Articles by Tag #malwareanalysis

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Lab 03-01: When Malware Fights Back — Analyzing Poison Ivy's Anti-VM Evasion

Part 2 of the Practical Malware Analysis Labs Series Introduction In my previous article...

Learn More 0 0Jan 6

Malware analysis - Hancitor Loader

Stage 1 In our case is very simple, so let's quickly run through it. From the import table, we can...

Learn More 0 0Nov 3 '25

WannaCry Ransomware Malware Analysis

WannaCry Ransomware Malware Analysis The WannaCry sample used for this analysis was...

Learn More 2 0Feb 6

Carnage Room|TryHackMe

Welcome to the Carnage Room on Try Hack Me! So, it's extremely important to have your Wireshark...

Learn More 0 0Jun 19 '25

Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts

Malware campaigns are evolving from SVGs with embedded JavaScript to obfuscated BAT scripts that...

Learn More 1 0Sep 19 '25

Digital Forensics and Incident Response - Advanced Investigation Techniques

# Digital Forensics and Incident Response: Advanced Investigation Techniques ## Overview Modern digital forensics requires sophisticated techniques ...

Learn More 1 0Aug 11 '25