Malformed Rhadamanthys DoH Query
TL;DR This analysis documents how the Rhadamanthys malware sends a malformed DoH query with the Host field specified twice. It fails in Any Run tasks that have the MITM Proxy…
Da Samala Tech blogs on malware and stuffs
TL;DR This analysis documents how the Rhadamanthys malware sends a malformed DoH query with the Host field specified twice. It fails in Any Run tasks that have the MITM Proxy…
HOWZIIIIIIIIIIIIIIIIIIIIIIT! Here’s a quick post to share with the world that I’ve created a new X account – lol smash that follow button! I post some quickfire stuff that I…
TL;DR This post documents backlinks, and how thractors use them for SEO poisoning to deliver Lumma Stealer and SectopRAT. I show how I find backlinks, and a technique to monitor…
TL;DR LandUpdate808 uses a backend C2 resource that is separate from the injected links infrastructure. This backend C2 resource, or injected link provider, serves a Base64 encoded string that is…
DTF is a framework that codifies infrastructure pivot techniques that could help cyber threat researchers.