PC Matic Malware Research

PC Matic SuperShield Protects Customers from Emotet Banking Trojan

The Malware Research team here at PC Pitstop has noticed a large number of hits on seemingly randomly-generated files in our research queue. Upon further investigation, it is apparent that these files are coming from Emotet Banking Trojan. In this post we will give a brief overview of the Trojan, how we detected it, and …

PC Matic SuperShield Protects Customers from Emotet Banking Trojan Read More »

Unpacking Malware Part 2 – Reconstructing the Import Address Table

READ FIRST: Disclaimer – Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other harm to property and even life in the case of a system which is in control of some equipment or machinery. When analyzing malware, you must always do so on a machine …

Unpacking Malware Part 2 – Reconstructing the Import Address Table Read More »

What is an Advanced Persistent Threat (APT)?

In the anti-malware world, you may hear the term APT which is short for Advanced Persistent Threat. It sounds like a complicated buzzword. What is it really? Before we start talking about what an “advanced” persistent threat is, let’s just start with a plain ol’ persistent threat. In computer science, the term “persistence” is generally …

What is an Advanced Persistent Threat (APT)? Read More »

WinDbg Debugger Window

All About Hooking

When reading a technical analysis of malware, you will often hear of the term “hooking.” The term is rather confusing and even ambiguous in some cases and thus, in this article we will explain exactly what hooking is, the different types of hooking, and how it is used by malware. What is Hooking? Let’s start …

All About Hooking Read More »

Contact a Cyber Security Expert to Learn about Application Whitelisting

The High-Level Anatomy of a Malware Exploit

ETERNALBLUE, DOUBLEPULSAR, Heartbleed…. Many of us have heard of these terms and possibly of their association with malware. However, the ecosystem and jargon can be confusing. How is ETERNALBLUE really related to WannaCry and Petya? What is the difference between an exploit and a malware to begin with? As a Malware Researcher, I’ve done deep …

The High-Level Anatomy of a Malware Exploit Read More »

Computer Virus Software

Script Engines Being Used to Distribute New Strain of Spora Ransomware

We’ve recently been covering scripting attacks in more detail on the Malware Research blog. These types of attacks have the ability to be completely fileless, as explained in a previous post. However, scripts also sometimes do come in files or accompany file-based malware. The new strain of Spora malware does just this. It uses a …

Script Engines Being Used to Distribute New Strain of Spora Ransomware Read More »

Fileless Malware

Fileless Malware Explained

A few days ago, Kayla wrote about Fileless Malware, and how PC Matic protects your devices from it. Malware can be so complicated and confusing to understand, that Malware Research is a full-time job… Let alone “fileless” malware. However, when explained in the proper steps, the concept is actually very easy to understand and every …

Fileless Malware Explained Read More »

Wanacrypt0r ransom screen

WanaCrypt0r Analysis Part II – SMB Exploit and Worm Component

Introduction Part II of the WanaCrypt0r code analysis has arrived. We’re going to be starting out where we left off last time, which is with the Microsoft Windows MS17-010 Server Message Block (SMB) exploit/”worm component” that made the ransomware so dangerous by allowing it to spread to other vulnerable (not patched) systems on the network …

WanaCrypt0r Analysis Part II – SMB Exploit and Worm Component Read More »

Wanacrypt0r ransom screen

WanaCrypt0r – A dive into the code

Introduction During the past few days, as one might expect, we’ve been getting lots of news, reports, and files for the ransomware entitled WanaCrypt0r/WannaCry/WanaCrypt. First and foremost, the good news is that customers of PC Matic SuperShield were protected from WanaCrypt0r the entire time. However, this post aims to provide a technical analysis of how …

WanaCrypt0r – A dive into the code Read More »