Analysis Report
HWMonitor supply chain attack installing Cobalt Strike
Analysis Report
A custom 64-bit Windows post-exploitation tool designed to bypass Defender, dump SAM credential hashes, and escalate privileges using a multi-stage attack chain. It leverages oplock-based TOCTOU attacks, offline SAM decryption with syskey, and Defender RPC abuse, with low AV detection and no known malware family or C2 infrastructure.
Analysis Report
A phishing email impersonates a trusted sender and uses a redirect chain to deliver a fake Microsoft sign-in page for credential harvesting. It leverages an AiTM phishing kit, legitimate platforms, and CAPTCHA evasion to bypass detection.
Analysis Report
Multi-stage decryption from URL to dropper to payload (Vidar)
Analysis Report
Beautiful ClickFix deploying RAT via Dll hijacking
Analysis Report
LLM Bot using GenAI to generate malicious code
Analysis Report
Reversing of VoidLink Stage 1
Analysis Report
Reversing of VoidLink Stage 0
Analysis Report
Deep Analysis of VoidLink Implants
Analysis Report
Analysis of Sandbox evasion
Analysis Report
Salvador Android Stealer
Analysis Report
RevoltRat uses Revolt for C2 communication
Analysis Report
Full reversing of MasonRAT V6 CPL incl. unpacking
Analysis Report
GrokPy uses Grok LLM model to solve CAPTCHAs
Analysis Report
Rhadamanthys delivered by an in-browser fake Windows Update, abusing the Fullscreen API (on-click), and using ClickFix-style
Analysis Report
CloudFlare Theme ClickFix/CAPTCHAScam dropping Redline
Analysis Report
Phishing Chain from e-Mail to Catpcha to Tycoon2FA
Analysis Report
CloudFlare Theme ClickFix/CAPTCHAScam dropping NetSupport RAT
Analysis Report
EvilProxy using open redirect vulnerability
Analysis Report
HTML payload leading to download and installation of WSHRAT
Analysis Report
HTML based phisher exhibiting a large spectrum of malicious behaviors
Analysis Report
CVE-2023-36884 using RTF to load Word DOC via MSHTML iframe injection
Analysis Report
SolarMarker with file pumping, valid PE signature, Powershell dropper and .Net backdoor
Analysis Report
STOP Djvu Ransomware via SmokeLoader with full config extracted
Analysis Report
AgentTesla v3 with full malware configuration
Analysis Report
Stealthy new payload delivery method: HTML (showing a PW) -> ZIP encrypted -> ISO -> LNK -> Calc.exe -> DLL -> DLL -> QBOT
Analysis Report
noPac using CVE-2021-42287 - CVE-2021-42278 Exploit to gain DC Admin
Analysis Report
SysJoker Multi-Platform Backdoor
Analysis Report
Emotet dropped by Hidden Macro
Analysis Report
Kimsuky Espionage Campaign, JS instrumentation
Analysis Report
Digit Stealer (AppleScript-based Info Stealer Payload) on Sequoia (ARM64)
Analysis Report
Cthulhu Stealer on Ventura (ARM64)
Analysis Report
XLoader (Objective-C) on Ventura (ARM64)
Analysis Report
LockBit randomware analyzed on native MacMini Apple Silicon (ARM64) with macOS Ventura
Analysis Report
XCSSET trojan
Analysis Report
NukeSped with Coinbase PDF (Lazarus)
Analysis Report
NukeSped.N with Decoy PDF (Lazarus)
Analysis Report
Gimmick Trojan
Analysis Report
DazzlySpy Trojan implant
Analysis Report
SysJoker Multi-Platform Backdoor
Analysis Report
MACMA aka CDDS Payload used in watering hole attack campaign
