New: malwareanalysisAll contenthive-129948hive-196917krsteemhive-180932hive-150122hive-183959hive-166405zzanhive-185836hive-144064hive-101145photographyhive-183397hive-188619hive-184714uncommonlabhive-145157bitcoinhive-103599hive-139150hive-193186hive-180301krsuccesshive-179660TrendingNewHotLikersmorfal (25)in malwareanalysis • 3 years agoAwesome Executable PackingSee A curated list of resources related to executable packing (including Portable Executable, Executable and Linkable Format and others). Contains books, papers, blog posts, and other written…utkonos (25)in reverseengineering • 6 years agoAlphaBlend Campaign Part 3This continues the reversing journey of the malicious DLL, msimg32.dll , and the AlphaBlend campaign. Now that I covered how to circumvent the SEH-based anti-debugging capability, we will look more…utkonos (25)in reverseengineering • 6 years agoAlphaBlend Campaign Part 2This post continues the analysis of the AlphaBlend campaign. I’d like to thank everyone for all the fantastic feedback. One goal I have is to always show my work, and I think my elementary school…