The Dispatch

All articles, analyses, and insights.

Filter by category:

Showing all 16 posts

PhantomStealer Malware Analysis
PhantomStealer Malware Analysis

Complete analysis of PhantomStealer.

Oct 2, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
StealC Malware Analysis
StealC Malware Analysis

Full analysis of StealC.

Sep 10, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
AmateraStealer Malware Analysis
AmateraStealer Malware Analysis

Partly analysis of AmateraStealer.

Aug 31, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+2
Read More
XenoRAT Malware Analysis
XenoRAT Malware Analysis

Complete XenoRAT Analysis.

Aug 25, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
ApolloShadow Malware Analysis
ApolloShadow Malware Analysis

Overview of ApolloShadow.

Aug 24, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
Mirai Malware Analysis
Mirai Malware Analysis

Complete analysis of Mirai.

Aug 14, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+2
Read More
Control Flow DeFlattening
Control Flow DeFlattening

Guide to CFF deobfuscation.

Aug 13, 2025
Fuad Aliyev
Reverse Engineering
DeObfuscation
+1
Read More
DonutLoader Malware Analysis
DonutLoader Malware Analysis

Complete analysis of DonutLoader.

Aug 9, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
DarkCloud Malware Analysis
DarkCloud Malware Analysis

Complete analysis of DarkCloud.

Aug 7, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
XWorm Malware Analysis
XWorm Malware Analysis

Complete analysis of XWorm.

Jul 29, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
MassLogger Malware Analysis
MassLogger Malware Analysis

Complete analysis of MassLogger.

Jun 25, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
AgendaRansomware Malware Analysis
AgendaRansomware Malware Analysis

Complete analysis of AgendaRansomware.

Jun 19, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
SnakeKeyLogger Malware Analysis
SnakeKeyLogger Malware Analysis

Complete analysis of SnakeKeyLogger.

May 17, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
SmokeLoader Malware Analysis
SmokeLoader Malware Analysis

Dynamic analysis of SmokeLoader's polymorphic unpacking and self-modification techniques.

Apr 13, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More
Vidar Malware Analysis
Vidar Malware Analysis

Deep dive into the Vidar stealer malware - from PowerShell dropper to data exfiltration techniques.

Apr 3, 2025
Fuad Aliyev
Malware Analysis
Stealer
+2
Read More
Remcos RAT Analysis: Multi-Stage Delivery Chain
Remcos RAT Analysis: Multi-Stage Delivery Chain

Complete analysis of Remcos RAT's sophisticated multi-stage delivery mechanism and evasion techniques.

Apr 3, 2025
Fuad Aliyev
Malware Analysis
Reverse Engineering
+1
Read More