Let’s play (again) with Predator the thief
Let’s play (again) with Predator the thief

Whenever I reverse a sample, I am mostly interested in how it was developed, even if in the end the techniques employed are generally the same, I am always curious about what was the way to achieve a task, or just simply understand the code philosophy of a piece of code. It is a very... » read more

Inside one xmrig botnet miner
Inside one xmrig botnet miner

This post is an extension of this article.  I – Introduction At the beginning of this year, after some daily IoC Feeds. I was interested in one Linux sample on hybrid-analysis for two reasons : First, it’s quite rare to see some stuff like this on public feeds. Secondly,  the POST requests were basics but it... » read more