Recent Posts

Malicious Document Investigation: XCEL Macro Analysis

Malicious Document Investigation: XCEL Macro Analysis

This Excel document contains malicious macros that are obfuscated to avoid detection. When opened and…

JavaScript Malware Deobfuscation: The Vjw0rm.js Report

JavaScript Malware Deobfuscation: The Vjw0rm.js Report

The Vjw0rm script is JavaScript malware with layered obfuscation. It is a Remote Access Trojan…

njRAT.exe Report

njRAT.exe Report

In this exercise, I analyzed a Remote Access Trojan binary, njRAT.exe, sourced from the Zoo…

Security Investigation with Splunk

Security Investigation with Splunk

In this exercise, I investigated failed authentication attempts with Splunk to detect potential threat actors…

Understanding Threat Hunting

Understanding Threat Hunting

A proactive approach to threat detection Understanding Threat Hunting Organisations use Security Information and Event…

Network Traffic Analysis with Security Onion

Network Traffic Analysis with Security Onion

In this exercise, I investigate an incident wherein a user got compromised through a malicious…