M4lcode

M4lcode

Malware & Threat Intelligence Researcher exploring malware, APT groups, and their campaigns across the wild.

CyberGate Technical Analysis

CyberGate Technical Analysis

Detailed analysis of CyberGate, published on Cyber5W blog

in
How to analyze malicious macros in MS office documents

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

in
How to deobfuscate Javascript malware

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

in
CryptNet Ransomware Detailed Analysis

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

in
Matanbuchus Loader Detailed Analysis

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

in
How to setup ARM android virtual machine on x86 host machine

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

in
Obfuscated Challenge Walkthrough

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

in