Blogs
Malware Library
Zero-Dwell Threat Intelligence Reports
DevMan Ransomware Leverages Credential Impersonation for Early Control
.exe
Privilege Escalation and Service Hijacking Observed in DevMan Ransomware
.exe
From Fake Document to Persistent Access, PluggyApe Backdoor Comes Alive
.exe
64bits
overlay
From Decoy Document to Active Backdoor, PluggyApe Infection Unfolds
.exe
64bits
overlay
Covert Python Runtime Execution Powers PluggyApe Backdoor Control
.exe
64bits
overlay
persistence
Registry-Based Persistence Keeps PluggyApe Backdoor Active Across Reboots
.exe
64bits
overlay
PluggyApe Backdoor Exploits Python Loader to Establish Stealthy Persistence
.exe
64bits
overlay
Malicious Python-Based Loader Powers Stealthy PluggyApe Infections
.exe
64bits
overlay
Hidden Backdoor Functionality Enabled by Obfuscated PluggyApe Payload
.exe
64bits
overlay
Network Communication Initiated via HTTP by Lynx Ransomware Payload
.exe
overlay
payload
Command-Line Process Spawned to Launch Payload by Lynx Ransomware
.exe
detect-debug-environment
spreader
assembly
payload
Outbound C2 Communication Established via Dynamic DNS by Lynx Ransomware
.exe
long-sleeps
detect-debug-environment
idle
spreader
assembly
Posts navigation
← Previous
1
…
3
4
5
6
7
…
59
Next →