<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://binhex.ninja/</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>1.0</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/IMG_1099-200w.avif</image:loc>
      <image:title>Saptarshi Laha</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/IMG_1099-400w.avif</image:loc>
      <image:title>Saptarshi Laha</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/IMG_1099-200w.webp</image:loc>
      <image:title>Saptarshi Laha</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/IMG_1099-400w.webp</image:loc>
      <image:title>Saptarshi Laha</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/IMG_1099.png</image:loc>
      <image:title>Saptarshi Laha</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-400w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-800w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-1200w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-400w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-800w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-1200w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x.jpeg</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-400w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-800w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-1200w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-400w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-800w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-1200w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3.jpeg</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-400w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-800w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-1200w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-400w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-800w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-1200w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2.jpg</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-400w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-800w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-1200w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-400w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-800w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-1200w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1.jpeg</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-400w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-800w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-1200w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-400w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-800w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-1200w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/blogs/ctf-re-blogs.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-400w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-800w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-1200w.avif</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-400w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-800w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1-1200w.webp</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>Zero Days CTF (2024) RE - 5</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/blogs/malware-analysis-re-blogs.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-400w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-800w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-1200w.avif</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-400w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-800w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x-1200w.webp</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x.jpeg</image:loc>
      <image:title>Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-400w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-800w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-1200w.avif</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-400w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-800w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3-1200w.webp</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3.jpeg</image:loc>
      <image:title>Shell Shocked: The Oyster Backdoor Update</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-400w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-800w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-1200w.avif</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-400w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-800w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2-1200w.webp</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2.jpg</image:loc>
      <image:title>Latrodectus: Unweaving the Web</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-400w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-800w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-1200w.avif</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-400w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-800w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1-1200w.webp</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1.jpeg</image:loc>
      <image:title>Koi Loader/Stealer: Part 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/blogs/external-contributions-re-blogs.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/support/support-the-blog.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Stripe%20Climate%20Badge.svg</image:loc>
      <image:title>Stripe Climate</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/support/current-supporters.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/malcore_new1.svg</image:loc>
      <image:title>Malcore</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/triage_new.svg</image:loc>
      <image:title>Triage</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/validin_new.svg</image:loc>
      <image:title>Validin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/logo_new.svg</image:loc>
      <image:title>Censys</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/abuse_ch_new.svg</image:loc>
      <image:title>Abuse.ch</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/RussianPanda%20Research%20Services_new.svg</image:loc>
      <image:title>RussianPanda Research Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/extension.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Monthly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-1.avif</image:loc>
      <image:title>Figure 1: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-1.webp</image:loc>
      <image:title>Figure 1: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-1.png</image:loc>
