This is a look into the short-lived piece of malware called Gazorp, and how its creators placed a backdoor within its command & control panel. I'll be looking at the code and how the backdoor was created and hidden.
In today's post I will be analyzing and reversing a new credential stealer that has recently hit the market. I'll be showing it's control flow, how it steals data and the methods it uses to be able to grab information off of its victims.
In this post I will be showing you how I found vulnerabilities in the control panel of a new piece of malware and how I exploited these to be able to take it over. I will also be giving insight into chaining vulnerabilities.