I am a tech-savvy person, Red Team Enthusiast, and like to wander around to learn new stuff. Malware Analysis, Cryptography, Networking, and System Administration are some of my forte. One of the Founding Members of CTF Team, Abs0lut3Pwn4g3. Apart from the mentioned skills, I’m good at communication skills and am a goal-driven person. Yellow belt holder at pwn.college in pursuit of learning and achieving Blue Belt.
B.Sc. (Hons) in Computer Science, 2020
College of Vocational Studies, University of Delhi
Objective The objective of this thermal paste evaluation was to assess and compare the performance of eight different thermal pastes under controlled testing conditions. The primary focus was to analyze their thermal conductivity, heat dissipation capabilities, and overall effectiveness in final performance available via thermal headroom. By conducting a series of systematic tests, we aimed to provide valuable insights and data-driven recommendations to aid in the selection of the most suitable thermal paste for improving the thermal performance for overall peak performance.
What is Overclocking a GPU? Overclocking a GPU refers to the process of increasing its clock speeds beyond the manufacturer’s specified limits. The core clock, memory clock, and sometimes voltage can be adjusted to achieve higher performance levels. Here are the pros and cons of overclocking: Pros: Increased Performance: Overclocking can provide a significant boost in GPU performance, resulting in higher frame rates in games, faster rendering times in creative applications, and improved overall system responsiveness.
What is Undervolting a GPU? Undervolting a GPU refers to the process of reducing the default voltage supplied to the graphics processing unit. GPUs are typically set to run at a specific voltage by the manufacturer, but undervolting allows users to lower that voltage while maintaining stable performance. Pros Reduced Power Consumption: Undervolting lowers the voltage supplied to the GPU, resulting in reduced power consumption. This can lead to lower electricity bills and increased energy efficiency, particularly in high-performance systems.
1. Executive Summary A. Fingerprinting MD5: 459aad8cc95d9fe2bd1d3199966289f7 SHA256: eb22d542b3b6e69a98801ff7843fa6981b13ca8628a5382cfdc0f713cdb72cba VirusTotal Report: https://www.virustotal.com/gui/file/eb22d542b3b6e69a98801ff7843fa6981b13ca8628a5382cfdc0f713cdb72cba B. Classification Infostealer, used to harvest stored credentials and session objects from browsers installed on the machine. C. Behavioral Summary The malware is a PyInstaller packed executable, with slight obfuscation. When the sample is executed, it extracts the packed Python bytecode, and required libraries into a temporary folder. It then proceeds to spawn a child process by executing itself again, sets/adds the temporary folder into its DLL directories, unpacks and unmarshall the Python bytecode on the fly in the memory.
1. Executive Summary A. Fingerprinting MD5: 425cf022932c7ace6542f18af4fbac2a SHA256: b24ce8861d8d06d10d73e38c6fcc0c026a5c9529fda74927f85b4cfe022f7e1d VirusTotal Report: https://www.virustotal.com/gui/file/b24ce8861d8d06d10d73e38c6fcc0c026a5c9529fda74927f85b4cfe022f7e1d/detection/f-b24ce8861d8d06d10d73e38c6fcc0c026a5c9529fda74927f85b4cfe022f7e1d-1668189288 B. Classification The AveMariaRat is a Remote Access Trojan that allow the attacker to connect and control the victim’s machine throught the using of a fake process and a reverse connection the its C&C server. C. Behavioral Summary The AveMariaRat comes with a common technique that hide the exe malware using a fake Word icon, once launched the exe start some cmd that creates two distinct dll files.