Date Author Title
2024-11-30Xavier MertensFrom a Regular Infostealer to its Obfuscated Version
2024-11-22Xavier MertensAn Infostealer Searching for « BIP-0039 » Data
2024-11-19Xavier MertensDetecting the Presence of a Debugger in Linux
2024-11-07Xavier MertensSteam Account Checker Poisoned with Infostealer
2024-11-05Xavier MertensPython RAT with a Nice Screensharing Feature
2024-10-09Xavier MertensFrom Perfctl to InfoStealer
2024-09-18Xavier MertensPython Infostealer Patching Windows Exodus App
2024-09-17Xavier Mertens23:59, Time to Exfiltrate!
2024-09-16Xavier MertensManaging PE Files With Overlays
2024-09-11Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-08-27Xavier MertensWhy Is Python so Popular to Infect Windows Hosts?
2024-08-26Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-08-19Xavier MertensDo you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2024-08-14Xavier MertensMultiple Malware Dropped Through MSI Package
2024-07-26Xavier MertensExelaStealer Delivered "From Russia With Love"
2024-07-25Xavier MertensXWorm Hidden With Process Hollowing
2024-07-24Xavier Mertens"Mouse Logger" Malicious Python Script
2024-06-06Xavier MertensMalicious Python Script with a "Best Before" Date
2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-22Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-04-29Guy BruneauLinux Trojan - Xorddos with Filename eyshcjdmzg
2024-04-25Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-03-28Xavier MertensFrom JavaScript to AsyncRAT
2024-03-13Xavier MertensUsing ChatGPT to Deobfuscate Malicious Scripts
2024-02-29Jesse La Grew[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
2024-02-08Xavier MertensA Python MP3 Player with Builtin Keylogger Capability
2024-02-06Jan KoprivaComputer viruses are celebrating their 40th birthday (well, 54th, really)
2024-01-26Xavier MertensA Batch File With Multiple Payloads
2024-01-25Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-24Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-19Xavier MertensmacOS Python Script Replacing Wallet Applications with Rogue Apps
2024-01-07Guy BruneauSuspicious Prometei Botnet Activity
2024-01-03Jan KoprivaInteresting large and small malspam attachments from 2023
2023-12-22Xavier MertensShall We Play a Game?
2023-11-18Xavier MertensQuasar RAT Delivered Through Updated SharpLoader
2023-11-15Xavier MertensRedline Dropped Through MSIX Package
2023-11-09Xavier MertensVisual Examples of Code Injection
2023-11-01Xavier MertensMalware Dropped Through a ZPAQ Archive
2023-10-31Xavier MertensMultiple Layers of Anti-Sandboxing Techniques
2023-10-28Xavier MertensSize Matters for Many Security Controls
2023-10-18Jesse La GrewHiding in Hex
2023-09-30Xavier MertensSimple Netcat Backdoor in Python Script
2023-09-29Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-08-25Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-08-23Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-08-22Xavier MertensHave You Ever Heard of the Fernet Encryption Algorithm?
2023-08-21Xavier MertensQuick Malware Triage With Inotify Tools
2023-08-20Guy BruneauSystemBC Malware Activity
2023-08-18Xavier MertensFrom a Zalando Phishing to a RAT
2023-08-11Xavier MertensShow me All Your Windows!
2023-08-03Jan KoprivaFrom small LNK to large malicious BAT file with zero VT score
2023-07-29Xavier MertensDo Attackers Pay More Attention to IPv6?
2023-07-28Xavier MertensShellCode Hidden with Steganography
2023-07-26Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2023-06-27Xavier MertensThe Importance of Malware Triage
2023-06-23Xavier MertensWord Document with an Online Attached Template
2023-06-21Yee Ching TokAnalyzing a YouTube Sponsorship Phishing Mail and Malware Targeting Content Creators
2023-06-20Xavier MertensMalicious Code Can Be Anywhere
2023-06-19Xavier MertensMalware Delivered Through .inf File
2023-06-16Xavier MertensAnother RAT Delivered Through VBS
2023-05-17Xavier MertensIncrease in Malicious RAR SFX files
2023-04-07Xavier MertensDetecting Suspicious API Usage with YARA Rules
2023-04-04Johannes UllrichAnalyzing the efile.com Malware "efail"
2023-03-30Xavier MertensBypassing PowerShell Strong Obfuscation
2023-03-26Didier StevensExtra: "String Obfuscation: Character Pair Reversal"
2023-03-01Xavier MertensPython Infostealer Targeting Gamers
2023-02-09Xavier MertensA Backdoor with Smart Screenshot Capability
2023-02-04Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-01-25Xavier MertensA First Malicious OneNote Document
2023-01-16Johannes UllrichPSA: Why you must run an ad blocker when using Google
2023-01-06Xavier MertensAutoIT Remains Popular in the Malware Landscape
2023-01-05Brad DuncanMore Brazil malspam pushing Astaroth (Guildma) in January 2023
2022-12-21Guy BruneauDShield Sensor Setup in Azure
2022-12-18Guy BruneauInfostealer Malware with Double Extension
2022-11-19Guy BruneauMcAfee Fake Antivirus Phishing Campaign is Back!
