[Amadey] Targeted Analysis of its Campaign’s Kill Chain, String and Traffic Encryption Algorithm, and Download of Additional Modules June 16, 2025 / Reverse Engineering, Threat Hunting / 0x0d4y Amadey, Downloader [Amadey] Targeted Analysis of its Campaign’s Kill Chain, String and Traffic Encryption Algorithm, and Download of Additional Modules Read Post »
[Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms May 9, 2024 / Reverse Engineering / 0x0d4y Downloader, Encryption, Latrodectus [Case Study: Latrodectus] Analyzing and Implementing String Decryption Algorithms Read Post »
Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement? April 30, 2024 / Detection Engineering, Reverse Engineering, Threat Hunting / 0x0d4y Downloader, IcedID, Latrodectus Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement? Read Post »