• GitHub
  • Contact
The Volatility Foundation - Promoting Accessible Memory Analysis Tools Within the Memory Forensics Community
  • The Volatility Framework
  • Training
  • Events
  • FAQ
  • Contest
  • About
  • Blog
Select Page

When Anti-Virus Engines Look Like Kernel Rootkits

by Volatility | May 27, 2020 | code injection, kernel, malware, rootkits, volatility, volshell

While analyzing real-world systems, memory analysts will often encounter anti-virus (AV) engines, EDRs, and similar products that, at first glance, look suspiciously like malware. This occurs because these security products leverage the same techniques commonly...

Guest Post: Martin Korman (VolatilityBot – An Automated Malicious Code Dumper)

by Volatility | Nov 30, 2015 | code injection, malware, unpacking, volatilitybot

This is a guest post from Martin Korman, author of VolatilityBot. Lately, I’ve found myself manually unpacking different versions of the same malware in order to perform static analysis with IDA and BinDiff. Therefore, I’ve decided to write a small system...

PlugX: Memory Forensics Lifecycle with Volatility

by Volatility | Nov 6, 2015 | anti-forensics, code injection, contest, impscan, malfind, osdfcon, plugx, rootkits, volatility

At OSDFCon last week, we discussed a case study showing how we identified manipulated memory artifacts in an infected environment. We were then able to rapidly introduce new capabilities to Volatility that could be used proactively in other environments. The...

HowTo: Extract “Hidden” API-Hooking BHO DLLs

by Volatility | Jan 23, 2013 | code injection, malware, unpacking, volatility, windows

A Twitter user recently asked a question to the @volatility account: “can you please tell me how to extract SilentBanker [from memory]”? We like to encourage people to work through problems on their own, so our initial advice was short and sweet:...

Slides and Video of Analyzing Malware in Memory Webinar

by Volatility | Jan 4, 2013 | code injection, forensics, kernel, malware, volatility, windows

I recently presented a Hacker Academy Deep Dive ( X thehackeracademy.com/tha-deep-dive-analyzing-malware-in-memory/) webinar on ‘Analyzing Malware in Memory’. The purpose of this presentation was to show how in-depth malware analysis can performed on...

What do Upclicker, Poison Ivy, Cuckoo, and Volatility Have in Common?

by Volatility | Dec 21, 2012 | code injection, forensics, malware, poison ivy, volatility, windows

Earlier this month, FireEye researchers Abhishek Singh and Yasir Khalid introduced Trojan Upclicker – malware that detects automated sandboxes by hooking mouse movements. If these user interactions never occur, the malware stays dormant, but as soon as someone...
« Older Entries

Volatility Blog Archive

2025

  • + July (1)
  • + May (2)
  • + March (1)

2024

  • + August (1)
  • + July (1)
  • + March (1)

2023

  • + August (1)
  • + July (1)
  • + June (1)
  • + March (1)
  • + February (1)
  • + January (1)

2022

  • + July (1)
  • + February (1)
  • + January (1)

2021

  • + October (1)
  • + August (1)
  • + May (1)
  • + January (1)

2020

  • + November (1)
  • + May (2)

2019

  • + November (1)
  • + October (2)
  • + July (1)
  • + June (1)

2018

  • + November (2)
  • + May (1)
  • + February (1)

2017

  • + November (1)
  • + June (1)
  • + April (1)

2016

  • + December (2)
  • + September (1)
  • + August (2)
  • + July (1)
  • + April (3)

2015

  • + November (2)
  • + October (1)
  • + August (2)
  • + July (2)
  • + June (1)
  • + May (1)
  • + March (1)
  • + February (1)
  • + January (1)

2014

  • + December (1)
  • + October (3)
  • + September (5)
  • + August (6)
  • + July (2)
  • + May (1)
  • + April (2)
  • + February (2)
  • + January (5)

2013

  • + October (3)
  • + September (2)
  • + August (1)
  • + June (9)
  • + May (15)
  • + April (2)
  • + March (2)
  • + February (1)
  • + January (4)

2012

  • + December (2)
  • + November (1)
  • + October (14)
  • + September (19)
bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

     

    Loading Comments...
     

    You must be logged in to post a comment.