      <image:title>Figure 1: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-2.avif</image:loc>
      <image:title>Figure 2: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-2.webp</image:loc>
      <image:title>Figure 2: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-2.png</image:loc>
      <image:title>Figure 2: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-3.avif</image:loc>
      <image:title>Figure 3: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-3.webp</image:loc>
      <image:title>Figure 3: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-3.png</image:loc>
      <image:title>Figure 3: ClickFix Variant</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-4.avif</image:loc>
      <image:title>Figure 4: BinHex.Ninja Security Extension notifying user of a ClickFix Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-4.webp</image:loc>
      <image:title>Figure 4: BinHex.Ninja Security Extension notifying user of a ClickFix Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-4.png</image:loc>
      <image:title>Figure 4: BinHex.Ninja Security Extension notifying user of a ClickFix Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-5.avif</image:loc>
      <image:title>Figure 5: BinHex.Ninja Security Extension successfully blocking a ClickFix Clipboard Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-5.webp</image:loc>
      <image:title>Figure 5: BinHex.Ninja Security Extension successfully blocking a ClickFix Clipboard Attack</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/clickfix-5.png</image:loc>
      <image:title>Figure 5: BinHex.Ninja Security Extension successfully blocking a ClickFix Clipboard Attack</image:title>
    </image:image>
    <video:video>
      <video:content_loc>https://binhex.ninja/videos/ClickFix-Block-Demo-1.mp4</video:content_loc>
      <video:thumbnail_loc>https://binhex.ninja/img/clickfix-4.png</video:thumbnail_loc>
      <video:title>📹 Demo 1: In-Depth Threat Protection</video:title>
      <video:description>Watch as the extension instantly detects and blocks a ClickFix attack within an iframe element, preventing malicious commands from reaching your clipboard.</video:description>
    </video:video>
    <video:video>
      <video:content_loc>https://binhex.ninja/videos/ClickFix-Block-Demo-2.mp4</video:content_loc>
      <video:thumbnail_loc>https://binhex.ninja/img/clickfix-5.png</video:thumbnail_loc>
      <video:title>📹 Demo 2: Multi-Layer Protection</video:title>
      <video:description>See the extension's multi-layer defense system in action, where a ClickFix attack served behind a Cloudflare proxy is detected.</video:description>
    </video:video>
  </url>
  <url>
    <loc>https://binhex.ninja/ctf-blogs/zero-days-ctf-2024-re-1.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h09_11.avif</image:loc>
      <image:title>Figure 1: Initial Challenge Sample</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h09_11.webp</image:loc>
      <image:title>Figure 1: Initial Challenge Sample</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h09_11.png</image:loc>
      <image:title>Figure 1: Initial Challenge Sample</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21.avif</image:loc>
      <image:title>Figure 2: Display of unintelligible data when opening the .pyc file in a text editor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21.webp</image:loc>
      <image:title>Figure 2: Display of unintelligible data when opening the .pyc file in a text editor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21.png</image:loc>
      <image:title>Figure 2: Display of unintelligible data when opening the .pyc file in a text editor</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h30_18.avif</image:loc>
      <image:title>Figure 3: Depicts the compiled pycdc.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h30_18.webp</image:loc>
      <image:title>Figure 3: Depicts the compiled pycdc.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h30_18.png</image:loc>
      <image:title>Figure 3: Depicts the compiled pycdc.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%281%29.avif</image:loc>
      <image:title>Figure 4: Illustrates the decompiled mystery.pyc</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%281%29.webp</image:loc>
      <image:title>Figure 4: Illustrates the decompiled mystery.pyc</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%281%29.png</image:loc>
      <image:title>Figure 4: Illustrates the decompiled mystery.pyc</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%282%29.avif</image:loc>
      <image:title>Figure 5: Displays the decoded flag output achieved through CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%282%29.webp</image:loc>
      <image:title>Figure 5: Displays the decoded flag output achieved through CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%282%29.png</image:loc>
      <image:title>Figure 5: Displays the decoded flag output achieved through CyberChef</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/ctf-blogs/zero-days-ctf-2024-re-3.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%289%29.avif</image:loc>
      <image:title>Figure 1: Depicts the third file, named ‘ ZeroDaysGame.tar.gz ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%289%29.webp</image:loc>
      <image:title>Figure 1: Depicts the third file, named ‘ ZeroDaysGame.tar.gz ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%289%29.png</image:loc>
      <image:title>Figure 1: Depicts the third file, named ‘ ZeroDaysGame.tar.gz ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2810%29.avif</image:loc>
      <image:title>Figure 2: Illustrates the contents of the .tar.gz archive after the initial extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2810%29.webp</image:loc>
      <image:title>Figure 2: Illustrates the contents of the .tar.gz archive after the initial extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2810%29.png</image:loc>
      <image:title>Figure 2: Illustrates the contents of the .tar.gz archive after the initial extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2811%29.avif</image:loc>
      <image:title>Figure 3: Illustrates the contents of the .tar archive after extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2811%29.webp</image:loc>
      <image:title>Figure 3: Illustrates the contents of the .tar archive after extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2811%29.png</image:loc>
      <image:title>Figure 3: Illustrates the contents of the .tar archive after extraction</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2812%29.avif</image:loc>
      <image:title>Figure 4: Displays the contents of the extracted folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2812%29.webp</image:loc>
