In this post we detail our comprehensive investigation into the phishing campaign encountered by our company. Our aim …
Author: AnyRun
Malware authors use protectors like Themida and VMProtect in the hope that they will …
In this article, we’ve prepared a brief overview of UAC bypass methods in Windows 11 that are used in …
Attackers often place malicious payloads on remote servers, which are then downloaded and executed on the user’s PC using scripts or other methods. One type of server …
In order to understand malware comprehensively, it is essential to employ various analysis techniques and examine …
The following research was conducted by Anna Pham, also known as RussianPanda, a Senior Threat Intelligence researcher and a …
Every now and then, you come across a situation where you need to get hands-on to understand how …
In the modern world, it is rare to encounter purely clean malware during analysis. …
Lena aka LambdaMamba
I am a Cybersecurity Analyst, Researcher, and ANY.RUN Ambassador. My passions include investigations, experimentations, gaming, writing, and drawing. …
Editor’s note: The current article was originally published on May 13, 2021, and updated on January 26, 2024.
Today we face a …
In this article, we’re analyzing one of the most unusual crypters— PureCrypter, and a …