FormBook: A Malware of Many Faces
Summary In this report, we analyze 11 different malicious documents (XLSM files), exploring their tactics and distinctive behaviors. We’ll cover its history, infection methods, and evasion strategies and conclude with…
IOS bug exposes years old pictures from users | MALDORK Memo
First let’s start off by defining a few terms that will be utilized throughout this memo. Abug is an unexpected flaw in the hardware or software of a system that…
Gaara.exe: Destroy the Hokage
Executive summary This report focuses on the initial dynamic and static analysis of this malware dropper. Part 2 will cover the unpacking and analysis of the clean file. The malware…
The Anatomy of a Phishing Attack | MALDORK Memo
First let’s start off by defining a few terms that will be utilized throughout this memo. A malicious actor(Ital.) is someone who intends to do harm to an individual, service,…
Yaroslav Vasinskyi and REvil Ransomware | MALDORK Memo
First let’s start off by defining a few terms that will be utilized throughout this memo. Amalicious actor is someone who intends to do harm to an individual, service, or…
Unveiling Ziraat_limpi: A Deep Dive Into a .NET Malware Infostealer
Upon initially acquiring this malware sample during a past training course, I embarked on a journey to deepen my understanding beyond the curriculum’s confines. While the class imparted valuable knowledge,…