2022-11-09Xavier MertensAnother Script-Based Ransomware
2022-11-05Guy BruneauWindows Malware with VHD Extension
2022-11-04Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-10-24Xavier MertensC2 Communications Through outlook.com
2022-10-21Brad Duncansczriptzzbn inject pushes malware for NetSupport RAT
2022-10-18Xavier MertensPython Obfuscation for Dummies
2022-10-17Xavier MertensFileless Powershell Dropper
2022-10-15Guy BruneauMalware - Covid Vaccination Supplier Declaration
2022-10-07Xavier MertensPowershell Backdoor with DGA Capability
2022-09-25Didier StevensDownloading Samples From Takendown Domains
2022-09-24Didier StevensMaldoc Analysis Info On MalwareBazaar
2022-09-23Xavier MertensKids Like Cookies, Malware Too!
2022-09-22Xavier MertensRAT Delivered Through FODHelper
2022-09-15Xavier MertensMalicious Word Document with a Frameset
2022-09-14Xavier MertensEasy Process Injection within Python
2022-09-10Guy BruneauPhishing Word Documents with Suspicious URL
2022-09-03Didier StevensVideo: James Webb JPEG With Malware
2022-09-02Didier StevensJames Webb JPEG With Malware
2022-08-30Johannes UllrichTwo things that will never die: bash scripts and IRC!
2022-08-22Xavier Mertens32 or 64 bits Malware?
2022-07-29Johannes UllrichPDF Analysis Intro and OpenActions Entries
2022-07-25Xavier MertensPowerShell Script with Fileless Capability
2022-07-20Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-06-25Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-22Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-16Xavier MertensHoudini is Back Delivered Through a JavaScript Dropper
2022-06-04Guy BruneauSpam Email Contains a Very Large ISO file
2022-06-03Xavier MertensSandbox Evasion... With Just a Filename!
2022-05-31Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-20Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-05-19Brad DuncanBumblebee Malware from TransferXL URLs
2022-05-11Brad DuncanTA578 using thread-hijacked emails to push ISO files for Bumblebee malware
2022-05-07Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-05-06Jan KoprivaWhat is the simplest malware in the world?
2022-05-05Brad DuncanPassword-protected Excel spreadsheet pushes Remcos RAT
2022-04-21Xavier MertensMulti-Cryptocurrency Clipboard Swapper
2022-04-06Brad DuncanWindows MetaStealer Malware
2022-03-25Xavier MertensXLSB Files: Because Binary is Stealthier Than XML
2022-03-24Xavier MertensMalware Delivered Through Free Sharing Tool
2022-03-23Brad DuncanArkei Variants: From Vidar to Mars Stealer
2022-03-11Xavier MertensKeep an Eye on WebSockets
2022-03-09Xavier MertensInfostealer in a Batch File
2022-02-22Xavier MertensA Good Old Equation Editor Vulnerability Delivering Malware
2022-02-18Xavier MertensRemcos RAT Delivered Through Double Compressed Archive
2022-02-11Xavier MertensCinaRAT Delivered Through HTML ID Attributes
2022-01-20Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-07Xavier MertensCustom Python RAT Builder
2022-01-06Xavier MertensMalicious Python Script Targeting Chinese People
2022-01-05Xavier MertensCode Reuse In the Malware Landscape
2021-12-21Xavier MertensMore Undetected PowerShell Dropper
2021-12-15Xavier MertensSimple but Undetected PowerShell Backdoor
2021-12-03Xavier MertensThe UPX Packer Will Never Die!
2021-12-02Brad DuncanTA551 (Shathak) pushes IcedID (Bokbot)
2021-11-19Xavier MertensDownloader Disguised as Excel Add-In (XLL)
2021-11-18Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-10-21Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-10-01Xavier MertensNew Tool to Add to Your LOLBAS List: cvtres.exe
2021-09-23Xavier MertensExcel Recipe: Some VBA Code with a Touch of Excel4 Macro
2021-09-01Brad DuncanSTRRAT: a Java-based RAT that doesn't care if you have Java
2021-08-30Xavier MertensCryptocurrency Clipboard Swapper Delivered With Love
2021-08-20Xavier MertensWaiting for the C2 to Show Up
2021-08-15Didier StevensSimple Tips For Triage Of MALWARE Bazaar's Daily Malware Batches
2021-08-07Didier StevensMALWARE Bazaar "Download daily malware batches"
2021-08-06Xavier MertensMalicious Microsoft Word Remains A Key Infection Vector
2021-07-30Xavier MertensInfected With a .reg File
2021-07-29Xavier MertensMalicious Content Delivered Through archive.org
2021-07-24Xavier MertensAgent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-07-16Xavier MertensMultiple BaseXX Obfuscations
2021-07-06Xavier MertensPython DLL Injection Check
2021-06-30Brad DuncanJune 2021 Forensic Contest: Answers and Analysis
2021-06-11Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-09Jan KoprivaArchitecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files"
2021-06-04Xavier MertensRussian Dolls VBS Obfuscation
2021-05-28Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-27Jan KoprivaAll your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not
2021-05-21Xavier MertensLocking Kernel32.dll As Anti-Debugging Technique
2021-05-19Brad DuncanMay 2021 Forensic Contest: Answers and Analysis
2021-05-18Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-06Xavier MertensAlternative Ways To Perform Basic Tasks
2021-05-05Brad DuncanMay 2021 Forensic Contest
2021-04-29Xavier MertensFrom Python to .Net
2021-04-28Xavier MertensDeeper Analyzis of my Last Malicious PowerPoint Add-On
2021-04-23Xavier MertensMalicious PowerPoint Add-On: "Small Is Beautiful"
2021-04-09Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2021-04-08Xavier MertensSimple Powershell Ransomware Creating a 7Z Archive of your Files
2021-04-06Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-04-02Xavier MertensC2 Activity: Sandboxes or Real Victims?
