<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ghidra on Arzedlab 🪵</title><link>https://arzedlab.github.io/tags/ghidra/</link><description>Recent content in Ghidra on Arzedlab 🪵</description><generator>Hugo</generator><language>en-us</language><copyright>© Ravshan</copyright><lastBuildDate>Mon, 24 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://arzedlab.github.io/tags/ghidra/index.xml" rel="self" type="application/rss+xml"/><item><title>Firmware reverse engineering and analysis of router devices</title><link>https://arzedlab.github.io/posts/firmware-reverse-engineering-and-analysis-of-route-2b63648c0bf48023a3fec748d42f3844/</link><pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate><guid>https://arzedlab.github.io/posts/firmware-reverse-engineering-and-analysis-of-route-2b63648c0bf48023a3fec748d42f3844/</guid><description>&lt;h1 id="firmware-reverse-engineering-and-analysis-of-router-devices">Firmware reverse engineering and analysis of router devices&lt;/h1>
&lt;h2 id="intro">Intro&lt;/h2>
&lt;p>First of all, hello everyone. We&amp;rsquo;re here to discuss routers, which are essential devices in our lives. Probably, more people don’t even know what it is. I have always been interested in security. How secure are they? In this post, I will discuss the feasibility of extracting the firmware and attempting to reverse it. Believe me, it is more interesting. In the market, there are routers from high-profile enterprises like Fortinet to budget home brands like TP-Link and Tenda, as well as other Chinese brands.&lt;/p></description></item><item><title>Full-Technical Analysis of DcRAT: Dissecting the Stealth, Persistence, and Power of DarkCrystal RAT</title><link>https://arzedlab.github.io/posts/full-technical-analysis-of-dcrat-dissecting-the-st-3a62fe4b93c34c30974b500a24fc7483/</link><pubDate>Sat, 31 Aug 2024 00:00:00 +0000</pubDate><guid>https://arzedlab.github.io/posts/full-technical-analysis-of-dcrat-dissecting-the-st-3a62fe4b93c34c30974b500a24fc7483/</guid><description>&lt;h1 id="ioc">IOC&lt;/h1>
&lt;p>Malicious file: “Огохланитриш_хати06.08.2024.pdf.exe_”&lt;/p>
&lt;p>Hashes&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>&lt;strong>Тип&lt;/strong>&lt;/th>
 &lt;th>&lt;strong>Значения&lt;/strong>&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>MD5&lt;/td>
 &lt;td>2cdb1d87940645acadcec093307b91dd&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>SHA1&lt;/td>
 &lt;td>fb16cec8b295ad76ff7ecbc1aa769e6553c7e5ba&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>SHA256&lt;/td>
 &lt;td>e6e93d2ec20e1aec2db995ae2a98eb35231d0b80564d257e4d9b87b0cbfc95af&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;strong>Загруженные исполняемые файлы&lt;/strong>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>&lt;strong>Путь&lt;/strong>&lt;/th>
 &lt;th>&lt;strong>SHA256 Hash&lt;/strong>&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>C:\Users\username\AppData\Roaming\2ZbCeAH0wY.exe&lt;/td>
 &lt;td>caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>C:\Users\username\AppData\Roaming\NjcXx3wcvK.exe&lt;/td>
 &lt;td>7526e43bb967b29c8a3afbb4ae23a86184f5eadf4279dace89c18946b2e63a9e&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>C:\Users\username\Desktop\RgkotKHZ.log&lt;/td>
 &lt;td>aab95596475ca74cede5ba50f642d92fa029f6f74f6faeae82a9a07285a5fb97&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>C:\Users\usernam\Desktop\MliXleSf.log&lt;/td>
 &lt;td>1f02230a8536adb1d6f8dadfd7ca8ca66b5528ec98b15693e3e2f118a29d49d8&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h3 id="dns-requests">&lt;strong>DNS requests&lt;/strong>&lt;/h3>
&lt;p>&lt;strong>Domain&lt;/strong>&lt;/p>
&lt;hr>
&lt;p>476072cm[.]nyashsens[.]top&lt;/p>
&lt;hr>
&lt;h2 id="ip-addresses">IP addresses&lt;/h2>
&lt;hr>
&lt;p>20.166.126.56&lt;/p>
&lt;hr>
&lt;p>95.101.149.131&lt;/p>
&lt;hr>
&lt;p>80.211.144.156&lt;/p>
&lt;hr>
&lt;h3 id="httphttps-requests">&lt;strong>HTTP/HTTPS requests&lt;/strong>&lt;/h3>
&lt;p>&lt;strong>URL&lt;/strong>&lt;/p>
&lt;hr>
&lt;p>hxxp[://]476072cm[.]nyashsens[.]top/ExternalRequestUpdateMultiuniversallocal[.]php&lt;/p>
&lt;hr>
&lt;p>hxxp[://]ocsp[.]digicert[.]com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D&lt;/p>
&lt;hr>
&lt;p>hxxp[://]www[.]microsoft[.]com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018[.]crl&lt;/p>
&lt;hr>
&lt;p>hxxp[://]www[.]microsoft[.]com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202[.]1[.]crl&lt;/p>
&lt;hr>
&lt;h1 id="introduction">Introduction&lt;/h1>
&lt;p>DCrat (Dark Crystal RAT) is an advanced remote access trojan that first appeared in 2018 and has since been used by threat actors in a variety of cyberattacks. DCrat is notable for its modular architecture, which lets attackers enable or disable features according to the goals of a campaign.&lt;/p></description></item></channel></rss>