| title | Welcome to my blog |
|---|
You will find here technical analysis on various APT / Cybercrime malware that I have been studying through the custom sandbox I'm currently developping.
Raw dynamic analysis results are available for more samples on my dedicated GitHub Reflexions
I'll be happy to exchange with other researchers in the field of static or dynamic analysis, as well as provide some logs for any publicly available sample.
The Emperor's New Clothes
The Emperor's New Clothes
The Emperor's New Clothes
The Emperor's New Clothes
Spot the differences
The Emperor's New Clothes
The Emperor's New Clothes
The Emperor's New Clothes
Focus on C2 network protocol
Focus on C2 network protocol
Loading managed code from native Win32 application
(Ab)using Pool Worker Threads for stealth