• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

C2C-Traffic

Found 1 related articles

Back to Tags
  • 2024-12-05

    Volatility3 Analysis of a Credential Stealer Trojan


    Detailed forensic analysis of a Windows memory dump compromised by the Amadey Trojan. This investigation utilizes Volatility3 to identify the main malicious process (lssass.exe), determine its location on the filesystem (Temp folder), confirm its nature via VirusTotal, track its C2C network connections (41.75.84.12), and discover persistence mechanisms (Scheduled Tasks and DLL payload execution via rundll32.exe).

    CyberDefenders DFIR Digital-Forensics Endpoint-Forensics Memory-Analysis Volatility3 Amadey-Trojan C2C-Traffic Persistence-Mechanism Windows-Forensics