Open in app

Sign In

Write

Sign In

BhaveshL
BhaveshL

12 Followers

Home

About

Aug 27

Bossfight #1 — Analyzing Emotet C2 Traffic

Hello there, today I’ll be analyzing Emotet C2 traffic using Wireshark. In this article we’ll go into stuff like Emotet’s infection chain, the C2 traffic and what it looks like and how Emotet drops it’s initial binary after infection. Emotet, initially identified in 2014 as a banking malware, has undergone…

Malware

5 min read

Bossfight #1 — Analyzing Emotet C2 Traffic using Wireshark
Bossfight #1 — Analyzing Emotet C2 Traffic using Wireshark
Malware

5 min read


Aug 26

“Retefe” — Analyzing a .JS malware

Malspam campaigns, short for malicious spam campaigns, represent a prevalent form of cyber threat that involves the distribution of harmful emails on a large scale. We’ve often seen malicious files in the form of .exe, .docx. .pdf and even .ISO …

Malware Analysis

5 min read

“Retefe” — Analyzing a .JS malware
“Retefe” — Analyzing a .JS malware
Malware Analysis

5 min read


Aug 24

Memory Forensics using Volatility3

Hello, in this blog we’ll be performing memory forensics on a memory dump that was derived from an infected system. This system was infected by RedLine malware. Today we’ll be focusing on using Volatility. Volatility is a very powerful memory forensics tool. It is used to extract information from memory…

Memory Forensics

5 min read

Memory Forensics using Volatility3
Memory Forensics using Volatility3
Memory Forensics

5 min read


Jun 2

Out of the blue…

In this writeup, I will delve into my intriguing experience of geolocating a picture. Below is the picture which I stumbled onto in one of a discord server that I’m part of. The OP posted the picture saying “Here’s a little nice osint challenge”. Hmmm….. time to roll up the…

Osint

3 min read

Out of the blue…
Out of the blue…
Osint

3 min read

BhaveshL

BhaveshL

12 Followers

Incident Responder, Threat Analysis

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams