Please note the following rules:

When uploading any malware be sure to do the following:

1. Change the extension to a non-executable one so that no one can accidently double click the file unless they are ready to deal with it in a safe manner. For example, rename *.exe to *.vxe.

2. Password protect the zip file and give the password.


Please note that if any files are found that are NOT protected in the above manner they will be removed.




Greetings All,

We would like to encourage people to use this forum for discussing all aspects of one of the most important facets of reverse code engineering, that of malware analysis. Since a majority of malwares tend to be packed and/or encrypted, this goes hand-in-hand with general unpacking strategies as well.

The term "malware" is meant in the broadest sense - viruses, worms, trojan horses, rootkits, even spyware and adware. Anything that *needs* to be reversed *should* be reversed and is fair game here.

Feel free to post links to other tutorials and analyses you may find, interesting discussions elsewhere, or anything else to add to the general knowledge base.

If you find an unknown malware and would like assistance in reversing it, or learn how to reverse it safely, then we can consider making it a communal Mini-Project in which all can participate.

Cheers,
Kayaker