Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New nightMARE Python Library to Analyze Malware and Extract Intelligence Indicators

New nightMARE Python Library to Analyze Malware and Extract Intelligence Indicators

Posted on October 16, 2025October 16, 2025 By CWS

Since its public debut in October 2025, nightmare has shortly turn into an important software for malware analysts searching for to streamline static and dynamic evaluation workflows.

Developed by Elastic Safety Labs, nightmare brings collectively mature open-source reverse engineering elements beneath a unified Python API.

Relatively than forcing customers to juggle disparate dependencies, nightmare leverages Rizin through rz-pipe for disassembly and the Unicorn engine for light-weight emulation.

This cohesive design empowers researchers to quickly craft configuration extractors, carve IoCs, and automate recurring evaluation duties.

Rising from a necessity to cut back code duplication throughout Elastic’s inner tooling, nightmare builds on practices honed over hundreds of pattern analyses.

Elastic analysts famous that many proprietary scripts suffered from fragile dependency chains and inconsistent abstractions.

By encapsulating widespread patterns—similar to sample matching, instruction emulation, and cross-reference enumeration—inside a strong library, nightMARE supplies a secure basis for each seasoned and novice reverse engineers.

Upon set up, nightmare exposes three major modules: evaluation, core, and malware. The evaluation module integrates Rizin to allow disassembly, hex-pattern searches, and performance enumeration.

The core module presents utilities for bitwise operations, regex-based extraction, and information casting.

Lastly, the malware module teams family-specific extractors—starting from Smokeloader to LUMMA—into versioned sub-packages that exhibit real-world makes use of of the API.

Elastic researchers recognized a big spike in LUMMA stealer campaigns in mid-2025, underscoring the worth of speedy configuration extraction.

By means of nightmare’s emulation capabilities, analysts can instantiate a WindowsEmulator, register Import Tackle Desk (IAT) hooks on APIs similar to Sleep, and execute focused code sequences in seconds.

By intercepting decryption routines in-process, nightMARE automates the restoration of C2 domains with out guide unpacking or debugger-driven tracing.

An infection Mechanism and Emulation-Pushed Extraction

nightMARE’s emulation framework presents a light-weight various to full-scale sandboxing. Think about the widespread method the place malware invokes Sleep earlier than continuing to C2 decryption.

The next code snippet demonstrates how nightMARE’s WindowsEmulator hooks Sleep in a LUMMA pattern, capturing timing conduct and enabling uninterrupted emulation:-

import pathlib
from nightMARE.evaluation import emulation

def sleephook(emu: emulation.WindowsEmulator, args):
print(f”Sleep {emu.unicorn.reg_read(emulation.unicorn.x86_const.UC_X86_REG_ECX)} ms”)
emu.do_return()

def major():
path = pathlib.Path(r”C:samplesDismHost.exe”)
emu = emulation.WindowsEmulator(is_32bits=False)
emu.load_pe(path.read_bytes(), stack_size=0x10000)
emu.enable_iat_hooking()
emu.set_iat_hook(b”KERNEL32.dll!Sleep”, sleephook)
emu.unicorn.emu_start(0x140006404, 0x140006412)

LUMMA manually pushes Steam profile information for decryption (Supply – Elastic)

By intercepting the Sleep name, the emulator advances previous timing obfuscation and resumes execution on the subsequent instruction.

Mixed with emu.get_data() and emu.get_xrefs_from(), analysts reconstruct decryption key and nonce addresses, allocate reminiscence buffers, and invoke the malware’s ChaCha20 routine immediately.

In the end, nightMARE outputs a decrypted checklist of C2 domains, prepared for menace intelligence ingestion.

With model 0.16, Elastic Safety Labs continues to increase nightMARE’s repertoire, including emulation help for extra API hooks, enhancing pattern-matching accuracy, and refining malware module templates.

As rising threats exploit novel obfuscation and packing schemes, nightMARE stands poised to speed up evaluation pipelines and empower the group’s collective protection.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Analyze, Extract, Indicators, Intelligence, Library, Malware, nightMARE, Python

Post navigation

Previous Post: Four-Year Prison Sentence for PowerSchool Hacker
Next Post: Beware the Hidden Costs of Pen Testing

Related Posts

WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs Cyber Security News
Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution Cyber Security News
Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Cyber Security News
CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems Cyber Security News
CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware Cyber Security News
FreeBSD-based OPNsense firewall Released for Security Issues and Improvements FreeBSD-based OPNsense firewall Released for Security Issues and Improvements Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News