Welcome to the MalwareHound project β a personal initiative to reverse engineer and analyze one malware sample per week. This repository includes static and dynamic analysis, behavioral breakdowns, YARA rules, and professional-grade reports in PDF format.
Goal: Sharpen malware analysis skills through weekly hands-on work and contribute to the community's collective knowledge.
Date | Malware Name | Type | PDF Report | YARA |
---|---|---|---|---|
2025-07-01 | PDF.Dropper.EncShell.pdf | embedded/encrypted shell | π Report | 𧬠Rule |
2025-06-24 | LNK.APT.ZeroDayLoader | LNK / .NET Reflective | π Report | 𧬠Rule |
2025-06-18 | SyntheticHijacker | Persistence Hijacker | π Report | 𧬠Rule |
More reports will be added. Stay tuned!
- YARA β Pattern-matching engine for malware signatures
- Detect It Easy (DIE) β Static file type and packer detection
- dnSpyEx β .NET debugger and decompiler
- ILSpy β .NET assembly browser and decompiler
- x64dbg β Debugger for Windows executables
- Ghidra β Disassembler and decompiler for reverse engineering
- Wireshark β Network protocol analyzer
- Procmon (Process Monitor) β Runtime system activity monitor
- Process Hacker β Advanced process viewer
- Capa β Identifies capabilities in executables
- CyberChef β Cyber Swiss army knife for data transformation
- UPX β Executable packer/unpacker
- PE-bear β PE structure inspection and patching
- REMnux β Malware analysis Linux distro
- FLARE-VM β Malware analysis Windows VM setup
- INetSim β Simulates internet services in an isolated network
- MobSF (Mobile Security Framework) β APK static analysis
- Cutter β GUI frontend for Radare2, used for disassembly and analysis
- Fakenet-NG β Simulated network services for malware behavior monitoring
MalwareHound/
βββ README.md
βββ reports
βΒ Β βββ LNK.APT.ZeroDayLoader.pdf
βΒ Β βββ PDF.Dropper.EncShell.pdf
βΒ Β βββ SyntheticHijacker-Report-PMAT.pdf
βββ SyntheticHijacker-Report-PMAT.pdf
βββ yara
βββ LNK.yara
βββ pdf-loader.yara
βββ SyntheticHijacker.yara
This repository is created for educational and research purposes only.
Do not attempt to reuse or repackage the information for malicious purposes.
The author is not responsible for any misuse of the data or code shared.
Hackering True
Cybersecurity Researcher & Malware Analyst
π GitHub Profile
πΌ LinkedIn