
Malware Research
Comprehensive threat intelligence reports and analysis of malware families, techniques, and attack patterns. Stay ahead of emerging threats with our detailed research.
Threat Intelligence
Comprehensive Malware Analysis
Our research team provides in-depth analysis of malware families, attack techniques, and threat actors to help you understand and defend against emerging threats.
Showing 12 of 12 malware reports
Malware | Classification | Threat Level | Report Date |
---|---|---|---|
Evolution, Capabilities, and Threat Analysis of the DRATzarus (ThreatNeedle) Malware Family | Remote Access Trojan | HIGH | Aug 13, 2025 |
Evolution, Capabilities, and Threat Analysis of the GolangGhost Malware Family | Remote Access Trojan (RAT) / Backdoor | HIGH | Aug 12, 2025 |
Evolution, Capabilities, and Threat Analysis of the DarkGate Malware Family | Remote Access Trojan (RAT) / Loader | HIGH | Aug 11, 2025 |
Evolution, Capabilities, and Threat Analysis of the Supper Malware Family | Remote Access Trojan (RAT) | CRITICAL | Aug 5, 2025 |
Evolution, Capabilities, and Threat Analysis of the Lumma Stealer Malware Family | Information Stealer | HIGH | Jul 31, 2025 |
Evolution, Capabilities, and Threat Analysis of the Mimikatz Credential Stealer | Credential Dumping Tool | HIGH | Jul 31, 2025 |
Evolution, Capabilities, and Threat Analysis of the Cobalt Strike Framework | Post-Exploitation Framework | HIGH | Jul 29, 2025 |
Evolution, Capabilities, and Threat Analysis of the Ghost RAT Malware Family | Remote Access Trojan (RAT) | HIGH | Jul 29, 2025 |
Comprehensive Malware Analysis of the InvisibleFerret Backdoor in Lazarus Group Operations | Backdoor/RAT | HIGH | Jul 26, 2025 |
Evolution, Capabilities, and Threat Analysis of the Quasar Malware Family | Remote Access Trojan (RAT) | HIGH | Jul 13, 2025 |
Evolution, Capabilities, and Threat Analysis of the SystemBC Malware Family | Remote Access Trojan (RAT) | CRITICAL | Jul 31, 2024 |
Evolution, Capabilities, and Threat Analysis of the Volgmer Malware Family | Backdoor Trojan | HIGH | Nov 14, 2017 |
Research Methodology
How We Analyze Threats
Our research team follows industry best practices to provide comprehensive threat intelligence.
Sample Analysis
Deep technical analysis of malware samples including static and dynamic analysis, behavior profiling, and code reverse engineering.
Infrastructure Mapping
Comprehensive mapping of command and control infrastructure, including domain analysis, IP tracking, and network behavior patterns.
Threat Intelligence
Integration with threat intelligence feeds and attribution analysis to identify threat actors and their motivations.
Stay Updated with Latest Threats
Get notified about new malware research and threat intelligence reports as they're published.