<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/reverse-engineering/</link><description>Recent content in Reverse Engineering on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 18 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>CDEF-Obfuscated</title><link>https://hexpysya.github.io/investigations/cdef-obfuscated/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-obfuscated/</guid><description>A malicious Word document uses a password-protected AutoOpen macro to drop and execute js script, which decrypts an embedded blob into stage2.js. It is a implant that establishes persistence via a hidden scheduled task, collects system reconnaissance, and beacons to two compromised WordPress C2 servers, downloading and executing a next-stage .pif payload</description></item><item><title>HTB-Lockpick3.0</title><link>https://hexpysya.github.io/investigations/htb-lockpick3.0/</link><pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-lockpick3.0/</guid><description>A ELF64 ransomware binary uses XOR string obfuscation keyed on a CLI passphrase, contacts a DigitalOcean C2 to register and retrieve an AES-256-CBC key and IV, recursively encrypts target files in /share/ renaming them to .24bes, exfiltrates the originals via HTTP PUT, zeroes and removes the source files, and installs a systemd service for persistence.</description></item><item><title>CDEF-$tealer</title><link>https://hexpysya.github.io/investigations/cdef-tealer/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-tealer/</guid><description>A Dridex loader DLL that dynamically resolves APIs via CRC32 hashing, uses int3/retn as an indirect call mechanism to evade analysis, decrypts embedded strings with RC4, and connects to four hardcoded C2 servers over HTTPS to download additional modules.</description></item><item><title>CDEF-XWorm</title><link>https://hexpysya.github.io/investigations/cdef-xworm/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-xworm/</guid><description>A .NET XWorm RAT that establishes triple persistence via scheduled task, startup shortcut, and registry Run key, implements keylogging, clipboard hijacking for crypto wallets, and communicates with multiple C2 servers over TCP using AES-ECB encrypted payloads.</description></item><item><title>HTB-Lupin</title><link>https://hexpysya.github.io/investigations/htb-lupin/</link><pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-lupin/</guid><description>Reverse engineering PHORPIEX dropper - analyzing clipboard hijacking, USB spreading, and UPnP NAT traversal techniques.</description></item><item><title>HTB-SneakyKeys</title><link>https://hexpysya.github.io/investigations/htb-sneakykeys/</link><pubDate>Tue, 03 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-sneakykeys/</guid><description/></item><item><title>HTB-Wayback</title><link>https://hexpysya.github.io/investigations/htb-wayback/</link><pubDate>Thu, 29 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-wayback/</guid><description/></item><item><title>HTB-Bypass</title><link>https://hexpysya.github.io/investigations/htb-bypass/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-bypass/</guid><description/></item><item><title>HTB-Cyberpsychosis</title><link>https://hexpysya.github.io/investigations/htb-cyberpsychosis/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-cyberpsychosis/</guid><description/></item><item><title>HTB-Partial_Encryption</title><link>https://hexpysya.github.io/investigations/htb-partial_encryption/</link><pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-partial_encryption/</guid><description/></item><item><title>HTB-RAuth</title><link>https://hexpysya.github.io/investigations/htb-rauth/</link><pubDate>Thu, 22 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-rauth/</guid><description/></item><item><title>HTB-Hubbub</title><link>https://hexpysya.github.io/investigations/htb-hubbub/</link><pubDate>Wed, 21 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-hubbub/</guid><description/></item><item><title>PoshC2: Sharp_v4_x64.dll</title><link>https://hexpysya.github.io/investigations/poschc2-sharp_v4_x64.dll/</link><pubDate>Tue, 25 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/poschc2-sharp_v4_x64.dll/</guid><description>A .NET DLL decodes architecture-specific shellcode from an embedded base64 string, allocates executable memory, and spawns a thread to execute it. The shellcode performs NTDLL unhooking, AMSI and ETW patching before executing an embedded PE payload identified as a PoshC2 dropper.</description></item><item><title>PoshC2: Dropper-cs.exe</title><link>https://hexpysya.github.io/investigations/dropper-cs.exe-analysis/</link><pubDate>Sun, 23 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/dropper-cs.exe-analysis/</guid><description>C2 .NET implant. AES-encrypted config, HTTPS beacon to &lt;code&gt;192.168.248.128&lt;/code&gt;, fileless in-memory execution, anti-debug via divide-by-zero.</description></item></channel></rss>