      <image:title>Figure 4: Displays the contents of the extracted folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2812%29.png</image:loc>
      <image:title>Figure 4: Displays the contents of the extracted folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2813%29.avif</image:loc>
      <image:title>Figure 5: Highlights the occurrence of the word " Unity " multiple times within the filenames in the folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2813%29.webp</image:loc>
      <image:title>Figure 5: Highlights the occurrence of the word " Unity " multiple times within the filenames in the folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2813%29.png</image:loc>
      <image:title>Figure 5: Highlights the occurrence of the word " Unity " multiple times within the filenames in the folder</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2814%29.avif</image:loc>
      <image:title>Figure 6: Illustrates the interface of AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2814%29.webp</image:loc>
      <image:title>Figure 6: Illustrates the interface of AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2814%29.png</image:loc>
      <image:title>Figure 6: Illustrates the interface of AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2815%29.avif</image:loc>
      <image:title>Figure 7: Depicts the " Load Folder " option within AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2815%29.webp</image:loc>
      <image:title>Figure 7: Depicts the " Load Folder " option within AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%2815%29.png</image:loc>
      <image:title>Figure 7: Depicts the " Load Folder " option within AssetStudioGUI</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%281%29.avif</image:loc>
      <image:title>Figure 8: Illustrates the “ Asset List ” tab and highlights the “ Text ” asset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%281%29.webp</image:loc>
      <image:title>Figure 8: Illustrates the “ Asset List ” tab and highlights the “ Text ” asset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%281%29.png</image:loc>
      <image:title>Figure 8: Illustrates the “ Asset List ” tab and highlights the “ Text ” asset</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%282%29.avif</image:loc>
      <image:title>Figure 9: Depicts the flag within the AssetStudioGUI interface</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%282%29.webp</image:loc>
      <image:title>Figure 9: Depicts the flag within the AssetStudioGUI interface</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_23h18_24%20%282%29.png</image:loc>
      <image:title>Figure 9: Depicts the flag within the AssetStudioGUI interface</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/ctf-blogs/zero-days-ctf-2024-re-2.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%283%29.avif</image:loc>
      <image:title>Figure 1: Displays the file ‘ chall ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%283%29.webp</image:loc>
      <image:title>Figure 1: Displays the file ‘ chall ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%283%29.png</image:loc>
      <image:title>Figure 1: Displays the file ‘ chall ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%284%29.avif</image:loc>
      <image:title>Figure 2: Illustrates ELF bytes observed in HxD</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%284%29.webp</image:loc>
      <image:title>Figure 2: Illustrates ELF bytes observed in HxD</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%284%29.png</image:loc>
      <image:title>Figure 2: Illustrates ELF bytes observed in HxD</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%285%29.avif</image:loc>
      <image:title>Figure 3: Displays Detect-It-Easy indicating that the binary is packed with UPX</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%285%29.webp</image:loc>
      <image:title>Figure 3: Displays Detect-It-Easy indicating that the binary is packed with UPX</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%285%29.png</image:loc>
      <image:title>Figure 3: Displays Detect-It-Easy indicating that the binary is packed with UPX</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%286%29.avif</image:loc>
      <image:title>Figure 4: Demonstrates the utilization of the UPX unpack command to generate the resulting unpacked binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%286%29.webp</image:loc>
      <image:title>Figure 4: Demonstrates the utilization of the UPX unpack command to generate the resulting unpacked binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%286%29.png</image:loc>
      <image:title>Figure 4: Demonstrates the utilization of the UPX unpack command to generate the resulting unpacked binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%287%29.avif</image:loc>
      <image:title>Figure 5: Depicts the unpacked sample as identified in Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%287%29.webp</image:loc>
      <image:title>Figure 5: Depicts the unpacked sample as identified in Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%287%29.png</image:loc>
      <image:title>Figure 5: Depicts the unpacked sample as identified in Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%288%29.avif</image:loc>
      <image:title>Figure 6: Illustrates the main function of the file in Binary Ninja , highlighting the flag string</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%288%29.webp</image:loc>
      <image:title>Figure 6: Illustrates the main function of the file in Binary Ninja , highlighting the flag string</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-05_18h21_21%20%288%29.png</image:loc>
      <image:title>Figure 6: Illustrates the main function of the file in Binary Ninja , highlighting the flag string</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/ctf-blogs/zero-days-ctf-2024-re-5.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28.avif</image:loc>
      <image:title>Figure 1: Illustrates the ' the_kings_secret.zip ' file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28.webp</image:loc>
      <image:title>Figure 1: Illustrates the ' the_kings_secret.zip ' file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28.png</image:loc>
      <image:title>Figure 1: Illustrates the ' the_kings_secret.zip ' file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%281%29.avif</image:loc>
      <image:title>Figure 2: Depicts the contents extracted from the ZIP file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%281%29.webp</image:loc>
      <image:title>Figure 2: Depicts the contents extracted from the ZIP file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%281%29.png</image:loc>
