Predator The Thief: In-depth analysis (v2.3.5)
Predator The Thief: In-depth analysis (v2.3.5)

Well, it’s been a long time without some fresh new contents on my blog. I had some unexpected problems that kept me away from here and a lot of work (like my tracker) that explain this. But it’s time to come back (slowly) with some stuff. So today, this is an In-Depth analysis of one... » read more

Some fun with a miner
Some fun with a miner

A few weeks ago I came across a malware that gave me some interests to dig more into it. It has a curious way to deploy itself, set up a miner on the machine and hide it behind some legit processes. In an example, when we look at Process Hacker : Visual Basic Compiler is... » read more