A forum for reverse engineering, OS internals and malware analysis 

Search found 6 matches

 Go to advanced search

Re: RedEye Ransomware

 by Nurohman Mohammed ¦  Tue Feb 12, 2019 7:58 am ¦  Forum: Malware ¦  Topic: RedEye Ransomware ¦  Replies: 7 ¦  Views: 3953

upload to mega.nz to avoid deletion by filehosting admin.
zippyshare will delete files like that.

Re: GX40 Ransomware

 by Nurohman Mohammed ¦  Thu Jan 24, 2019 12:20 pm ¦  Forum: Completed Malware Requests ¦  Topic: GX40 Ransomware ¦  Replies: 3 ¦  Views: 894

thank you very much @dumb100, now i can start analyzing this old sample. :)

GX40 Ransomware

 by Nurohman Mohammed ¦  Thu Jan 24, 2019 7:42 am ¦  Forum: Completed Malware Requests ¦  Topic: GX40 Ransomware ¦  Replies: 3 ¦  Views: 894

GX40 Ransomware

MD5 : f9da7dcf28c9e06ef9b2d39467c82f70
SHA1 : da4b57856503f0a6473aac73a726de0d5c3cb5cd

Article : https://twitter.com/BleepinComputer/sta ... 7246061568
AV site : https://www.virustotal.com/en/file/0659 ... /analysis/

Re: Malware Analyst

 by Nurohman Mohammed ¦  Thu Jan 24, 2019 6:09 am ¦  Forum: Newbie Questions ¦  Topic: Malware Analyst ¦  Replies: 6 ¦  Views: 1985

okay, thankyou :D

Re: Malware Analyst

 by Nurohman Mohammed ¦  Mon Jan 21, 2019 1:46 am ¦  Forum: Newbie Questions ¦  Topic: Malware Analyst ¦  Replies: 6 ¦  Views: 1985

owh, thankyou for the answer, I think just doing research alone is enough. by the way, my answer number 1, anyone know here about that ? screenshot : 1. https://3.bp.blogspot.com/-Fb0ffWXTBqw/Wy3YIY5-jCI/AAAAAAAAAHw/cNk0yA9gGWwclFsxgyM6Cy9J9uS4gAVIACLcBGAs/s1600/0.png https://3.bp.blogspot.com/-Fb0f...

Malware Analyst

 by Nurohman Mohammed ¦  Sun Jan 20, 2019 9:45 am ¦  Forum: Newbie Questions ¦  Topic: Malware Analyst ¦  Replies: 6 ¦  Views: 1985

Hey, I'm new here. I want to ask about analyzing malware. 1. How do malware analysts use the [ progress telerik fiddler web debugger ] to detect the type of malware they are analyzing? like when analyzing a suspicious url that is transferred to another page, let's call it an exploit kit. fiddler imm...