Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New nightMARE Python Library to Analyze Malware and Extract Intelligence Indicators

Posted on October 16, 2025October 16, 2025 By CWS

Since its public debut in October 2025, nightmare has shortly turn into an important software for malware analysts searching for to streamline static and dynamic evaluation workflows.

Developed by Elastic Safety Labs, nightmare brings collectively mature open-source reverse engineering elements beneath a unified Python API.

Relatively than forcing customers to juggle disparate dependencies, nightmare leverages Rizin through rz-pipe for disassembly and the Unicorn engine for light-weight emulation.

This cohesive design empowers researchers to quickly craft configuration extractors, carve IoCs, and automate recurring evaluation duties.

Rising from a necessity to cut back code duplication throughout Elastic’s inner tooling, nightmare builds on practices honed over hundreds of pattern analyses.

Elastic analysts famous that many proprietary scripts suffered from fragile dependency chains and inconsistent abstractions.

By encapsulating widespread patterns—similar to sample matching, instruction emulation, and cross-reference enumeration—inside a strong library, nightMARE supplies a secure basis for each seasoned and novice reverse engineers.

Upon set up, nightmare exposes three major modules: evaluation, core, and malware. The evaluation module integrates Rizin to allow disassembly, hex-pattern searches, and performance enumeration.

The core module presents utilities for bitwise operations, regex-based extraction, and information casting.

Lastly, the malware module teams family-specific extractors—starting from Smokeloader to LUMMA—into versioned sub-packages that exhibit real-world makes use of of the API.

Elastic researchers recognized a big spike in LUMMA stealer campaigns in mid-2025, underscoring the worth of speedy configuration extraction.

By means of nightmare’s emulation capabilities, analysts can instantiate a WindowsEmulator, register Import Tackle Desk (IAT) hooks on APIs similar to Sleep, and execute focused code sequences in seconds.

By intercepting decryption routines in-process, nightMARE automates the restoration of C2 domains with out guide unpacking or debugger-driven tracing.

An infection Mechanism and Emulation-Pushed Extraction

nightMARE’s emulation framework presents a light-weight various to full-scale sandboxing. Think about the widespread method the place malware invokes Sleep earlier than continuing to C2 decryption.

The next code snippet demonstrates how nightMARE’s WindowsEmulator hooks Sleep in a LUMMA pattern, capturing timing conduct and enabling uninterrupted emulation:-

import pathlib
from nightMARE.evaluation import emulation

def sleephook(emu: emulation.WindowsEmulator, args):
print(f”Sleep {emu.unicorn.reg_read(emulation.unicorn.x86_const.UC_X86_REG_ECX)} ms”)
emu.do_return()

def major():
path = pathlib.Path(r”C:samplesDismHost.exe”)
emu = emulation.WindowsEmulator(is_32bits=False)
emu.load_pe(path.read_bytes(), stack_size=0x10000)
emu.enable_iat_hooking()
emu.set_iat_hook(b”KERNEL32.dll!Sleep”, sleephook)
emu.unicorn.emu_start(0x140006404, 0x140006412)

LUMMA manually pushes Steam profile information for decryption (Supply – Elastic)

By intercepting the Sleep name, the emulator advances previous timing obfuscation and resumes execution on the subsequent instruction.

Mixed with emu.get_data() and emu.get_xrefs_from(), analysts reconstruct decryption key and nonce addresses, allocate reminiscence buffers, and invoke the malware’s ChaCha20 routine immediately.

In the end, nightMARE outputs a decrypted checklist of C2 domains, prepared for menace intelligence ingestion.

With model 0.16, Elastic Safety Labs continues to increase nightMARE’s repertoire, including emulation help for extra API hooks, enhancing pattern-matching accuracy, and refining malware module templates.

As rising threats exploit novel obfuscation and packing schemes, nightMARE stands poised to speed up evaluation pipelines and empower the group’s collective protection.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Analyze, Extract, Indicators, Intelligence, Library, Malware, nightMARE, Python

Post navigation

Previous Post: Four-Year Prison Sentence for PowerSchool Hacker
Next Post: Beware the Hidden Costs of Pen Testing

Related Posts

India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones Cyber Security News
New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability Cyber Security News
Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal Cyber Security News
New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK Cyber Security News
Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Cyber Security News
Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark