<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"><channel><title>MALCAT</title><link>https://malcat.fr/</link><description>the binary file dissector</description><lastBuildDate>Thu, 15 Jan 2026 00:00:00 +0100</lastBuildDate><item><title>0.9.12 is out: Python 3.14, PYC and .NET stack analysis</title><link>https://malcat.fr/blog/0912-is-out-python-314-pyc-and-net-stack-analysis/</link><description>&lt;p&gt;Malcat version 0.9.12 is out! This time we have focused on python and dotnet disassembly, with a new stack analysis that should improve their disassembly listing readability. We have also added support for python 3.14 and packed a large number of minor improvements.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Thu, 15 Jan 2026 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2026-01-15:/blog/0912-is-out-python-314-pyc-and-net-stack-analysis/</guid><category>news</category></item><item><title>Malcat scripting tutorial: deobfuscating Latrodectus</title><link>https://malcat.fr/blog/malcat-scripting-tutorial-deobfuscating-latrodectus/</link><description>&lt;p&gt;In this tutorial, we will learn how to leverage Malcat's scripting and patching capabilities to deobfuscate an unpacked Latrodectus sample.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Fri, 10 Oct 2025 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2025-10-10:/blog/malcat-scripting-tutorial-deobfuscating-latrodectus/</guid><category>malware analysis</category></item><item><title>0.9.11 is out: ARM and MachO analysis</title><link>https://malcat.fr/blog/0911-is-out-arm-and-macho-analysis/</link><description>&lt;p&gt;Malcat version 0.9.11 is out! With this release, Malcat is now able to analyse MacOS programs. That means: addition of Armv7, Armv8 and Aarch64 disassemblers and decompilers as well as  MachO, DMG and UMachO file format support. You'll also find many improvements in the decompiler window, Kesakode view and the user interface in general.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Tue, 30 Sep 2025 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2025-09-30:/blog/0911-is-out-arm-and-macho-analysis/</guid><category>news</category></item><item><title>Get your swimsuit, we're diving into a black SEO scheme</title><link>https://malcat.fr/blog/get-your-swimsuit-were-diving-into-a-black-seo-scheme/</link><description>&lt;p&gt;What started like an easy unpacking session to fill a Friday afternoon lead us to a singular black-SEO campaign. Together, we will unravel 4 different malicious loaders written in 4 different programming languages, briefly analyse the final 10MB black-seo client and reverse engineer its command and control protocol. All of this for XXL swimsuits.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Klemenc</dc:creator><pubDate>Fri, 05 Sep 2025 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2025-09-05:/blog/get-your-swimsuit-were-diving-into-a-black-seo-scheme/</guid><category>malware analysis</category></item><item><title>0.9.10 is out: CFG recovery, MIPS &amp; UI improvements</title><link>https://malcat.fr/blog/0910-is-out-cfg-recovery-mips-ui-improvements/</link><description>&lt;p&gt;Malcat version 0.9.10 is out! In this release, we have improved Malcat's CFG recovery algorithm and compared its performances against other reversing software. A new CPU architecture (MIPS) has also been added and multiple improvements to the decompiler interface in Malcat were made. Last but not least, several QoL changes have been made, from a new preview popup in data and code views to new scripts/transform and an more extensive corpus search.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Thu, 08 May 2025 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2025-05-08:/blog/0910-is-out-cfg-recovery-mips-ui-improvements/</guid><category>news</category></item><item><title>0.9.9 is out: Offline Kesakode, python 3.13 &amp; UI</title><link>https://malcat.fr/blog/099-is-out-offline-kesakode-python-313-ui/</link><description>&lt;p&gt;Malcat version 0.9.9 is out! Say hello to the offline version of Kesakode, which lets you identify malware even faster and without uploading any hash! You will see also several UI improvements, python 3.13 support and a couple of optimisations regarding file parsers. Last but not least, the threat intelligence features are now available in the lite edition!&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 16 Feb 2025 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2025-02-16:/blog/099-is-out-offline-kesakode-python-313-ui/</guid><category>news</category></item><item><title>0.9.8 is out: Scripting &amp; QoL improvements</title><link>https://malcat.fr/blog/098-is-out-scripting-qol-improvements/</link><description>&lt;p&gt;Malcat version 0.9.8 is out! You will find many quality-of-life improvements, such as an improved transform dialog, better scripting support, better data preview and many more.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sat, 30 Nov 2024 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-11-30:/blog/098-is-out-scripting-qol-improvements/</guid><category>news</category></item><item><title>Malcat tip: fast unpacking of RTF payloads</title><link>https://malcat.fr/blog/malcat-tip-fast-unpacking-of-rtf-payloads/</link><description>&lt;p&gt;In this short tutorial, we will see how to extract binary payloads from RTF documents using Malcat. We will then proceed to emulate a shellcode for CVE-2017-11882 and extract the download link.