This is a collection of our raw research notes. Each post is generated from a Jupyter Notebook that can be found in our GitHub Research repository. Notes may contain errors, spelling mistakes, grammar mistakes, and incorrect code. Please keep in mind these are all rough drafts. Pull requests are welcome!
Notes
AMSI Bypass In The Wild
Metastealer
StrelaStealer
Satacom (LegionLoader)
in2al5dp3in4er Loader
CryptNET Ransomware
XORStringsNet
Quasar Chaos
PhotoLoader ICEDID
AresLoader
3CX Supply Chain Attack
OneNote WSF Malware (Emotet)
CryptBot
Healer AVKiller
QvoidStealer
- •
- 1
- 2