<tutorialjinni.com/>

RokRAT Adobe Flash Malware Sample (CVE-2018-4878)

Posted Under: Malware Analysis on Feb 20, 2018
RokRAT exploits CVE-2018-4878, a Adobe Falsh 0-day vulnerability. Its is believed to be the work of supposedly North Korean Group 123 or APT37. RokRAT is disseminated via a excel file which has an ActiveX Object, that object is an embedded SWF file.

Olympic Destroyer Analysis and Samples

Posted Under: Malware Analysis on Feb 18, 2018
Olympic Destroyer as the name implies is a malware / worm designed for destruction and sabotage the of on going Winter Olympic games in Pyeongchang, South Korea.

Saturn Ransomware Analysis and Samples

Posted Under: Malware Analysis on Feb 16, 2018
Saturn Ransomware encrypts various files of its victim machine and ask for $300 in Bitcoins to unlock. It give its victim one week to comply. Infected files by this virus bears its distinct .saturn extension.

Echo Mirage 3.1 Download Windows 10

Posted Under: Malware Analysis on Mar 21, 2017
Echo Mirage is a all purpose network proxy that uses DLL injection and function Hooks to reliably intercept and modify network traffic on the fly.

Get Real IP Address of Website Bypassing CloudFlare

Posted Under: Malware Analysis on Mar 17, 2017
These days most websites uses Cloudflare for there protecting against DOS or DDOS attacks. Cloudflare is free and easy to setup. Cloudflare conceals the IP address of the website in order to protect it from attack.
© Tutorial Jinni