M4lcode

Menu

  • Home
  • About
  • Contact Me
  • Home
  • About
  • Contact Me
Search
5 posts tagged

.NET

Flesh Stealer: A Report on Multivector Data Theft
1 min read Apr 11, 2025

Flesh Stealer: A Report on Multivector Data Theft

Detailed analysis of Flesh Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer malware analysis .NET
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
1 min read Mar 3, 2025

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

Detailed analysis of PureLogs, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer .NET Reactor malware analysis .NET
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector
1 min read Feb 24, 2025

Six Months Undetected: Analysis of archive.org hosted .NET PE Injector

Detailed analysis of .NET PE Injector, published on DeXpose blog

M4lcode's Picture
M4lcode in PE Injector malware analysis .NET
Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
2 posts tagged

.NET Reactor

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
1 min read Mar 3, 2025

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

Detailed analysis of PureLogs, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer .NET Reactor malware analysis .NET
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
1 post tagged

API Hashing

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

APT Profile

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
1 post tagged

AZORult

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
1 post tagged

Backdoor

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
2 posts tagged

C++

AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

DarkComet

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
1 post tagged

Delphi

CyberGate Technical Analysis
1 min read Jul 28, 2024

CyberGate Technical Analysis

Detailed analysis of CyberGate, published on Cyber5W blog

M4lcode's Picture
M4lcode in Delphi RAT malware analysis
1 post tagged

Linux

Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
1 post tagged

Loader

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Nova

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

PE Injector

Six Months Undetected: Analysis of archive.org hosted .NET PE Injector
1 min read Feb 24, 2025

Six Months Undetected: Analysis of archive.org hosted .NET PE Injector

Detailed analysis of .NET PE Injector, published on DeXpose blog

M4lcode's Picture
M4lcode in PE Injector malware analysis .NET
2 posts tagged

RAT

DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
CyberGate Technical Analysis
1 min read Jul 28, 2024

CyberGate Technical Analysis

Detailed analysis of CyberGate, published on Cyber5W blog

M4lcode's Picture
M4lcode in Delphi RAT malware analysis
1 post tagged

Ransomware

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
2 posts tagged

Research

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
Egypt Post Impersonation Linked to Smishing Triad
1 min read May 30, 2025

Egypt Post Impersonation Linked to Smishing Triad

Egypt Post impersonation linked to the Smishing Triad — research published on DeXpose blog

M4lcode's Picture
M4lcode in Smishing Triad Threat Intelligence Research
1 post tagged

Smishing Triad

Egypt Post Impersonation Linked to Smishing Triad
1 min read May 30, 2025

Egypt Post Impersonation Linked to Smishing Triad

Egypt Post impersonation linked to the Smishing Triad — research published on DeXpose blog

M4lcode's Picture
M4lcode in Smishing Triad Threat Intelligence Research
1 post tagged

Snake Keylogger

Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
1 post tagged

Stack Strings

Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
1 post tagged

Strings Encryption

CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
2 posts tagged

Threat Intelligence

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog

M4lcode's Picture
M4lcode in APT Profile Threat Intelligence Research
Egypt Post Impersonation Linked to Smishing Triad
1 min read May 30, 2025

Egypt Post Impersonation Linked to Smishing Triad

Egypt Post impersonation linked to the Smishing Triad — research published on DeXpose blog

M4lcode's Picture
M4lcode in Smishing Triad Threat Intelligence Research
1 post tagged

android

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
2 posts tagged

doc

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
2 posts tagged

js

How to deobfuscate Javascript malware
1 min read Apr 1, 2024

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

M4lcode's Picture
M4lcode in js malware analysis
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
2 posts tagged

macros

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
14 posts tagged

malware analysis

Flesh Stealer: A Report on Multivector Data Theft
1 min read Apr 11, 2025

Flesh Stealer: A Report on Multivector Data Theft

Detailed analysis of Flesh Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer malware analysis .NET
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
1 min read Mar 3, 2025

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

Detailed analysis of PureLogs, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer .NET Reactor malware analysis .NET
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector
1 min read Feb 24, 2025

