<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: MRxO1</title>
    <description>The latest articles on DEV Community by MRxO1 (@mrxo11).</description>
    <link>https://dev.to/mrxo11</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3756387%2Ff99defa9-1bd3-4bd0-8c82-f03caa271700.jpeg</url>
      <title>DEV Community: MRxO1</title>
      <link>https://dev.to/mrxo11</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mrxo11"/>
    <language>en</language>
    <item>
      <title>Getting Started with Bug Bounties: Core Vulnerabilities and Basic Testing</title>
      <dc:creator>MRxO1</dc:creator>
      <pubDate>Wed, 18 Feb 2026 15:26:39 +0000</pubDate>
      <link>https://dev.to/mrxo11/getting-started-with-bug-bounties-core-vulnerabilities-and-basic-testing-4k3f</link>
      <guid>https://dev.to/mrxo11/getting-started-with-bug-bounties-core-vulnerabilities-and-basic-testing-4k3f</guid>
      <description>&lt;p&gt;If you are starting in bug bounties, the most important thing is recon.&lt;br&gt;&lt;br&gt;
Also, one more tip is to master one vulnerability first. Do not try to master every vulnerability at once.&lt;/p&gt;




&lt;h2&gt;
  
  
  Recon is the Main Skill
&lt;/h2&gt;

&lt;p&gt;Reconnaissance is the foundation of bug bounty hunting. There are many ways to do recon, and it is a very broad topic. Good recon helps you expand your scope and discover more assets, endpoints, and hidden functionality.&lt;/p&gt;

&lt;p&gt;Recon is what makes your scope bigger. If your recon is strong, you will find more attack surfaces. If your recon is weak, you will miss most of the bugs.&lt;/p&gt;

&lt;p&gt;When you start bug bounties, you must focus on recon first. It is the main skill that separates beginners from experienced hunters. A full article can be written only on recon techniques.&lt;/p&gt;




&lt;h2&gt;
  
  
  Open Redirect
&lt;/h2&gt;

&lt;p&gt;Open redirect happens when a web application takes untrusted input and redirects the user to another site without proper validation.&lt;/p&gt;

&lt;p&gt;This usually occurs when:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A parameter controls the redirect destination&lt;/li&gt;
&lt;li&gt;The application does not verify the destination domain&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;a href="https://example.com/?page=evil.com" rel="noopener noreferrer"&gt;https://example.com/?page=evil.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Try combining domains:&lt;br&gt;
&lt;a href="https://example.com/?page=evil.com/?google.com" rel="noopener noreferrer"&gt;https://example.com/?page=evil.com/?google.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Using the @ trick:&lt;br&gt;
&lt;a href="http://www.google.com@evil.com" rel="noopener noreferrer"&gt;www.google.com@evil.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Testing with curl:&lt;br&gt;
curl -I "&lt;a href="https://example.com/?page=https://evil.com" rel="noopener noreferrer"&gt;https://example.com/?page=https://evil.com&lt;/a&gt;"&lt;/p&gt;

&lt;p&gt;Look for:&lt;br&gt;
HTTP/1.1 302 Found&lt;br&gt;&lt;br&gt;
Location: &lt;a href="https://evil.com" rel="noopener noreferrer"&gt;https://evil.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Impact:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing attacks&lt;/li&gt;
&lt;li&gt;Token leakage&lt;/li&gt;
&lt;li&gt;Bypass of security checks&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Cross Site Scripting (XSS)
&lt;/h2&gt;

&lt;p&gt;Cross Site Scripting allows attackers to execute arbitrary client side code inside the victim’s browser. This happens when a web application takes user input and sends it back to the browser without proper sanitization or encoding.&lt;/p&gt;

&lt;p&gt;With XSS, an attacker can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read or modify page content&lt;/li&gt;
&lt;li&gt;Steal session cookies&lt;/li&gt;
&lt;li&gt;Perform actions as the victim&lt;/li&gt;
&lt;li&gt;Redirect users to phishing pages&lt;/li&gt;
&lt;li&gt;Capture keystrokes&lt;/li&gt;
&lt;li&gt;Inject malicious scripts into trusted sites&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;XSS is one of the most common vulnerabilities in bug bounty programs.&lt;/p&gt;

&lt;h3&gt;
  