2021-04-01Brad DuncanApril 2021 Forensic Quiz
2021-03-31Xavier MertensQuick Analysis of a Modular InfoStealer
2021-03-19Xavier MertensPastebin.com Used As a Simple C2 Channel
2021-03-18Xavier MertensSimple Python Keylogger
2021-03-17Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-16Jan Kopriva50 years of malware? Not really. 50 years of computer worms? That's a different story...
2021-03-04Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-02-19Xavier MertensDynamic Data Exchange (DDE) is Back in the Wild?
2021-02-14Didier StevensVideo: tshark & Malware Analysis
2021-02-12Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-11Jan KoprivaAgent Tesla hidden in a historical anti-malware tool
2021-02-03Brad DuncanExcel spreadsheets push SystemBC malware
2021-02-02Xavier MertensNew Example of XSL Script Processing aka "Mitre T1220"
2021-01-22Xavier MertensAnother File Extension to Block in your MTA: .jnlp
2021-01-21Xavier MertensPowershell Dropping a REvil Ransomware
2021-01-04Jan KoprivaFrom a small BAT file to Mass Logger infostealer
2021-01-02Guy BruneauProtecting Home Office and Enterprise in 2021
2020-12-24Xavier MertensMalicious Word Document Delivering an Octopus Backdoor
2020-12-22Xavier MertensMalware Victim Selection Through WiFi Identification
2020-12-03Brad DuncanTraffic Analysis Quiz: Mr Natural
2020-11-25Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-23Didier StevensQuick Tip: Cobalt Strike Beacon Analysis
2020-11-09Xavier MertensHow Attackers Brush Up Their Malicious Scripts
2020-10-25Didier StevensVideo: Pascal Strings
2020-10-21Daniel WesemannShipping dangerous goods
2020-09-24Xavier MertensParty in Ibiza with PowerShell
2020-09-23Xavier MertensMalicious Word Document with Dynamic Content
2020-09-18Xavier MertensA Mix of Python & VBA in a Malicious Word Document
2020-09-15Brad DuncanTraffic Analysis Quiz: Oh No... Another Infection!
2020-09-04Jan KoprivaA blast from the past - XXEncoded VB6.0 Trojan
2020-09-03Xavier MertensSandbox Evasion Using NTP
2020-08-28Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-26Xavier MertensMalicious Excel Sheet with a NULL VT Score
2020-08-24Xavier MertensTracking A Malware Campaign Through VT
2020-08-19Xavier MertensExample of Word Document Delivering Qakbot
2020-08-18Xavier MertensUsing API's to Track Attackers
2020-08-14Jan KoprivaDefinition of 'overkill' - using 130 MB executable to hide 24 kB malware
2020-08-06Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-08-05Brad DuncanTraffic Analysis Quiz: What's the Malware From This Infection?
2020-07-24Xavier MertensCompromized Desktop Applications by Web Technologies
2020-07-15Brad DuncanWord docs with macros for IcedID (Bokbot)
2020-07-10Brad DuncanExcel spreasheet macro kicks off Formbook infection
2020-07-08Xavier MertensIf You Want Something Done Right, You Have To Do It Yourself... Malware Too!
2020-06-13Guy BruneauMirai Botnet Activity
2020-06-04Xavier MertensAnti-Debugging Technique based on Memory Protection
2020-06-01Jim ClausingStackstrings, type 2
2020-05-23Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-05-21Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-05-20Brad DuncanMicrosoft Word document with malicious macro pushes IcedID (Bokbot)
2020-05-06Xavier MertensKeeping an Eye on Malicious Files Life Time
2020-04-27Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-25Didier StevensMALWARE Bazaar
2020-04-24Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-20Didier StevensKPOT AutoIt Script: Analysis
2020-04-17Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-12Didier StevensReader Analysis: "Dynamic analysis technique to get decrypted KPOT Malware."
2020-04-10Xavier MertensPowerShell Sample Extracting Payload From SSL
2020-04-03Xavier MertensObfuscated with a Simple 0x0A
2020-03-31Johannes UllrichKwampirs Targeted Attacks Involving Healthcare Sector
2020-03-27Xavier MertensMalicious JavaScript Dropping Payload in the Registry
2020-03-26Xavier MertensVery Large Sample as Evasion Technique?