      <image:title>Figure 2: Depicts the contents extracted from the ZIP file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%282%29.avif</image:loc>
      <image:title>Figure 3: Depicts the analysis of the executable file using Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%282%29.webp</image:loc>
      <image:title>Figure 3: Depicts the analysis of the executable file using Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%282%29.png</image:loc>
      <image:title>Figure 3: Depicts the analysis of the executable file using Detect-It-Easy</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%283%29.avif</image:loc>
      <image:title>Figure 4: Illustrates the initial variable declarations observed in the main() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%283%29.webp</image:loc>
      <image:title>Figure 4: Illustrates the initial variable declarations observed in the main() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%283%29.png</image:loc>
      <image:title>Figure 4: Illustrates the initial variable declarations observed in the main() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%284%29.avif</image:loc>
      <image:title>Figure 5: Depicts the first fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%284%29.webp</image:loc>
      <image:title>Figure 5: Depicts the first fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%284%29.png</image:loc>
      <image:title>Figure 5: Depicts the first fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%285%29.avif</image:loc>
      <image:title>Figure 6: Depicts the second fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%285%29.webp</image:loc>
      <image:title>Figure 6: Depicts the second fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%285%29.png</image:loc>
      <image:title>Figure 6: Depicts the second fgets() function encountered in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%286%29.avif</image:loc>
      <image:title>Figure 7: Depicts the two loops utilized in validating the first and second input strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%286%29.webp</image:loc>
      <image:title>Figure 7: Depicts the two loops utilized in validating the first and second input strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%286%29.png</image:loc>
      <image:title>Figure 7: Depicts the two loops utilized in validating the first and second input strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%287%29.avif</image:loc>
      <image:title>Figure 8: Displays the var_250 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%287%29.webp</image:loc>
      <image:title>Figure 8: Displays the var_250 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%287%29.png</image:loc>
      <image:title>Figure 8: Displays the var_250 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%288%29.avif</image:loc>
      <image:title>Figure 9: Illustrates the decoding of the expected second input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%288%29.webp</image:loc>
      <image:title>Figure 9: Illustrates the decoding of the expected second input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%288%29.png</image:loc>
      <image:title>Figure 9: Illustrates the decoding of the expected second input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%289%29.avif</image:loc>
      <image:title>Figure 10: Displays the var_290 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%289%29.webp</image:loc>
      <image:title>Figure 10: Displays the var_290 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%289%29.png</image:loc>
      <image:title>Figure 10: Displays the var_290 array as depicted in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2810%29.avif</image:loc>
      <image:title>Figure 11: Illustrates the decoding of the expected first input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2810%29.webp</image:loc>
      <image:title>Figure 11: Illustrates the decoding of the expected first input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2810%29.png</image:loc>
      <image:title>Figure 11: Illustrates the decoding of the expected first input string using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2811%29.avif</image:loc>
      <image:title>Figure 12: Depicts the data array of the CipherText variable</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2811%29.webp</image:loc>
      <image:title>Figure 12: Depicts the data array of the CipherText variable</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2811%29.png</image:loc>
      <image:title>Figure 12: Depicts the data array of the CipherText variable</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2812%29.avif</image:loc>
      <image:title>Figure 13: Displays the function prototype of the function wrapped by the j_SimpleDecryption() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2812%29.webp</image:loc>
      <image:title>Figure 13: Displays the function prototype of the function wrapped by the j_SimpleDecryption() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2812%29.png</image:loc>
      <image:title>Figure 13: Displays the function prototype of the function wrapped by the j_SimpleDecryption() function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2813%29.avif</image:loc>
      <image:title>Figure 14: Depicts the flag obtained through manual decryption using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2813%29.webp</image:loc>
      <image:title>Figure 14: Depicts the flag obtained through manual decryption using CyberChef</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_22h44_28%20%2813%29.png</image:loc>
      <image:title>Figure 14: Depicts the flag obtained through manual decryption using CyberChef</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/ctf-blogs/zero-days-ctf-2024-re-4.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/ctf1.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_051.avif</image:loc>
      <image:title>Figure 1: Illustrates the executable file ‘ acup.exe ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_051.webp</image:loc>
      <image:title>Figure 1: Illustrates the executable file ‘ acup.exe ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_051.png</image:loc>
      <image:title>Figure 1: Illustrates the executable file ‘ acup.exe ’</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05.avif</image:loc>
      <image:title>Figure 2: Analysis with Detect-It-Easy reveals the utilization of PyInstaller</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05.webp</image:loc>
      <image:title>Figure 2: Analysis with Detect-It-Easy reveals the utilization of PyInstaller</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05.png</image:loc>
