PDA

View Full Version : Malware Analysis and Unpacking Forum


Pages : [1] 2 3 4 5 6 7 8 9

  1. [ TECHNICAL TEAR DOWN : DIGICOUPPOAN (PUP/ADWARE) ]
  2. gosong.net - malware site
  3. some FB shared malware.
  4. malevolous pdf sample
  5. Asprotected app, I have the key constants and a working key.
  6. Unpacking PESpin v1.32?
  7. my USB another infection..
  8. some malware got on my usb-stick
  9. Using veil with a dll
  10. Custome Themida? packed malware
  11. Trusteer rapport
  12. new hasp envelope? unknown PE packer
  13. PE Section Adder and rebuilder
  14. Rogue dll
  15. obfuscated java script that result to drive-by download
  16. Break on ResumeThread
  17. PeCompact 2.X unpacking problem
  18. This site really seems like snakeoil + fake AV potential candidate.
  19. Allaple Malware analysis for illustration..
  20. Machine learning for malware detection and classification
  21. Cracking a shareware keyfile protection.
  22. Binary Auditor - PE format rebuilding exercise solution
  23. Help unpacking old malware - Malware attached
  24. some malwares from USB
  25. just today infected USB-flash
  26. Malware samples: broken vs tool detection
  27. Unpacking Dynamically Allocated Code
  28. PackerBreaker - Yet another universal unpacker tool
  29. The fully Automated "VirusBusterKit" - A Hype or Reality?
  30. Need Help to Unpack file packed with ApLib
  31. some crushing malware unpacking
  32. [Help] Need help to unpack files completely
  33. Anti-Dumping - Part 3
  34. Automated Static Malware Analysis with Pythonect
  35. Help with ASProtect 1.23 RC4 unpacking
  36. PPEE (puppy) 1.01
  37. Need tips to analyze hacked memory pointers
  38. Need help analyzing injected code
  39. Lab Hardware
  40. Fake AV malware to play with
  41. Unpacking Mac OSX Dock
  42. import table problem
  43. Olly crashes when I try to attach to a new process that malware started
  44. Debug a Remote Thread in Olly Debugger
  45. Delphi App Reversing with Olly
  46. finding worm injected exe name/path in memory
  47. Collection Of OllyDbg Bugs And Exploits
  48. Yet Another Anti-Debug Trick
  49. Setting up a mail server
  50. A new Anti-Olly trick
  51. Your free airline ticket is ready.
  52. An anti-attach trick.
  53. USPS Delivery Failure Notification "USPS report.zip"
  54. Cannot proceed - Packed EXE?
  55. [ARTeam] Analyzing an Adobe Flash Malware (CVE-2011-2110) by +NCR/CRC!
  56. Obfuscation affect on Dependency Walker?
  57. Patching Antivirus XP 2008 [Malware]
  58. Problem with MoleBox unpacking
  59. Unpacking / Patching Maleware - Help needed
  60. Pointers in unpacked file don't get rebased
  61. Thinstall Consult?
  62. [Unpackme] Unknown .net packer UnpackMe
  63. Help analyzing a malicious PDF
  64. Rooted/botted
  65. Malware(Hackarmy) - Olly hangs
  66. Trouble Unpacking Netsky-Q FSG 1.0 and UPX 0.80 - 1.24 DLL -> Markus & Laszlo
  67. MacDefender - Indicator of future malware or not?
  68. Honeynet Forensic Challenge 8 - "Malware Reverse Engineering"
  69. Is code analysis cost effective?
  70. Zeus sourcecode
  71. Compromised by a virus
  72. Malware Analysis - Starting out..
  73. Buster Sandbox Analyzer
  74. Trying to unpack .exe with Securom 7.00.00.0001
  75. LINK: Malcode Context of API Abuse
  76. Cracking the logic of XP security 2011 for 'fun'.
  77. packed dll file dropped by virus
  78. how to know which protection is used
  79. Change a intern link in a .exe file
  80. Amr Thabet: Reversing Stuxnet's Rootkit (MRxNet) Into C++
  81. Can't Dump a w32 binary (malware)?
  82. What packer is this?
  83. InternetSecurity2011
  84. Anti-Unpacker Tricks
  85. VB Header Info
  86. How can I handle waitforsingleobject() error while debugging?
  87. Extract Sequence of assembly codes during runtime ???
  88. ELF - problem with unpacking
  89. Unknown packer (MZP signature)
  90. CongratZ! Now .NETwill load malware
  91. MBR analysis
  92. Virtob.si yet ready to infect you..
  93. Restore Themida/Winlicense VM codes to original x86
  94. Debugging and unpacking NsPack
  95. Malware analysis Machine Reimaging
  96. Pokas x86 PE Emulator for Generic Unpacking
  97. Write your Own Unpacker
  98. analyze a dll
  99. How to analyze on a live system that is infected?
  100. immunity debugger plugin
  101. Unknown packed file prob Zbot variant
  102. {smartassembly} protection analysis + unpacker (with source)
  103. Armadillo help?
  104. Compromised by Super Private Keylogger
  105. Drive-by browser exploit analysis
  106. if WinRAR is in NullsoftInstaller, then...
  107. what about this sample?
  108. Java Malware question.
  109. AntiUnpacking Tricks of Malware
  110. KHOBE and Chicken Little
  111. extract runtime assembly code ?
  112. unlock file or folder , i hope this tool might be useful :)
  113. Interesting Malware analysis write up.
  114. IDA Debugger - strange behavior when debugging protectors
  115. Win32.Sinowal MBR rootkit
  116. Malware that tampers with debugger?
  117. Fake Virus Alert
