A Cybersecurity Blog

Recent Articles

Malicious Document Investigation: XCEL Macro Analysis

Malicious Document Investigation: XCEL Macro Analysis

This Excel document contains malicious macros that are obfuscated to avoid detection. When opened and macros are enabled, it attempts to reach out to external resources hosted on malicious URLs and download and execute additional payloads. Source: ht...

Malware Analysis: njRAT.exe Report

Malware Analysis: njRAT.exe Report

In this exercise, I analysed a Remote Access Trojan binary, njRAT.exe, sourced from the Zoo malware repository on GitHub. Analysis revealed that the sample was originally compiled in 2013 as EnKSaR.HaCKeR.exe. The malware is designed to grant an atta...