![]() ![]() Designed by Norwegian engineer Kare Halvorsen (aka Zenta), the MorpHex looks to be a big translucent ball, but it's. That’s pretty damn amazing, but something about this is troubling me…. The MorpHex robot is more of the creepy variety well, creepy but cool, that is. Still though, this is a pretty impressive upgrade that Halvorsen has incorporated. Because of the asymmetric design that results from the hexapod moving itself across the floor, it’s impossible right now to straighten itself out. The result, while not optimal, is a method of travel that moves Morphex in an arc rather than a straight line. To create the aforementioned locomotion, the six-legged robot uses the motors on one side of its body to push itself along while contracted into a ball. Probably one of his more impressive pieces of work, he has recently updated Morphex to not only have the ability to transform from a ball to a robot, but also to be able to roll about while in sphere form as illustrated in the video above. Morphex was created by Norwegian Engineer Kare Halvorsen who has a passion for creating hexapod robots in his spare time. Now, when this article is written, I expect that Google will finally show at least one proper search result :-).This may be the coolest thing I have ever seen: Regardless of these uncertainties over the “Origins of the Species”, we're continuously maintaining our emulators to find (and defeat) all of the used tricks and we successfully detect Morphex in the wild. We can only speculate whether it was written by “Sunzer” or not. ![]() The price of this new big player in the reseller market for custom cryptors is not known. Morphex uses callbacks bound to very obscure OpenGL objects to control/change the code flow. The real innovation is in its level of anti-emulation tricks. What's new in Morphex? It incorporates new tricks, in addition to several old, well-known ones such as the randomization of icons (known from Crum) and uses the topmost layer of encryption only to encapsulate the malicious binary, which is then unpacked into memory in its original state. ,Vicenor:4817,DL:1159,Morphex:3104,OnlineGameHack:3367,ZJGH:5099. Let's look at part of our continuous statistics and see how these two cryptors changed their position. While Crum has not disappeared from the scene, it now has a strong competitor (or perhaps a successor?). Crum was one of them and, as mentioned, it is used to wrap AutoRun payloads. I’ve mentioned the use of custom malware packers in one of my previous blog posts. Sightings of Crum cryptor, the previous leader, have fallen substantially in the same period. ![]() The Crypter is most commonly delivered through phishing emails, which lead to the download of a visual basic file. Morphex sightings – as measured by percentage increases on a daily, weekly, and monthly level – have shot up. Morphisec has recently monitored a highly sophisticated Crypter-as-a-Service that delivers numerous RAT families onto target machines. Custom malware packers such as Morphex are essential to getting these initial files to the intended victims.Įven though it is only February, Morphex has already climbed to the top of the avast! Virus Lab charts. They are spread when an infected USB device is plugged in, misusing the AutoRun function to start an executable file which invites a wide array of malware into the computer. Morphex PE32 Loader is supporting the most successful and fastest growing AutoRun worm of 2011.ĪutoRun worms are responsible for roughly one out of every eight computer infections. The MorpHex robot is more of the creepy variety well, creepy but cool, that is. Even if this is an "unknown" name, you should be concerned. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |