My malware analysis courses have now a new certificate design.
https://malwareanalysis-for-hedgehogs.learnworlds.com/courses
My malware analysis courses have now a new certificate design.
https://malwareanalysis-for-hedgehogs.learnworlds.com/courses
Added a task for the SugarSMP spark stealer sample to samplepedia
https://samplepedia.cc/sample/060ed0ec27a0a4ad7b55425ed56d8ef0c55aa61b499d4884d1679f18d518ddf3/89/
New blog: Using LLMs the right way for malware analysis
💡Tips for building an autonomous AI analysis lab on a 12 yo laptop and getting stuff done faster without loss of accuracy.
https://blog.gdatasoftware.com/2026/03/38381-llm-malware-analysis
GuvercinInstaller.exe 1/72
#kurdishmyth stealer, NodeJS
➡️Infects discord_desktop_core\index.js
➡️Steals various browser and discord data.
➡️Exfiltrates via discord webhook.
The code references kurdishmyth and mythprivate
The wallet exfiltration webhook uses a photo of Abdullah Öcalan as its avatar image.
You will find the same malware family with this VT search query:
vhash:087076656d156d05655253z72zff7z11z23z13z93z12b4z11z behaviour_processes:"C:\\Windows\\system32\\cmd.exe /d /s /c \"taskkill /F /IM discord.exe\""
samplepedia.cc update:
You have now a new "My articles" overview (see profile dropdown menu), which allows you to add article drafts and manage articles.
You can decide to publish such a draft as a solution later.
Looks like the dev told an LLM to generate test files for a Shai Hulud detection app.
The LLM complied and generated malicious test files...
I created an extraction script for custom PyInstaller applications as seen in suspected EvilAI PDF apps.
Script (modified pyinstxtractor-ng): https://github.com/struppigel/hedgehog-tools/blob/main/PyInstaller%20mod/pyinstaller-mod-extractor-ng.py
#Samplepedia updates
* you can upload images for articles
* view count for samples and articles
* expert difficulty available