<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malware Analysis on My Blog</title><link>https://aynaitlamine.github.io/categories/malware-analysis/</link><description>Recent content in Malware Analysis on My Blog</description><generator>Hugo -- 0.152.2</generator><language>en-us</language><lastBuildDate>Wed, 17 Dec 2025 15:30:00 +0100</lastBuildDate><atom:link href="https://aynaitlamine.github.io/categories/malware-analysis/index.xml" rel="self" type="application/rss+xml"/><item><title>Analyzing UDPGangster: A New Backdoor from Iran's MuddyWater</title><link>https://aynaitlamine.github.io/posts/analyzing-udpgangster-a-new-backdoor-from-irans-muddywater/</link><pubDate>Wed, 17 Dec 2025 15:30:00 +0100</pubDate><guid>https://aynaitlamine.github.io/posts/analyzing-udpgangster-a-new-backdoor-from-irans-muddywater/</guid><description>Independent analysis of MuddyWater&amp;#39;s UDPGangster backdoor - from phishing document to persistent C2 communication</description></item><item><title>Analyzing a New Stealth Backdoor from the Dropping Elephant Group</title><link>https://aynaitlamine.github.io/posts/analyzing-a-new-stealth-backdoor-from-the-dropping-elephant-group/</link><pubDate>Sat, 29 Nov 2025 14:00:00 +0100</pubDate><guid>https://aynaitlamine.github.io/posts/analyzing-a-new-stealth-backdoor-from-the-dropping-elephant-group/</guid><description>From phishing email to Python backdoor - my deep dive into analyzing a sophisticated Dropping Elephant campaign targeting Pakistan&amp;#39;s defense sector</description></item></channel></rss>