  
  Types of XSS
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Reflected XSS&lt;/li&gt;
&lt;li&gt;Stored XSS&lt;/li&gt;
&lt;li&gt;DOM based XSS&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Reflected XSS
&lt;/h3&gt;

&lt;p&gt;Reflected XSS occurs when the payload is sent in the request and immediately reflected in the server response.&lt;/p&gt;

&lt;p&gt;This usually happens in:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Search fields&lt;/li&gt;
&lt;li&gt;Error messages&lt;/li&gt;
&lt;li&gt;URL parameters&lt;/li&gt;
&lt;li&gt;Headers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
site.com/page?name=&lt;u&gt;John&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;If the site returns:&lt;br&gt;
Hello &lt;u&gt;John&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;It means HTML is being rendered.&lt;/p&gt;

&lt;p&gt;Test:&lt;br&gt;
site.com/page?name=alert(1)&lt;/p&gt;

&lt;p&gt;If the script executes, the site is vulnerable.&lt;/p&gt;

&lt;p&gt;Basic payloads:&lt;/p&gt;

&lt;p&gt;alert(1)&lt;/p&gt;

&lt;p&gt;"&amp;gt;alert(1)&lt;br&gt;
'&amp;gt;alert(1)&lt;/p&gt;

&lt;h3&gt;
  
  
  Stored XSS
&lt;/h3&gt;

&lt;p&gt;Stored XSS occurs when the payload is saved in the database and executed whenever the page is viewed.&lt;/p&gt;

&lt;p&gt;Common locations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Comment sections&lt;/li&gt;
&lt;li&gt;Profile fields&lt;/li&gt;
&lt;li&gt;Messages&lt;/li&gt;
&lt;li&gt;Review forms&lt;/li&gt;
&lt;li&gt;File upload names&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example payload:&lt;/p&gt;

&lt;p&gt;alert(1)&lt;/p&gt;

&lt;h3&gt;
  
  
  DOM Based XSS
&lt;/h3&gt;

&lt;p&gt;DOM XSS occurs entirely on the client side when JavaScript reads attacker-controlled data and passes it to dangerous functions.&lt;/p&gt;

&lt;p&gt;Common sources:&lt;br&gt;
document.URL&lt;br&gt;&lt;br&gt;
document.referrer&lt;br&gt;&lt;br&gt;
location&lt;br&gt;&lt;br&gt;
location.href&lt;br&gt;&lt;br&gt;
location.search  &lt;/p&gt;

&lt;p&gt;Dangerous sinks:&lt;br&gt;
eval&lt;br&gt;&lt;br&gt;
setTimeout&lt;br&gt;&lt;br&gt;
setInterval&lt;br&gt;&lt;br&gt;
document.write&lt;br&gt;&lt;br&gt;
innerHTML&lt;br&gt;&lt;br&gt;
outerHTML  &lt;/p&gt;

&lt;p&gt;Impact:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Session hijacking&lt;/li&gt;
&lt;li&gt;Account takeover&lt;/li&gt;
&lt;li&gt;Phishing attacks&lt;/li&gt;
&lt;li&gt;Keylogging&lt;/li&gt;
&lt;li&gt;Admin account compromise&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  CSRF (Cross-Site Request Forgery)
&lt;/h2&gt;

&lt;p&gt;CSRF allows attackers to perform actions on behalf of an authenticated user without their knowledge.&lt;/p&gt;

&lt;p&gt;Conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Victim must be logged in&lt;/li&gt;
&lt;li&gt;Victim must interact with attacker content&lt;/li&gt;
&lt;li&gt;Application must lack CSRF protection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Possible impacts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Email change&lt;/li&gt;
&lt;li&gt;Password reset&lt;/li&gt;
&lt;li&gt;Account takeover&lt;/li&gt;
&lt;li&gt;Financial transactions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
POST /change-email&lt;br&gt;&lt;br&gt;
email=&lt;a href="mailto:attacker@mail.com"&gt;attacker@mail.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Try:&lt;br&gt;
GET /change-email?email=&lt;a href="mailto:attacker@mail.com"&gt;attacker@mail.com&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  IDOR (Insecure Direct Object Reference)
&lt;/h2&gt;

&lt;p&gt;IDOR occurs when applications expose direct references to objects without proper authorization checks.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
/api/user?id=1001&lt;/p&gt;

