Ryan CornateanuDeobfuscating PowerShell Malware DroppersI recently saw a video of Ahmed S Kasmani dissecting a ComRAT PowerShell script to obtain the main malware that it drops onto the victim’s…12 min read·Sep 26, 2021----
Ryan CornateanuPulling Bits From ROM Silicon Die Images: Unknown ArchitectureMy journey into Integrated Reverse Engineering didn’t begin too long ago but once I invested the time and understanding, I became…27 min read·Mar 21, 2021--2--2
Ryan CornateanuGenetic Analysis of CryptoWall RansomwareA strain of a Crowti ransomware emerged, the variant known as CryptoWall, was spotted by researchers in early 2013. Ransomware by nature…26 min read·Nov 23, 2020--1--1
Ryan CornateanuUsing Z3 Theorem on AVR FirmwareAs many of you may or may not be aware of, I have a serious obsession with embedded systems security. It wasn’t until about two years ago…17 min read·May 26, 2020--1--1
Ryan CornateanuExtracting Embedded Payloads From MalwareOne of my all time favorite subfields of reverse engineering is the dissection of viruses. In this article I will be exploring malware…15 min read·Mar 3, 2020--1--1
Ryan CornateanuReverse Engineering Encrypted Code SegmentsWhile working on a reverse engineering project, I came across a binary that appeared to be malformed since it couldn’t disassembled, but…12 min read·Jan 3, 2020--2--2