2020-03-23Didier StevensKPOT Deployed via AutoIt Script
2020-03-22Didier StevensMore COVID-19 Themed Malware
2020-03-21Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-03-19Xavier MertensCOVID-19 Themed Multistage Malware
2020-03-11Xavier MertensAgent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account
2020-03-06Xavier MertensA Safe Excel Sheet Not So Safe
2020-02-21Xavier MertensQuick Analysis of an Encrypted Compound Document Format
2020-02-14Xavier MertensKeep an Eye on Command-Line Browsers
2020-02-07Xavier MertensSandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2020-02-03Jan KoprivaAnalysis of a triple-encrypted AZORult downloader
2020-01-16Jan KoprivaPicks of 2019 malware - the large, the small and the one full of null bytes
2020-01-10Xavier MertensMore Data Exfiltration
2020-01-09Xavier MertensQuick Analyzis of a(nother) Maldoc
2020-01-02Xavier MertensRansomware in Node.js
2019-12-24Brad DuncanMalspam with links to Word docs pushes IcedID (Bokbot)
2019-12-12Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-11-23Guy BruneauLocal Malware Analysis with Malice
2019-10-18Xavier MertensQuick Malicious VBS Analysis
2019-10-03Xavier Mertens"Lost_Files" Ransomware
2019-09-19Xavier MertensAgent Tesla Trojan Abusing Corporate Email Accounts
2019-08-30Xavier MertensMalware Dropping a Local Node.js Instance
2019-08-28Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2019-08-22Xavier MertensSimple Mimikatz & RDPWrapper Dropper
2019-08-18Didier StevensVideo: Analyzing DAA Files
2019-08-16Didier StevensThe DAA File Format
2019-08-12Didier StevensMalicious .DAA Attachments
2019-07-18Xavier MertensMalicious PHP Script Back on Stage?
2019-07-11Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-02Xavier MertensMalicious Script With Multiple Payloads
2019-06-14Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-06-10Xavier MertensInteresting JavaScript Obfuscation Example
2019-05-29Xavier MertensBehavioural Malware Analysis with Microsoft ASA
2019-05-13Xavier MertensFrom Phishing To Ransomware?
2019-05-03Jim ClausingA few Ghidra tips for IDA users, part 3 - conversion, labels, and comments
2019-05-01Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-19Didier StevensAnalyzing UDF Files with Python
2019-04-17Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-17Xavier MertensMalware Sample Delivered Through UDF Image
2019-04-08Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-03-30Didier Stevens"404" is not Malware
2019-03-10Didier StevensMalicious HTA Analysis by a Reader
2019-03-10Didier StevensQuick and Dirty Malicious HTA Analysis
2019-02-14Xavier MertensOld H-Worm Delivered Through GitHub
2019-01-16Brad DuncanEmotet infections and follow-up malware
2019-01-06Didier StevensMalicious .tar Attachments
2019-01-05Didier StevensA Malicious JPEG? Second Example
2019-01-04Didier StevensA Malicious JPEG?
2019-01-02Xavier MertensMalicious Script Leaking Data via FTP
2018-12-09Didier StevensQuickie: String Analysis is Still Useful
2018-12-08Didier StevensReader Malware Submission: MHT File Inside a ZIP File
2018-11-27Xavier MertensMore obfuscated shell scripts: Fake MacOS Flash update
2018-11-26Xavier MertensObfuscated bash script targeting QNap boxes
2018-11-22Xavier MertensDivided Payload in Multiple Pasties
2018-11-06Xavier MertensMalicious Powershell Script Dissection
2018-10-23Xavier MertensDiving into Malicious AutoIT Code
2018-10-22Xavier MertensMalicious Powershell using a Decoy Picture
2018-10-21Pasquale StirparoBeyond good ol’ LaunchAgent - part 0
2018-10-12Xavier MertensMore Equation Editor Exploit Waves
2018-09-28Xavier MertensMore Excel DDE Code Injection
2018-09-22Didier StevensSuspicious DNS Requests ... Issued by a Firewall
2018-09-16Didier Stevens20/20 malware vision
2018-09-13Xavier MertensMalware Delivered Through MHT Files
2018-09-05Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-08-31Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-08-30Xavier MertensCrypto Mining Is More Popular Than Ever!
2018-08-26Didier StevensIdentifying numeric obfuscation
2018-08-26Didier Stevens"When was this machine infected?"
2018-08-24Xavier MertensMicrosoft Publisher Files Delivering Malware
2018-08-21Xavier MertensMalicious DLL Loaded Through AutoIT
2018-08-06Didier StevensNumeric obfuscation: another example
2018-08-04Didier StevensDealing with numeric obfuscation in malicious scripts
2018-08-02Brad DuncanDHL-themed malspam reveals embedded malware in animated gif
2018-07-26Xavier MertensWindows Batch File Deobfuscation
2018-07-09Renato MarinhoCriminals Don't Read Instructions or Use Strong Passwords
2018-06-07Remco VerhoefAutomated twitter loot collection
2018-06-05Xavier MertensMalicious Post-Exploitation Batch File
2018-06-01Remco VerhoefBinary analysis with Radare2
2018-05-22Xavier MertensMalware Distributed via .slk Files
2018-05-19Xavier MertensMalicious Powershell Targeting UK Bank Customers
2018-05-09Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-07Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-01Xavier MertensDiving into a Simple Maldoc Generator
2018-03-05Xavier MertensMalicious Bash Script with Multiple Features
2018-03-04Xavier MertensThe Crypto Miners Fight For CPU Cycles
2018-02-25Didier StevensRetrieving malware over Tor on Windows
2018-02-02Xavier MertensSimple but Effective Malicious XLS Sheet
2018-01-28Didier StevensIs this a pentest?