Analysis Report
OSX ZuRu running in trojanized iTerm2
Analysis Report
XLoader / Formbook info stealer on macOS
Analysis Report
Dinodas RAT on Ubuntu 22.04 x64
Analysis Report
TeamTNT variant mining Raptoreum (RTM) cryptocurrency
Analysis Report
SysJoker Multi-Platform Backdoor
Analysis Report
Abcbot botnet malware
Analysis Report
Xenomorph, targeting over 30 different banks
Analysis Report
DexPro protected APK using multiple Android Zipfile parser flaws
Analysis Report
S.O.V.A analysis on Android 12 Snow Cone
Analysis Report
Dinodas RAT on Ubuntu 22.04 x64
Analysis Report
TeamTNT variant mining Raptoreum (RTM) cryptocurrency
Analysis Report
SysJoker Multi-Platform Backdoor
Analysis Report
Abcbot botnet malware
Analysis Report
Bumblebee Loader with extensive Anti-VM and Anti-Sandbox techniques
Analysis Report
Date-aware (<20.1.2020) Cassandra Crypter dropping AgentTesla
Analysis Report
Greatness phisher with full config extractor
Analysis Report
Strela Stealer
Analysis Report
Redline Clipper
Analysis Report
Kraken Rat
Analysis Report
Typhon Logger
Analysis Report
Stealerium
Analysis Report
RHADAMANTHYS
Analysis Report
StealC
Analysis Report
WshRat
Analysis Report
Vector Stealer
Analysis Report
Aurora
Analysis Report
Chaos
Analysis Report
Kovter
Analysis Report
Luca Stealer
Analysis Report
Qbot Downloader
Analysis Report
VenomRat
Analysis Report
Upatre
Analysis Report
JCrypt
Analysis Report
Nymaim
Analysis Report
Crimson
Analysis Report
LockBit ransomware
Analysis Report
Eternity Stealer
Analysis Report
PhoenixRAT
Analysis Report
Erbium Stealer
Analysis Report
CryptbotV2
Analysis Report
Vermin Keylogger
Analysis Report
S500Rat
Analysis Report
LummaC Stealer
Analysis Report
Kutaki
Analysis Report
Phorpiex
Analysis Report
Eternity Clipper
Analysis Report
Rook
Analysis Report
BumbleBee
Analysis Report
BlueBot
Analysis Report
Predator
Analysis Report
Tofsee
Analysis Report
BluStealer
Analysis Report
Socelars
Analysis Report
Xtreme RAT
Analysis Report
Matanbuchus
Analysis Report
Allcome clipbanker
Analysis Report
Jester Stealer
Analysis Report
BlackMatter
Analysis Report
DanaBot
Analysis Report
AveMaria
Analysis Report
Cryptbot Glupteba
Analysis Report
BitRat
Analysis Report
Oski
Analysis Report
Matiex
Analysis Report
Fareit Pony
Analysis Report
Clipboard Hijacker
Analysis Report
CobaltStrike
Analysis Report
Djvu
Analysis Report
Squirrelwaffle
Analysis Report
Jupyter
Analysis Report
RevengeRAT
Analysis Report
njRat Xtreme RAT
Analysis Report
SystemBC
Analysis Report
Phantom Miner
Analysis Report
Orcus
Analysis Report
Grandsteal
Analysis Report
MercurialGrabber
Analysis Report
BlackNet
Analysis Report
Caliber
Analysis Report
HawkEye MailPassView
Analysis Report
FatalRAT
Analysis Report
Ursnif
Analysis Report
NanoCore
Analysis Report
QBot
Analysis Report
Remcos
Analysis Report
Formbook
Analysis Report
Hancitor
Analysis Report
CryLock
Analysis Report
Dridex
Analysis Report
Lokibot
Analysis Report
Redline
Analysis Report
Metasploit
Analysis Report
LimeRat
Analysis Report
NetWire
Analysis Report
AsyncRat
Analysis Report
SmokeLoader
Analysis Report
njRat
Analysis Report
TrickBot
Analysis Report
Sodinokibi
Analysis Report
StrRat
Analysis Report
Snake Keylogger
Analysis Report
AgentTesla