M4lcode

Menu

  • Home
  • About
  • Contact Me
  • Home
  • About
  • Contact Me
Search
2 posts tagged

.NET

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

.NET Reactor

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

API Hashing

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

APT Profile

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

AZORult

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
1 post tagged

Backdoor

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
2 posts tagged

C++

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

DarkComet

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
1 post tagged

Encrypted Payload

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
1 post tagged

Linux

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
1 post tagged

Loader

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Nova

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

RAT

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
1 post tagged

Ransomware

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

Research

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

Snake Keylogger

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

Stack Strings

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Strings Encryption

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

Threat Intelligence

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

android

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
1 post tagged

c++

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
2 posts tagged

doc

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
2 posts tagged

js

How to deobfuscate Javascript malware
1 min read Apr 1, 2024

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

M4lcode's Picture
M4lcode in js malware analysis
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
2 posts tagged

macros

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
11 posts tagged

malware analysis

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
How to deobfuscate Javascript malware
1 min read Apr 1, 2024

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

M4lcode's Picture
M4lcode in js malware analysis
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
3 posts tagged

stealer

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
1 post tagged

tutorial

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
1 post tagged

vidar

Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
1 post tagged

xlsx

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros

Latest Posts

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

M4lcode's Picture
M4lcode
Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

M4lcode's Picture
M4lcode

Explore Tags

.NET .NET Reactor API Hashing APT Profile AZORult Backdoor C++ DarkComet Encrypted Payload Linux Loader Nova RAT Ransomware Research Snake Keylogger Stack Strings Strings Encryption Threat Intelligence android c++ doc js macros malware analysis stealer tutorial vidar xlsx
2025 © M4lcode. Crafted & Designed by Artem Sheludko.