2018-01-26Xavier MertensInvestigating Microsoft BITS Activity
2018-01-25Xavier MertensRansomware as a Service
2018-01-11Xavier MertensMining or Nothing!
2017-12-19Xavier MertensExample of 'MouseOver' Link in a Powerpoint File
2017-12-16Xavier MertensMicrosoft Office VBA Macro Obfuscation via Metadata
2017-11-29Xavier MertensFileless Malicious PowerShell Sample
2017-11-16Xavier MertensSuspicious Domains Tracking Dashboard
2017-11-15Xavier MertensIf you want something done right, do it yourself!
2017-11-13Guy BruneauVBE Embeded Script (info.zip)
2017-11-07Xavier MertensInteresting VBA Dropper
2017-11-03Xavier MertensSimple Analysis of an Obfuscated JAR File
2017-10-31Xavier MertensSome Powershell Malicious Code
2017-10-29Didier StevensRemember ACE files?
2017-10-24Xavier MertensBadRabbit: New ransomware wave hitting RU & UA
2017-10-15Didier StevensPeeking into .msg files
2017-09-09Didier StevensMalware analysis output sanitization
2017-09-02Xavier MertensAutoIT based malware back in the wild
2017-08-26Didier StevensMalware analysis: searching for dots
2017-08-25Xavier MertensMalicious AutoIT script delivered in a self-extracting RAR file
2017-08-23Xavier MertensMalicious script dropping an executable signed by Avast?
2017-08-18Renato MarinhoEngineBox Malware Supports 10+ Brazilian Banks
2017-07-21Didier StevensMalicious .iso Attachments
2017-07-09Russ McReeAdversary hunting with SOF-ELK
2017-07-05Didier StevensSelecting domains with random names
2017-06-22Xavier MertensObfuscating without XOR
2017-06-06Didier StevensMalware and XOR - Part 2
2017-06-05Didier StevensMalware and XOR - Part 1
2017-05-16Russ McReeWannaCry? Do your own data analysis.
2017-05-13Guy BruneauMicrosoft Released Guidance for WannaCrypt
2017-04-28Xavier MertensAnother Day, Another Obfuscation Technique
2017-04-19Xavier MertensHunting for Malicious Excel Sheets
2017-04-05Xavier MertensWhitelists: The Holy Grail of Attackers
2017-03-18Xavier MertensExample of Multiple Stages Dropper
2017-03-12Guy BruneauHoneypot Logs and Tracking a VBE Script
2017-03-08Xavier MertensNot All Malware Samples Are Complex
2017-02-05Xavier MertensMany Malware Samples Found on Pastebin
2017-01-31Johannes UllrichMalicious Office files using fileless UAC bypass to drop KEYBASE malware
2017-01-24Xavier MertensMalicious SVG Files in the Wild
2017-01-06John BambenekRansomware Operators Cold Calling UK Schools to Get Malware Through
2017-01-05John BambenekNew Year's Resolution: Build Your Own Malware Lab?
2017-01-01Didier Stevenspy2exe Decompiling - Part 1
2016-12-13Xavier MertensUAC Bypass in JScript Dropper
2016-11-11Rick WannerBenevolent malware? reincarna/Linux.Wifatch
2016-10-30Pasquale StirparoVolatility Bot: Automated Memory Analysis
2016-09-30Xavier MertensAnother Day, Another Malicious Behaviour
2016-09-13Rob VandenBrinkIf it's Free, YOU are the Product
2016-09-05Xavier MertensMalware Delivered via '.pub' Files
2016-09-01Xavier MertensMaxmind.com (Ab)used As Anti-Analysis Technique
2016-08-25Xavier MertensOut-of-Band iOS Patch Fixes 0-Day Vulnerabilities
2016-08-24Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-08-23Xavier MertensVoice Message Notifications Deliver Ransomware
2016-08-01Daniel WesemannAre you getting I-CANNED ?
