Posts by Tag
- Yara 4
- PowerShell 3
- .NET 3
- Config Extraction 2
- IDA 2
- IDAPython 2
- KrakenKeylogger 2
- AsyncRAT 1
- OneNote 1
- Batch 1
- LummaC2 1
- PlutoCrypt 1
- CryptoJoker 1
- Threat Hunting 1
- Dorking 1
- URLscan 1
- VirusTotal 1
- URLhaus 1
- UnpackMe 1
- DarkGate 1
- Loader 1
- ShellCode 1
- Delphi 1
- Injection 1
Yara
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
Kraken - The Deep Sea Lurker Part 2
Part 2 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
PowerShell
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
.NET
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
PlutoCrypt - A CryptoJoker Ransomware Variant
Pivoting through the execution chain of a CryptoJoker Ransomware copycat
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
Config Extraction
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware
AsyncRAT OneNote Dropper
Deep Dive analysis of an AsyncRAT OneNote Dropper
IDA
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
IDAPython
DarkGate - Threat Breakdown Journey
Shining a Light on the Hidden Tactics and Techniques Employed by DarkGate
LummaC2 - Stealer Features BreakDown
Breakdown of a key features stored in LummaC2 Stealer
KrakenKeylogger
Kraken - The Deep Sea Lurker Part 2
Part 2 of analyzing the KrakenKeylogger Malware
Kraken - The Deep Sea Lurker Part 1
Part 1 of analyzing the KrakenKeylogger Malware