clibm079's profile picture. Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. 
Blog: http://malwareanalysisspace.blogspot.com

clibm079

@clibm079

Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. Blog: http://malwareanalysisspace.blogspot.com

置頂

"To truly understand an adversary, you must rise to — or beyond — their depth.Because only depth reveals intent." #CyberSecurity #MalwareAnalysis #APT #NationalLevelAPT #ThreatIntel #ReverseEngineering


💙PE-bear: The Art of Intuitive Malware Analysis How Visual Design Turns the ‘First View’ into Actionable Insights for Reverse Engineering malwareanalysisspace.blogspot.com/2025/11/pe-bea…

clibm079's tweet image. 💙PE-bear: The Art of Intuitive Malware Analysis
How Visual Design Turns the ‘First View’ into Actionable Insights for Reverse Engineering
malwareanalysisspace.blogspot.com/2025/11/pe-bea…

clibm079 已轉發

So this was a fun one to investigate! We had a threat actor install our agent, and it gave us some insight into what they do for a "living." 👇 huntress.com/blog/rare-look…


clibm079 已轉發

Long overdue, but here’s my writeup for #FlareOn12 Task 9: hshrzd.wordpress.com/2025/11/20/fla…


clibm079 已轉發

💽 Digital Forensics: Repairing a Damaged Hard Drive and Extracting the Data Blog: hackers-arise.com/digital-forens… Author: @three_cube

mqst_'s tweet image. 💽 Digital Forensics: Repairing a Damaged Hard Drive and Extracting the Data

Blog: hackers-arise.com/digital-forens…

Author: @three_cube
mqst_'s tweet image. 💽 Digital Forensics: Repairing a Damaged Hard Drive and Extracting the Data

Blog: hackers-arise.com/digital-forens…

Author: @three_cube
mqst_'s tweet image. 💽 Digital Forensics: Repairing a Damaged Hard Drive and Extracting the Data

Blog: hackers-arise.com/digital-forens…

Author: @three_cube

clibm079 已轉發

Been waiting for this for so long... now we have Plugin Manager and officially built BinDiff/BinExport for 9.2 My suffering has ended.

⌨️ Introducing HCLI: The Modern Command-Line Interface for IDA. Automate workflows, simplify plugin development across platforms, manage licenses and more. hex-rays.com/blog/introduci…

HexRaysSA's tweet image. ⌨️ Introducing HCLI: The Modern Command-Line Interface for IDA. 
Automate workflows, simplify plugin development across platforms, manage licenses and more.

 hex-rays.com/blog/introduci…


In PE-Bear’s Disasm view, “Follow arg 0 RVA” shows the RVA (Relative Virtual Address) of the first argument passed to a function. This makes it much easier to identify pointers to strings, structures, static configuration blocks, and other referenced data.💙

clibm079's tweet image. In PE-Bear’s Disasm view, “Follow arg 0 RVA” shows the RVA (Relative Virtual Address) of the first argument passed to a function. This makes it much easier to identify pointers to strings, structures, static configuration blocks, and other referenced data.💙

Example: PE-bear + IDA: How a beginner can quickly navigate to the main function using PE-bear’s Disasm Let IDA guide you efficiently and help you start a new journey.


Example: In the PE-Bear section map, visually contrast readable and obfuscated strings. Builds your “kung-fu” intuition for spotting packed vs. unpacked samples—no entropy needed. Flexible for mental triage and picking the right next step.


Example: Bridging PE-Bear and IDA: A Rapid Workflow from String Clue to Deep Static Analysis. PE-Bear finds the VA — IDA chases the logic.💙


Example: PE-Bear’s string scan + “Follow Raw” flow feels natural. That loop — scan → follow → scroll → inspect → spot → scan — keeps both panels in a single view: fast, focused, fluid. An amazing interactive, fast-feedback workflow that drives real analysis forward.💙


clibm079 已轉發

Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware

lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware
lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware
lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware

clibm079 已轉發

So far, I have spent sleepless months writing custom libs and loaders for my red teaming assessments and its still going on =) After going through all this, I have decided to write a blog about some mistakes I made and why you shouldn't make them. Finally, I would like to…

5mukx's tweet image. So far, I have spent sleepless months writing custom libs and loaders for my red teaming assessments and its still going on =) 

After going through all this, I have decided to write a blog about some mistakes I made and why you shouldn't make them.

Finally, I would like to…

Couldn’t resist taking another look — PE-Bear’s string hover preview is pure design insight from real analysis work.💙

clibm079's tweet image. Couldn’t resist taking another look — PE-Bear’s string hover preview is pure design insight from real analysis work.💙
clibm079's tweet image. Couldn’t resist taking another look — PE-Bear’s string hover preview is pure design insight from real analysis work.💙

⚠️ I searched tag=JS on Bazaar and found about 1k malicious entries (2025-10-15 → 2025-11-06). The use of JavaScript for malware delivery seems to be quietly growing.

clibm079's tweet image. ⚠️ I searched tag=JS on Bazaar and found about 1k malicious entries (2025-10-15 → 2025-11-06).
The use of JavaScript for malware delivery seems to be quietly growing.

clibm079 已轉發

Guess who's back? 🎶 Gootloader's back. Again. New evasion tricks. New persistence chain. Same legal-themed lures. Big props to @RussianPanda9xx & @HuntressLabs for catching this one early. Details: gootloader.wordpress.com/2025/11/05/goo#gootloader #malware #JavaScript #powershell


Example: IDA + DIE — Decode XOR data directly in DIE’s data convertor. A fast workflow for efficient malware analysis. #MalwareAnalysis #XOR #ReverseEngineering #DIE #IDA


PE-Bear reveals the embedded RansomNote via its string hover preview — a practical highlight that makes it perfect for quick visual triaging. 💙

clibm079's tweet image. PE-Bear reveals the embedded RansomNote via its string hover preview — a practical highlight that makes it perfect for quick visual triaging. 💙

Example: PE-Bear: Using New Instances for Multiple Incident Response and Analysis Tasks A new instance isn’t just another window — it’s a separate task. Switch between analyses seamlessly and resume work instantly, staying focused and building efficient habits.


clibm079 已轉發

A new approach to static analysis with AI that turns days of research into hours. No MCP or live IDA required. Using GPT-5, we completely cracked XLoader v8, one of the most challenging malware families to analyze. #XLoader #MalwareAnalysis #AI research.checkpoint.com/2025/generativ…


Loading...

Something went wrong.


Something went wrong.