Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Mark Lim

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at ScaleA pictorial representation of malware configuration data such as that used by IcedID
66,586
people reacted

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale

  • By Mark Lim, Daniel Raygoza and Bob Jung
  • May 3, 2023 at 6:00 AM

5

9 min. read

Machine Learning Versus Memory Resident EvilA pictorial representation of highly evasive malware, including sandbox evasion
63,791
people reacted

Machine Learning Versus Memory Resident Evil

  • By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim
  • January 31, 2023 at 6:00 AM

10

12 min. read

Trending

  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
56,285
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedIDConceptual image representing malware, such as the information stealer IcedID, being delivered by a polyglot file.
63,871
people reacted

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

  • By Mark Lim
  • September 27, 2022 at 6:00 AM

71

4 min. read

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
50,542
people reacted

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families

  • By Mark Lim and Riley Porter
  • June 24, 2022 at 6:00 AM

31

5 min. read

Defeating BazarLoader Anti-Analysis TechniquesA conceptual image representing malware, such as BazarLoader, often known for anti-analysis techniques
43,336
people reacted

Defeating BazarLoader Anti-Analysis Techniques

  • By Mark Lim
  • April 25, 2022 at 6:00 AM

15

7 min. read

Evade Sandboxes With a Single Bit – the Trap FlagEvade sandboxes with a single bit.
39,372
people reacted

Evade Sandboxes With a Single Bit – the Trap Flag

  • By Mark Lim
  • July 19, 2021 at 3:30 PM

35

5 min. read

BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat
71,688
people reacted

BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat

  • By Mark Lim
  • April 26, 2019 at 11:40 AM

27

9 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.