Malware Unicorn

twitter: @malwareunicorn
Company: Endgame, Inc.
MU

View My GitHub Profile

Go Back to All WorkShops

Presentations

Reverse Engineering Malware 101

WiCys Conference 2017, DEF CON (Packet Hacking Village) 2017

.Net Hijacking to Defend Powershell slides

BSides 2017, CanSecWest 2017

Instegogram: Leveraging Instagram for C2 via Image Steganography slides

DefCon (Crypto Village) 2016

OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My! slides

Mircon 2014

DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry slides

RSA Conference 2014

Vehicle Embedded System Imaging & Extraction, Examination and Exploitation

DoD Cyber Crime Conference 2012

Whitepapers

Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing

Johns Hopkins University

Dll Side-Loading: A Thorn in the Side of the Anti-Virus Industry

FireEye

Work Blogs

WCry/WanaCry Ransomware Technical Analysis

Endgame

Instegogram: Leveraging Instagram for C2 via Image Steganography

Endgame

Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain

Endgame

DOS AND DON’TS WITH DOCUMENT EMBEDDED OBJECTS

FireEye

MACROS GALORE

FireEye

A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE

FireEye

TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK

FireEye

Education

MS in Information Systems Engineering, Johns Hopkins University

BA in Communication Design, Computer Science, Texas State University