Skip to content (Press Enter)
  • Home

Ghetto Forensics

  • Home
Default Image

Tag: malware analysis

Creating a Malware Sandbox in Seconds with Noriben.

January 18, 2016May 20, 2025 Brian Baskin

Happy New Years! As part of the new year, let’s make an effort to make your defensive posture better, especially through quicker and more effective malware analysis! A few years ago I created a sample malware analysis sandbox script to use for the analysis and reverse engineering that I performed on a daily basis. Let’s …

Read More

A Walkthrough for FLARE RE Challenges

September 22, 2014May 20, 2025 Brian Baskin

The FireEye Labs Advanced Reverse Engineering (FLARE) challenge was causing a bit of a buzz when it was announced and launched in early July. It read like a recruitment campaign for a new division within FireEye, but still a fun challenge to partake in. The challenge started … and I was on-site at a client …

Read More

Malware with No Strings Attached Part 2 – Static Analysis

February 17, 2014May 20, 2025 Brian Baskin

In the previous post I showed some dynamic analysis procedures for a variant of a trojan known to Symantec as Coreflood. Based on the dynamic analysis, we discovered that the analyzed sample contained very few strings of use. It decrypted an embedded executable, which was injected into memory for execution. It dropped an encrypted file to …

Read More

Malware with No Strings Attached Part 1 – Dynamic Analysis

February 15, 2014May 20, 2025 Brian Baskin

I had the honor of lecturing for Champlain College’s graduate level Malware Analysis course this week. One of the aspects of the lecture was showing off dynamic analysis with my Noriben script and some of the indicators I would look for when running malware. While every malware site under the sun can tell you how …

Read More

Malware Analysis: The State of Java Reversing Tools

September 3, 2013May 20, 2025 Brian Baskin

In the world of incident response and malware analysis, Java has always been a known constant. While many malware analysts are monitoring more complex malware applications in various languages, Java is still the language of love for drive-by attacks on common end-users. It is usually with certainty that any home user infection with malware such …

Read More

Search

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Tags

.net behavior analysis bsidesdc bsidesde cafebabe challenge class ctf cybergamut debugger dfir dynamic analysis encryption fernflower forensics gmail google ida infected infosec jad jar java jd-gui jdo jmd krakatau malware malware analysis matasano memory microsoft Noriben plaso privacy procmon python reverse engineering runtime security shedexec sysinternals trojan volatility windows
© 2025 Ghetto Forensics. All Rights Reserved. Prime Cyber Security By Themeignite. Powered By WordPress.