Homepage
Open in app
Sign inGet started

insomniacs

reverse engineering away those sleepless nights

Go to the profile of asuna amawaka
asuna amawaka
Jun 23, 2022

Analysis Walkthrough: APT32’s {79828CC5–8979–43C0–9299–8E155B397281}.dll

Read more…
Go to the profile of luxingzhe
luxingzhe
Mar 6, 2022

CDRThief 新变种/New CDRThief Variant!

Exploring the new CDRThief Variant

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Nov 19, 2021

It’s a BEE! It’s a… no, it’s ShadowPad.

Analysis walkthrough of ShadowPad variant 2020/2021 that…

Read more…
Go to the profile of BlueMonkey
BlueMonkey
Sep 28, 2021

Aria-Body Loader? Is that you?

Hello! This is my first time writing a blog on a loader which I had gotten hold of. So, I am a new…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Aug 29, 2021

Quarians, Turians and…QuickHeal

I was expecting to find an Asari or Salarian variant of this malware…

Read more…
Go to the profile of geumland
geumland
Jan 27, 2021

Volatility 3 — Downloading Windows Symbols for Volatility 3 on Air-gapped Machines

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Dec 20, 2020

A Look into SUNBURST’s DGA

My attempt at a script that decodes all of SUNBURST’s DGA strings :)

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Nov 30, 2020

Do you want to bake a donut? Come on, let’s go update~ Go away, Maria.

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Oct 31, 2020

Journal: FlareOn7 (Part 3)

This is the last part of the series :)

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Oct 25, 2020

Journal: FlareOn7 (Part 2)

Continue walking with me on levels 7–9…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Oct 23, 2020

Journal: FlareOn7 (Part 1)

Walk with me through my approach to the challenges in FlareOn7 :)

Read more…
Go to the profile of asuna amawaka
asuna amawaka
May 20, 2020

What happened between the BigBadWolf and the Tiger?

Read more…
Go to the profile of asuna amawaka
asuna amawaka
May 6, 2020

Shadows with a chance of BlackNix

A long post on analysis of a variant of BlackNix RATs, which are…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Mar 16, 2020

Shadows in the Rain

An analysis of a BBSRAT sample involving mutexes and C2 URL associated with the…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Mar 15, 2020

Dad! There’s A Rat In Here!

An analysis of the DADSTACHE sample fetched by the maldoc (MD5…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Mar 10, 2020

APT40 goes from Template Injections to OLE-Linkings for payload delivery

Read more…
Go to the profile of geumland
geumland
Mar 4, 2020

Part 1: Evora vs Elise — The Twins

If you had read my last post, you would have known that I am studying samples of Evora. At the…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Feb 12, 2020

Analysis Walkthrough — Fun ClientRun (Part 2)

Let’s carry on with the analysis of the payload dropped…

Read more…
Go to the profile of asuna amawaka
asuna amawaka
Feb 12, 2020

Analysis Walkthrough — Fun ClientRun (Part 1)

This is my first attempt at writing a walkthrough of my analysis process of a…

Read more…
Go to the profile of geumland
geumland
Jan 20, 2020

Confusing naming convention

In the report, it mentioned that the newly dubbed Sagerunex malware is an…

Read more…
Go to the profile of geumland
geumland
Jun 23, 2019

On 27 March 2019, we notice a Twitter post by ClearSky Cyber Security on having a sample named “Timelines-ECRL.docx” (MD5: 01b5276fdfda2043980cbce19117aaa0) which likely refers to…

Read more…
About insomniacsLatest StoriesArchiveAbout MediumTermsPrivacyTeams