&lt;p&gt;Test:&lt;br&gt;
/api/user?id=1002&lt;br&gt;&lt;br&gt;
/api/user?id=1003  &lt;/p&gt;

&lt;p&gt;Look for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Numeric IDs&lt;/li&gt;
&lt;li&gt;Sequential values&lt;/li&gt;
&lt;li&gt;Base64-encoded identifiers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
echo "1001" | base64&lt;/p&gt;

&lt;p&gt;IDOR is often one of the easiest bugs for beginners.&lt;/p&gt;




&lt;h2&gt;
  
  
  Local File Disclosure and Path Traversal
&lt;/h2&gt;

&lt;p&gt;This vulnerability allows attackers to read files from the server by manipulating file paths.&lt;/p&gt;

&lt;p&gt;Basic payload:&lt;br&gt;
../../../etc/passwd&lt;/p&gt;

&lt;p&gt;Bypass techniques:&lt;br&gt;
..//..//..//&lt;br&gt;&lt;br&gt;
%00&lt;br&gt;&lt;br&gt;
%2e%2e%2f  &lt;/p&gt;

&lt;p&gt;Look for parameters:&lt;br&gt;
file=&lt;br&gt;&lt;br&gt;
path=&lt;br&gt;&lt;br&gt;
page=&lt;br&gt;&lt;br&gt;
include=  &lt;/p&gt;

&lt;p&gt;Impact:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reading configuration files&lt;/li&gt;
&lt;li&gt;Accessing credentials&lt;/li&gt;
&lt;li&gt;Sensitive data exposure&lt;/li&gt;
&lt;li&gt;Possible path to remote code execution&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  SQL Injection (SQLi)
&lt;/h2&gt;

&lt;p&gt;SQL injection allows attackers to interact directly with the database.&lt;/p&gt;

&lt;p&gt;Possible actions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read data&lt;/li&gt;
&lt;li&gt;Modify data&lt;/li&gt;
&lt;li&gt;Delete data&lt;/li&gt;
&lt;li&gt;Create new records&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Types:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Error-based SQLi&lt;/li&gt;
&lt;li&gt;Blind SQLi&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Basic tests:&lt;br&gt;
?id=1' AND 1=1--&lt;br&gt;&lt;br&gt;
?id=1' AND 1=2--  &lt;/p&gt;

&lt;p&gt;If responses differ, it may be injectable.&lt;/p&gt;

&lt;p&gt;Time-based test:&lt;br&gt;
?id=1' AND SLEEP(5)--  &lt;/p&gt;




&lt;h2&gt;
  
  
  SSRF (Server-Side Request Forgery)
&lt;/h2&gt;

&lt;p&gt;SSRF allows attackers to make the server send requests to internal or restricted resources.&lt;/p&gt;

&lt;p&gt;Possible impacts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access internal admin panels&lt;/li&gt;
&lt;li&gt;Scan internal network ports&lt;/li&gt;
&lt;li&gt;Read internal services&lt;/li&gt;
&lt;li&gt;Access cloud metadata&lt;/li&gt;
&lt;li&gt;Remote code execution in some cases&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;a href="https://example.com/proxy?url=http://127.0.0.1" rel="noopener noreferrer"&gt;https://example.com/proxy?url=http://127.0.0.1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Internal targets:&lt;br&gt;
&lt;a href="http://127.0.0.1" rel="noopener noreferrer"&gt;http://127.0.0.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="http://localhost" rel="noopener noreferrer"&gt;http://localhost&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="http://10.0.0.1" rel="noopener noreferrer"&gt;http://10.0.0.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="http://172.16.0.1" rel="noopener noreferrer"&gt;http://172.16.0.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="http://192.168.0.1" rel="noopener noreferrer"&gt;http://192.168.0.1&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="http://169.254.169.254/latest/meta-data/" rel="noopener noreferrer"&gt;http://169.254.169.254/latest/meta-data/&lt;/a&gt;  &lt;/p&gt;




&lt;h2&gt;
  
  
  Rate Limiting Bypass
&lt;/h2&gt;

&lt;p&gt;Rate limiting is used to prevent brute force attacks and abuse.&lt;/p&gt;

