Keylogger Malware Analysis

Published:

  • Analyzed a keylogger in a controlled virtual sandbox, identifying 12 malicious patterns via static and dynamic analysis.

  • Used tools such as IDA Pro, OllyDbg, YARA, FakeDNS, PEiD, VirusTotal, and Process Monitor to fingerprint malware and study network behavior.