Tag: Flare
-
Threat actors intensify focus on NATO member states
Initial access brokers (IABs) are increasingly targeting entities within NATO member states, indicating a persistent and geographically …
-
Photos: RSA Conference 2023 Early Stage Expo
RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most …
-
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach
The FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to always stay on top of the most current and emerging threats. …
-
Announcing the Seventh Annual Flare-On Challenge
The FireEye Labs Advanced Reverse Engineering (FLARE) team is honored to announce that the popular Flare-On challenge will return for a …
-
capa: Automatically Identify Malware Capabilities
capa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to …
-
Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
Static analysis of a large, obfuscated sample can take dozens of hours. Dynamic analysis can provide an alternate solution, but it requires …
-
Analyzing Dark Crystal RAT, a C# backdoor
The FireEye Mandiant Threat Intelligence Team helps protect our customers by tracking cyber attackers and the malware they use. The FLARE …
-
Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation
This blog post continues the FLARE script series with a discussion of patching IDA Pro database files (IDBs) to interactively emulate code. …
-
FakeNet Genie: Improving Dynamic Malware Analysis with Cheat Codes for FakeNet-NG
As developers of the network simulation tool FakeNet-NG, reverse engineers on the FireEye FLARE team, and malware analysis instructors, we …
-
FIDL: FLARE’s IDA Decompiler Library
IDA Pro and the Hex Rays decompiler are a core part of any toolkit for reverse engineering and vulnerability research. In a previous blog …
-
LOWKEY: Hunting for the Missing Volume Serial ID
In August 2019, FireEye released the “Double Dragon” report on our newest graduated threat group: …
●●●