Recent Posts

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...