[CyberDefenders] NetX-Support

Analyze browser, filesystem, and event artifacts to reconstruct the attack chain, identify the malicious download source, extract second-stage and C2 indicators, and determine persistence, account creation, and lateral movement.

November 20, 2025 · 6 min · 1203 words · roushe

[CyberDefenders] Amadey

An after-hours alert from the Endpoint Detection and Response (EDR) system flags suspicious activity on a Windows workstation. The flagged malware aligns with the Amadey Trojan Stealer. Your job is to analyze the presented memory dump and create a detailed report for actions taken by the malware.

September 15, 2025 · 3 min · 567 words · roushe
× Full image