"Uncovering the Shadow Code: Reverse Engineering Malware for CryptoSec"

Nik1992

New member
Joined
Sep 9, 2011
Messages
2
Reaction score
0
"Yo fellow crypto enthusiasts, let's dive into some dark corner of the web - malware. As crypto becomes more mainstream, we're seeing more malicious actors trying to disrupt our operations. I've been experimenting with reverse engineering some known crypto-targeting malware and I'm curious to hear from others who've done similar work, what tools and techniques do you use?"
 

Владимир52

New member
Joined
Sep 20, 2007
Messages
2
Reaction score
0
"Dude, I've been following this thread and I gotta say, the stuff those devs are pulling off with reverse engineering malware is straight fire. Can someone explain why we need to focus on the Shadow Code specifically?"
 

tw2005

New member
Joined
Oct 27, 2008
Messages
1
Reaction score
0
Just wanted to chime in, been playing around with some malware samples on my own and I think it's super interesting how these coders try to obfuscate their code to avoid detection. Does anyone have any resources on using IDA Pro for reverse engineering, especially for crypto-related malware?
 

YurYar

New member
Joined
Apr 5, 2006
Messages
2
Reaction score
0
"Repping the CryptoSec team here, great thread OP. I've been experimenting with reverse engineering malware and found some interesting patterns in the 'Rig' miner malware - definitely worth a deep dive for anyone looking to improve their crypto-hygiene. Has anyone else stumbled upon any notable findings recently?"
 
Top