2016-07-27Xavier MertensAnalyze of a Linux botnet client source code
2016-07-25Didier StevensPython Malware - Part 4
2016-07-16Didier StevensPython Malware - Part 3
2016-07-12Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-06-20Xavier MertensOngoing Spam Campaign Related to Swift
2016-06-18Rob VandenBrinkControlling JavaScript Malware Before it Runs
2016-05-15Didier StevensPython Malware - Part 1
2016-05-13Xavier MertensMISP - Malware Information Sharing Platform
2016-05-05Xavier MertensMicrosoft BITS Used to Download Payloads
2016-05-02Rick WannerFake Chrome update for Android
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-04-21Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2016-04-10Didier StevensHandling Malware Samples
2016-03-07Xavier MertensAnother Malicious Document, Another Way to Deliver Malicious Code
2016-02-24Xavier MertensAnalyzis of a Malicious .lnk File with an Embedded Payload
2016-02-18Xavier MertensHunting for Executable Code in Windows Environments
2016-02-11Tom WebbTomcat IR with XOR.DDoS
2016-01-24Didier StevensObfuscated MIME Files
2016-01-15Xavier MertensJavaScript Deobfuscation Tool
2016-01-01Didier StevensFailure Is An Option
2015-12-26Didier StevensMalfunctioning Malware
2015-12-16Xavier MertensPlaying With Sandboxes Like a Boss
2015-12-06Mark HofmanMalware SPAM a new run has started.
2015-11-09John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2015-09-29Pedro BuenoTricks for DLL analysis
2015-09-28Johannes Ullrich"Transport of London" Malicious E-Mail
2015-09-21Xavier MertensDetecting XCodeGhost Activity
2015-04-24Basil Alawi S.TaherFileless Malware
2015-04-09Brad DuncanAn example of the malicious emails sometimes sent to the ISC handler addresses
2015-03-18Daniel WesemannNew SANS memory forensics poster
2015-03-14Didier StevensMaldoc VBA Sandbox/Virtualization Detection
2015-03-08Brad DuncanWhat Happened to You, Asprox Botnet?
2015-02-19Daniel WesemannMacros? Really?!
2014-10-03Johannes UllrichCSAM: The Power of Virustotal to Turn Harmless Binaries Malicious
2014-09-22Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-08-06Chris MohanFree Service to Help CryptoLocker Victims by FireEye and Fox-IT
2014-07-22Daniel WesemannIvan's Order of Magnitude
2014-07-19Russ McReeKeeping the RATs out: the trap is sprung - Part 3
2014-07-18Russ McReeKeeping the RATs out: **it happens - Part 2
2014-07-18Russ McReeGameover Zeus reported as "returned from the dead"
2014-07-16Russ McReeKeeping the RATs out: an exercise in building IOCs - Part 1
2014-07-05Guy BruneauMalware Analysis with pedump
2014-06-22Russ McReeOfficeMalScanner helps identify the source of a compromise
2014-06-08Guy Bruneauefax Spam Containing Malware
2014-04-06Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-05Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2014-03-04Daniel WesemannXPired!
2014-02-28Daniel WesemannFiesta!
2014-01-19Rick WannerAnatomy of a Malware distribution campaign
2013-12-24Daniel WesemannMr Jones wants you to appear in court!
2013-12-23Daniel WesemannCostco, BestBuy, Walmart really want to send you a package!
2013-12-07Guy BruneauSuspected Active Rovnix Botnet Controller
2013-11-02Rick WannerProtecting Your Family's Computers
2013-10-31Russ McReeHappy Halloween: The Ghost Really May Be In The Machine
2013-10-30Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-10-28Daniel WesemannExploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-10-24Johannes UllrichFalse Positive: php.net Malware Alert
2013-09-30Adrien de BeaupreTwitter DM spam/malware
2013-09-12Daniel Wesemann37.58.73.42 / 95.156.228.69 / 195.210.43.42, anyone?
2013-09-10Swa FrantzenMacs need to patch too!
2013-08-29Russ McReeSuspect Sendori software
2013-07-04Russ McReeCelebrating 4th of July With a Malware PCAP Visualization
2013-06-18Russ McReeVolatility rules...any questions?
2013-05-21Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-05-17Daniel Wesemanne-netprotections.su ?
2013-05-16Daniel WesemannExtracting signatures from Apple .apps
2013-05-11Lenny ZeltserExtracting Digital Signatures from Signed Malware
2013-05-01Daniel WesemannThe cost of cleaning up
2013-04-10Manuel Humberto Santander PelaezMassive Google scam sent by email to Colombian domains
2013-03-22Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 4
2013-03-20Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 3
2013-03-19Johannes UllrichScam of the day: More fake CNN e-mails
2013-03-15Mark BaggettAVG detect legit file as virus
2013-03-14Mark BaggettWipe the drive! Stealthy Malware Persistence - Part 2
2013-03-13Mark BaggettWipe the drive! Stealthy Malware Persistence Mechanism - Part 1
2013-02-25Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2013-01-08Jim ClausingCuckoo 0.5 is out and the world didn't end
2012-12-18Rob VandenBrinkAll I Want for Christmas is to Not Get Hacked !
2012-12-03Kevin ListonMobile Malware: Request for Field Reports
2012-11-02Daniel WesemannLamiabiocasa
2012-11-01Daniel WesemannPatched your Java yet?
2012-10-14Pedro BuenoCyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1
2012-09-21Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-09-14Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-07-21Rick WannerOpenDNS is looking for a few good malware people!
2012-07-05Adrien de BeaupreNew OS X trojan backdoor MaControl variant reported
2012-06-27Swa FrantzenOnline Banking Heists
2012-06-26Daniel WesemannRun, Forest! (Update)
2012-06-25Rick WannerTargeted Malware for Industrial Espionage?