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sat, 10 Aug 2024 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-08-10:/blog/malcat-tip-fast-unpacking-of-rtf-payloads/</guid><category>tutorial</category></item><item><title>0.9.6 is out: Kesakode malware identification!</title><link>https://malcat.fr/blog/096-is-out-kesakode-malware-identification/</link><description>&lt;p&gt;Malcat version 0.9.6 is out! We have launched our brand-new online hash lookup service: Kesakode. You'll be able to identify (unpacked) malware, see similarities between malware families, write better Yara rules and speed up your reverse engineering game!&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 26 May 2024 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-05-26:/blog/096-is-out-kesakode-malware-identification/</guid><category>news</category></item><item><title>Writing a Qakbot 5.0 config extractor with Malcat</title><link>https://malcat.fr/blog/writing-a-qakbot-50-config-extractor-with-malcat/</link><description>&lt;p&gt;Starting from a (backdoored) MSI installer, we will unroll the infection to chain to get the final Qakbot sample. Sticking to pure static analysis, we will then decrypt Qakbot's configuration and finally write a script in Malcat to automate the process.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Fri, 16 Feb 2024 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-02-16:/blog/writing-a-qakbot-50-config-extractor-with-malcat/</guid><category>malware analysis</category></item><item><title>0.9.5 is out: InnoSetup, new GUI dialogs, threat intel and more</title><link>https://malcat.fr/blog/095-is-out-innosetup-new-gui-dialogs-threat-intel-and-more/</link><description>&lt;p&gt;Malcat version 0.9.5 is out! We have added support for InnoSetup installers, added binaries for Debian 12 build, made several UI improvements and expanded the threat intelligence providers&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 04 Feb 2024 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-02-04:/blog/095-is-out-innosetup-new-gui-dialogs-threat-intel-and-more/</guid><category>news</category></item><item><title>Shrinking a PYC file to its minimum</title><link>https://malcat.fr/blog/shrinking-a-pyc-file-to-its-minimum/</link><description>&lt;p&gt;In this tutorial, we will see how to use Malcat editing capabilities to reduce the size of a python bytecode file (.pyc) to its minimum. This article is the write-up for our Binary Golf Grand Prix 4 entry.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 07 Jan 2024 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2024-01-07:/blog/shrinking-a-pyc-file-to-its-minimum/</guid><category>tutorial</category></item><item><title>0.9.4 is out: Ubuntu 23 support, python 3.11 and magic masking</title><link>https://malcat.fr/blog/094-is-out-ubuntu-23-support-python-311-and-magic-masking/</link><description>&lt;p&gt;Malcat version 0.9.4 is out! We have added support for Ubuntu 23, a python 3.11 disassembler, magic masking selection for more robust code signatures and many QOL improvements&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Wed, 08 Nov 2023 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2023-11-08:/blog/094-is-out-ubuntu-23-support-python-311-and-magic-masking/</guid><category>news</category></item><item><title>0.9.3 is out: python, python, python (and firmwares)</title><link>https://malcat.fr/blog/093-is-out-python-python-python-and-firmwares/</link><description>&lt;p&gt;Malcat version 0.9.3 is out! Enjoy headless python scripting, extended python bindings, improved rust support, 3 new firmwares parsers and many QOL improvements&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 08 Oct 2023 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2023-10-08:/blog/093-is-out-python-python-python-and-firmwares/</guid><category>news</category></item><item><title>New release: 0.9.2</title><link>https://malcat.fr/blog/new-release-092/</link><description>&lt;p&gt;Malcat version 0.9.2 is out! You can now easily apply chained transformation on data, open and deobfuscate script files and analyse CHM files. The user interface also got improved with many quality of life improvements.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Wed, 12 Jul 2023 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2023-07-12:/blog/new-release-092/</guid><category>news</category></item><item><title>New release: 0.9.1</title><link>https://malcat.fr/blog/new-release-091/</link><description>&lt;p&gt;Malcat version 0.9.1 is out! Enjoy a new sphinx-based documentation, a proper startup screen, improved .one and .cab support and better O.S integration.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 14 May 2023 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2023-05-14:/blog/new-release-091/</guid><category>news</category></item><item><title>New release: 0.9.0</title><link>https://malcat.fr/blog/new-release-090/</link><description>&lt;p&gt;Malcat version 0.9.0 is out! You can now open multiple files in parallel, scan for FLIRT signatures, analyse onenote files and enjoy quick bookmarks handling, in addition to the usual bug fixing and various QOL improvements&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Mon, 23 Jan 2023 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2023-01-23:/blog/new-release-090/</guid><category>news</category></item><item><title>New release: 0.8.5</title><link>https://malcat.fr/blog/new-release-085/</link><description>&lt;p&gt;New version 0.8.5 is out! Enjoy the new "big file" mode, an improved disassembly view, advanced Yara integration and VHD + FAT filesystem support, as well as many other improvements.