Date Author Title
2022-07-10Guy BruneauExcel 4 Emotet Maldoc Analysis using CyberChef
2022-07-07Brad DuncanEmotet infection with Cobalt Strike
2022-02-09Brad DuncanExample of Cobalt Strike from Emotet infection
2022-01-25Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2022-01-19Brad Duncan0.0.0.0 in Emotet Spambot Traffic
2021-12-22Brad DuncanDecember 2021 Forensic Contest: Answers and Analysis
2021-11-16Brad DuncanEmotet Returns
2021-01-28Daniel WesemannEmotet vs. Windows Attack Surface Reduction
2020-11-03Brad DuncanEmotet -> Qakbot -> more Emotet
2020-01-28Brad DuncanEmotet epoch 1 infection with Trickbot gtag mor84
2020-01-23Xavier MertensComplex Obfuscation VS Simple Trick
2019-12-18Brad DuncanEmotet infection with spambot activity
2019-10-02Brad DuncanA recent example of Emotet malspam
2019-09-18Brad DuncanEmotet malspam is back
2019-03-13Brad DuncanMalspam pushes Emotet with Qakbot as the follow-up malware
2019-01-16Brad DuncanEmotet infections and follow-up malware
2018-11-15Brad DuncanEmotet infection with IcedID banking Trojan
2018-09-26Brad DuncanOne Emotet infection leads to three follow-up malware infections
2018-07-26Xavier MertensWindows Batch File Deobfuscation
2018-07-24Brad DuncanRecent Emotet activity
2017-11-30Brad DuncanMore Malspam pushing Emotet malware
2017-08-10Didier StevensMaldoc Analysis with ViperMonkey
2017-07-28Didier StevensStatic Analysis of Emotet Maldoc
2017-07-26Brad DuncanMalspam pushing Emotet malware