Analyzing JavaScript XWORM StagerSample here: https://bazaar.abuse.ch/sample/0ffef02908f711dc3b01b83a439e2aeaafa58b021a4c930ed47772e6d958931e/Jun 21Jun 21
Obfuscated .BAT file to Remcos RATSample here: https://bazaar.abuse.ch/sample/1242e10442597e1c7a5ba0eb08de59c358c4fa20c38a85b5870f892a8dad03df/#yaraJun 8Jun 8
Analyzing a malicious .MSI fileHi, the file analyzed is from: https://bazaar.abuse.ch/sample/35857d1db3f83fe2c0ee0a3502276e7352beaa242d9a31573e639bf175379c81/May 31May 31
Volatility3 Exercise — MemLabs Lab 1Hi, this is an old challenge that was uploaded 4 years ago. There are already many writeups availabe in the internet regarding this. I…May 30May 30
Published inSystem WeaknessAnalyzing WSH RATHi, today I’ll detail down how I analyzed a WSH RAT sample in the form JavaScript. I acquired it in MalwareBazaar here…May 29May 29
A brief analysis to LummaC2 StealerLummaC2, first seen in 2022 is a known stealer that operates within the Malware-as-a-Service (MaaS) model and sold in underground forums…May 27May 27