Downloader

Reverse Engineering

[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms

This article has a slightly different objective than the last ones I published, it is not about an analysis of specific malware. Today’s article is about a case study of the Latrodectus string decryption algorithm (analyzed in the previous research). The objective is to study how to identify a string decryption algorithm when reverse engineering […]

, ,

[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Read Post »

Detection Engineering Reverse Engineering Threat Hunting

Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement?

My first public malware research was for a strain of IcedID. A few months later, in my nighttime activities, I was working on technical analysis research for Sodinokibi (REvil), a Ransomware that is no longer seen, however, is part of the evolutionary history of the business model that we now know as RaaS. But, I

, ,

Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement? Read Post »

Scroll to Top