Analysis of the BackSwap banking trojan and its innovative techniques for stealing money through browser manipulation while evading detection.
Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.
Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.
Curated list of malware sample repositories, databases, and collections for malware analysts and security researchers.