      <image:title>Figure 2: Analysis with Detect-It-Easy reveals the utilization of PyInstaller</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%281%29.avif</image:loc>
      <image:title>Figure 3: Output of pyinstxtractor.py displaying potential entry points</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%281%29.webp</image:loc>
      <image:title>Figure 3: Output of pyinstxtractor.py displaying potential entry points</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%281%29.png</image:loc>
      <image:title>Figure 3: Output of pyinstxtractor.py displaying potential entry points</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%282%29.avif</image:loc>
      <image:title>Figure 4: Directory generated by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%282%29.webp</image:loc>
      <image:title>Figure 4: Directory generated by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%282%29.png</image:loc>
      <image:title>Figure 4: Directory generated by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%283%29.avif</image:loc>
      <image:title>Figure 5: Python bytecode (.pyc) file extracted by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%283%29.webp</image:loc>
      <image:title>Figure 5: Python bytecode (.pyc) file extracted by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%283%29.png</image:loc>
      <image:title>Figure 5: Python bytecode (.pyc) file extracted by pyinstxtractor.py</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%284%29.avif</image:loc>
      <image:title>Figure 6: Represents the file selected for analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%284%29.webp</image:loc>
      <image:title>Figure 6: Represents the file selected for analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%284%29.png</image:loc>
      <image:title>Figure 6: Represents the file selected for analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%285%29.avif</image:loc>
      <image:title>Figure 7: Illustrates the decompilation output of the ‘ acup.pyc ’ file using pycdc.exe</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%285%29.webp</image:loc>
      <image:title>Figure 7: Illustrates the decompilation output of the ‘ acup.pyc ’ file using pycdc.exe</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%285%29.png</image:loc>
      <image:title>Figure 7: Illustrates the decompilation output of the ‘ acup.pyc ’ file using pycdc.exe</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%286%29.avif</image:loc>
      <image:title>Figure 8: Illustrates the expected input string for the second condition in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%286%29.webp</image:loc>
      <image:title>Figure 8: Illustrates the expected input string for the second condition in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%286%29.png</image:loc>
      <image:title>Figure 8: Illustrates the expected input string for the second condition in the code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%287%29.avif</image:loc>
      <image:title>Figure 9: Illustrates the base64 encoding of the expected input string</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%287%29.webp</image:loc>
      <image:title>Figure 9: Illustrates the base64 encoding of the expected input string</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%287%29.png</image:loc>
      <image:title>Figure 9: Illustrates the base64 encoding of the expected input string</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%288%29.avif</image:loc>
      <image:title>Figure 10: Displays the output flag</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%288%29.webp</image:loc>
      <image:title>Figure 10: Displays the output flag</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-06_00h14_05%20%288%29.png</image:loc>
      <image:title>Figure 10: Displays the output flag</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/malware-analysis-blogs/amos-stealer-atomic-stealer-malware.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x.avif</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x.webp</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/OIG1-topaz-text-sharpen-lighting-upscale-3.4x.jpeg</image:loc>
      <image:title>ctf image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.03.01@2x.avif</image:loc>
      <image:title>Figure 1: Displays the .DMG file that is downloaded by an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.03.01@2x.webp</image:loc>
      <image:title>Figure 1: Displays the .DMG file that is downloaded by an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.03.01@2x.png</image:loc>
      <image:title>Figure 1: Displays the .DMG file that is downloaded by an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.27.33@2x.avif</image:loc>
      <image:title>Figure 2: Displays the installer prompts guiding the user to install the malicious application</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.27.33@2x.webp</image:loc>
      <image:title>Figure 2: Displays the installer prompts guiding the user to install the malicious application</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.27.33@2x.png</image:loc>
      <image:title>Figure 2: Displays the installer prompts guiding the user to install the malicious application</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.42@2x.avif</image:loc>
      <image:title>Figure 3: Demonstrates right-clicking the application to open it in a text editor for further inspection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.42@2x.webp</image:loc>
      <image:title>Figure 3: Demonstrates right-clicking the application to open it in a text editor for further inspection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.42@2x.png</image:loc>
      <image:title>Figure 3: Demonstrates right-clicking the application to open it in a text editor for further inspection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.56@2x.avif</image:loc>
      <image:title>Figure 4: Displays the base64-encoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.56@2x.webp</image:loc>
      <image:title>Figure 4: Displays the base64-encoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-22%20at%2023.28.56@2x.png</image:loc>
      <image:title>Figure 4: Displays the base64-encoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.52.01@2x.avif</image:loc>
      <image:title>Figure 5: Displays the decoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.52.01@2x.webp</image:loc>
      <image:title>Figure 5: Displays the decoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2020.52.01@2x.png</image:loc>
      <image:title>Figure 5: Displays the decoded script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2021.02.08@2x.avif</image:loc>
