ChloeOSRe-implementing LummaStealer’s novel Anti-sandbox techniqueReferences - https://outpost24.com/blog/lummac2-anti-sandbox-technique-trigonometry-human-detection/Jun 23Jun 23
ChloeOSHTB: SimpleEncryptor, Reversing a simple encryption routineDescription: On our regular checkups of our secret flag storage server we found out that we were hit by ransomware! The original flag data…Apr 20, 20231Apr 20, 20231
ChloeOSHTB: BehindTheScenes, Patching Binaries in GhidraThis walk through of the beginner Reverse Engineering challenge “BehindTheScenes” from HackTheBox demonstrates how to patch a binary in…Apr 17, 2023Apr 17, 2023
ChloeOSMalware Analysis: Dridex, and showcasing API hashing.Simple API hashing example: from https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malwareJan 20, 2023Jan 20, 2023
ChloeOSTryHackMe: Intro to hardware hackingI’ll be going through Tryhackme’s Hardware reverse engineering room, only keeping the Protocol descriptions and showing some examples of…Jan 13, 2023Jan 13, 2023
ChloeOSMalware Basics: Manually unpacking 5 malware samples with x32-64dbg (PMA labs)This sample comes from the practical malware analysis labs, on chapter 18 Packers and unpacking. You can find the binaries here…Jan 6, 2023Jan 6, 2023
ChloeOSAndroid Malware Analysis: Spyware disguised as Microsoft wordI found this sample through the malware hunters team twitter.Dec 4, 2022Dec 4, 2022
ChloeOSCrimsonRAT(APT36) Malware Analysis with ILSpy and Any.RunI’ll be analyzing a sample of CrimsonRAT a .net Remote Access Trojan delivered through malicious office documents.Aug 24, 2022Aug 24, 2022