M4lcode

Menu

  • Home
  • About
  • Contact Me
  • Home
  • About
  • Contact Me
Search
2 posts tagged

.NET

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

.NET Reactor

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

API Hashing

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

APT Profile

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

AZORult

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
1 post tagged

Backdoor

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
2 posts tagged

C++

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

ChromElevator

Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer ChromElevator malware analysis Infrastructure Analysis c++
1 post tagged

DarkComet

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
1 post tagged

Encrypted Payload

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
1 post tagged

Infrastructure Analysis

Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer ChromElevator malware analysis Infrastructure Analysis c++
1 post tagged

Linux

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
1 post tagged

Loader

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Nova

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

RAT

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
1 post tagged

Ransomware

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

Research

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

Snake Keylogger

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

Stack Strings

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Strings Encryption

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

Threat Intelligence

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

android

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
2 posts tagged

c++

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer ChromElevator malware analysis Infrastructure Analysis c++
1 post tagged

doc

Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
1 post tagged

js

Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
1 post tagged

macros

Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
10 posts tagged

malware analysis

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer ChromElevator malware analysis Infrastructure Analysis c++
Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
4 posts tagged

stealer

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

Detailed analysis of Valkyrie Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer Encrypted Payload malware analysis c++
Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

Detailed analysis of Arkanix Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer ChromElevator malware analysis Infrastructure Analysis c++
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
1 post tagged

tutorial

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
1 post tagged

vidar

Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis

Latest Posts

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
1 min read Nov 25, 2025

Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile

M4lcode's Picture
M4lcode
Deep Dive into Arkanix Stealer and its Infrastructure
1 min read Nov 22, 2025

Deep Dive into Arkanix Stealer and its Infrastructure

M4lcode's Picture
M4lcode

Explore Tags

.NET .NET Reactor API Hashing APT Profile AZORult Backdoor C++ ChromElevator DarkComet Encrypted Payload Infrastructure Analysis Linux Loader Nova RAT Ransomware Research Snake Keylogger Stack Strings Strings Encryption Threat Intelligence android c++ doc js macros malware analysis stealer tutorial vidar
2026 © M4lcode. Crafted & Designed by Artem Sheludko.