Daniel Plohmann

276 Followers
213 Following
4 Posts
Reverse Engineering & Malware Analysis Research at Fraunhofer FKIE.
Zoo keeper of Malpedia.
Twitterhttps://twitter.com/push_pnx
Keybasehttps://keybase.io/pnx
Githubhttps://github.com/danielplohmann
📣​ I have updated "Malpedia FLOSSed".
TL;DR: More data, cleaner Rust/Go/Dotnet strings, various tags!
We also created a public web service to make this data more accessible: http://strings.malpedia.io, as well as an IDA plugin as a demo use case.
Read more -> https://github.com/malpedia/malpedia-flossed
Welcome to nginx!

MCRIT is a ready-to-use framework for code similarity analysis. In a presentation at #VB2023, @pnx will provide an overview of the framework and its capabilities, including new features added since its initial release. https://www.virusbulletin.com/conference/vb2023/abstracts/applied-one-many-code-similarity-analysis-using-mcrit/

I wrote a blog on new features in the IDA plugin for #MCRIT, most notably being able to query basic blocks or the whole currently viewed function against a dataset like #Malpedia in mere seconds, making it viable as a live companion while analyzing malware.

https://danielplohmann.github.io/blog/2023/08/02/mcrit_blocks.html

Upgraded MCRIT Feature: IDA Plugin

My colleague @targodan created a Mastodon bot that can conveniently look up malware aliases via Malpedia for you: @malias​
So whenever you come across names like #Pinkslipbot, it will tell you how else that malware family is known ->