Blog: http://malwareanalysisspace.blogspot.com
Website: http://clibm079.net
PE-Bear: Visualize DLL Side-Loading and Sample Correlation
Practical and convenient for observing malware correlations in a single window.
Also valuable for incident response and IoC collection.
PE-Bear: Visualize DLL Side-Loading and Sample Correlation
Practical and convenient for observing malware correlations in a single window.
Also valuable for incident response and IoC collection.
PE‑Bear + DIE: Abilities vs Factory — Imphash & Rich Header
This helps you group variants and attribute their build environments quickly.
PE‑Bear + DIE: Abilities vs Factory — Imphash & Rich Header
This helps you group variants and attribute their build environments quickly.
PE-Bear + DIE: Fast Shows Structural Evolution — and What It’s Changed.
Compare Mode is ideal for comparing related samples in a malware family.
This helps you trace the malware evolution and also study the PE structure with a GUI.
PE-Bear + DIE: Fast Shows Structural Evolution — and What It’s Changed.
Compare Mode is ideal for comparing related samples in a malware family.
This helps you trace the malware evolution and also study the PE structure with a GUI.
PE-Bear + DIE: Fast Pack Check — and Why It’s Packed.
Combine this with other skills, like strings scanning and experience-based analysis.
This helps you decide the next step: sandbox, unpack, or reverse engineer.
PE-Bear + DIE: Fast Pack Check — and Why It’s Packed.
Combine this with other skills, like strings scanning and experience-based analysis.
This helps you decide the next step: sandbox, unpack, or reverse engineer.
🔗https://malwareanalysisspace.blogspot.com/2025/10/revisiting-subvirt-blue-pill-from.html
#SubVirt #BluePill #VMBasedRootkit #UEFI #BootKit #RootkitDefense #SystemSecurity
🔗https://malwareanalysisspace.blogspot.com/2025/10/revisiting-subvirt-blue-pill-from.html
#SubVirt #BluePill #VMBasedRootkit #UEFI #BootKit #RootkitDefense #SystemSecurity