malware

MalwareBytesSecurity

SamSam ransomware: controlled distribution for an elusive malware

Credit to Author: Malwarebytes Labs| Date: Mon, 18 Jun 2018 19:30:53 +0000

SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.

Categories:

Tags:

(Read more…)

The post SamSam ransomware: controlled distribution for an elusive malware appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

Credit to Author: Sameer Patil| Date: Fri, 08 Jun 2018 09:59:53 +0000

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the in-wild exploit is being used in limited, targeted attacks and it…

Read More
MalwareBytesSecurity

Malware analysis: decoding Emotet, part 2

Credit to Author: Vishal Thakur| Date: Thu, 07 Jun 2018 15:00:00 +0000

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

Categories:

Tags:

(Read more…)

The post Malware analysis: decoding Emotet, part 2 appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Malware analysis: decoding Emotet, part 1

Credit to Author: Vishal Thakur| Date: Fri, 25 May 2018 15:00:00 +0000

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you’ll learn how to recognize and discard “dead” code thrown in to complicate the analysis process.

Categories:

Tags:

(Read more…)

The post Malware analysis: decoding Emotet, part 1 appeared first on Malwarebytes Labs.

Read More