Denwp Research
  • Home
  • Malware
  • Detection Engineering
  • About

Detection Engineering

A collection of 3 posts
Unexplored LOLBAS Technique: Wevtutil.exe
blog

Unexplored LOLBAS Technique: Wevtutil.exe

Wevtutil.exe manages Windows event logs, aiding system admins but exploitable by attackers for log manipulation, evasion, and data exfiltration.
Nov 25, 2024 6 min read
Hidden World of xattr: Lazarus Group’s Abuse of "Rustyattr" to Evade Detection
blog

Hidden World of xattr: Lazarus Group’s Abuse of "Rustyattr" to Evade Detection

Lazarus Group hides malware in macOS extended attributes (xattr), evading detection.
Nov 19, 2024 7 min read
Unveiling the Stealth: How Malware Hides Using Alternate Data Streams
blog

Unveiling the Stealth: How Malware Hides Using Alternate Data Streams

Understanding the intricacies of malware evasion techniques is very important. One such method gaining notoriety is the use of Alternate Data Streams (ADS). In this article, we delve into the covert world of ADS and explore how malware exploits this file system feature to hide from detection. Alternate Data Streams
Dec 8, 2023 6 min read
Page 1 of 1
Denwp Research © 2025
Powered by Ghost