Recent
Great resources for starting out in malware reverse engineering
1501 words·8 mins·
loading
·
loading
ReverseEngineering
Training
MalwareAnalysis
Linux
MacOS
Windows
AppleSilicon
Microsoft
BeginnerFriendly
A list of resources for people looking to start their adventure into the wonderful world of malware reverse engineering. This list will be dynamically updated as and when I can evaluate new training material (both paid and free) available on the market.
The difference between dynamic and static analysis
2350 words·12 mins·
loading
·
loading
ReverseEngineering
Training
MalwareAnalysis
Linux
MacOS
Windows
AppleSilicon
Microsoft
Explaining the fundamental differences in dynamic and static analysis in reverse engineering malware samples across Windows, Mac and Nix endpoints.
Delving into BlueNorOff malware
2381 words·12 mins·
loading
·
loading
MacMalware
ARMRE
ReverseEngineering
Ghidra
Bluenoroff
APT
DPRK
MacOS
In this article, we examine a newer strand of Bluenoroff malware from late 2023 on MacOS systems. It’s our first look at a strand of malware from an APT.
Analysis of PureLand Info Stealer
2614 words·13 mins·
loading
·
loading
MacOS
ARM
MacMalware
ReverseEngineering
eCrime
infostealer
Analysis of an information stealer application designed for MacOS systems alongside a detailed breakdown of the structure of iOS applications to aid in future analysis of mac malware.
[Part 2] Creating a safe (and functional) RE environment on Apple Silicon - UTM
1998 words·10 mins·
loading
·
loading
UTM
ARM
Virtualisation
AppleSilicon
MacMalware
ARM-basedWindows
ARM-basedLinux
FlareVM
This blog post will guide you through the key programs and downloads required to successfully set up a functional and safe malware environment on M series MacBooks using UTM.
[Part 1] Creating a safe (and functional) RE environment on Apple Silicon - VMWare Fusion
3281 words·16 mins·
loading
·
loading
Virtualisation
ReverseEngineering
FlareVM
ARM
inetsim
AppleSilicon
ARM-basedLinux
ARM-basedWindows
VMWareFusion
This blog post will guide you through the key programs and downloads required to successfully set up a functional and safe malware environment on M series MacBooks using VMWare Fusion.