003 - Analyzing a C2 agent - Part 1: The Dropper 2023-12-08 — 13 min read In this first part, we will analyze a malicious macro containing an embedded C2 agent. We will analyze how it acts, what techniques it uses to hinder analysis, and how we can obtain indicators of compromise from it. Read more →
002 - Analyzing a Malicious Macro 2023-12-06 — 8 min read In this article we analyze from scratch a malicious macro that has an embedded bind shell using static and dynamic analysis techniques. Read more →
001 - Intro 2023-12-05 — 1 min read Introduction to the blog, where I plan to document the different techniques one can use when analyzing malware, both statically and dynamically. Read more →