Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 16620 views 2 min read
Instructions on ANY.RUN Quickly Check if a Sample is Malicious with ANY.RUN’s Process Tree April 4, 2024 4288 views 7 min read
Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 13775 views 22 min read
News A New Phishing Campaign Deploys STRRAT and VCURMS via GitHub March 20, 2024 1860 views 4 min read
Malware Analysis AsukaStealer: The Next Chapter in ObserverStealer’s Story March 18, 2024 7388 views 11 min read
Cybersecurity Lifehacks How We Process IOCs for ANY.RUN Threat Intelligence Lookup and Feeds March 13, 2024 1773 views 5 min read
Malware Analysis How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study March 12, 2024 10089 views 7 min read
Cybersecurity Lifehacks Analyzing Linux Malware in ANY.RUN: 3 examples February 22, 2024 3713 views 4 min read
Cybersecurity Lifehacks What is Crypto Malware: Definition and Analysis in ANY.RUN February 21, 2024 2063 views 6 min read
Analyst Training Understanding Macros in Malware: Types, Capabilities, Case Study February 20, 2024 4437 views 11 min read