clibm079
banner
clibm079.bsky.social
clibm079
@clibm079.bsky.social
2 followers 8 following 14 posts
Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. Blog: http://malwareanalysisspace.blogspot.com Website: http://clibm079.net
Posts Media Videos Starter Packs
Pinned
"To truly understand an adversary, you must rise to — or beyond — their depth.Because only depth reveals intent."
#CyberSecurity #MalwareAnalysis #APT #NationalLevelAPT #ThreatIntel #ReverseEngineering
Example:
PE‑Bear + DIE: Abilities vs Factory — Imphash & Rich Header
This helps you group variants and attribute their build environments quickly.
Example:
PE-Bear + DIE: Fast Shows Structural Evolution — and What It’s Changed.
Compare Mode is ideal for comparing related samples in a malware family.
This helps you trace the malware evolution and also study the PE structure with a GUI.
Example:
PE-Bear + DIE: Fast Pack Check — and Why It’s Packed.
Combine this with other skills, like strings scanning and experience-based analysis.
This helps you decide the next step: sandbox, unpack, or reverse engineer.
🔵Revisiting SubVirt & Blue Pill: From Attacker Proof-of-Concepts to Defensive Foundations
🔗https://malwareanalysisspace.blogspot.com/2025/10/revisiting-subvirt-blue-pill-from.html
#SubVirt #BluePill #VMBasedRootkit #UEFI #BootKit #RootkitDefense #SystemSecurity
"To truly understand an adversary, you must rise to — or beyond — their depth.Because only depth reveals intent."
#CyberSecurity #MalwareAnalysis #APT #NationalLevelAPT #ThreatIntel #ReverseEngineering
PE-bear provides rapid string scanning and plaintext visibility inside suspicious binaries. Like DiE and Malcat Lite, it’s an effective first-step triage tool for malware such as ransomware — a quick way to spot early indicators before diving deeper into reverse engineering.
Love it: PE-bear supports dumping multi-layer embedded binary repeatedly—it lists them in a clean tree so you can extract multiple payloads fast. Excellent UX, practical features, and clearly designed for analysts. Recorded a short follow-up demo showing repeated extraction. 💙
YouTube: Video Notes from a Stage of Quiet Exploration for Malware RE—Not a Guide, But a Trace.
I used PE-bear for the first time to dump an embedded binary. Its intuitive UI made extraction effortless. Because malware often embeds payloads with the form A in B to evade detection, pulling out the inner binary was crucial for deeper analysis and IoCs hunting.
🌿💻 2025.08 Share
Poems of Malware Analysis
Shadows in the Stack: Notes from the Binary Jungle
🔗https://malwareanalysisspace.blogspot.com/2025/08/poems-of-malware-analysis-shadows-in.html
#MalwareAnalysis #ReverseEngineering #BinaryPoetry
🌿 The Path of Clarity
Notes from a Stage of Quiet Exploration — Not a Guide, But a Trace
📖 A personal pdf documenting thoughts behind my research journey.
🌀 It’s not about malware report.
🔗 malwareanalysisspace.blogspot.com/2025/06/the-...
#MalwareAnalysis #InnerExploration #ResearchJourney
Malware Analysis Space: The Path of Clarity
malwareanalysisspace.blogspot.com
🚨 2025.05 RESEARCH
Static Analysis of Turla’s Uroboros: Revealing Core Tactics and Technical Mindset
🔗http://malwareanalysisspace.blogspot.com/2025/05/static-analysis-of-turlas-uroboros.html
#Turla #Uroboros #kernel #rootkit #CoreTactics #TechnicalMindset
🚨 2025.08 RESEARCH
Analysis of Equation Group’s nls_933w.dll: Revealing Core Tactics and Technical Mindset
🔗http://malwareanalysisspace.blogspot.com/2025/08/analysis-of-equation-groups-nls933wdll.html
#EquationGroup #nls_933w #kernel #rootkit #Firmware #CoreTactics #TechnicalMindset