<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PE on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/pe/</link><description>Recent content in PE on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 03 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/pe/index.xml" rel="self" type="application/rss+xml"/><item><title>CDEF-$tealer</title><link>https://hexpysya.github.io/investigations/cdef-tealer/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-tealer/</guid><description>A Dridex loader DLL that dynamically resolves APIs via CRC32 hashing, uses int3/retn as an indirect call mechanism to evade analysis, decrypts embedded strings with RC4, and connects to four hardcoded C2 servers over HTTPS to download additional modules.</description></item><item><title>CDEF-XWorm</title><link>https://hexpysya.github.io/investigations/cdef-xworm/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/cdef-xworm/</guid><description>A .NET XWorm RAT that establishes triple persistence via scheduled task, startup shortcut, and registry Run key, implements keylogging, clipboard hijacking for crypto wallets, and communicates with multiple C2 servers over TCP using AES-ECB encrypted payloads.</description></item><item><title>HTB-SecretPictures</title><link>https://hexpysya.github.io/investigations/htb-secretpictures/</link><pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-secretpictures/</guid><description>A Go-based backdoor that copies itself to a system directory, establishes persistence via a registry Run key, enumerates connected drives, and attempts to connect to a hardcoded C2 domain.</description></item><item><title>HTB-Subatomic</title><link>https://hexpysya.github.io/investigations/htb-subatomic/</link><pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-subatomic/</guid><description>A fake therapy installer distributed as an NSIS self-extracting archive delivers an Electron-based Node.js infostealer that performs anti-VM checks, injects malicious code into Discord clients, and exfiltrates browser credentials, cookies, autofill data, and Discord tokens to a hardcoded C2.</description></item><item><title>HTB-Lupin</title><link>https://hexpysya.github.io/investigations/htb-lupin/</link><pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-lupin/</guid><description>Reverse engineering PHORPIEX dropper - analyzing clipboard hijacking, USB spreading, and UPnP NAT traversal techniques.</description></item><item><title>HTB-SneakyKeys</title><link>https://hexpysya.github.io/investigations/htb-sneakykeys/</link><pubDate>Tue, 03 Feb 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-sneakykeys/</guid><description/></item><item><title>HTB-CrashDump</title><link>https://hexpysya.github.io/investigations/htb-crashdump/</link><pubDate>Fri, 30 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-crashdump/</guid><description>Analyzed two process dumps (notepad.exe and update.exe) revealing a Cobalt Strike Beacon infection. The malware used process injection with reflective DLL loading, communicated with C2 server at &lt;code&gt;101.10.25.4:8023&lt;/code&gt;, and possessed capabilities for privilege escalation, token manipulation, and lateral movement via named pipes.</description></item><item><title>HTB-Partial_Encryption</title><link>https://hexpysya.github.io/investigations/htb-partial_encryption/</link><pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/htb-partial_encryption/</guid><description/></item><item><title>PoshC2: Sharp_v4_x64.dll</title><link>https://hexpysya.github.io/investigations/poschc2-sharp_v4_x64.dll/</link><pubDate>Tue, 25 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/poschc2-sharp_v4_x64.dll/</guid><description>A .NET DLL decodes architecture-specific shellcode from an embedded base64 string, allocates executable memory, and spawns a thread to execute it. The shellcode performs NTDLL unhooking, AMSI and ETW patching before executing an embedded PE payload identified as a PoshC2 dropper.</description></item><item><title>PoshC2: Dropper-cs.exe</title><link>https://hexpysya.github.io/investigations/dropper-cs.exe-analysis/</link><pubDate>Sun, 23 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/dropper-cs.exe-analysis/</guid><description>C2 .NET implant. AES-encrypted config, HTTPS beacon to &lt;code&gt;192.168.248.128&lt;/code&gt;, fileless in-memory execution, anti-debug via divide-by-zero.</description></item><item><title>Metasploit: adobe_pdf_embedded_exe_nojs</title><link>https://hexpysya.github.io/investigations/metasploit-adobe_pdf_embedded_exe_nojs/</link><pubDate>Sat, 22 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/metasploit-adobe_pdf_embedded_exe_nojs/</guid><description>A malicious PDF uses a Launch action to execute cmd.exe, which runs an inline VBScript that reads hex-encoded shellcode directly from the PDF body, writes it to disk as an executable, and launches a Metasploit reverse shell.</description></item><item><title>Metasploit: adobe-pdf-embedded-file</title><link>https://hexpysya.github.io/investigations/metasploit-adobe-pdf-embedded-file/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/investigations/metasploit-adobe-pdf-embedded-file/</guid><description>A malicious PDF exploits JavaScript and Launch actions to extract and execute an embedded PE payload, establishing a reverse shell connection to an attacker-controlled server.</description></item></channel></rss>