Hunting for Real-Life Example On August 2, 2024, Instagram was blocked in Turkey following a disagreement over content moderation. Immediately, users sought alternative methods to regain access,...
Hunt and Analysis - Nightingale Stealer
Part 1 - Nightingale Stealer Spoiler Alert: If you are familiar with Phemedrone Stealer, be prepared for a revelation. Nightingale Stealer, as it turns out, is essentially an edited version of Phe...
Hunt and Analysis - Hornet Stealer
Part 1 - Hornet Stealer On January 24th, the Twitter account @spamhaus posted a tweet regarding a newly discovered C2 panel. Based on the panel’s logo and name, they have identified this malwar...
Hunt and Analysis - Sentinel Stealer
Part 1 - Sentinel Stealer || Stealer as a Service On January 19th, the Twitter account @FalconFeedsio reported the discovery of a new stealer, known as Sentinel Stealer. Although there were earlie...
Hunt and Analysis - Neptune Loader
Part 1 - Neptune || A Native HTTP Loader A user named m0hx shared a post on hackforums.net on November 22, 2023, promoting a loader called Neptune. In the threat actor’s exact words; “Neptune is ...
Hunt and Analysis - Serpent Stealer
Part 1 - Dissecting the First Serpent Stealer Sample On October 15, 2023, a new malware named Serpent Stealer was showcased on Breach Forums by a user named stealth. This malware, categorized as a...
Calling Conventions for Reverse Engineering
What is Calling Convention ? The term “calling convention” describes; how arguments passed to the function and how values are returned from functions, whether the caller or the callee will c...
- 1
- 1 / 1