2012-06-25Swa FrantzenBelgian online banking customers hacked.
2012-06-22Daniel WesemannRun, Forest!
2012-06-21Raul SilesPrint Bomb? (Take 2)
2012-06-21Russ McReeAnalysis of drive-by attack sample set
2012-06-19Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2012-06-04Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-04-26Richard PorterDefine Irony: A medical device with a Virus?
2012-04-25Daniel WesemannBlacole's obfuscated JavaScript
2012-04-25Daniel WesemannBlacole's shell code
2012-04-12Guy BruneauHP ProCurve 5400 zl Switch, Flash Cards Infected with Malware
2012-04-12Guy BruneauApple Java Updates for Mac OS X
2012-03-25Daniel Wesemannevilcode.class
2012-03-03Jim ClausingNew automated sandbox for Android malware
2012-02-24Guy BruneauFlashback Trojan in the Wild
2012-02-20Pedro BuenoSimple Malware Research Tools
2012-02-20Rick WannerDNSChanger resolver shutdown deadline is March 8th
2012-01-14Daniel WesemannHello, Antony!
2011-12-28Daniel Wesemann.nl.ai ?
2011-12-10Daniel WesemannUnwanted Presents
2011-12-07Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-11-04Guy BruneauDuqu Mitigation
2011-10-20Johannes UllrichEvil Printers Sending Mail
2011-09-07Lenny ZeltserAnalyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-08-29Kevin ShorttInternet Worm in the Wild
2011-06-15Pedro BuenoHit by MacDefender, Apple Web Security (name your Mac FakeAV here)...
2011-05-25Daniel WesemannApple advisory on "MacDefender" malware
2011-05-19Daniel WesemannFake AV Bingo
2011-05-14Guy BruneauWebsense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity
2011-05-03Johannes UllrichUpdate on Osama Bin Laden themed Malware
2011-05-02Johannes UllrichBin Laden Death Related Malware
2011-04-23Manuel Humberto Santander PelaezImage search can lead to malware download
2011-03-01Daniel WesemannAV software and "sharing samples"
2011-02-07Pedro BuenoThe Good , the Bad and the Unknown Online Scanners
2011-02-01Lenny ZeltserThe Importance of HTTP Headers When Investigating Malicious Sites
2010-12-29Daniel WesemannMalware Domains 2234.in, 0000002.in & co
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-10-26Pedro BuenoCyber Security Awareness Month - Day 26 - Sharing Office Files
2010-09-09Marcus Sachs'Here You Have' Email
2010-07-21Adrien de BeaupreDell PowerEdge R410 replacement motherboard firmware contains malware
2010-07-21Adrien de Beaupreautorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-07-06Rob VandenBrinkBogus Support Organizations use Live Operators to Install Malware
2010-07-04Manuel Humberto Santander PelaezMalware inside PDF Files
2010-06-17Deborah HaleFYI - Another bogus site
2010-06-14Manuel Humberto Santander PelaezRogue facebook application acting like a worm
2010-06-07Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-06-02Rob VandenBrinkNew Mac malware - OSX/Onionspy
2010-05-26Bojan ZdrnjaMalware modularization and AV detection evasion
2010-05-23Manuel Humberto Santander Pelaeze-mail scam announcing Fidel Castro's funeral ... and nasty malware to your computer.
2010-05-21Rick WannerIBM distributes malware at AusCERT!
2010-04-30Kevin ListonThe Importance of Small Files
2010-04-19Daniel WesemannLinked into scams?
2010-04-18Guy BruneauSome NetSol hosted sites breached
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2010-03-30Pedro BuenoSharing the Tools
2010-03-26Daniel WesemannGetting the EXE out of the RTF again
2010-03-09Marcus SachsEnergizer Malware
2010-03-04Daniel Wesemannsalefale-dot-com is bad
2010-03-03Johannes UllrichReports about large number of fake Amazon order confirmations
2010-02-21Patrick Nolan Looking for "more useful" malware information? Help develop the format.
2010-01-14Bojan ZdrnjaPDF Babushka
2010-01-07Daniel WesemannStatic analysis of malicious PDFs
2010-01-07Daniel WesemannStatic analysis of malicous PDFs (Part #2)
2009-12-17Daniel Wesemannoverlay.xul is back
2009-12-17Daniel WesemannIn caches, danger lurks
2009-12-16Rob VandenBrinkBeware the Attack of the Christmas Greeting Cards !
2009-12-07Rick WannerCheat Sheet: Analyzing Malicious Documents
2009-12-04Daniel WesemannMax Power's Malware Paradise
2009-12-02Rob VandenBrinkSPAM and Malware taking advantage of H1N1 concerns
2009-11-25Jim ClausingUpdates to my GREM Gold scripts and a new script
2009-09-25Lenny ZeltserCategories of Common Malware Traits
2009-09-25Deborah HaleConficker Continues to Impact Networks
2009-09-25Deborah HaleMalware delivered over Google and Yahoo Ad's?
