logo
Analyzing MSFVenom Android Payload (Malware)

Analyzing MSFVenom Android Payload (Malware)

MSFVenom is a versatile and widely used tool for generating payloads and shellcodes as part of the Metasploit Framework. It allows users to create customized payloads for various platforms, including Android, for penetration testing purposes. I want to analyze a bit of MSFVenom Android payload to better understand its structure and how it can be used to exploit vulnerabilities in Android devices.
6 minutes to read
Kousha Zanjani

Android Trust Wallet Stealer Malware Analysis

As far as technology improves, hackers do their best to abuse these technologies. Android became one of the most impressive technology and it’s going further. Hackers research Android Security every moment and Android malware spread more and more. There is a lot of malware that developed till today. I want to analyze an Android malware that is a Crypto Wallet Stealer. I have a sample which you can download it from HERE .
2 minutes to read
Kousha Zanjani

TeamTNT Miners in the Wild

Last night my friend and I were Looking for some Redis NOSQL (Because Most of them do not have any authentication of course 😆) in Shodan and Censys for Bug Hunting. I’ve found some interesting things which led me to write this blog post. Most of the Redis seemed to be exploited and infected with a Miner by TeamTNT. I used shodan query port:6379 to find Redis services. Redis has a tool called redis-cli which lets you interact with Redis servers.
3 minutes to read
Kousha Zanjani

Lemon Duck Malware

A month ago I’ve got a Log from a company (we will call it victim corp from now) that it was detected as a malicios activity. What I’ve got from that report log was just an URL, Funny right?! :)) I’ve start to google dork it. After some search and googling I’ve found some URLs and one of them was from app.any.run website which is one of the best sandbox for malware analysis and downloading samples.
5 minutes to read
Kousha Zanjani

Extract PNG Malware from PCAP File

I want to talk about How I detected and extracted PNG malware from a PCAP file. What we will cover in this post: Introduction to Packet Analysis Introduction to Wireshark Detect Malicious Network Traffic Partial Content Responses Impact of Connection Problems Extract Malicious File from HTTP for analysis and Reverse Engineering Nowadays cyber attacks have become more sophisticated. The use of malware is increasing, Malware comes in many forms such as:
6 minutes to read
Kousha Zanjani