Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Category: Malware Analysis

  • Home
  • Malware Analysis
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022

Our research team has identified a campaign in wild serving Formbook stealer. Based on the email content and sender it seems targeted towards UK. Below

Read More
Malware Analysis

Gozi ISFB RM3 and Me : A Diamond Model Approach

September 29, 2019August 23, 2022

Readers! Few weeks back I was invited to present at Malware and Reverse Engineering conference (MRE) and topic I chose to present is my understanding

Read More
Malware Analysis Ransomware

Yet another WanaCry Ransomware – Analysis

June 10, 2017April 23, 2022

Recently, organizations are being targeted with new ransomware labelled as WanaCry. Being curious, I downloaded the sample to understand how the malware actually behaved. The

Read More
Forensics General Tips Malware Analysis

Hash Values – A Trivial Artefact

December 27, 2016April 23, 2022

Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon

Read More
Fraud & Fin Crime Malware Analysis Threat Intelligence

Evoltin POS Malware – Kill Chain Mind Map

November 14, 2016April 23, 2022

Readers!!! Its been quite a while I have updated my blog posts, due to me spending  some quality time off the work and being with

Read More
Hunting Package Malware Analysis

YARA rule for Dridex

August 2, 2016April 23, 2022

Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded

Read More
Malware Analysis Phishing

A javascript file – Invoice from UK

June 23, 2016April 23, 2022

It’s been quite a while I was able to analyse my spam emails. Recently, I received an email with a zip attachment claiming to be

Read More
General Tips Malware Analysis

Malware Analysis – Mind Map

May 30, 2016April 23, 2022

Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind

Read More
Malware Analysis

Dridex malware dropper -New doc 115.doc

March 1, 2016April 23, 2022

On a pleasant morning I received an email with an doc attachment. The email was not having any text or message. Subject was name of

Read More
Malware Analysis Phishing

NDISPlan phishing/malware email

September 24, 2015April 23, 2022

Based on my previous blog entry about emails I have analysed an email that was received from *@ndis.gov.au. From the email it seems that you

Read More

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...