&lt;p&gt;Common bypass methods:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IP rotation&lt;/li&gt;
&lt;li&gt;Race conditions&lt;/li&gt;
&lt;li&gt;Parameter manipulation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Examples:&lt;br&gt;
&lt;a href="mailto:email@site.com"&gt;email@site.com&lt;/a&gt;%00&lt;br&gt;&lt;br&gt;
&lt;a href="mailto:email@site.com"&gt;email@site.com&lt;/a&gt;%0d&lt;br&gt;&lt;br&gt;
&lt;a href="mailto:email@site.com"&gt;email@site.com&lt;/a&gt;%0a&lt;br&gt;&lt;br&gt;
&lt;a href="mailto:email@site.com"&gt;email@site.com&lt;/a&gt;%09  &lt;/p&gt;

&lt;p&gt;Headers to test:&lt;br&gt;
X-Originating-IP&lt;br&gt;&lt;br&gt;
X-Forwarded-For&lt;br&gt;&lt;br&gt;
X-Remote-IP&lt;br&gt;&lt;br&gt;
X-Remote-Addr&lt;br&gt;&lt;br&gt;
X-Client-IP&lt;br&gt;&lt;br&gt;
X-Host  &lt;/p&gt;

&lt;p&gt;Check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OTP systems&lt;/li&gt;
&lt;li&gt;Login attempts&lt;/li&gt;
&lt;li&gt;Signup flows&lt;/li&gt;
&lt;li&gt;Token granting systems&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  CORS Misconfiguration
&lt;/h2&gt;

&lt;p&gt;CORS issues occur when the server trusts untrusted origins.&lt;/p&gt;

&lt;p&gt;Test request:&lt;br&gt;
Origin: &lt;a href="https://evil.com" rel="noopener noreferrer"&gt;https://evil.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Look for:&lt;br&gt;
Access-Control-Allow-Origin: *&lt;br&gt;&lt;br&gt;
Access-Control-Allow-Credentials: true&lt;br&gt;&lt;br&gt;
Access-Control-Allow-Origin: null  &lt;/p&gt;

&lt;p&gt;Impact:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data theft from authenticated users&lt;/li&gt;
&lt;li&gt;Cross-origin account compromise&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Other Vulnerabilities to Learn
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Clickjacking&lt;/li&gt;
&lt;li&gt;Broken link hijacking&lt;/li&gt;
&lt;li&gt;HTML injection&lt;/li&gt;
&lt;li&gt;XXE&lt;/li&gt;
&lt;li&gt;RCE&lt;/li&gt;
&lt;li&gt;File upload vulnerabilities&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If you are starting with bug bounties:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Focus on recon first&lt;/li&gt;
&lt;li&gt;Learn core web vulnerabilities&lt;/li&gt;
&lt;li&gt;Understand how web applications work and languages like JavaScript and SQL&lt;/li&gt;
&lt;li&gt;Practice consistently&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Recon will always be the most important skill in bug bounty hunting.&lt;/p&gt;

&lt;p&gt;Focus on one vulnerability at a time. Do not try to learn everything at once.&lt;br&gt;&lt;br&gt;
When starting out, begin with IDOR since it is usually easier to find.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webtesting</category>
      <category>security</category>
    </item>
    <item>
      <title>How Hackers Hide Malware Inside Android Apps</title>
      <dc:creator>MRxO1</dc:creator>
      <pubDate>Fri, 06 Feb 2026 10:40:17 +0000</pubDate>
      <link>https://dev.to/mrxo11/how-hackers-hide-malware-inside-android-apps-4ifm</link>
      <guid>https://dev.to/mrxo11/how-hackers-hide-malware-inside-android-apps-4ifm</guid>
      <description>&lt;h1&gt;
  
  
  How Android Malware Gets Hidden Inside Legit Apps
&lt;/h1&gt;

&lt;p&gt;Ever wondered how some Android malware manages to hide inside legitimate apps and avoid detection and bypass AV?&lt;/p&gt;

&lt;p&gt;In this article, we’ll look at a &lt;strong&gt;high level overview&lt;/strong&gt; of how attackers bind malicious payloads to legitimate applications, and more importantly, &lt;strong&gt;what defenders should watch for&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This article is for educational and defensive awareness only.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Research Reference
&lt;/h2&gt;

