shellcode
2024-08-05
Shellcode is a small piece of code employed by malware that is used as the payload when exploiting software vulnerabilities. It is known as shellcode, ...
Read More
Signature Detection
2024-08-05
A signature in the context of malware analysis and detection is a series of bytes, strings, or characteristics that uniquely identifies a sample as ...
Read More
strings command
2024-08-05
strings is a program that finds and prints readable strings within a binary file. It is useful for determing the contents of non-text files. This is ...
Read More
UUIDfuscation
2024-08-05
UUIDfuscation is the process of using UUIDs to encode and obfuscate malware.
A UUID is made up of 5 segments of different sizes and may look something ...
Read More
Malware
2024-08-04
Malware is software specifically designed to perform malicious actions. Malware may disrupt, damage, or provide unauthorized access to a computer ...
Read More
Malware Development Life Cycle
2024-08-04
The Malware Development Life Cycle (MDLC) is a process similar to the Software Development Life Cycle (SDLC), but focused on malware.
The MLDC can be ...
Read More
payload
2024-08-04
In the context of cybersecurity, a payload is a component of an attack that causes harm to the victim host.
Read More
Windows
2024-08-04
Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.
It is grouped into families that cater to ...
Read More
Bokbot
2024-08-03
IcedID (Aka BokBot) is a malware family of modular banking trojans, capable of acting as a dropper.
Read More
Emotet
2024-08-03
Emotet (aka Mealybug) is a malware strain and cybercrime operation believed to be based in Ukraine.
https://en.wikipedia.org/wiki/Emotet
Read More