Detailed analysis of Flesh Stealer, published on DeXpose blog
Detailed analysis of PureLogs, published on DeXpose blog
Detailed analysis of .NET PE Injector, published on DeXpose blog
Detailed analysis of Nova KeyLogger, published on ANY.RUN blog
Detailed analysis of CryptNet Ransomware, published on Cyber5W blog
Detailed analysis of Matanbuchus Loader, published on Cyber5W blog
APT27 (Emissary Panda/Iron Tiger/Lucky Mouse) Profile — research published on DeXpose blog
Detailed analysis of AZORult, published on ANY.RUN blog
Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog
Detailed analysis of DarkComet RAT, published on ANY.RUN blog
Detailed analysis of CyberGate, published on Cyber5W blog
Egypt Post impersonation linked to the Smishing Triad — research published on DeXpose blog
Setup ARM android virtual machine on x86 host machine tutorial
Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog
Malware Analysis Challenge from Cyber Defenders
Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog
Vidar Stealer Technical Analysis