bl7ck0utCobalt Strike & .HTA filesAs per Mitre ATT&CK, ID S0154 tracks Cobalt Strike as a “commercial, full-featured, remote access tool that bills itself as “adversary…Oct 29, 2023Oct 29, 2023
bl7ck0utAnalyzing Emotet C2 Traffic using WiresharkHello there, today I’ll be analyzing Emotet C2 traffic using Wireshark. In this article we’ll go into stuff like Emotet’s infection chain…Aug 27, 2023Aug 27, 2023
bl7ck0ut“Retefe” — Analyzing a .JS malwareMalspam campaigns, short for malicious spam campaigns, represent a prevalent form of cyber threat that involves the distribution of…Aug 26, 2023Aug 26, 2023
bl7ck0utOut of the blue…In this writeup, I will delve into my intriguing experience of geolocating a picture.Jun 2, 2023Jun 2, 2023