Malware analysis: decoding Emotet, part 2

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun! Categories: Malware Threat analysis Tags: code analysisdownloaderemotetencryptionpowershell (Read ...

A week in security (May 21 – May 27)

A roundup of security news from May 21 – May 27, including Mac cryptominer, the results of the crackme, bad coding habits, Emotet analysis, and much more. Categories: Security world Week in ...
Malware analysis: decoding Emotet, part 1

Malware analysis: decoding Emotet, part 1

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you'll learn how to recognize and discard "dead" code thrown in to complicate the analysis ...
Malware detection with anti-virus (AV) software

The Detection Curveball

We analysed malware that was getting through our customers’ detection layers, and how long it takes the detection industry to catch up with fresh samples. Most malware that reaches customer endpoints is ...
How artificial intelligence stopped an Emotet outbreak

How artificial intelligence stopped an Emotet outbreak

At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next ...
Bromium Helps You Defeat Ransomware

The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale

We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, ...
Fake WhatsApp on Google Play Shows How Easy Users Can Be Tricked

Fake WhatsApp on Google Play Shows How Easy Users Can Be Tricked

Google removed a rogue version of the WhatsApp Messenger application from Google Play that had been installed by more than 1 million people. A subsequent search by users and researchers revealed that ...
Malwarebytes Labs Report: Q3 2017 Teaser

Labs report: summer ushers in unprecedented season of breaches

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed ...