Loading...

Binary Ninja Plugin: fix-stomped-imports

Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware that proved to be tricker than expected. As we'll see, this sample maps a PE [...]

By |2024-09-18T13:29:21+00:00September 18, 2024|

Using PoolTags to Fingerprint Hosts

Commonly, malware will fingerprint the host it executes on, in an attempt to discover more about its environment and act accordingly. Part of this process is quite often dedicated to analyzing specific data [...]

By |2018-08-08T11:00:31+00:00August 8, 2018|
Go to Top