&lt;p&gt;For those interested in the full research notes and demonstration material, you can check my GitHub repository:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://github.com/MRxO11/How_Attacker_Make_FUD_Android_Malware" rel="noopener noreferrer"&gt;https://github.com/MRxO11/How_Attacker_Make_FUD_Android_Malware&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  What is Android Payload Binding?
&lt;/h2&gt;

&lt;p&gt;Payload binding is a technique where attackers:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Take a legitimate Android application.&lt;/li&gt;
&lt;li&gt;Inject malicious code into it.&lt;/li&gt;
&lt;li&gt;Repackage and distribute the modified app.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To the user, the app looks normal.&lt;br&gt;
In the background, it may:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open a reverse shell&lt;/li&gt;
&lt;li&gt;Steal SMS messages&lt;/li&gt;
&lt;li&gt;Exfiltrate data&lt;/li&gt;
&lt;li&gt;Give remote access to the attacker&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This technique is commonly used in &lt;strong&gt;Android RATs (Remote Access Trojans)&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  High Level Attack Flow
&lt;/h2&gt;

&lt;p&gt;A typical payload binding attack follows these stages:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Malicious Payload Creation
&lt;/h3&gt;

&lt;p&gt;Attackers generate a malicious Android payload designed to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connect back to a command and control server&lt;/li&gt;
&lt;li&gt;Execute remote commands&lt;/li&gt;
&lt;li&gt;Maintain persistence&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. Decompiling the Legitimate App
&lt;/h3&gt;

&lt;p&gt;The attacker takes a trusted or popular APK and decompiles it to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access its internal structure&lt;/li&gt;
&lt;li&gt;Modify its code&lt;/li&gt;
&lt;li&gt;Inject malicious components&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. Injecting Malicious Code
&lt;/h3&gt;

&lt;p&gt;The payload’s code is inserted into the legitimate app’s structure.&lt;/p&gt;

&lt;p&gt;This allows the malware to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run silently in the background&lt;/li&gt;
&lt;li&gt;Use the app’s permissions&lt;/li&gt;
&lt;li&gt;Blend in with normal app behavior&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Modifying Permissions
&lt;/h3&gt;

&lt;p&gt;Attackers often modify the app’s manifest to request additional permissions, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Internet access&lt;/li&gt;
&lt;li&gt;SMS access&lt;/li&gt;
&lt;li&gt;Storage access&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These permissions allow data exfiltration or remote control.&lt;/p&gt;




&lt;h3&gt;
  
  
  5. Repackaging and Signing
&lt;/h3&gt;

&lt;p&gt;The modified app is rebuilt and signed so it can be installed on Android devices.&lt;/p&gt;

&lt;p&gt;This final APK is then distributed through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing links&lt;/li&gt;
&lt;li&gt;Fake app stores&lt;/li&gt;
&lt;li&gt;Social engineering campaigns&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Indicators of a Bound Malicious APK
&lt;/h2&gt;

&lt;p&gt;Security analysts should look for:&lt;/p&gt;

&lt;h3&gt;
  
  
  Suspicious Permissions
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SMS access for a non messaging app&lt;/li&gt;
&lt;li&gt;Contact or storage access without reason&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Package Name Changes
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Generic or suspicious names like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;com.google.services&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;com.android.update&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  Unusual Network Activity
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Connections to unknown IPs or domains&lt;/li&gt;
&lt;li&gt;Persistent background traffic&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Repackaged App Signs
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Different developer signature&lt;/li&gt;
&lt;li&gt;Slightly altered UI or behavior&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Payload binding is a common technique used in Android malware campaigns.&lt;br&gt;
Understanding how it works helps defenders:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recognize suspicious apps&lt;/li&gt;
&lt;li&gt;Detect repackaged malware&lt;/li&gt;
&lt;li&gt;Improve mobile security posture&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cybersecurity knowledge should always be used to &lt;strong&gt;defend systems, not compromise them&lt;/strong&gt;.&lt;/p&gt;

</description>
      <category>android</category>
      <category>malware</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>WannaCry Ransomware Malware Analysis</title>
      <dc:creator>MRxO1</dc:creator>
      <pubDate>Fri, 06 Feb 2026 10:29:09 +0000</pubDate>
      <link>https://dev.to/mrxo11/wannacry-ransomware-malware-analysis-2jk8</link>
      <guid>https://dev.to/mrxo11/wannacry-ransomware-malware-analysis-2jk8</guid>
      <description>&lt;h1&gt;
  
