AccidentalRebel.com
  • Archives
  • Categories
  • Tags
  • Newsletter
  • About
Malware Analysis

Talking about Mitre's Malware Behavior Catalog

Tue 02 August 2022
Talking about Mitre's Malware Behavior Catalog

An overview of MITRE's Malware Behavior Catalog (MBC) framework and MBCScan, a command-line tool I built to surface MBC behaviors from Capa scan results.

Read more →
malware analysis mitre +1 more
misc

String anti-virus evasion in x64 assembly (Part 2)

Sat 09 July 2022
String anti-virus evasion in x64 assembly (Part 2)

How to hide API call strings from antivirus detection using LoadLibrary and GetProcAddress for runtime DLL loading, with a full x64 assembly implementation.

Read more →
evasion assembly av
misc

String anti-virus evasion in x64 assembly (Part 1)

Fri 08 July 2022
String anti-virus evasion in x64 assembly (Part 1)

How to hide strings from antivirus detection by placing them on the stack instead of the .data segment, demonstrated in C and x64 Windows assembly.

Read more →
evasion assembly av
misc

Converting a malware dropper to x64 assembly

Sun 03 July 2022
Converting a malware dropper to x64 assembly

Practical lessons from converting a C malware dropper to x64 Windows assembly, covering shadow spaces, calling conventions, and memory segments.

Read more →
malware assembly reverse-engineering
Threat Hunting

Cyber Corp Case 2 Writeup - Part 3

Sat 06 November 2021
Cyber Corp Case 2 Writeup - Part 3

CyberCorp Case 2 part 3 — certutil download, LSASS dumping, WMI lateral movement to a domain controller, and tracking the second reverse shell C2 address.

Read more →
threat-hunting cyberdefenders
Threat Hunting

Cyber Corp Case 2 Writeup - Part 2

Wed 03 November 2021
Cyber Corp Case 2 Writeup - Part 2

CyberCorp Case 2 part 2 — decoding a base64 gzipped registry payload, tracing PID spoofing in PowerShell, and identifying the reverse shell C2 IP.

Read more →
threat-hunting cyberdefenders
Threat Hunting

Cyber Corp Case 2 Writeup - Part 1

Sat 30 October 2021
Cyber Corp Case 2 Writeup - Part 1

CyberCorp Case 2 threat hunting walkthrough — tracking WMI persistence, a malicious Word document, and a hidden iexproxy.dll download technique in Kibana.

Read more →
threat-hunting cyberdefenders
Tools

New Tool Preview: vATT&CK

Mon 18 October 2021
New Tool Preview: vATT&CK

vATT&CK is a visual relationship mapper for MITRE ATT&CK that shows linked malware, threat groups, mitigations, and subtechniques in a single interactive graph.

Read more →
tools cybersecurity
Reverse Engineering

IOLI Crackme 0x04

Wed 29 September 2021
IOLI Crackme 0x04

IOLI Crackme 0x04 walkthrough — the password is any digits that sum to 15, revealed by tracing sscanf-based accumulation through static analysis in IDA.

Read more →
re crackme
Malware Analysis

Building my Virtual Cybersecurity Home Lab

Sun 05 September 2021
Building my Virtual Cybersecurity Home Lab

How I built a virtual cybersecurity home lab with pfSense, Metasploitable, Kali, Splunk, Snort, and a dedicated malware analysis network using Remnux.

Read more →
malware dev
« Previous 1 2 3 4 5 Next »
AccidentalRebel

AccidentalRebel

Juan Karlo Licudine

Defense-first security engineer who builds tools and thinks like an attacker. Now focused on where AI and security collide.

  • Email
  • LinkedIn
  • GitHub

For weekly CyberSecurity x AI news subscribe below

© AccidentalRebel. Defense-first security engineer who builds tools and thinks like an attacker. Now focused on where AI and security collide.
  • Email
  • LinkedIn
  • GitHub