• Spanish

006 - Decoding XWorm: Introduction

In this first article of the XWorm series, we explore the basics of analyzing this RAT (Remote Access Trojan). We identify the type of binary, analyze managed vs unmanaged code, and introduce the key tools for its analysis.
Read more →

003 - Analyzing a C2 agent - Part 1: The Dropper

In this first part, we will analyze a malicious macro containing an embedded C2 agent. We will analyze how it acts, what techniques it uses to hinder analysis, and how we can obtain indicators of compromise from it.
Read more →
Subscribe
×

Subscribe to Threat Anatomy

Get notified when we post new content!

We respect your privacy. Your email will only be used to notify you about new posts.