What’s My (File)Name?, (Mon, Jul 7th)

Modern malware implements a lot of anti-debugging and anti-analysis features. Today, when a malware is spread in the wild, there are chances that it will be automatically sent into a automatic analysis pipe, and a sandbox. To analyze a sample in a sandbox, it must be “copied” into the sandbox and executed. This can happen manually or automatically. When people start the analysis of a suspicious file, they usually call it “sample.exe”, “malware.exe” or “suspicious.exe”. It&#;x26;#;39;s not always a good idea because it&#;x26;#;39;s can be detected by the malware and make it aware that “I&#;x26;#;39;m being analyzed”.

Continue reading What’s My (File)Name?, (Mon, Jul 7th)

Posted in Uncategorized

Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)

We have collected SSH and telnet honeypot data in various forms for about 10 years. Yesterday&#;x26;#;39;s diaries, and looking at some new usernames attempted earlier today, made me wonder if botnets just add new usernames or remove old ones from their lists. So I pulled some data from our database to test this hypothesis. I didn&#;x26;#;39;t spend a lot of time on this, and this could use a more detailed analysis. But here is a preliminary result:

Continue reading Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)

Posted in Uncategorized