AccidentalRebel.com
  • Archives
  • Categories
  • Tags
  • Newsletter
  • About
misc

Malware sandbox evasion in x64 assembly by checking ram size - Part 2

Mon 15 August 2022
Malware sandbox evasion in x64 assembly by checking ram size - Part 2

Implementing sandbox evasion via GlobalMemoryStatusEx in x64 assembly, including how to manually calculate C struct sizes and pass pointers on the stack.

Read more →
malware sandbox evasion +2 more
misc

Malware sandbox evasion in x64 assembly by checking ram size - Part 1

Mon 08 August 2022
Malware sandbox evasion in x64 assembly by checking ram size - Part 1

Implementing the malware sandbox evasion technique of checking RAM size using GetPhysicallyInstalledSystemMemory, converted from C to x64 Windows assembly.

Read more →
malware sandbox evasion +2 more
Malware Analysis

Talking about Mitre's Malware Behavior Catalog

Tue 02 August 2022
Talking about Mitre's Malware Behavior Catalog

An overview of MITRE's Malware Behavior Catalog (MBC) framework and MBCScan, a command-line tool I built to surface MBC behaviors from Capa scan results.

Read more →
malware analysis mitre +1 more
misc

String anti-virus evasion in x64 assembly (Part 2)

Sat 09 July 2022
String anti-virus evasion in x64 assembly (Part 2)

How to hide API call strings from antivirus detection using LoadLibrary and GetProcAddress for runtime DLL loading, with a full x64 assembly implementation.

Read more →
evasion assembly av
misc

String anti-virus evasion in x64 assembly (Part 1)

Fri 08 July 2022
String anti-virus evasion in x64 assembly (Part 1)

How to hide strings from antivirus detection by placing them on the stack instead of the .data segment, demonstrated in C and x64 Windows assembly.

Read more →
evasion assembly av
misc

Converting a malware dropper to x64 assembly

Sun 03 July 2022
Converting a malware dropper to x64 assembly

Practical lessons from converting a C malware dropper to x64 Windows assembly, covering shadow spaces, calling conventions, and memory segments.

Read more →
malware assembly reverse-engineering
Threat Hunting

Cyber Corp Case 2 Writeup - Part 3

Sat 06 November 2021
Cyber Corp Case 2 Writeup - Part 3

CyberCorp Case 2 part 3 — certutil download, LSASS dumping, WMI lateral movement to a domain controller, and tracking the second reverse shell C2 address.

Read more →
threat-hunting cyberdefenders
Threat Hunting

Cyber Corp Case 2 Writeup - Part 2

Wed 03 November 2021
Cyber Corp Case 2 Writeup - Part 2

CyberCorp Case 2 part 2 — decoding a base64 gzipped registry payload, tracing PID spoofing in PowerShell, and identifying the reverse shell C2 IP.

Read more →
threat-hunting cyberdefenders
Threat Hunting

Cyber Corp Case 2 Writeup - Part 1

Sat 30 October 2021
Cyber Corp Case 2 Writeup - Part 1

CyberCorp Case 2 threat hunting walkthrough — tracking WMI persistence, a malicious Word document, and a hidden iexproxy.dll download technique in Kibana.

Read more →
threat-hunting cyberdefenders
Tools

New Tool Preview: vATT&CK

Mon 18 October 2021
New Tool Preview: vATT&CK

vATT&CK is a visual relationship mapper for MITRE ATT&CK that shows linked malware, threat groups, mitigations, and subtechniques in a single interactive graph.

Read more →
tools cybersecurity
« Previous 1 2 3 4 5 6 Next »
AccidentalRebel

AccidentalRebel

Juan Karlo Licudine

Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.

  • Email
  • LinkedIn
  • GitHub

For weekly Cybersecurity x AI threat analysis subscribe below

© AccidentalRebel. Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.
  • Email
  • LinkedIn
  • GitHub