Skip to content

Breaking

Fake Malware TOAD via Malvertizing PDFChampions YAPA Browser Hijacker/Loader Analysis  ConvertyFile Browser Hijacker Convert Master Browser Hijacker Analysis Teams Transcript Page Lure Delivers GoTo RMM

Malasada Tech

Da Samala Tech blogs on malware and stuffs

Malasada Tech

Da Samala Tech blogs on malware and stuffs

  • Home
  • About
Uncategorized

FOLLOW ME ON X @MalasadaTech808

Aaron Samala August 18, 2025 No Comments

HOWZIIIIIIIIIIIIIIIIIIIIIIT! Here’s a quick post to share with the world that I’ve created a new X account – lol smash that follow button! I post some quickfire stuff that I…

Thruntellisearch - Threat Hunting/Intelligence Research

Thractor Backlinks for SEO Poisoning to Deliver Lumma Stealer and SectopRAT

Aaron Samala August 17, 2025 No Comments

TL;DR This post documents backlinks, and how thractors use them for SEO poisoning to deliver Lumma Stealer and SectopRAT. I show how I find backlinks, and a technique to monitor…

LandUpdate808

LandUpdate808 Backend C2 Analysis

Aaron Samala August 16, 2025 No Comments

TL;DR LandUpdate808 uses a backend C2 resource that is separate from the injected links infrastructure. This backend C2 resource, or injected link provider, serves a Base64 encoded string that is…

Thresearch

Defender’s ThreatMesh Framework (DTF) – An Infrastructure Pivot Framework

Aaron Samala August 2, 2025 1 Comment

DTF is a framework that codifies infrastructure pivot techniques that could help cyber threat researchers.

ClickFix SocGholish

TA569 SocGholish Overlap w/TA582 Infra

Aaron Samala May 25, 2025 No Comments

Intro This is the long form of my post from here: https://x.com/MalasadaTech/status/1924982337689027063. While browsing urlscan scan tasks, I found crypto-js.min.js usage for obfuscation linked to Tycoon and Storm1747 in Any…

CopyPaste

Copy/Paste Technique Used to Deliver XWORM

Aaron Samala May 16, 2025 No Comments

XWORM is observed being distributed via Copy/Paste. XWORM C2 traffic uses a pattern that can be matched. Using Discord webhooks for C2 is not new, but it’s new to me.…

Threat Intelligence

PDF Lure Delivering GoTo (LogMeIn) RMM

Aaron Samala May 12, 2025 No Comments

This documents chrunting for delivery sites that connect to api.telegramorg, finding a malicious GoTo RMM, and developing masq-monitor and Snort/Suricata detections. Tactical Pause THE CONTENT, VIEWS, AND OPINIONS EXPRESSED ON…

Phishing

Unsuccessful Crypto Phishing Attempt on Me

Aaron Samala April 7, 2025 No Comments

This documents the analysis I performed on a crypto phishing domain that a phisher DM’d me. It documents how I was able to pivot on file hashes the site served,…

Malware Research Phishing

SVG Capabilities and Behaviors

Aaron Samala March 16, 2025 No Comments

TL;DR This documents my research into three methods an attacker could use, with an SVG file, in a phishing attack to direct the victim to the next stage in the…

ClickFix LandUpdate808 Malware Research

Updated LandUpdate808 Analysis

Aaron Samala January 5, 2025 No Comments

It’s been a while since I’ve posted about LandUpdate808. There was a compromised site that is local to Hawaii that I recently noticed, and it prompted me to research the…

Posts pagination

1 2 3 … 5

« Previous Page — Next Page »

Recent Posts

  • Fake Malware TOAD via Malvertizing
  • PDFChampions YAPA Browser Hijacker/Loader Analysis 
  • ConvertyFile Browser Hijacker
  • Convert Master Browser Hijacker Analysis
  • Teams Transcript Page Lure Delivers GoTo RMM

Recent Comments

  1. PDFChampions YAPA Browser Hijacker/Loader Analysis  - Malasada Tech on ConvertyFile Browser Hijacker
  2. PDFChampions YAPA Browser Hijacker/Loader Analysis  - Malasada Tech on Convert Master Browser Hijacker Analysis
  3. ConvertyFile Browser Hijacker - Malasada Tech on Convert Master Browser Hijacker Analysis
  4. Teams Transcript Page Lure Delivers GoTo RMM - Malasada Tech on Oyster Malware Delivery via Teams Fake App
  5. BLOG: My thoughts on improving analysis and reporting - Malasada Tech on Oyster Malware Delivery via Teams Fake App

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • May 2025
  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024

Categories

  • ClickFix
  • CopyPaste
  • Cybersecurity Trends
  • Gootkit
  • Gootloader
  • Gootloader Backlinks
  • LandUpdate808
  • Lumma Stealer
  • Malware Research
  • Phishing
  • Skimmer
  • SocGholish
  • Threat Intelligence
  • Thresearch
  • Thruntellisearch – Threat Hunting/Intelligence Research
  • Uncategorized

You Missed

Thruntellisearch - Threat Hunting/Intelligence Research

Fake Malware TOAD via Malvertizing

Malware Research Thruntellisearch - Threat Hunting/Intelligence Research

PDFChampions YAPA Browser Hijacker/Loader Analysis 

Malware Research

ConvertyFile Browser Hijacker

Malware Research Thruntellisearch - Threat Hunting/Intelligence Research

Convert Master Browser Hijacker Analysis

Malasada Tech

Da Samala Tech blogs on malware and stuffs

Copyright © All rights reserved | Blogarise by Themeansar.