Blogs
Malware Library
Zero-Dwell Threat Intelligence Reports
NightSpire Encoder Sample Manipulates desktop.ini and Browser Credential Stores
.exe
Browser Credential File Access and Thread Context Control Observed in NightSpire Sample
.exe
64bits
payload
Encoder-Class NightSpire Implant Identified as enc.exe in Windows Deployment Path
.exe
64bits
NightSpire Encoder Build (Go 1.24.1) Identified with 57-Engine Ransomware Consensus
.exe
64bits
Multi-Engine Ransomware Verdict Aligns with Encoder-Class NightSpire Deployment
.exe
64bits
NightSpire Ransomware Triggers Uncommon Svchost Execution Pattern During Runtime
.exe
64bits
Windows GUI Go Binary Deployed as 98wjn2guh.exe Exhibits High-Severity Ransomware Profile
.exe
64bits
payload
NightSpire Ransomware Executes Credential Vault Harvesting Prior to Encryption Phase
.exe
64bits
detect-debug-environment
Waitable Timer–Driven Execution Flow Defines Go-Based Ransomware Runtime
.exe
64bits
long-sleeps
calls-wmi
executes-dropped-file
Go-Compiled NightSpire Ransomware Engages Credential Vault Access and Pre-Encryption Recon
.exe
64bits
detect-debug-environment
ProgramData-Staged Python DLL Injection Observed in Pdfclick Build Chain
.exe
64bits
overlay
ree Converter Uninstall Component Loads Python Runtime Outside Standard Execution Context
.exe
64bits
overlay
Posts navigation
← Previous
1
2
3
4
…
59
Next →