Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy

Introduction Malware group History Analysis of BloodAlchemy Initial infection vector and infection flow Analysis of malicious DLL Analysis of shellcode Analysis of payload (BloodAlchemy) Structures Functions Creation of VFT associated with…

Unraveling the Shinigami's prank hidden in spam emails

Introduction Infection flow Malicious email Analysis results Discussion Countermeasures IoCs This post is also available in: 日本語 Introduction ITOCHU Cyber & Intelligence Inc. (abbr. : ICI) routinely observes a large volume of spam email…

The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 - v0.7.3 Analysis

What is the LODEINFO malware? Analysis of LODEINFO The infection flow Update of the Downloader Shellcode Remote Template Injection Maldoc VBA code embedded in Maldoc Microsoft Office language check The Downloader Shellcode Fake PEM file de…

Sequel: Gifts from Tropical Pirates - Who is the Sender? Look for the Attacker Group

Background What is Tropic Trooper? The Need for Attribution Overall picture of the campaign Similarities to previous samples Similarities between EntryShell and KeyBoy Relationship between the new malware CrowDoor and FamousSparrow What is…

Gifts from Tropical Pirates -New Dangerous Weapons Hidden in Email and Malware

Summary Targeted Attack Mail Attachments Infection flow of malware Launching shortcut files Malware Analysis and Description of Operation Installer Operation Loader Operation Attacker’s mistake? The threat actor Countermeasures IoCs Destin…