shellcode

2024-08-05

Shellcode is a small piece of code employed by malware that is used as the payload when exploiting software vulnerabilities. It is known as shellcode, ...

Read More

Signature Detection

2024-08-05

A signature in the context of malware analysis and detection is a series of bytes, strings, or characteristics that uniquely identifies a sample as ...

Read More

strings command

2024-08-05

strings is a program that finds and prints readable strings within a binary file. It is useful for determing the contents of non-text files. This is ...

Read More

UUIDfuscation

2024-08-05

UUIDfuscation is the process of using UUIDs to encode and obfuscate malware.

A UUID is made up of 5 segments of different sizes and may look something ...

Read More

Malware

2024-08-04

Malware is software specifically designed to perform malicious actions. Malware may disrupt, damage, or provide unauthorized access to a computer ...

Read More

Malware Development Life Cycle

2024-08-04

The Malware Development Life Cycle (MDLC) is a process similar to the Software Development Life Cycle (SDLC), but focused on malware.

The MLDC can be ...

Read More

payload

2024-08-04

In the context of cybersecurity, a payload is a component of an attack that causes harm to the victim host.

Read More

Windows

2024-08-04

Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.

It is grouped into families that cater to ...

Read More

Bokbot

2024-08-03

IcedID (Aka BokBot) is a malware family of modular banking trojans, capable of acting as a dropper.

Read More

Emotet

2024-08-03

Emotet (aka Mealybug) is a malware strain and cybercrime operation believed to be based in Ukraine.

https://en.wikipedia.org/wiki/Emotet

Read More