      <image:title>Figure 6: Displays the contents of the RVS folder, including the hidden .RVS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2021.02.08@2x.webp</image:loc>
      <image:title>Figure 6: Displays the contents of the RVS folder, including the hidden .RVS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-25%20at%2021.02.08@2x.png</image:loc>
      <image:title>Figure 6: Displays the contents of the RVS folder, including the hidden .RVS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2019.47.52@2x.avif</image:loc>
      <image:title>Figure 7: Depicts a decompiled code snippet highlighting a custom base64 alphabet, two large hexadecimal strings, operations performed on these str...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2019.47.52@2x.webp</image:loc>
      <image:title>Figure 7: Depicts a decompiled code snippet highlighting a custom base64 alphabet, two large hexadecimal strings, operations performed on these str...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2019.47.52@2x.png</image:loc>
      <image:title>Figure 7: Depicts a decompiled code snippet highlighting a custom base64 alphabet, two large hexadecimal strings, operations performed on these str...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.17.28@2x.avif</image:loc>
      <image:title>Figure 8: Depicts the “from hexadecimal” that is applied on the hexadecimal strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.17.28@2x.webp</image:loc>
      <image:title>Figure 8: Depicts the “from hexadecimal” that is applied on the hexadecimal strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.17.28@2x.png</image:loc>
      <image:title>Figure 8: Depicts the “from hexadecimal” that is applied on the hexadecimal strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.47.26@2x.avif</image:loc>
      <image:title>Figure 9: Depicts the base64 decode operation that is applied on the previous output string using the custom alphabet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.47.26@2x.webp</image:loc>
      <image:title>Figure 9: Depicts the base64 decode operation that is applied on the previous output string using the custom alphabet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202024-12-31%20at%2021.47.26@2x.png</image:loc>
      <image:title>Figure 9: Depicts the base64 decode operation that is applied on the previous output string using the custom alphabet</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2015.43.03@2x.avif</image:loc>
      <image:title>Figure 10: Depicts the invocation of two _system commands in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2015.43.03@2x.webp</image:loc>
      <image:title>Figure 10: Depicts the invocation of two _system commands in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2015.43.03@2x.png</image:loc>
      <image:title>Figure 10: Depicts the invocation of two _system commands in the decompiled code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.48.38@2x.avif</image:loc>
      <image:title>Figure 11: Depicts the malware prompting the user to enter their password, masquerading as a System Preferences request</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.48.38@2x.webp</image:loc>
      <image:title>Figure 11: Depicts the malware prompting the user to enter their password, masquerading as a System Preferences request</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.48.38@2x.png</image:loc>
      <image:title>Figure 11: Depicts the malware prompting the user to enter their password, masquerading as a System Preferences request</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.58.25x@2x.avif</image:loc>
      <image:title>Figure 12: Depicts the malware-related files and folders that are created during execution</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.58.25x@2x.webp</image:loc>
      <image:title>Figure 12: Depicts the malware-related files and folders that are created during execution</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.58.25x@2x.png</image:loc>
      <image:title>Figure 12: Depicts the malware-related files and folders that are created during execution</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.56.29@2x.avif</image:loc>
      <image:title>Figure 13: Shows the network packets from the malware's attempt to connect to its C2 server for data exfiltration</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.56.29@2x.webp</image:loc>
      <image:title>Figure 13: Shows the network packets from the malware's attempt to connect to its C2 server for data exfiltration</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2016.56.29@2x.png</image:loc>
      <image:title>Figure 13: Shows the network packets from the malware's attempt to connect to its C2 server for data exfiltration</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.19.00@2x.avif</image:loc>
      <image:title>Figure 14: Illustrates the hosts identified using the aforementioned query</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.19.00@2x.webp</image:loc>
      <image:title>Figure 14: Illustrates the hosts identified using the aforementioned query</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.19.00@2x.png</image:loc>
      <image:title>Figure 14: Illustrates the hosts identified using the aforementioned query</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.22.42@2x.avif</image:loc>
      <image:title>Figure 15: Displays the IPs identified with a red spike, signifying those confirmed to be directly associated with the AMOS Stealer campaign</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.22.42@2x.webp</image:loc>
      <image:title>Figure 15: Displays the IPs identified with a red spike, signifying those confirmed to be directly associated with the AMOS Stealer campaign</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%202025-01-01%20at%2019.22.42@2x.png</image:loc>
      <image:title>Figure 15: Displays the IPs identified with a red spike, signifying those confirmed to be directly associated with the AMOS Stealer campaign</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/malware-analysis-blogs/koi-loader-koi-stealer-malware.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1.avif</image:loc>
      <image:title>koi image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1.webp</image:loc>
      <image:title>koi image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal1.jpeg</image:loc>
      <image:title>koi image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio%2B%284%29.avif</image:loc>
      <image:title>Figure 1: Illustrates the infection chain of the Koi Loader/Koi Stealer campaign</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio%2B%284%29.webp</image:loc>
