Tag

malware analysis

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 5, 2025 · Information Security

Essential Kali Linux Penetration Testing Tools and How to Use Them

Explore the most common Kali Linux penetration testing utilities—including Nmap, Metasploit, Hydra, Wireshark, and more—organized by categories such as information gathering, vulnerability exploitation, password cracking, and network monitoring, with brief usage commands and guidance for each tool.

Kali Linuxmalware analysisnetwork scanning
0 likes · 11 min read
Essential Kali Linux Penetration Testing Tools and How to Use Them
Bilibili Tech
Bilibili Tech
Jan 17, 2023 · Information Security

Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures

The article delivers a technical overview of modern botnet threats, detailing the PBot and Xanthe families, their infection vectors, command‑and‑control operations, and provides practical detection, mitigation, and statistical analysis methods for defending against large‑scale DDoS, spam, and other malicious activities.

DetectionSuricatabotnet
0 likes · 17 min read
Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures
Efficient Ops
Efficient Ops
Aug 3, 2021 · Information Security

How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack

This article walks through a real‑world server breach where a disguised gpg‑agentd process was used to install backdoors, download malicious scripts, exploit Redis, and launch mass scans, and then offers concrete hardening steps to prevent similar compromises.

gpg-agentdmalware analysismasscan
0 likes · 12 min read
How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack
Laravel Tech Community
Laravel Tech Community
Mar 23, 2021 · Information Security

Analysis of Qike PDF Converter Malware and Its Silent Propagation Mechanism

Security researchers discovered that the Qike PDF Converter embeds a malicious proxy module that silently spreads via download‑site installers, hijacks system processes, consumes CPU, persists as a startup service, and originates from a Hangzhou tech company, highlighting the risks of silent promotion in freeware distribution.

Huoronginformation securitymalware analysis
0 likes · 4 min read
Analysis of Qike PDF Converter Malware and Its Silent Propagation Mechanism
Top Architect
Top Architect
Mar 9, 2021 · Information Security

Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion

This report provides a comprehensive technical analysis of the malicious "Le Bao" app that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group joining mechanism, payment flow, server‑side tracing, and profit model, highlighting its covert distribution of pornographic content and associated illicit activities.

information securitymalware analysispayment tracing
0 likes · 12 min read
Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion
Java Architect Essentials
Java Architect Essentials
Mar 7, 2021 · Information Security

Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion

This report investigates the malicious “Le Bao” Android application that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group‑joining mechanism, membership‑based porn livestream access, promotion methods, profit model, and comprehensive traceability of servers, payment channels, and social accounts.

Mobile Securityapp investigationillegal content
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake Chat Application Used for Pornographic Promotion
macrozheng
macrozheng
Feb 2, 2021 · Information Security

How Malware Hides Its Mining Process on Linux and How to Uncover It

An infected Linux server shows high CPU usage but standard tools miss the culprit; this guide explains how mining malware hides its process via /proc tricks, demonstrates detection using network scans, unhide tools, and offers removal steps to eradicate the hidden miner.

Linuxcryptocurrency mininginformation security
0 likes · 8 min read
How Malware Hides Its Mining Process on Linux and How to Uncover It
Efficient Ops
Efficient Ops
Jan 13, 2021 · Information Security

How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis

This article walks through a real‑world Linux mining malware infection, detailing how the attacker hid a malicious cron job, used LD_PRELOAD rootkits, propagated via SSH keys, and how the analyst uncovered and removed the threat using busybox, strace, and careful forensic commands.

Incident ResponseLinux securityRootkit
0 likes · 12 min read
How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis
Efficient Ops
Efficient Ops
Nov 22, 2020 · Information Security

Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack

This article walks through a real‑world compromise of an Alibaba Cloud server, detailing how a disguised gpg‑agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning with malicious scripts, and it concludes with practical hardening recommendations.

gpg-agentdmalware analysismasscan
0 likes · 15 min read
Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack
Top Architect
Top Architect
Nov 6, 2020 · Information Security

Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion

The report investigates the malicious “Le Bao” application that mimics WeChat, detailing its hidden QR‑code group‑joining mechanism, server‑side communication, payment and gambling integration, and the broader illicit promotion and profit model, while providing forensic traces, source‑code decoding, and mitigation recommendations.

Mobile Securityapp spoofinginformation security
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion
Efficient Ops
Efficient Ops
May 31, 2020 · Information Security

Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD

This article walks through a real‑world Linux mining malware incident, detailing how the attacker used a malicious crontab entry and LD_PRELOAD to hide processes, the forensic steps to uncover the payload, and practical remediation and hardening measures to prevent future compromises.

Linux securitycrontabcryptocurrency mining
0 likes · 12 min read
Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD
Efficient Ops
Efficient Ops
May 20, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server

After a routine morning, the author discovers an Alibaba Cloud server frozen due to malicious outbound traffic, then traces a sophisticated malware chain involving a disguised gpg-agentd process, malicious cron jobs, compromised SSH keys, Redis exploitation, and mass scanning, culminating in detailed forensic analysis and security recommendations.

cron jobsgpg-agentdmalware analysis
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server
Efficient Ops
Efficient Ops
Dec 18, 2018 · Information Security

How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread

On December 14, Tencent's security intelligence team uncovered a “DriverLife” Trojan that exploited the high‑severity EternalBlue vulnerability to propagate like a worm, infecting up to 100,000 users within two hours, and detailed its infection chain, malicious payloads, and mitigation recommendations.

EternalBlueinformation securitymalware analysis
0 likes · 7 min read
How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread
Beike Product & Technology
Beike Product & Technology
Aug 15, 2018 · Information Security

Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan

This article details a step‑by‑step incident‑response case study of a Windows internal‑network Trojan that exploited SMB port 445, describing how alerts were identified, malicious processes were traced, terminated, and fully removed using tools such as netstat, PChunter, and process monitoring utilities.

Incident Responsemalware analysisnetwork scanning
0 likes · 6 min read
Malware Incident Response: Analyzing and Removing a Persistent Windows Trojan
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
May 14, 2017 · Information Security

How to Analyze and Recover from the WannaCry Ransomware Attack

This article summarizes the latest technical analysis of the WannaCry ransomware, offers official prevention guidelines, and provides step‑by‑step recovery tools to help victims restore encrypted files as quickly as possible.

Data RecoveryWannaCryinformation security
0 likes · 3 min read
How to Analyze and Recover from the WannaCry Ransomware Attack
Architect
Architect
Jan 22, 2016 · Information Security

Analysis of New MD5 Collision Malware and Its Attack Techniques

This article examines the evolution of a malicious MD5 collision campaign from 2014‑2015, detailing the chosen‑prefix collision method, the combination with digital signatures and dual‑signature tricks, the full infection workflow, and the large‑scale propagation and impact on millions of Windows users.

MD5 collisionchosen-prefix collisiondigital signature
0 likes · 15 min read
Analysis of New MD5 Collision Malware and Its Attack Techniques
Architect
Architect
Dec 11, 2015 · Information Security

Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline

The article presents a comprehensive technical analysis of a sophisticated Windows trojan that masquerades as a Word document, detailing its delivery method, file extraction process, registry modifications, remote‑control capabilities, and the organized, targeted attack infrastructure behind it.

C2 infrastructureinformation securitymalware analysis
0 likes · 10 min read
Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline