Remus Stealer: C2 Protocol Analysis, Cryptography, and Detection
Disclaimer: This blog and all associated research are part of my personal independent study. All hardware, software, and infrastructure are personally owned ...
Disclaimer: This blog and all associated research are part of my personal independent study. All hardware, software, and infrastructure are personally owned ...
VECT 2.0 Ransomware — Deep Dive Analysis
Interlock Ransomware: Deep Dive into a C-Based FreeBSD Encryptor
Scope: This is Part 1 of the BlackSanta analysis series, focusing exclusively on the DWrite.dll loader component. Part 2 will cover the BlackSanta EDR-kil...
0APT Ransomware: Deep Dive into a Rust-Based Windows Encryptor
Qilin Ransomware (Rust Variant) Analysis
Analysis of GRIDTIDE — a Linux x86-64 backdoor using the Google Sheets API as a bidirectional C2 channel. AES-128-CBC config decryption, OAuth2 JWT Bearer au...
A comprehensive reverse-engineering analysis of Matanbuchus 3.0, covering its multi-layered obfuscation framework, encrypted C2 protocol, command dispatch ar...
Building a dedicated edge ML node for malware research — from unboxing to a working containerized environment on the NVIDIA Jetson Orin Nano.
Verifying that PyTorch, CUDA, and GPU training all work end-to-end inside the Jupyter container on the Jetson Orin Nano.