Monthly Archives: March 2016

Petya key decoder

CODE Sourcecodes of my applications related to recovery from Petya attacks Key decoder for multiple Petyas based on Janus’ masterkey Petya Green – app for brutforce attack on Green Petya’s key multicore version by procrash Red Petya key recovery based … Continue reading

Posted in Malware, Malware Decryptor, Tools | 21 Comments

Introduction to ADS – Alternate Data Streams

Sometimes during automated malware analysis in a sandbox (i.e. Cuckoo), we can get in the report the following information: “creating alternate data streams”. It is related with an interesting feature of NTFS file system,  that can be used for hidden … Continue reading

Posted in Malware, Techniques | 3 Comments