Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I’ll show you how a malware can hide suspicious information related to created processes.

Continue reading Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

Posted in Uncategorized

Analysis using Gephi with DShield Sensor Data, (Wed, Jan 7th)

I&#;x26;#;39;m always looking for new ways of manipulating the data captured by my DShield sensor [1]. This time I used Gephi [2] and Graphiz [3] a popular and powerful tool for visualizing and exploring relationships between nodes, to examine the relationship between the source IP, filename and which sensor got a copy of the file. I queried the past 30 days of data stored in my ELK [4] database in Kibana using ES|QL [5][6] to query and export the data and import the result into Gephi.

Continue reading Analysis using Gephi with DShield Sensor Data, (Wed, Jan 7th)

Posted in Uncategorized

A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)

Malicious use of QR codes has long been ubiquitous, both in the real world as well as in electronic communication. This is hardly surprising given that a scan of a QR code can lead one to a phishing page as easily as clicking a link in an e-mail.

Continue reading A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)

Posted in Uncategorized