<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[I Red Team DEV - Malware analysis ]]></title>
		<link>https://ired.dev/</link>
		<description><![CDATA[I Red Team DEV - https://ired.dev]]></description>
		<pubDate>Tue, 05 May 2026 12:15:39 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[#Malware_analysis]]></title>
			<link>https://ired.dev/showthread.php?tid=34</link>
			<pubDate>Sun, 06 Jul 2025 21:04:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=34</guid>
			<description><![CDATA[1. DEVMAN Ransomware<br />
<a href="https://any.run/cybersecurity-blog/devman-ransomware-analysis" target="_blank" rel="noopener" class="mycode_url">https://any.run/cybersecurity-blog/devma...e-analysis</a><br />
2. BrowserVenom (Fake DeepSeek) Malicious installer<br />
<a href="https://securelist.com/browservenom-mimicks-deepseek-to-use-malicious-proxy/115728" target="_blank" rel="noopener" class="mycode_url">https://securelist.com/browservenom-mimi...oxy/115728</a><br />
3. KimJongRAT Stealer<br />
<a href="https://unit42.paloaltonetworks.com/kimjongrat-stealer-variant-powershell" target="_blank" rel="noopener" class="mycode_url">https://unit42.paloaltonetworks.com/kimj...powershell</a><br />
4. macOS NimDoor<br />
<a href="https://www.sentinelone.com/labs/macos-nimdoor-dprk-threat-actors-target-web3-and-crypto-platforms-with-nim-based-malware" target="_blank" rel="noopener" class="mycode_url">https://www.sentinelone.com/labs/macos-n...ed-malware</a><br />
5. Windows Shortcut (LNK) Malware Strategies<br />
<a href="https://unit42.paloaltonetworks.com/lnk-malware" target="_blank" rel="noopener" class="mycode_url">https://unit42.paloaltonetworks.com/lnk-malware</a>]]></description>
			<content:encoded><![CDATA[1. DEVMAN Ransomware<br />
<a href="https://any.run/cybersecurity-blog/devman-ransomware-analysis" target="_blank" rel="noopener" class="mycode_url">https://any.run/cybersecurity-blog/devma...e-analysis</a><br />
2. BrowserVenom (Fake DeepSeek) Malicious installer<br />
<a href="https://securelist.com/browservenom-mimicks-deepseek-to-use-malicious-proxy/115728" target="_blank" rel="noopener" class="mycode_url">https://securelist.com/browservenom-mimi...oxy/115728</a><br />
3. KimJongRAT Stealer<br />
<a href="https://unit42.paloaltonetworks.com/kimjongrat-stealer-variant-powershell" target="_blank" rel="noopener" class="mycode_url">https://unit42.paloaltonetworks.com/kimj...powershell</a><br />
4. macOS NimDoor<br />
<a href="https://www.sentinelone.com/labs/macos-nimdoor-dprk-threat-actors-target-web3-and-crypto-platforms-with-nim-based-malware" target="_blank" rel="noopener" class="mycode_url">https://www.sentinelone.com/labs/macos-n...ed-malware</a><br />
5. Windows Shortcut (LNK) Malware Strategies<br />
<a href="https://unit42.paloaltonetworks.com/lnk-malware" target="_blank" rel="noopener" class="mycode_url">https://unit42.paloaltonetworks.com/lnk-malware</a>]]></content:encoded>
		</item>
	</channel>
</rss>