malwareresearch | Unsorted

Telegram-канал malwareresearch - Malware Research

9618

Group for Malware Analysts. Pinned message with resources and rules: https://t.me/MalwareResearch/38033

Subscribe to a channel

Malware Research

I've never heard of login algorithms

Читать полностью…

Malware Research

Hello @maria1994ariam, welcome to the Malware Research group! Please read the pinned message before you post!

Читать полностью…

Malware Research

Rising was correct that it's bloated, well, at least based on its description

Seems to be Vidar stealer, haha

Читать полностью…

Malware Research

https://www.virustotal.com/gui/file/f78100cf92b6659186c3751f5d1b2f829db1457f73e0b08a8b7dab807f0a4fa5?nocache=1

Читать полностью…

Malware Research

Free Desktop version with Expert plan, only for Windows 7-11

Читать полностью…

Malware Research

New FedBan
Fed: Libra's Empire
FedAdmin: ❤🦦
User: !IT’S UNKNOWN
User ID: 7486705603
Reason: for ignoring warning

Читать полностью…

Malware Research

/channel/reverseengineeringz/9275

Читать полностью…

Malware Research

anything that's related to malware research, provided it's within the rules

the most common requests here are for malware samples, followed by some questions on what they couldn't solve

Читать полностью…

Malware Research

i'm new in group how does it works...?

Читать полностью…

Malware Research

Hello! I’m preparing my own index FOR610 and I would like to ask if someone has any index just to share and compare it

Читать полностью…

Malware Research

Hello Amy Wilson, welcome to the Malware Research group! Please read the pinned message before you post!

Читать полностью…

Malware Research

https://youtu.be/Ld_DKSg4kik

Читать полностью…

Malware Research

otherwise, the lazy/confidential way would be to go to Malpedia and search for the malware name and read through the reports for its behaviours for detection

Читать полностью…

Malware Research

If anyone is curious about this or tries to solve it, pls let me know as well.))

Читать полностью…

Malware Research

I was able to analyze the part where it downloads and compiles C# code, but I couldn't manage the part after that

Читать полностью…

Malware Research

Anyone reverse engineered instagram login algorithms?

Читать полностью…

Malware Research

ALYac's name for it is cool. Halloween? 😁

Читать полностью…

Malware Research

"Rising" the name which I never heard tbh flagged this file while other AV remain silent 😁

Читать полностью…

Malware Research

keeping the message here if someone is interested in the suspicious file 😁

Читать полностью…

Malware Research

Hello @Sffhhgj, welcome to the Malware Research group! Please read the pinned message before you post!

Читать полностью…

Malware Research

If anyone want to learn ethical hacking dm me

Читать полностью…

Malware Research

Hii Guys,
I'm new to Malware Analysis
I have a quiet knowledge in web pentesting and linux

Can anybody share the Roadmap for Malware Analysis..... 🙂

Читать полностью…

Malware Research

User !IT’S has 1/3 warnings; be careful!
Reason:
read the pinned message to understand what this group is about and don't ask irrelevant questions

Читать полностью…

Malware Research

Hi. I am new in this group.

Читать полностью…

Malware Research

User 0x876008c67af has 1/3 warnings; be careful!
Reason:
stay on topic

Читать полностью…

Malware Research

User dCrypTØR has 1/3 warnings; be careful!
Reason:
add a description to links

Читать полностью…

Malware Research

Hello TK, welcome to the Malware Research group! Please read the pinned message before you post!

Читать полностью…

Malware Research

the URL is dead, no samples are available. if you need help in analysis, please share the hash so someone else can download and assist you

Читать полностью…

Malware Research

The detection part is completed. What I want to figure out is the malware's behavior. If the C# code is running, or if it has already run, what does it do? What are the next steps?

Читать полностью…

Malware Research

Based on the pasted script...

A PowerShell script that connects to the Internet, which subsequently executes cmd and modifies the Run key?

Sigma rule can do that, but whether your tool can support this method of detection is another

Читать полностью…
Subscribe to a channel