Forging malicious DOC, undetected by all VirusTotal static engines
Malware research · 2020-12-24Walkthrough of a maliciously crafted Office document that evaded every static engine on VirusTotal — and what the engines were missing.
Posts from the previous version of this site. The technical content is intact; the formatting has been lightly cleaned up. Each post links back to its original URL.
Walkthrough of a maliciously crafted Office document that evaded every static engine on VirusTotal — and what the engines were missing.
Walkthrough and exploit for Level 06 of the Fusion exploitation series. Race conditions, integer overflow, stack overrun.
Solution for Level 05 of the Fusion series. Heap spraying, info leak, and ASLR bypass.
Deep technical dive into the Nymaim banking trojan: anti-analysis tricks, control-flow obfuscation, and the parts that fight back.
Reverse-engineering walkthrough of Ursnif: process injection, sandbox evasion, traffic obfuscation, and a bug in the malware's own DGA.