#blue teaming

detective search icon virus icon
cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet. Part 2

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

cover image for article: Malware Analysis example. Classic case: Stuxnet

Malware Analysis example. Classic case: Stuxnet

Stuxnet, as it came to be known, was unlike any other virus or worm that came before. In today's article we will reverse engineer this malware in order to better understand its code.

cover image for article: Intro to static malware analysis

Intro to static malware analysis

Static code analysis is the technique of studying the source code of a program without running it. This can be valuable for malware reverse engineering, as it can assist discover dangerous code.