Remove tag do-not-call
article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Today I want to share a quick analysis on a new leaked APT34 Tool in order to track similarities between APT34 public available toolsets. For example it wraps up a file called Year.txt including numbers from 1900 to 2020, a file called numspecial.txt including special numbers patterns and special chars patterns, a file called num4.txt

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. When you press the power button you are providing the right power to every electronic chips who needs it. Used tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. When you press the power button you are providing the right power to every electronic chips who needs it. Used tools.

article thumbnail

APT34: Glimpse project

Security Affairs

But let’s move on and start a quick analysis on it. Since May 2016, the threat group has introduced new tools using different tunneling protocols to their tool set ” Robert Falcone of Palo Alto Networks’ Unit 42 research team wrote in an analysis of the group’s activities. NET (>v4) application to control infected machines.