Six Months Undetected: Analysis of archive.org hosted .NET PE Injector

Detailed analysis of .NET PE Injector, published on DeXpose blog

M4lcode's Picture
M4lcode in PE Injector malware analysis .NET
Analysis of Nova: A Snake Keylogger Fork
1 min read Dec 11, 2024

Analysis of Nova: A Snake Keylogger Fork

Detailed analysis of Nova KeyLogger, published on ANY.RUN blog

M4lcode's Picture
M4lcode in Nova Snake Keylogger malware analysis .NET
DarkComet RAT: Technical Analysis of Attack Chain
1 min read Oct 25, 2024

DarkComet RAT: Technical Analysis of Attack Chain

Detailed analysis of DarkComet RAT, published on ANY.RUN blog

M4lcode's Picture
M4lcode in RAT DarkComet malware analysis
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
CyberGate Technical Analysis
1 min read Jul 28, 2024

CyberGate Technical Analysis

Detailed analysis of CyberGate, published on Cyber5W blog

M4lcode's Picture
M4lcode in Delphi RAT malware analysis
How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros
Gafgyt Backdoor Analysis
1 min read Apr 7, 2024

Gafgyt Backdoor Analysis

Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog

M4lcode's Picture
M4lcode in malware analysis Backdoor Linux
How to deobfuscate Javascript malware
1 min read Apr 1, 2024

How to deobfuscate Javascript malware

Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog

M4lcode's Picture
M4lcode in js malware analysis
CryptNet Ransomware Detailed Analysis
1 min read Mar 21, 2024

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware, published on Cyber5W blog

M4lcode's Picture
M4lcode in .NET Reactor Strings Encryption malware analysis Ransomware .NET
Matanbuchus Loader Detailed Analysis
1 min read Mar 15, 2024

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus Loader, published on Cyber5W blog

M4lcode's Picture
M4lcode in API Hashing Stack Strings malware analysis Loader C++
Obfuscated Challenge Walkthrough
4 min read Nov 22, 2023

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders

M4lcode's Picture
M4lcode in doc js malware analysis macros
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
4 posts tagged

stealer

Flesh Stealer: A Report on Multivector Data Theft
1 min read Apr 11, 2025

Flesh Stealer: A Report on Multivector Data Theft

Detailed analysis of Flesh Stealer, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer malware analysis .NET
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
1 min read Mar 3, 2025

PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism

Detailed analysis of PureLogs, published on DeXpose blog

M4lcode's Picture
M4lcode in stealer .NET Reactor malware analysis .NET
AZORult Malware: Technical Analysis
1 min read Sep 4, 2024

AZORult Malware: Technical Analysis

Detailed analysis of AZORult, published on ANY.RUN blog

M4lcode's Picture
M4lcode in stealer AZORult malware analysis C++
Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
1 post tagged

tutorial

How to setup ARM android virtual machine on x86 host machine
2 min read Feb 24, 2024

How to setup ARM android virtual machine on x86 host machine

Setup ARM android virtual machine on x86 host machine tutorial

M4lcode's Picture
M4lcode in android tutorial
1 post tagged

vidar

Deep Analysis of Vidar Stealer
7 min read Jul 24, 2023

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

M4lcode's Picture
M4lcode in stealer vidar malware analysis
1 post tagged

xlsx

How to analyze malicious macros in MS office documents
1 min read Apr 13, 2024

How to analyze malicious macros in MS office documents

Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog

M4lcode's Picture
M4lcode in xlsx doc malware analysis macros

Latest Posts

Threat Actor Profile: APT27
1 min read Sep 15, 2025

Threat Actor Profile: APT27

M4lcode's Picture
M4lcode
Egypt Post Impersonation Linked to Smishing Triad
1 min read May 30, 2025

Egypt Post Impersonation Linked to Smishing Triad

M4lcode's Picture
M4lcode

Explore Tags

.NET .NET Reactor API Hashing APT Profile AZORult Backdoor C++ DarkComet Delphi Linux Loader Nova PE Injector RAT Ransomware Research Smishing Triad Snake Keylogger Stack Strings Strings Encryption Threat Intelligence android doc js macros malware analysis stealer tutorial vidar xlsx
2025 © M4lcode. Crafted & Designed by Artem Sheludko.