Fumik0_'s box

Some works during my free time

CPU Power Usage – Sandbox Evasive Technique
CPU Power Usage – Sandbox Evasive Technique

Hi Folks, I'm not usually in this kind of paper, but this time, I am exceptionally writing a really short one about something related to some VM evasive PoC. There is always some tricks to detect if you are running on a virtual machine or not. Most of them are stupid, but it's enough accurate... » read more

Predator The Thief: In-depth analysis (v2.3.5)
Predator The Thief: In-depth analysis (v2.3.5)

Well, it's been a long time without some fresh new contents on my blog. I had some unexpected problems that kept me away from here and a lot of work (like my tracker) that explain this. But it's time to come back (slowly) with some stuff. So today, this is an In-Depth analysis of one... » read more

Some fun with a miner
Some fun with a miner

A few weeks ago I came across a malware that gave me some interests to dig more into it. It has a curious way to deploy itself, set up a miner on the machine and hide it behind some legit processes. In an example, when we look at Process Hacker : Visual Basic Compiler is... » read more