Malware Digitally Signed by Microsoft
While working on a sherlock from HackTheBox, I researched a tactic of threat actors abusing the Microsoft driver...
TryHackMe: Advent of Cyber 2024
I’ve spent the past few weeks tackling TryHackMe’s Advent of Cyber 2024. Some of my favorite challenges were:...
S550 Mustang IPC Reverse Engineering
Note: This post was published 4 Feb 2024, but was based off of research and work completed back...
QAKBot Campaign 6Apr2023
Correspondence Sender Subject Attachment Name Attachment Hash (with VirusTotal link) clemke[@]e-chuppah[.]com RE: New Borrowers AK.pdf 9521bc74735d1300e182eaa98299023ba08acc9af17b85cc50b3938c99bd0b32 aschaden[@]shopbarbay[.]com FW:...
Trojan.Kryptic – 22 Mar 2023
Initial Email An email was discovered from comel[@]industry-mass[.]com. This site was created within the last 15 days.The email...
Odd phishing link
Friend sent me a strange message she got with the following link: Attempt 1: www I booted into...
Finding x-callback-url / Deep Link of iOS Apps
I find often I like doing automations between apps. While you can use the Open App functionality with...
Wordle Reverse Engineered
I’ve been seeing posts for this wordle game on my facebook, and it seems to be alight on...
Malware Analysis #2
SHA256 Hash: 1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c I searched the daily list of MalShare.com and pulled a random hash for investigation today,...
Malware Analysis – #1
See here on my post on creating your own Malware Analysis lab! I created an account on VirusShare...