Click here to download all references as Bib-File.•
2025-03-06
⋅
Medium SarvivaMalwareAnalyst
⋅
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication XWorm |
2025-02-21
⋅
Medium SarvivaMalwareAnalyst
⋅
Process Hollowing — Malware Reverse Engineering. |
2023-03-01
⋅
Medium SarvivaMalwareAnalyst
⋅
SecTopRAT: A Dangerous Remote Access Trojan Spreading Through Google Fake Ads SectopRAT |