M4lcode

M4lcode

Malware & Threat Intelligence Researcher exploring malware, APT groups, and their campaigns across the wild.

Threat Actor Profile: APT27

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

in
Egypt Post Impersonation Linked to Smishing Triad

Egypt Post Impersonation Linked to Smishing Triad

Egypt Post impersonation linked to the Smishing Triad — research published on DeXpose blog

in
Flesh Stealer: A Report on Multivector Data Theft

Flesh Stealer: A Report on Multivector Data Theft

Detailed analysis of Flesh Stealer, published on DeXpose blog

in
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

Detailed analysis of PureLogs, published on DeXpose blog

in
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector

Six Months Undetected: Analysis of archive.org hosted .NET PE Injector

Detailed analysis of .NET PE Injector, published on DeXpose blog

in
Analysis of Nova: A Snake Keylogger Fork

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

in
DarkComet RAT: Technical Analysis of Attack Chain

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

in
AZORult Malware: Technical Analysis

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

in