M4lcode

M4lcode

Malware & Threat Intelligence Researcher exploring malware, APT groups, and their campaigns across the wild.

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

in
Threat Actor Profile: APT27

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

in
Analysis of Nova: A Snake Keylogger Fork

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

in
DarkComet RAT: Technical Analysis of Attack Chain

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

in
AZORult Malware: Technical Analysis

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

in
How to analyze malicious macros in MS office documents

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

in
How to deobfuscate Javascript malware

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

in