Actor behind Operation LagTime targets Russia

Analysis of the backdoor in memory

Attribution

IOCs

Rtf file

Network

Backdoor:

--

--

--

Malwarist,Threat Huntist and pythonist / core dev of #yeti/ member of @ProjectHoneynet / co-organizer #BotConf / researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Slime V2 Full Migration Details

Setting up an OpenVPN Server to Access your VPC Private Ressources

Secret Network Decentralization Ecosystem Update — April 2021 — Secure Secrets’ Report

Zigbee Security and Exploitation for IoT Devices

The Cybersecurity Challenge for the NHS

Guide to import your multi wallet into SpurFund App

{UPDATE} Noa Noa! Hack Free Resources Generator

7 Main Things on Which You Should Focus to Detect Phishing. The Simple Guide by Hacken

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sebdraven

Sebdraven

Malwarist,Threat Huntist and pythonist / core dev of #yeti/ member of @ProjectHoneynet / co-organizer #BotConf / researcher

More from Medium

LOLBINed — 360TotalSecurity (360AdvToolExecutor.exe)

[Mal Series #23] Malware Loader — Bumblebee

Technical analysis of enterprise ransomware — Part One

Introducing BloodHound 4.1 — The Three Headed Hound