PDF-only academic report analyzing a real multi-stage Windows malware sample, including anti-analysis behavior, process replacement, C2 communication, and data exfiltration in an isolated lab.
-
Updated
May 12, 2026
PDF-only academic report analyzing a real multi-stage Windows malware sample, including anti-analysis behavior, process replacement, C2 communication, and data exfiltration in an isolated lab.
TryHackMe Boogeyman 2 write-up covering phishing email analysis, malicious document macros, memory forensics, C2 investigation, and persistence detection.
Static analysis and reverse engineering of Phantom Stealer V3 (SHA256: b1d8...). For educational purposes only.
🔍 Technical analysis of "悦动空间" Android spyware - Exfiltrates contacts, SMS & images to C2 servers (156.224.170.230) | SHA-256: a1feefa...
TryHackMe Boogeyman 1 write-up covering phishing email analysis, malicious LNK investigation, PowerShell log analysis, C2 traffic, DNS exfiltration, and KeePass data recovery.
Add a description, image, and links to the c2-analysis topic page so that developers can more easily learn about it.
To associate your repository with the c2-analysis topic, visit your repo's landing page and select "manage topics."