Keylogger Malware Analysis
Published:
Analyzed a keylogger in a controlled virtual sandbox, identifying 12 malicious patterns via static and dynamic analysis.
Used tools such as IDA Pro, OllyDbg, YARA, FakeDNS, PEiD, VirusTotal, and Process Monitor to fingerprint malware and study network behavior.