      <image:title>Figure 1: Illustrates the infection chain of the Koi Loader/Koi Stealer campaign</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio%2B%284%29.png</image:loc>
      <image:title>Figure 1: Illustrates the infection chain of the Koi Loader/Koi Stealer campaign</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/GKWCdHDXEAAmvWa.avif</image:loc>
      <image:title>Figure 2: Brad's depiction of the step-by-step process of the infected ZIP download from the perspective of an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/GKWCdHDXEAAmvWa.webp</image:loc>
      <image:title>Figure 2: Brad's depiction of the step-by-step process of the infected ZIP download from the perspective of an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/GKWCdHDXEAAmvWa.png</image:loc>
      <image:title>Figure 2: Brad's depiction of the step-by-step process of the infected ZIP download from the perspective of an unsuspecting user</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49.avif</image:loc>
      <image:title>Figure 3: Illustrates the malicious ZIP file, disguised as a Chase Bank statement</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49.webp</image:loc>
      <image:title>Figure 3: Illustrates the malicious ZIP file, disguised as a Chase Bank statement</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49.png</image:loc>
      <image:title>Figure 3: Illustrates the malicious ZIP file, disguised as a Chase Bank statement</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%281%29.avif</image:loc>
      <image:title>Figure 4: Depicts the LNK file impersonating a PDF document</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%281%29.webp</image:loc>
      <image:title>Figure 4: Depicts the LNK file impersonating a PDF document</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%281%29.png</image:loc>
      <image:title>Figure 4: Depicts the LNK file impersonating a PDF document</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%282%29.avif</image:loc>
      <image:title>Figure 5: Illustrates the malicious command line associated with the LNK file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%282%29.webp</image:loc>
      <image:title>Figure 5: Illustrates the malicious command line associated with the LNK file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%282%29.png</image:loc>
      <image:title>Figure 5: Illustrates the malicious command line associated with the LNK file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%283%29.avif</image:loc>
      <image:title>Figure 6: Depicts the downloaded malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%283%29.webp</image:loc>
      <image:title>Figure 6: Depicts the downloaded malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%283%29.png</image:loc>
      <image:title>Figure 6: Depicts the downloaded malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%284%29.avif</image:loc>
      <image:title>Figure 7: Illustrates the batch script contained within the malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%284%29.webp</image:loc>
      <image:title>Figure 7: Illustrates the batch script contained within the malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%284%29.png</image:loc>
      <image:title>Figure 7: Illustrates the batch script contained within the malicious BAT file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%285%29.avif</image:loc>
      <image:title>Figure 8: Depicts the downloaded malicious JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%285%29.webp</image:loc>
      <image:title>Figure 8: Depicts the downloaded malicious JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%285%29.png</image:loc>
      <image:title>Figure 8: Depicts the downloaded malicious JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%286%29.avif</image:loc>
      <image:title>Figure 9: Illustrates the obfuscated contents of the JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%286%29.webp</image:loc>
      <image:title>Figure 9: Illustrates the obfuscated contents of the JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%286%29.png</image:loc>
      <image:title>Figure 9: Illustrates the obfuscated contents of the JS file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%287%29.avif</image:loc>
      <image:title>Figure 10: Illustrates the downloaded malicious PowerShell scripts</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%287%29.webp</image:loc>
      <image:title>Figure 10: Illustrates the downloaded malicious PowerShell scripts</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%287%29.png</image:loc>
      <image:title>Figure 10: Illustrates the downloaded malicious PowerShell scripts</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%288%29.avif</image:loc>
      <image:title>Figure 11: Illustrates the script contained within agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%288%29.webp</image:loc>
      <image:title>Figure 11: Illustrates the script contained within agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%288%29.png</image:loc>
      <image:title>Figure 11: Illustrates the script contained within agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%289%29.avif</image:loc>
      <image:title>Figure 12: Displays the values of variables $c and $f as set by agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%289%29.webp</image:loc>
      <image:title>Figure 12: Displays the values of variables $c and $f as set by agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%289%29.png</image:loc>
      <image:title>Figure 12: Displays the values of variables $c and $f as set by agent1.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2810%29.avif</image:loc>
      <image:title>Figure 13: Illustrates the script contained within agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2810%29.webp</image:loc>
      <image:title>Figure 13: Illustrates the script contained within agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2810%29.png</image:loc>
      <image:title>Figure 13: Illustrates the script contained within agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2811%29.avif</image:loc>
      <image:title>Figure 14: Depicts an endeavor to analyze the shellcode statically</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2811%29.webp</image:loc>
      <image:title>Figure 14: Depicts an endeavor to analyze the shellcode statically</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_17h48_49%20%2811%29.png</image:loc>
      <image:title>Figure 14: Depicts an endeavor to analyze the shellcode statically</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14.avif</image:loc>
