malware
An Obfuscation Tour
Obfuscation is often used by malware samples to hide their SECRETs, but we know how to uncover them. Want to know as well? Check our guide here.
Obfuscation is often used by malware samples to hide their SECRETs, but we know how to uncover them. Want to know as well? Check our guide here.
The world is lockedown, but SECRET’s finding keep being unlocked. This time we uncovered a wave of ransomware threats. Check it out here.
Marcus’ RevEngE against malware! This week SECRET arrived in Vienna to participate of the Reversing and Offensive-oriented Trends Symposium 2019 (ROOTS). Marcus discussed challenges and pitfalls of decompiling malicious samples and presented RevEnge, the Reverse Engineering Engine. RevEngE is a Proof-of-Concept (PoC) tool to the debug-oriented decompilation approached that we Read more…
Tamy Beppler, a SECRET researcher, has been presenting her research in the 2019 Information Security Conference. Tamy investigated the use of file textutres for malware families’ classification. Interested in taking a look on her results? Check this link.
An Internet company has been promoting a competition that challenges researchers to bypass machine learning models for malware detection. SECRET has been participating this challenge and our members (Fabrício Ceschin and Marcus Botacin) were able to bypass all models! Want to know more about how to code a binary that Read more…
Another SECRET course! Marcus Botacin presented how to reverse engineer Linux ELF binaries at SBSEG 2019. Check course materials on the github.
SBSEG promoted a tools exhibition event during the event. Marcus Botacin, representing SECRET, presented RevEngE, the Reverse Engineering Engine. RevEngE is a prototype of a malware decompilator aimed to assist analysts to debug malware executions. You can find all details on github.
Marcus Botacin, a SECRET member, present his research about malware variants identification in practice. The research was awarded by the program committee during the event. Check all details on github.
Malware is the main SECRET research line, thus SECRET researchers are often reverse engineering malware samples. A key SECRET principle is to strongly rely on in-house developed analysis tools. We here share a bit of the SECRET-developed tools. A daily task at SECRET is to perform binary static analysis to Read more…