Gootloader Isn’t Broken
In this post, we take a closer look at the Gootloader malware, correcting previous assertions about its dysfunction. Through the use of tools like Process Monitor and Burp Suite, we…
Da Samala Tech blogs on malware and stuffs
In this post, we take a closer look at the Gootloader malware, correcting previous assertions about its dysfunction. Through the use of tools like Process Monitor and Burp Suite, we…
Explore the mysterious allure of USPS templates in countries like Ghana, Cambodia, and Brazil. Discover why official government domains might host these lure articles, and the implications for global cyber…
BLUF: This document will cover research into Gootkit search term research as well as research possible verification methods. Intro: Gootkit research depends on having high quality methods to find the…
I spotted a lure masquerading as an Indeed Career Guide resource (https//666025xyz/erp-terms-of-contract). See below. I found this while working on the Gootkit Crawler project – a project that will generate…
Discover the latest strategies in cyber warfare with our investigative piece on Gootkit malware's evolving C2 infrastructure. Uncover insights into how the removal of xmlrpc.php signals a new phase in…
Are you a SOC Analyst that's observed Gootkit downloads, but no beaconing activity lately? Are you a new or aspiring SOC Analyst that wants to perform your own research (and…
The cybersecurity landscape is rapidly evolving, with new threats emerging daily. This article explores five critical emerging threats that Security Operations Center (SOC) analysts must be aware of: AI-powered cyber…