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Mon, 03 Oct 2022 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-10-03:/blog/new-release-085/</guid><category>news</category></item><item><title>LNK forensic and config extraction of a cobalt strike beacon</title><link>https://malcat.fr/blog/lnk-forensic-and-config-extraction-of-a-cobalt-strike-beacon/</link><description>&lt;p&gt;Windows shortcut files can contain valuable data. We will see how to extract the most information out of a .lnk downloader and will manually extract the configuration file of the final cobalt strike beacon using malcat&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Thu, 11 Aug 2022 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-08-11:/blog/lnk-forensic-and-config-extraction-of-a-cobalt-strike-beacon/</guid><category>malware analysis</category></item><item><title>New release: 0.8.4</title><link>https://malcat.fr/blog/new-release-084/</link><description>&lt;p&gt;New version 0.8.4 is out! Enjoy support for ubuntu 22.04 / python 3.10! We've also improved the analysis of LNK and NSIS files, added more than 400000 API hashes in our constant database and malcat can now identify and parse Cobalt strike configuration files.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Mon, 18 Jul 2022 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-07-18:/blog/new-release-084/</guid><category>news</category></item><item><title>New release: 0.8.2</title><link>https://malcat.fr/blog/new-release-082/</link><description>&lt;p&gt;New version 0.8.2 is out! Enjoy blazing fast stack strings detection for x86/x64, CD/DVD file system browsing, Py2Exe scripts disassembly and lzma streams detection.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 08 May 2022 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-05-08:/blog/new-release-082/</guid><category>news</category></item><item><title>Reversing a NSIS dropper using quick and dirty shellcode emulation</title><link>https://malcat.fr/blog/reversing-a-nsis-dropper-using-quick-and-dirty-shellcode-emulation/</link><description>&lt;p&gt;We will statically unpack and emulate a malicious NSIS installer running multiple shellcodes, up to the final Lokibot password stealer and its configuration.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 17 Apr 2022 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-04-17:/blog/reversing-a-nsis-dropper-using-quick-and-dirty-shellcode-emulation/</guid><category>malware analysis</category></item><item><title>New release: 0.8.0</title><link>https://malcat.fr/blog/new-release-080/</link><description>&lt;p&gt;New version 0.8.0 is out! New RTTI analysis, VTGrep integration, improved python + Golang disassembly, color themes and advanced selection.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Tue, 22 Mar 2022 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-03-22:/blog/new-release-080/</guid><category>news</category></item><item><title>Cutting corners against a Dridex downloader</title><link>https://malcat.fr/blog/cutting-corners-against-a-dridex-downloader/</link><description>&lt;p&gt;When one faces obfuscated code, it is sometimes more efficient to focus on the data instead. By using Malcat's different views and analyses (and a bit of guessing as well), we will show how to statically unpack an excel downloader and the following obfuscated native dropper without (much) reverse engineering.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Sun, 13 Mar 2022 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-03-13:/blog/cutting-corners-against-a-dridex-downloader/</guid><category>malware analysis</category></item><item><title>New release: 0.7.88</title><link>https://malcat.fr/blog/new-release-0788/</link><description>&lt;p&gt;New version 0.7.88 is out! Added MSI installer decompiler, improved scripting documentation and added Joe Sandbox threat intelligence lookup.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Fri, 18 Feb 2022 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2022-02-18:/blog/new-release-0788/</guid><category>news</category></item><item><title>Exploit, steganography and Delphi: unpacking DBatLoader</title><link>https://malcat.fr/blog/exploit-steganography-and-delphi-unpacking-dbatloader/</link><description>&lt;p&gt;We will unroll a maldoc spam exploiting CVE-2018-0798 leading to a multi-staged Delphi dropper abusing steganography and cloud services to conceal its payload&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Tue, 07 Dec 2021 00:00:00 +0100</pubDate><guid isPermaLink="false">tag:malcat.fr,2021-12-07:/blog/exploit-steganography-and-delphi-unpacking-dbatloader/</guid><category>malware analysis</category></item><item><title>Statically unpacking a simple .NET dropper</title><link>https://malcat.fr/blog/statically-unpacking-a-simple-net-dropper/</link><description>&lt;p&gt;Our target is a 2-layers .NET dropper using multiple cipher passes (XOR, AES ECB and AES CBC + PBKDF2) to finally drop a Loki sample. Without even starting a debugger, we will show how to unpack it 100% statically using Malcat's builtin transformations and the python scripting engine.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Renaud Tabary</dc:creator><pubDate>Mon, 16 Aug 2021 00:00:00 +0200</pubDate><guid isPermaLink="false">tag:malcat.fr,2021-08-16:/blog/statically-unpacking-a-simple-net-dropper/</guid><category>malware analysis</category></item></channel></rss>