Glupteba's .NET dropper deep dive.
In this article, we will be analyzing Glupteba's first stage, where a executable is dropped and executed at disk from a decrypted .NET resource.
Read More
Unveiling custom packers: A comprehensive guide
In this article, you'll be diving into an introduction to how packers work, some tips to unpack, and two walkthroughs showing off how i usually deal with custom packers.
Read More
Asymmetric cryptography: A mathematical introduction.
Asymmetric cryptography, or Public-key cryptography, is the type of cryptography which, instead of symmetric cryptography, utilizes pairs of keys. Each pair is made up by a Public Key and a Private Key. As their names says, the Public Key can be exposed to anyone in the world, but the Private Key must be kept in secret, only you should know what is its values.
Read More
Unpacking an Emotet trojan
Emotet, in general, is a banking trojan. Identified in-the-wild for the first time in 2014 as a stealth info stealer (mainly targeting banking informations), emotet has evolved to a sofisticated trojan over the years; Now having funcionalities that goes from simply keylogging to self-spreading (as worms do).
Read More