PinnedGi7w0rmVexTrio’s Browser FingerprintingHey everyone, welcome back to the first blog post in 2024. Today, we are going to have a look at something I came across while looking at…40 min read·Mar 19, 2024----
PinnedGi7w0rmGi7w0rm’s personal year review — 2023Disclaimer: The following article will highlight my work and achievements in 2023. I am not sure if this is going to be worth reading, but…24 min read·Jan 6, 2024--1--1
PinnedGi7w0rmThe curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…12 min read·Oct 19, 2023----
PinnedGi7w0rmDynamicRAT — A full-fledged Java RatHello everyone, welcome back to one of my sporadical blog posts. Due to some fortunate circumstances, I finally have the honor to name my…10 min read·Jun 8, 2023----
Gi7w0rmUncovering DDGroup — A long-time threat actorSometimes when investigating malware, you come across something that calls your attention. Something that seems odd, something that seems…16 min read·Sep 8, 2023----
Gi7w0rmCloudEyE — From .lnk to ShellcodeHello and welcome back to another blog post. Today, we will look at the infection chain of a well-known malware loader called CloudEye…12 min read·Jul 9, 2023--1--1
Gi7w0rmA long way to SectopRatInvestigating a highly obfuscated stealer sample11 min read·Jan 18, 2023--1--1
Gi7w0rmWhat is stealer malware?And what do people want with my credentials?4 min read·Oct 23, 2021----