Recent posts
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
Kraken - The Deep Sea Lurker Part 2
Part 2 of analyzing the KrakenKeylogger Malware
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer