SmoothOperator abuses Microsoft Authenticode signatures to seem valid. Here is an explanation how it works and how to detect it in files.
Buy me a coffee:
Follow me on Twitter:
AnalysePESig:
SigFlip:
Sysinternals:
Using unauthenticated data inside authenticode signed binaries: ://
1 view
0
0
7 months ago 00:34:11 1
Malware Analysis - JS to PowerShell to XWorm with Binary Refinery
9 years ago 00:19:53 124
Static Malware Smtp Fail Analysis [ShmooCon 2016]
2 years ago 01:05:44 1
Reverse Engineering and Malware Analysis
10 months ago 00:40:05 1
Malware Analysis - Unpacking AutoIt stub with large obfuscated script
9 years ago 00:37:03 4
automated malware analysis with cuckoo
11 months ago 00:43:08 1
Malware Analysis - 3 ways to deobfuscate JScript and JavaScript malware
10 months ago 00:27:09 1
Malware Analysis - C2 extractor for Turla’s Kopiluwak using Binary Refinery
8 months ago 00:39:13 1
REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It
2 years ago 00:07:55 1
Top 5 Malware Analysis Websites
1 year ago 00:28:07 1
Malware Analysis - ZPAQ to .NET downloader to Injector DLL unpacking
9 years ago 00:03:19 14
Online виртуальная машина (Malware Analysis )
3 years ago 01:42:04 6
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
1 year ago 00:16:18 1
Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla
5 years ago 00:30:36 6
Black Hat USA 2016 An AI Approach to Malware Similarity Analysis Mapping the Malware Genome
2 years ago 00:37:03 1
Malware Analysis - 3CX SmoothOperator with Binary Ninja
1 year ago 00:10:36 1
Malware Analysis - Unpacking Ageostealer built with Electron Framework
2 years ago 00:14:57 1
Does Writing Malware Help With Malware Analysis?
1 year ago 00:20:06 1
Malware Analysis - Agniane Stealer, Native Stub to .NET Unpacking
6 years ago 00:10:32 4
Malware Analysis - Unpack and Decompile PyInstaller Malware
5 years ago 00:07:33 1
Malware Analysis Bootcamp - Understanding The PE Header