01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
01001101 01000001 01001100 01010111 01000001 01010010 01000101
x86 Assembly
push    ebp
mov     ebp, esp
sub     esp, 0x28
call    GetModuleHandleA
xor     eax, eax
push    0x6C6C642E
call    LoadLibraryA
mov     [ebp-0x4], eax
Binary
4D 5A 90 00 03 00 00 00
04 00 00 00 FF FF 00 00
B8 00 00 00 00 00 00 00
40 00 00 00 00 00 00 00
50 45 00 00 4C 01 03 00
E8 00 00 00 00 83 C4 04
C++ Malware
#include <windows.h>

void inject(HANDLE hProc) {
    LPVOID addr = VirtualAllocEx(
        hProc, NULL, 0x1000,
        MEM_COMMIT, PAGE_RWX
    );
    WriteProcessMemory(hProc,
        addr, shellcode, len, NULL);
}
CRACKED
Malware Analysis Research Platform

Hacking Minds, Not Just Malware.
CRACKMALWARE.

A research platform for malware analysis, reverse engineering, and technical documentation. For verified analysts only.

CVE Intelligence

Latest malware-related vulnerabilities

Live Feed

Updated hourly
  • CVE-2018-25245
    High

    7 Tik 1.0.1.0 contains a denial of service vulnerability that allows attackers to crash the application by submitting excessively long input strings to the search functionality. Attackers can paste a buffer of 7700 characters into the search bar to trigger an application crash.

  • CVE-2018-25243
    Medium

    FastTube 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string to the search functionality. Attackers can paste a buffer of 1900 characters into the search bar and trigger a crash when the search operation is executed.

  • CVE-2018-25244
    Medium

    Eco Search 1.0.2.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string to the search functionality. Attackers can paste a buffer of 950 or more characters into the search bar and trigger a crash by initiating a search operation.

  • CVE-2018-25242
    Medium

    One Search 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting excessively long input strings to the search functionality. Attackers can paste a buffer of 950 or more characters into the search bar to trigger an unhandled exception that crashes the application.

  • CVE-2018-25241
    High

    VPN Browser+ 1.1.0.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting oversized input through the search functionality. Attackers can paste a large buffer of characters into the search bar to trigger an unhandled exception that terminates the application.

Featured Research

Top analyses from verified analysts

laz

Malvertising Through “Audio Tools”: A Technical Analysis of a Stealer Campaign Delivered via Fake Voice Software

This article documents a real-world investigation into a malware distribution campaign masquerading as legitimate audio-enhancement software. The campaign leverages social engineering on Discord, professionally designed websites, and Electron-based loaders to deploy a modular information stealer. The analysis covers initial contact, infrastructure abuse, static and behavioral indicators, configuration artifacts, command-and-control (C2) logic, and underground commercialization. All sensitive actor identifiers have been intentionally redacted to comply with responsible disclosure and publication standards.

283 5

What is Crackmalware?

Deep Analysis

Publish detailed technical malware analyses with code, disassembly, and behavioral data.

Verified Analysts

Only verified researchers can publish. Quality over quantity, always.

Reputation System

Build your reputation through peer review, likes, and quality contributions.