PC Matic Malware Research

PC Matic SuperShield Protects Customers from Emotet Banking Trojan

The Malware Research team here at PC Pitstop has noticed a large number of hits on seemingly randomly-generated files in our research queue. Upon further investigation, it is apparent that these files are coming from Emotet Banking Trojan. In this post we will give a brief overview of the Trojan, how we detected it, and …

PC Matic SuperShield Protects Customers from Emotet Banking Trojan Read More »

Unpacking Malware Part 2 – Reconstructing the Import Address Table

READ FIRST: Disclaimer – Malware can destroy data, damage your computer, cause your computer to damage other computers, steal information, or cause other harm to property and even life in the case of a system which is in control of some equipment or machinery. When analyzing malware, you must always do so on a machine …

Unpacking Malware Part 2 – Reconstructing the Import Address Table Read More »

What is an Advanced Persistent Threat (APT)?

In the anti-malware world, you may hear the term APT which is short for Advanced Persistent Threat. It sounds like a complicated buzzword. What is it really? Before we start talking about what an “advanced” persistent threat is, let’s just start with a plain ol’ persistent threat. In computer science, the term “persistence” is generally …

What is an Advanced Persistent Threat (APT)? Read More »

WinDbg Debugger Window

All About Hooking

When reading a technical analysis of malware, you will often hear of the term “hooking.” The term is rather confusing and even ambiguous in some cases and thus, in this article we will explain exactly what hooking is, the different types of hooking, and how it is used by malware. What is Hooking? Let’s start …

All About Hooking Read More »

Contact a Cyber Security Expert to Learn about Application Whitelisting

The High-Level Anatomy of a Malware Exploit

ETERNALBLUE, DOUBLEPULSAR, Heartbleed…. Many of us have heard of these terms and possibly of their association with malware. However, the ecosystem and jargon can be confusing. How is ETERNALBLUE really related to WannaCry and Petya? What is the difference between an exploit and a malware to begin with? As a Malware Researcher, I’ve done deep …

The High-Level Anatomy of a Malware Exploit Read More »

Computer Virus Software

Script Engines Being Used to Distribute New Strain of Spora Ransomware

We’ve recently been covering scripting attacks in more detail on the Malware Research blog. These types of attacks have the ability to be completely fileless, as explained in a previous post. However, scripts also sometimes do come in files or accompany file-based malware. The new strain of Spora malware does just this. It uses a …

Script Engines Being Used to Distribute New Strain of Spora Ransomware Read More »