  118. Relations Between APIs in Malware
  119. Easy and simple way to analyze malwares
  120. PHP Malware
  121. Parite.B virus
  122. Help to identify packer
  123. AntiDebug using GetKeyboardState?
  124. Autorun Malware
  125. unpack exe4j
  126. Infected, lets chase.
  127. JAVA malware
  128. Just 4 question ?
  129. Debugging an .msi .dll
  130. Setting up a malware analysis environment
  131. huh!? freeserials.ws Serials + Trojans!?!?
  132. KAV malware naming issue (funny)
  133. MBR worm
  134. Analysis of compiler infector Induc
  135. How Find Temporal Order Of API calls in PEs?
  136. Aurora Example
  137. Malware which password protects office files
  138. FSG unpacker with command line support?
  139. Is this malware?
  140. Trojan monitoring almost every browser
  141. Buster Sandbox Analyzer
  142. Visual Basic Packer???
  143. yoda cryptor help.
  144. swf exploit
  145. URLANDEXIT tag in WMV
  146. RBoT Packer Issues
  147. Tips for thwarting VM detection
  148. Best place to submit a new threat?
  149. Java Host Virus
  150. ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code
  151. MALWARE 0day..fun
  152. tools from china ->heuristic virus detection (bdv)
  153. problem with resource section after unpacking
  154. Malware for analysis - "Michael Jackson Gay" virus (Yahoo messenger spammer)
  155. i wrote a game music unpacker
  156. How to extract java classes from executable.
  157. [Question] How can you dump virtually allocated memory ?
  158. I got Trojanned
  159. Virii but we dont care!!!
  160. PDF Exploit
  161. exploited pdf
  162. Malware creates new thread, how do I follow it?
  163. funny comics unpacking tut
  164. Please help analysing new SWF exploit!
  165. LHA encoding/decoding
  166. Unpacking a MoleBox 2.5.7
  167. Entropy visualization utilities for packed malware?
  168. Trojan type infection perhaps?
  169. CRC calculation
  170. tinyPE reversing
  171. CrypKey Instant 6.x -> CrypKey Inc.
  172. Got a virus - please help analysing
  173. Question about an algorithm
  174. Trying to ID the packing in a BIOS file
  175. ExeCryptor kioresk Tut about lic
  176. psyb0t
  177. SANS malware analysis article
  178. Execryptor EC functions
  179. Common Malicious API's
  180. obscure rootkit(?) offer fr infected user, kernel detective (long post)
  181. Pace Interlok (iLok)
  182. Researchers unveil persistent BIOS attack methods
  183. Extracting shellcode from office docs?
  184. winzix fun??
  185. thekeys.ws virus (don't know what it is)
  186. securom nag
  187. How to deal with polymorphic code
  188. Where to download malware?
  189. VB injects DELHPI ~;
  190. Undetected home work
  191. Rootkit.Win32.TDSS.eyj Another custom packer/cryptor
  192. AV Emulators not able to handle far jmp, yet.
  193. fun malware cryptor ~;
  194. "HOT URL!" your PC infected, install AV2009
  195. Another unknown packer in malware
  196. Malware packed with unknown packer
  197. Trojan.Win32.VB.jir - Automated Analysis tools Aware
  198. in VB6 malware \Device\PhysicalMemory?
  199. today's torrent-malware fight
  200. Malware refuses to run properly on VMWare
  201. what's packer of this malware code.
  202. Conficker dll analyse
  203. fun remote DLL loading found in malware :)
  204. Themida protected plugin dll
  205. Question about Rootkit Unhooker
  206. Poison-Ivy RAT Packed with Molebox
  207. Some VB malware
  208. IDA - Analyzing offset independent malware
  209. lil malware unpacking contest here!
  210. Armadillo Inline Patching problem
  211. SVCHOST.EXE under seige.
  212. SecuRom 7.30.0012
  213. XP AntiVirus 2009
  214. Armadillo OEP
  215. Malware Challenge Contest
  216. Armadillo 5.x 6.x IAT problem (oep OK)
  217. LINK: A Quick Survey on Automatic Unpacking Techniques
  218. Shellcode analyzing
  219. PDF_stream_inflater
  220. Disinfecting a program.
  221. Themida IAT rebuild for Hardware Dependancys targets
  222. does this tmp5.tmp install any driver
  223. unpacked Srizbi
  224. For you guys to solve out
  225. recombining functions split into 1-cmd-chunks
  226. strange AntivirusXP2008?
  227. Trojan.Win32.Agent.vie
  228. Packed Malware - Double Packed?
  229. Please Dump me , Please !
  230. TR/Crypt.XPACK.Gen - Trojan
  231. Trojan horse...a Hellenes poetic fancy !!
  232. Unpacking Storm Worm
  233. Inside Parite.B virus
  234. Analyzing Google toolbar requests
  235. Trojan made in C#
  236. SWF Encrypt explanation.
  237. lARP v2.0 Ultra
  238. a packed exe file, can't be loaded normally
  239. an arma question
  240. Run-time Detection of Self-Replication
  241. Malware analysis examples @ Websense
  242. eEye BootRoot
  243. OEP of Arm 1.xx to 2.x protected Targets
  244. Virtual environment to test CIH (A.K.A Chernobyl) virus?
  245. seems to some script kiddies autit v3 virus
  246. Computer Viruses as Artificial Life
  247. SSDT Hooking + AV
  248. How to find a suspectious program?
  249. Execryptor + Ollydbg
  250. 【Help】Please analyze the code