All in Writing: Malware Evasion Through Font Settings
Malware continues to evolve at a rapid pace, constantly finding new ways to infect systems and evade detection. I often liken it to trying to catch a moving train while…
Malware 101 for Dorks
Malware continues to evolve at a rapid pace, constantly finding new ways to infect systems and evade detection. I often liken it to trying to catch a moving train while…
Summary In this report, we analyze 11 different malicious documents (XLSM files), exploring their tactics and distinctive behaviors. We’ll cover its history, infection methods, and evasion strategies and conclude with…
Executive summary This report focuses on the initial dynamic and static analysis of this malware dropper. Part 2 will cover the unpacking and analysis of the clean file. The malware…
Upon initially acquiring this malware sample during a past training course, I embarked on a journey to deepen my understanding beyond the curriculum’s confines. While the class imparted valuable knowledge,…