2009-09-04Adrien de BeaupreFake anti-virus
2009-08-29Guy BruneauImmunet Protect - Cloud and Community Malware Protection
2009-08-26Johannes UllrichMalicious CD ROMs mailed to banks
2009-07-26Jim ClausingNew Volatility plugins
2009-07-03Adrien de BeaupreHappy 4th of July!
2009-07-02Daniel WesemannGetting the EXE out of the RTF
2009-07-02Bojan ZdrnjaCold Fusion web sites getting compromised
2009-06-16John BambenekIran Internet Blackout: Using Twitter for Operational Intelligence
2009-06-16John BambenekURL Shortening Service Cligs Hacked
2009-06-04Raul SilesMalware targetting banks ATM's
2009-06-04Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-05-20Pedro BuenoCyber Warfare and Kylin thoughts
2009-05-07Deborah HaleMalicious Content on the Web
2009-05-04Tom ListonFacebook phishing malware
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-03-13Bojan ZdrnjaWhen web application security, Microsoft and the AV vendors all fail
2009-02-23Daniel WesemannTurf War
2009-02-23Daniel WesemannAnd the Oscar goes to...
2009-02-10Bojan ZdrnjaMore tricks from Conficker and VM detection
2009-02-09Bojan ZdrnjaSome tricks from Conficker's bag
2009-02-04Daniel WesemannTitan Shields up!
2009-01-31John BambenekGoogle Search Engine's Malware Detection Broken
2009-01-24Pedro BuenoIdentifying and Removing the iWork09 Trojan
2009-01-18Daniel Wesemann3322. org
2009-01-15Bojan ZdrnjaConficker's autorun and social engineering
2009-01-12William SaluskyDownadup / Conficker - MS08-067 exploit and Windows domain account lockout
2009-01-07Bojan ZdrnjaAn Israeli patriot program or a trojan
2009-01-02Rick WannerTools on my Christmas list.
2008-12-25Maarten Van HorenbeeckMerry Christmas, and beware of digital hitchhikers!
2008-12-25Maarten Van HorenbeeckChristmas Ecard Malware
2008-12-17donald smithTeam CYMRU's Malware Hash Registry
2008-12-05Daniel WesemannBeen updatin' your Flash player lately?
2008-12-05Daniel WesemannBaby, baby!
2008-12-04Bojan ZdrnjaRogue DHCP servers
2008-11-17Jim ClausingFinding stealth injected DLLs
2008-11-16Maarten Van HorenbeeckDetection of Trojan control channels
2008-11-12John BambenekThoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline)
2008-11-11Swa FrantzenAcrobat continued activity in the wild
2008-11-10Stephen HallAdobe Reader Vulnerability - part 2
2008-10-07Kyle HaugsnessGood reading and a malware challenge
2008-09-29Daniel WesemannASPROX mutant
2008-09-22Maarten Van HorenbeeckData exfiltration and the use of anonymity providers
2008-09-18Bojan ZdrnjaMonitoring HTTP User-Agent fields
2008-09-07Lorna HutchesonMalware Analysis: Tools are only so good
2008-09-03Daniel WesemannStatic analysis of Shellcode
2008-09-03Daniel WesemannStatic analysis of Shellcode - Part 2
2008-09-01John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-13Adrien de BeaupreCNN switched to MSNBC
2008-08-05Daniel WesemannThe news update you never asked for
2008-07-20Kevin ListonMalware Intelligence: Making it Actionable
2008-07-15Maarten Van HorenbeeckExtracting scripts and data from suspect PDF files
2008-07-14Daniel WesemannObfuscated JavaScript Redux
2008-07-07Pedro BuenoBad url classification
2008-06-18Marcus SachsOlympics Part II
2008-06-14Lorna HutchesonMalware Detection - Take the Blinders Off
2008-06-10Swa FrantzenRansomware keybreaking
2008-06-01Mark HofmanFree Yahoo email account! Sign me up, Ok well maybe not.
2008-05-28Adrien de BeaupreAnother example of malicious SWF
2008-05-27Adrien de BeaupreMalicious swf files?
2008-05-26Marcus SachsPredictable Response
2008-05-14Bojan ZdrnjaWar of the worlds?
2008-05-02Adrien de BeaupreHi, remember me?...
2008-04-30Bojan Zdrnja(Minor) evolution in Mac DNS changer malware
2008-04-24Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-16Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-04-15Johannes UllrichSRI Malware Threat Center
2008-04-14John BambenekA Federal Subpoena or Just Some More Spam & Malware?
2008-04-07John BambenekHP USB Keys Shipped with Malware for your Proliant Server
2008-04-07John BambenekGot Kraken?
2008-04-07John BambenekKraken Technical Details: UPDATED x3
2008-04-06Daniel WesemannAdvanced obfuscated JavaScript analysis
2008-04-04Daniel Wesemannnmidahena
2008-04-03Bojan ZdrnjaVB detection: is it so difficult?
2008-04-02Adrien de BeaupreWhen is a DMG file not a DMG file
2008-03-27Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft
2006-08-31Swa FrantzenNT botnet submitted
2000-01-02Deborah Hale2010 A Look Back - 2011 A Look Ahead