I need an help to setup anti-debugging dll’s in x64 , but I unable to set.
I need an help plz help me to set plugins in x64.
From last two days I m attempting to bypass the so Called Anti-Debu. technique the UnhandleException , i do it in many ways , but failed , means App crash and program get terminate.
Please if anyone can help me to how to deal with Unhandle Excpetion so that I can bypass this technique .
Hi all !
Can any one tell me or help in to understand the NtCreateSection() parameters , the third argument of it’s “ObjectAttributes” which means Pointer to OBJECT_ATTRIBUTES structure contains section name, in Object Namespace format.
But when I saw this argument value in Stack , it was simply “18”, so I m asking you how can I get specific address or say where I can see the “OBJECT_ATTRIBUTES structure”
Can anyone please tell me , how any Ransomware uses OpenSSl.
I m starting to analysis the sample IRON that @Struppigel shares on @VirusBay, and I got news from Twitter that it uses OpenSSL posted by @hasherezade ,
So as I m new to this , I want to know how we can ensure it uses OpenSSL or Win Crypt API.
As with Win Crypt API, we can see the method uses during call of LoadAdress() and GetProcAddress(),
But what about OpenSSL, how we confirm about it .
Looks like your connection to Malware Analysis Forums was lost, please wait while we try to reconnect.