Specific malware analysis

CTB-Locker: files decryption demonstration feature
CTB-Locker: encryption/decryption scheme in details

Android Koler trojan: C&C part
Android Koler trojan: analysis driven by application components

KINS Virtual Machine
Initialization and DNA paternity test

Nailuj sys file analysis. A description of the tricks used by Nailuj rootkit. Pdf version available here.

Ascesso trojan. Some words on how to decrypt trojan Ascesso. Pdf version available here.

One comment on “Specific malware analysis

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s