  
  WannaCry Ransomware Malware Analysis
&lt;/h1&gt;

&lt;p&gt;The WannaCry sample used for this analysis was obtained from the following repository, specifically prepared for educational and research purposes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sample Source:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/4-1.Bossfight-wannacry.exe" rel="noopener noreferrer"&gt;https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/4-1.Bossfight-wannacry.exe&lt;/a&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  Analysis Approach
&lt;/h2&gt;

&lt;p&gt;To understand the behavior of the malware, both &lt;strong&gt;static&lt;/strong&gt; and &lt;strong&gt;dynamic&lt;/strong&gt; analysis techniques were used.&lt;/p&gt;
&lt;h3&gt;
  
  
  Static Analysis
&lt;/h3&gt;

&lt;p&gt;Static analysis involves examining the malware without executing it. This helps identify:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Embedded strings&lt;/li&gt;
&lt;li&gt;Suspicious imports&lt;/li&gt;
&lt;li&gt;Hardcoded domains&lt;/li&gt;
&lt;li&gt;Encryption routines&lt;/li&gt;
&lt;li&gt;Indicators of compromise&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This stage provides an initial understanding of what the malware is capable of doing.&lt;/p&gt;
&lt;h3&gt;
  
  
  Dynamic Analysis
&lt;/h3&gt;

&lt;p&gt;Dynamic analysis involves executing the malware inside a &lt;strong&gt;controlled and isolated environment&lt;/strong&gt; (such as a virtual machine or sandbox). This allows us to observe:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;File system changes&lt;/li&gt;
&lt;li&gt;Network activity&lt;/li&gt;
&lt;li&gt;Process creation&lt;/li&gt;
&lt;li&gt;Persistence mechanisms&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This step confirms whether the behaviors seen in static analysis actually occur during execution.&lt;/p&gt;


&lt;h2&gt;
  
  
  Executive Summary
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;SHA256:&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;A6AA84358130078F9455773AF1E9EF2C7710934F72DF8514C9A62ABEB83D2E81&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The analyzed sample behaves as a &lt;strong&gt;ransomware dropper&lt;/strong&gt; that executes multiple payloads after initial infection. Once executed, it encrypts files on the system and attempts to spread laterally across the network.&lt;/p&gt;
&lt;h3&gt;
  
  
  Symptoms of Infection
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Encrypted files with the &lt;code&gt;.wncry&lt;/code&gt; extension&lt;/li&gt;
&lt;li&gt;Desktop wallpaper replaced with a ransom note&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Presence of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;@Please_Read_Me@.txt&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;@WanaDecryptor@.exe&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Suspicious executable appearing in &lt;code&gt;%APPDATA%&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  Indicators of Infection and System Modifications
&lt;/h2&gt;

&lt;p&gt;After successful execution:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Files are encrypted and renamed with the &lt;code&gt;.wncry&lt;/code&gt; extension.&lt;/li&gt;
&lt;li&gt;Desktop wallpaper is replaced with a ransom message.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Two files appear on the desktop:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;@Please_Read_Me@.txt&lt;/code&gt; – contains ransom instructions.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;@WanaDecryptor@.exe&lt;/code&gt; – ransomware interface for payment.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are clear signs of a successful ransomware detonation.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpqhrjjy1adzownkbv862.png" alt=" " width="800" height="393"&gt;
&lt;/h2&gt;
&lt;h2&gt;
  
  
  Static Analysis – String Examination
&lt;/h2&gt;

&lt;p&gt;Static string analysis was performed using &lt;strong&gt;FLOSS&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;
  
  
  Execution Indicator
&lt;/h3&gt;

&lt;p&gt;One of the common PE indicators:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;This program cannot be run in DOS mode.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  Kill Switch Domain
&lt;/h3&gt;

&lt;p&gt;A hardcoded domain was discovered:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hxxp://www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This domain acts as a &lt;strong&gt;kill switch&lt;/strong&gt;, which determines whether the malware continues execution.&lt;/p&gt;




&lt;h3&gt;
  
  
  Cryptographic Functions
&lt;/h3&gt;

