1. Wiper

    Hi dear readers :) In this sample, i will analyze Wiper family trojan. Let’s talk about this malware. Wiper family trojans; First; they get information about the system and do some registry activity. Then the child processes remove each other. Only one of them is always running under the main process. Second; By catching network activity and DNS request, we will see malware trying to establish TCP connection for C2C server. …


  2. badpdf.pdf

    Let’s quickly analyze a simple malicious PDF file. I’ll use REMNUX virtual machine. …


  3. Budget-Report.ExE

    Hello, today I will do a static, dynamic and network analysis of a malware called ‘budget-report.exe’. I hope you enjoy reading it. Don’t forget to take a snapshot! Because we don’t know anything about file. It’s can be a worm! Let’s Analyze :) …


  4. Batch Obfuscation

    Hi! We are talking about Batch Obfuscation. …