Author Topic: Reverse engineering malware adventure  (Read 404 times)

0 Members and 1 Guest are viewing this topic.

Offline techb

  • Soy Sauce Feeler
  • Global Moderator
  • King
  • *
  • Posts: 2350
  • Cookies: 345
  • Aliens do in fact wear hats.
    • View Profile
    • github
Reverse engineering malware adventure
« on: March 07, 2015, 07:53:14 am »
Found via hackaday.com

A writeup on finding some malware in an email attachment as a .doc utilizing ZeuS. The guy did an excellent job with the post, really it's a great read. It might help some others looking to do this kinda thing. This also shows the power/usefulness of Notepad++.

http://phishme.com/decoding-zeus-disguised-as-an-rtf-file/
« Last Edit: March 07, 2015, 07:57:21 am by techb »
>>>import this
-----------------------------

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Re: Reverse engineering malware adventure
« Reply #1 on: March 07, 2015, 09:23:43 pm »
Thanks for the share. Indeed an interesting article.