Couple #reverseloader -> #xloader #opendir at:
http://107.175.246 .42/25/
http://89.40.31 .143/img/
Couple #reverseloader -> #xloader #opendir at:
http://107.175.246 .42/25/
http://89.40.31 .143/img/
2026-04-13 (Monday): #XLoader (#Formbook) infection.
A #pcap of the traffic, the associated email and #malware samples are available at https://malware-traffic-analysis.net/2026/04/13/index.html
#CheckPoint Research demonstrated a new way to use #ChatGPT for #malware analysis directly from the web interface, analyzing #XLoader malware. The workflow using exported IDA data enables static analysis, rapid decryption, IoC extraction, and hidden C2 discovery.
https://research.checkpoint.com/2025/generative-ai-for-reverse-engineering/
🤺 AI vs. XLoader: Guess who’s winning?
#CheckPoint Research used generative AI to tear through #XLoader, one of the most encrypted, evasive malware strains — uncovering its secrets in mere hours.
And here’s the twist: It all happened with #ChatGPT. No heavy tooling. No waiting.
#AI is changing the rules of malware analysis, and the race just shifted in our favor: https://blog.checkpoint.com/research/cracking-xloader-with-ai-how-generative-models-accelerate-malware-analysis
First time I've seen #xloader use @tumblr for traffic noise: