You will find here technical analysis on various APT / Cybercrime malware that I have been studying through the custom sandbox I’m currently developping.
Raw dynamic analysis results are available for more samples on my dedicated GitHub Reflexions

I’ll be happy to exchange with other researchers in the field of static or dynamic analysis, as well as provide some logs for any publicly available sample.


30/04/2025

BRUTERATEL BlueTeam Version

The Emperor’s New Clothes


27/04/2025

BRUTERATEL Full command list 6/6

The Emperor’s New Clothes


12/04/2025

BRUTERATEL Full command list 5/6

The Emperor’s New Clothes


28/03/2025

BRUTERATEL Full command list 4/6

The Emperor’s New Clothes


21/03/2025

BRUTERATEL Comparative Analysis

Spot the differences


20/03/2025

BRUTERATEL Full command list 3/6

The Emperor’s New Clothes


19/03/2025

BRUTERATEL Full command list 2/6

The Emperor’s New Clothes


17/03/2025

BRUTERATEL Full command list 1/6

The Emperor’s New Clothes


12/03/2025

LAZARUS PEBBLEDASH Analysis

Focus on C2 network protocol


07/03/2025

TURLA QUIETCANARY Analysis

Focus on C2 network protocol


03/03/2025

TURLA TINYTURLA Analysis


14/02/2025

REDLINE STEALER Analysis

Loading managed code from native Win32 application


04/02/2025

BAZAARLOADER Analysis

(Ab)using Pool Worker Threads for stealth