Basic Static and Dynamic Analysis of Amadey Loader
In this blog post, I'll cover some basic static and dynamic analysis around Amadey Loader. Amadey is available on Russian-speaking hacker...
Cybersecurity blog
Basic Static and Dynamic Analysis of Amadey Loader
What is fuzzy hashing?
Ousaban MSI Installer Analysis
Basic PDF Analysis - Formbook Malware
Malware Headliners: LokiBot
Malware Headliners: Emotet
Indicators of Compromise (IOCs) List from Analyzed Samples
Malware Headliners: Qakbot
Malware Headliners: Dridex
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer
"Cracking Open the Malware Piñata" Series: Intro to Static Analysis with Kazy Trojan
"Cracking Open the Malware Piñata" Series: Analysis Environment Setup
AutoRun Malware: Why your computer is summoning dark lords after you plugged in that parking lot USB
Pesky Persistence: How "Turning It Off and On Again" May Not Solve Your Problem
Hacking the Brain: The Psychology of Phishing and Social Engineering
Process Injection: Malware Lurking in the Shadows of Legitimate Programs (Part 2)
Process Injection: Malware Lurking in the Shadows of Legitimate Programs (Part 1)
Malicious C2 Domains: How to stomp a moving target
Web Shells: The Hacker's Pearl in a Sea of Networked Environments
Windows Authentication Bypass via Accessibility Binaries