&lt;p&gt;Strings showed usage of Windows CryptoAPI:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Microsoft Enhanced RSA and AES Cryptographic Provider
CryptGenKey
CryptDecrypt
CryptEncrypt
CryptDestroyKey
CryptImportKey
CryptAcquireContextA
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;These indicate that the malware performs &lt;strong&gt;file encryption using built-in Windows cryptographic functions&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  Multilingual Ransom Notes
&lt;/h3&gt;

&lt;p&gt;The malware contains multiple language files:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;msg/m_italian.wnry
msg/m_japanese.wnry
msg/m_korean.wnry
msg/m_latvian.wnry
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This suggests the malware was intended for &lt;strong&gt;global distribution&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  Other Notable Strings
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;tasksche.exe
icacls . /grant Everyone:F /T /C /Q
attrib +h .
WNcry@2ol7
\\192.168.56.20\IPC$
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;These strings indicate:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;File permission changes&lt;/li&gt;
&lt;li&gt;Hidden directory creation&lt;/li&gt;
&lt;li&gt;Network propagation behavior&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Import Analysis Using PEStudio
&lt;/h2&gt;

&lt;p&gt;PEStudio was used to examine imported Win32 APIs.&lt;/p&gt;

&lt;p&gt;This revealed functionality related to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Encryption&lt;/li&gt;
&lt;li&gt;File operations&lt;/li&gt;
&lt;li&gt;Network communication&lt;/li&gt;
&lt;li&gt;Command execution&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This confirms that the malware is capable of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Encrypting files&lt;/li&gt;
&lt;li&gt;Spreading across the network&lt;/li&gt;
&lt;li&gt;Establishing persistence&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj11hx1nne7a5nn9q21g4.png" alt=" " width="800" height="414"&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Detonation Conditions (Kill Switch Logic)
&lt;/h2&gt;

&lt;p&gt;Before executing its payload, WannaCry attempts to contact the kill switch domain.&lt;/p&gt;

&lt;h3&gt;
  
  
  Behavior Logic
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9tnp9zk2tzqc28en6tz4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9tnp9zk2tzqc28en6tz4.png" alt=" " width="800" height="582"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Malware sends HTTP request to the domain.&lt;/li&gt;
&lt;li&gt;If the domain responds:&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Malware terminates.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;If no response:&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Malware continues execution.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Lab Consideration
&lt;/h3&gt;

&lt;p&gt;To allow detonation during analysis:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DNS simulation tools (like INetSim) must be disabled.&lt;/li&gt;
&lt;li&gt;Otherwise, the malware may terminate early.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Network-Based Indicators
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Kill Switch Communication
&lt;/h3&gt;

&lt;p&gt;The malware attempts to reach:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hxxp://www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A successful connection stops execution.&lt;/p&gt;




&lt;h3&gt;
  
  
  Local Listener on Port 9050
&lt;/h3&gt;

&lt;p&gt;Observed process:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;taskhsvc.exe
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Port 9050 is commonly associated with &lt;strong&gt;Tor&lt;/strong&gt;, suggesting:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Anonymous communication&lt;/li&gt;
&lt;li&gt;Possible payment verification via Tor network&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdfwqwpxtsxw7urhvog5f.png" alt=" " width="800" height="357"&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  SMB Propagation Behavior
&lt;/h3&gt;

&lt;p&gt;WannaCry generates large numbers of SMB requests over port 445.&lt;/p&gt;

&lt;p&gt;Observed actions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Accessing &lt;code&gt;\\&amp;lt;IP&amp;gt;\IPC$&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Using named pipes&lt;/li&gt;
&lt;li&gt;Attempting null or brute-force authentication&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This behavior aligns with exploitation of:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EternalBlue (MS17-010)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This allows the ransomware to spread across vulnerable machines.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgt56y1bz5ynimkclrqa7.png" alt=" " width="800" height="373"&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Host-Based Indicators
&lt;/h2&gt;

&lt;p&gt;Using &lt;strong&gt;Procmon&lt;/strong&gt;, a suspicious process was identified:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;tasksche.exe
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Observed actions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Writing files to disk&lt;/li&gt;
&lt;li&gt;Modifying file attributes&lt;/li&gt;
&lt;li&gt;Creating scheduled tasks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This confirms its role in persistence.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvjkybd3xqilvltj8r8da.png" alt=" " width="800" height="371"&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  File System Activity
&lt;/h2&gt;

