Posts by Tag
- PowerShell 6
- Yara 6
- .NET 5
- Config Extraction 4
- IDA 4
- IDAPython 3
- Batch 2
- ShellCode 2
- Injection 2
- KrakenKeylogger 2
- AsyncRAT 1
- OneNote 1
- Vidar 1
- C/C++ 1
- BumbleBee 1
- TA579 1
- Gozi 1
- Jscript 1
- ScrubCrypt 1
- Xworm 1
- Threat Intel 1
- LummaC2 1
- PlutoCrypt 1
- CryptoJoker 1
- Threat Hunting 1
- Dorking 1
- URLscan 1
- VirusTotal 1
- URLhaus 1
- UnpackMe 1
- DarkGate 1
- Loader 1
- Delphi 1
PowerShell
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
ScrubCrypt - The Rebirth of Jlaive
ScrubCrypt - Uncovering the rebranded Jlaive crypter
BumbleBee DocuSign Campaign
Breakdown of a BumbleBee PowerShell Dropper & extracting the config of BumbleBee
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
Yara
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
Kraken - The Deep Sea Lurker Part 2
Part 2 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
.NET
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
ScrubCrypt - The Rebirth of Jlaive
ScrubCrypt - Uncovering the rebranded Jlaive crypter
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
Config Extraction
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign
BumbleBee DocuSign Campaign
Breakdown of a BumbleBee PowerShell Dropper & extracting the config of BumbleBee
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
IDA
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
IDAPython
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
Vidar Stealer H&M Campaign
Deep Dive analysis of an Vidar Stealer
Batch
ScrubCrypt - The Rebirth of Jlaive
ScrubCrypt - Uncovering the rebranded Jlaive crypter
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
ShellCode
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign
Injection
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
Gozi - Italian ShellCode Dance
Breakdown of a recent Gozi trojan Italian targeted campaign
KrakenKeylogger
Kraken - The Deep Sea Lurker Part 2
Part 2 of analyzing the KrakenKeylogger Malware
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware