Malware Removal Guide for Windows was written to help remove most malicious software on a Windows operation system.
fbfc296b298953c291b21aa480377671b8d0e49e38dc1dd43c89bc6c51084ac4
Malwarebytes version 4.5 suffers from an unquoted service path vulnerability.
5d3b338c6b63fa0e19f25fadaae3a0c56720448c0466a9380022704057d9075e
Whitepaper called Malware Hunting 101. Written in Vietnamese.
4c7c6fc0b06cba7e2b4fb8988f1c690f57a0745feb25e07266255d76ec474755
MalwareFox AntiMalware version 2.74.0.150 suffers from a local privilege escalation vulnerability.
0cd89e4424f7e5ca7ded334e2c740e198543904d8777a8c6b61bd1ff38a9c646
This Metasploit module exploits a vulnerability in the update functionality of Malwarebytes Anti-Malware consumer before 2.0.3 and Malwarebytes Anti-Exploit consumer 1.03.1.1220. Due to the lack of proper update package validation a man-in-the-middle attacker could execute arbitrary code by spoofing the update server data-cdn.mbamupdates.com and uploading an executable. This Metasploit module has been tested successfully with MBAM 2.0.2.1012 and MBAE 1.03.1.1220.
7ff0974c6eceef6b507a55c91fa7ecc2267e3fb1d468c441797b7a7071ac3090
MalwareBytes Anti-Exploit versions 1.03.1.1220 and 1.04.1.1012 suffer from a denial of service vulnerability.
3259b673e5b298e7ac53c957351c5819f461a0171a4f1b0766bfbac1cfbdacdf
Apple Security Advisory 2012-05-14-1 - This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found.
ff2f94e0d38ea69f36970a1ad604758214b956d4b4c5ef71810c7ef1ed9fd7ef
Whitepaper called Reverse Engineering Malware Part 1.
36dd2e02c332eee7ad1b0a13487a9cc66d5bcca061c99f0a07d0ec1b39863a5f
Apple Security Advisory 2012-04-13-1 - This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found. This update is available for OS X Lion systems that do not have Java installed.
bd22d552b5690a6807fe6409d749b643aff68c006e6425cebeeaef89b0278536
This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.
8ace29513474b3ae5ebf23335d1c8782b885f19d4f5db31bcf348fcb6e7db1b8
Various antivirus software on Windows fails to detect, block and/or move malware if the executable file has only execution permission and no read, write, or other bits set.
879cd8a29ab09f08b7c40d225925d5e8508b102a9ffe9d1dc4638c067da81f49
Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.
f349bdbbeafc34f1e51d0e1bafb7ebaade4f4140aa0d2c8365eae7c7b00ab480
Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.
8f97c0865fbaa3413d8b485397cc6e12ec502b7798cce86f6a4b246286cdf22f
Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.
3af0d1f22f3669d267dde29c93584f1f6061588dcdc62dde41660a76aec55d2b
Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.
f0441c544a8826462e893ab8a63bb69a28c9d6e665cbbe115dcd76279374aa05
Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.
1da2d31cf70bc80c92291577f2083b14031a5734ec0581920bfa1e0f0bde24ab
Brief whitepaper detailing a malware epidemic that has broken out on Orkut.
73dc54ba8b4aeec48a54c65b229212900579d41ddf955358bc47f8b81eafc3f8
Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.
79dd3d0c7dc9f48914728d425f112804cc3da0e65148b0374bb4360af84b37fc
Malware 2010 Call For Papers - The 5th IEEE International Conference on Malicious and Unwanted Software (Malware 2010) will be held in Nancy, France, October 20th through the 21st, 2010. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.
383461f7576b55115bbe7be0f58312ce5728f64ebd6557ae2ef0a535cce01f87
The affiliate group that controls many rogue anti-malware software has a SQL injection vulnerability in their control panel that hosts all their sites. This control panel, is also hosted on a domain that is controlled by the rogue group. On the control panel, resides a user list, malware search, definition search, settings, statistics, archives, various databases, and TODO lists.
91efcacabf3584593f19b0e4930f367709869382192c56579661b8026a992287
Whitepaper entitled "Anatomy of a Malware". A tutorial that was created to educate people on how a simple piece of malware works.
5172b6396a1d3bf6c98f00741dec0697cfc325806e2509483c51c1658ee514dc
What are the driving forces behind the rise of malware? Who is behind it, and what tactics do they use? How are vendors responding, and what should organizations, researchers, and end users keep in mind for the upcoming future? These and many other questions will be discussed in this article, combining security experience, business logic, a little bit of psychology, market trends, and personal chats with knowledgeable folks from the industry.
0090cfb31408a8fe6a1a37416a4c00716e65ef1fbf0400d4b057e7561da9b074
Technical exercise demonstrating the enormously elaborate methods required to defeat the current security mechanisms in place in both Microsoft Windows XP SP2 and Internet Explorer 6.00 SP2 fully patched.
6fb0a58cc4a94db5f5ff84d35499da125dd5fa0ff5907d7c79123a8216912a11
Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.
77b83565d337b035d648444f5bce0a768b8022a42f296c2f964bd12f78475766
Post discussing vulnerabilities in deployment of dangerous files onto a target machine utilizing the Windows Media Player.
8f316501a1dad19f5066131347357a6b5fef2a66474c18543f7935f8ac377235