Analysis 1a8023c76e45b0145f1c28753efc1d5409a0ac2a1c6fdbab2022e737dcaa0ab5.exe (MD5: 422AD9C53A86F687B230FDE951FB5856) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Nice use of #PolarProxy to decrypt TLS C2 traffic from #RustyStealer
https://www.dfirsec.au/different-but-same/
Different Methods, Same Results

Introduction During my free time I enjoy doing some light malware analysis, utilising sites like MalwareBazaar, any.run, vx-underground, etc to obtain samples. Sometimes these samples are good where all the threat actor infrastructure is still active, which leads to some interesting analysis and other times these samples are rather

DFIRSec