M4lcode

M4lcode

Malware & Threat Intelligence Researcher exploring malware, APT groups, and their campaigns across the wild.

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

in
Deep Dive into Arkanix Stealer and its Infrastructure

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

in
Threat Actor Profile: APT27

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

in
Analysis of Nova: A Snake Keylogger Fork

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

in
DarkComet RAT: Technical Analysis of Attack Chain

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

in
AZORult Malware: Technical Analysis

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

in
CryptNet Ransomware Detailed Analysis

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

in