<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 04/03/2026 at 8:45 PM by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://0x0d4y.blog/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>0x0d4y Malware Research</title>
		<link><![CDATA[https://0x0d4y.blog]]></link>
		<description><![CDATA[0x0d4y Malware Research]]></description>
		<lastBuildDate><![CDATA[Wed, 05 Mar 2025 13:22:11 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://0x0d4y.blog/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://0x0d4y.blog/lockbit4-0-evasion-tales/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/lockbit4-0-evasion-tales/]]></link>
			<title>Technical Analysis of Lockbit4.0 Evasion Tales</title>
			<pubDate><![CDATA[Wed, 05 Mar 2025 13:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/amadey-targeted-analysis/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/amadey-targeted-analysis/]]></link>
			<title>[Amadey] Targeted Analysis of its Campaign&#8217;s Kill Chain, String and Traffic Encryption Algorithm, and Download of Additional Modules</title>
			<pubDate><![CDATA[Tue, 17 Jun 2025 18:47:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/babbleloader-deep-dive-into-edr-and-machine-learning-based-endpoint-protection-evasion/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/babbleloader-deep-dive-into-edr-and-machine-learning-based-endpoint-protection-evasion/]]></link>
			<title>[BabbleLoader] A Deep Dive into EDR and Machine Learning-Based Endpoint Protection Evasion</title>
			<pubDate><![CDATA[Wed, 05 Mar 2025 13:23:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/zero2automated-custom-sample/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/zero2automated-custom-sample/]]></link>
			<title>Zero2Automated &#8211; Complete Custom Sample Challenge Analysis</title>
			<pubDate><![CDATA[Tue, 11 Jun 2024 19:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/newsletter/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/newsletter/]]></link>
			<title>Newsletter</title>
			<pubDate><![CDATA[Thu, 13 Nov 2025 11:56:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/latrodectus-technical-analysis-of-the-new-icedid/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/latrodectus-technical-analysis-of-the-new-icedid/]]></link>
			<title>Latrodectus [IceNova] &#8211; Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement?</title>
			<pubDate><![CDATA[Sun, 15 Dec 2024 14:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/case-study-analyzing-and-implementing-string-decryption-algorithms-latrodectus/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/case-study-analyzing-and-implementing-string-decryption-algorithms-latrodectus/]]></link>
			<title>[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms</title>
			<pubDate><![CDATA[Sun, 15 Dec 2024 14:32:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/complete-course-review-and-certification-of-zero2automated-the-advanced-malware-analysis-course/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/complete-course-review-and-certification-of-zero2automated-the-advanced-malware-analysis-course/]]></link>
			<title>Complete Course and Certification Review of Zero2Automated &#8211; The Advanced Malware Analysis</title>
			<pubDate><![CDATA[Sun, 13 Oct 2024 16:26:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/icedid-technical-analysis/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/icedid-technical-analysis/]]></link>
			<title>IcedID &#8211; Technical Malware Analysis [Second Stage]</title>
			<pubDate><![CDATA[Sun, 03 Mar 2024 14:27:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/icedid-technical-analysis-of-x64-dll-version/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/icedid-technical-analysis-of-x64-dll-version/]]></link>
			<title>IcedID &#8211; Technical Analysis of an IcedID Lightweight x64 DLL</title>
			<pubDate><![CDATA[Sat, 25 Jan 2025 16:22:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/veletrix-loader-infection-a-look-from-a-digital-forensic-perspective/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/veletrix-loader-infection-a-look-from-a-digital-forensic-perspective/]]></link>
			<title>Veletrix Loader Infection: A Look from a Digital Forensic Perspective</title>
			<pubDate><![CDATA[Mon, 18 Aug 2025 13:20:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/arsenal-analysis-of-a-nation-state-actor-an-in-depth-look-at-lazarus-scoringmathtea/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/arsenal-analysis-of-a-nation-state-actor-an-in-depth-look-at-lazarus-scoringmathtea/]]></link>
			<title>Nation-State Actor&#8217;s Arsenal: An In-Depth Look at Lazarus&#8217; ScoringMathTea</title>
			<pubDate><![CDATA[Mon, 17 Nov 2025 13:05:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/telecommunications-supply-chain-china-nexus-threat-technical-analysis-of-veletrix-loaders-strategic-infrastructure-positioning/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/telecommunications-supply-chain-china-nexus-threat-technical-analysis-of-veletrix-loaders-strategic-infrastructure-positioning/]]></link>
			<title>VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting</title>
			<pubDate><![CDATA[Mon, 07 Jul 2025 16:05:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0x0d4y.blog/mustang-panda-employ-publoader-through-claimloader-yes-another-dll-side-loading-technique-delivery-via-phishing/]]></guid>
			<link><![CDATA[https://0x0d4y.blog/mustang-panda-employ-publoader-through-claimloader-yes-another-dll-side-loading-technique-delivery-via-phishing/]]></link>
			<title>Mustang Panda Employ Publoader Through ClaimLoader: Yes.. another DLL Side-Loading Technique Delivery via Phishing</title>
			<pubDate><![CDATA[Mon, 06 Oct 2025 13:48:58 +0000]]></pubDate>
		</item>
				</channel>
</rss>
