You will find here technical analysis on various APT / Cybercrime malware that I have been studying through the custom sandbox I’m currently developping.
Raw dynamic analysis results are available for more samples on my dedicated GitHub Reflexions
I’ll be happy to exchange with other researchers in the field of static or dynamic analysis, as well as provide some logs for any publicly available sample.
30/04/2025
BRUTERATEL BlueTeam Version
The Emperor’s New Clothes
27/04/2025
BRUTERATEL Full command list 6/6
The Emperor’s New Clothes
12/04/2025
BRUTERATEL Full command list 5/6
The Emperor’s New Clothes
28/03/2025
BRUTERATEL Full command list 4/6
The Emperor’s New Clothes
21/03/2025
BRUTERATEL Comparative Analysis
Spot the differences
20/03/2025
BRUTERATEL Full command list 3/6
The Emperor’s New Clothes
19/03/2025
BRUTERATEL Full command list 2/6
The Emperor’s New Clothes
17/03/2025
BRUTERATEL Full command list 1/6
The Emperor’s New Clothes
12/03/2025
LAZARUS PEBBLEDASH Analysis
Focus on C2 network protocol
07/03/2025
TURLA QUIETCANARY Analysis
Focus on C2 network protocol
03/03/2025
TURLA TINYTURLA Analysis
14/02/2025
REDLINE STEALER Analysis
Loading managed code from native Win32 application
04/02/2025
BAZAARLOADER Analysis
(Ab)using Pool Worker Threads for stealth