&lt;p&gt;The malware creates a hidden directory:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;C:\ProgramData\&amp;lt;random_folder&amp;gt;\
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This directory contains:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Encrypted payloads&lt;/li&gt;
&lt;li&gt;Configuration files&lt;/li&gt;
&lt;li&gt;Executables&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It acts as a &lt;strong&gt;staging area&lt;/strong&gt; for the ransomware.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fti13xpe8zjpv2l4wn42i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fti13xpe8zjpv2l4wn42i.png" alt=" " width="800" height="376"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;now this Image showing the new created directory &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fip7el2iw4ef2uw1h9eyh.png" alt=" " width="706" height="451"&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Persistence Mechanism
&lt;/h2&gt;

&lt;p&gt;A new Windows service is created using the same name as the random folder.&lt;/p&gt;

&lt;p&gt;Purpose:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Execute malware on every reboot&lt;/li&gt;
&lt;li&gt;Maintain persistence even after process termination&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fra664qf7r9v5i8jt1bkt.png" alt=" " width="516" height="459"&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Kill Switch Mechanism – Debugger Analysis
&lt;/h2&gt;

&lt;p&gt;During debugging, the following execution flow was observed:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Kill switch URL loaded into &lt;code&gt;ESI&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Value transferred to &lt;code&gt;EAX&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Passed into &lt;code&gt;InternetUrlA&lt;/code&gt; API.&lt;/li&gt;
&lt;li&gt;Result stored in &lt;code&gt;EDI&lt;/code&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The main function of Wannacry&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbay5fhqd9q71twe0yyf9.png" alt=" " width="800" height="364"&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Decision Logic
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4h5unq3l3ptx3n5ukd79.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4h5unq3l3ptx3n5ukd79.png" alt=" " width="800" height="673"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If EDI == 0&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connection failed&lt;/li&gt;
&lt;li&gt;Malware continues execution&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fque5lt7qoyv3zoqc7bsd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fque5lt7qoyv3zoqc7bsd.png" alt=" " width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If EDI != 0&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connection successful&lt;/li&gt;
&lt;li&gt;Malware terminates&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Payload Execution
&lt;/h3&gt;

&lt;p&gt;If kill switch fails:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;fcn.00408090
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;is executed, initiating:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;File encryption&lt;/li&gt;
&lt;li&gt;Network propagation&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Manipulating the Kill Switch in the Debugger
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fferqbt34u4ozbkz628f7.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fferqbt34u4ozbkz628f7.PNG" alt=" " width="800" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By manually modifying the value of the &lt;code&gt;EDI&lt;/code&gt; register:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Simulated a successful kill switch response.&lt;/li&gt;
&lt;li&gt;Malware exited immediately.&lt;/li&gt;
&lt;li&gt;Encryption and propagation were prevented.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This confirms the kill switch is &lt;strong&gt;hardcoded&lt;/strong&gt; into the execution logic.&lt;/p&gt;




&lt;h2&gt;
  
  
  Tools Used
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cutter (Radare2)&lt;/strong&gt; – Static analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;x32dbg&lt;/strong&gt; – Dynamic debugging&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Procmon&lt;/strong&gt; – Process and file activity&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PEStudio&lt;/strong&gt; – Import analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FLOSS&lt;/strong&gt; – String extraction&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  YARA Detection Rule
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;rule WannaCry_Simple_PMAT
{
    meta:
        description = "Detects WannaCry ransomware - based on PMAT by TCM"
        author = "MRxO1"
        reference = "PMAT - Practical Malware Analysis &amp;amp; Triage"
        date = "2025-04-25"
        malware_family = "WannaCry"

    strings:
        $s1 = "http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com" ascii
        $s2 = "tasksche.exe" ascii
        $s3 = "WNcry@2ol7" ascii
        $s4 = "Ooops, your files have been encrypted!" ascii nocase
        $s5 = "icacls . /grant Everyone:F /T /C /Q" ascii
        $s6 = "msg/m" ascii

    condition:
        uint16(0) == 0x5A4D and
        4 of ($s*)
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;PMAT – Practical Malware Analysis &amp;amp; Triage&lt;/li&gt;
&lt;li&gt;Microsoft MS17-010 Security Bulletin&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>malwareanalysis</category>
      <category>reverseengineering</category>
      <category>wannacry</category>
    </item>
  </channel>
</rss>
