Posts by Category
Malware Analysis
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
BumbleBee DocuSign Campaign
Breakdown of a BumbleBee PowerShell Dropper & extracting the config of BumbleBee
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
Threat Breakdown
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
ScrubCrypt - The Rebirth of Jlaive
ScrubCrypt - Uncovering the rebranded Jlaive crypter
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign