• Spanish

006 - Decoding XWorm: Introduction

In this first article of the XWorm series, we explore the basics of analyzing this RAT (Remote Access Trojan). We identify the type of binary, analyze managed vs unmanaged code, and introduce the key tools for its analysis.
Read more →

003 - Analyzing a C2 agent - Part 1: The Dropper

In this first part, we will analyze a malicious macro containing an embedded C2 agent. We will analyze how it acts, what techniques it uses to hinder analysis, and how we can obtain indicators of compromise from it.
Read more →