      <image:title>Figure 15: Displays the remote executable referenced in agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14.webp</image:loc>
      <image:title>Figure 15: Displays the remote executable referenced in agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14.png</image:loc>
      <image:title>Figure 15: Displays the remote executable referenced in agent3.ps1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%281%29.avif</image:loc>
      <image:title>Figure 16: On the left, the decryption function is highlighted, while on the right, the XOR key is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%281%29.webp</image:loc>
      <image:title>Figure 16: On the left, the decryption function is highlighted, while on the right, the XOR key is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%281%29.png</image:loc>
      <image:title>Figure 16: On the left, the decryption function is highlighted, while on the right, the XOR key is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%282%29.avif</image:loc>
      <image:title>Figure 17: On the left, the decryption function is highlighted, while on the right, the starting point of the encrypted data is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%282%29.webp</image:loc>
      <image:title>Figure 17: On the left, the decryption function is highlighted, while on the right, the starting point of the encrypted data is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%282%29.png</image:loc>
      <image:title>Figure 17: On the left, the decryption function is highlighted, while on the right, the starting point of the encrypted data is highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%283%29.avif</image:loc>
      <image:title>Figure 18: Demonstrates the execution of the Python script against the sample, resulting in the dumping of a clean PE file along with the printed U...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%283%29.webp</image:loc>
      <image:title>Figure 18: Demonstrates the execution of the Python script against the sample, resulting in the dumping of a clean PE file along with the printed U...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%283%29.png</image:loc>
      <image:title>Figure 18: Demonstrates the execution of the Python script against the sample, resulting in the dumping of a clean PE file along with the printed U...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%284%29.avif</image:loc>
      <image:title>Figure 19: Displays the clean PE output generated from the execution of the Python script against the loader binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%284%29.webp</image:loc>
      <image:title>Figure 19: Displays the clean PE output generated from the execution of the Python script against the loader binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%284%29.png</image:loc>
      <image:title>Figure 19: Displays the clean PE output generated from the execution of the Python script against the loader binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%285%29.avif</image:loc>
      <image:title>Figure 20: Displays the download script of two additional payloads, namely sd4.ps1 and sd2.ps1 orchestrated by a PowerShell script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%285%29.webp</image:loc>
      <image:title>Figure 20: Displays the download script of two additional payloads, namely sd4.ps1 and sd2.ps1 orchestrated by a PowerShell script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%285%29.png</image:loc>
      <image:title>Figure 20: Displays the download script of two additional payloads, namely sd4.ps1 and sd2.ps1 orchestrated by a PowerShell script</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%286%29.avif</image:loc>
      <image:title>Figure 21: Illustrates the two final payloads utilized by the malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%286%29.webp</image:loc>
      <image:title>Figure 21: Illustrates the two final payloads utilized by the malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/2024-04-07_23h06_14%20%286%29.png</image:loc>
      <image:title>Figure 21: Illustrates the two final payloads utilized by the malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/malware-analysis-blogs/oyster-backdoor-cleanuploader-malware.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3.avif</image:loc>
      <image:title>oyster image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3.webp</image:loc>
      <image:title>oyster image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal3.jpeg</image:loc>
      <image:title>oyster image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.22.58@2x.avif</image:loc>
      <image:title>Figure 1: Depicts the malicious signed executables, including their icons and the associated signer name</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.22.58@2x.webp</image:loc>
      <image:title>Figure 1: Depicts the malicious signed executables, including their icons and the associated signer name</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.22.58@2x.png</image:loc>
      <image:title>Figure 1: Depicts the malicious signed executables, including their icons and the associated signer name</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/unnamed.avif</image:loc>
      <image:title>Figure 2: An example of a malicious sponsored advertisement on Google Search Credits - MalwareBytes</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/unnamed.webp</image:loc>
      <image:title>Figure 2: An example of a malicious sponsored advertisement on Google Search Credits - MalwareBytes</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/unnamed.png</image:loc>
      <image:title>Figure 2: An example of a malicious sponsored advertisement on Google Search Credits - MalwareBytes</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Figure-1---Fake-Microsoft-Teams-Website.avif</image:loc>
      <image:title>Figure 3: An example of a malicious Teams website Credits - Rapid7</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Figure-1---Fake-Microsoft-Teams-Website.webp</image:loc>
      <image:title>Figure 3: An example of a malicious Teams website Credits - Rapid7</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Figure-1---Fake-Microsoft-Teams-Website.png</image:loc>
      <image:title>Figure 3: An example of a malicious Teams website Credits - Rapid7</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.22.26@2x.avif</image:loc>
      <image:title>Figure 4: Depicts malicious executables I analysed that are associated with the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.22.26@2x.webp</image:loc>
      <image:title>Figure 4: Depicts malicious executables I analysed that are associated with the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.22.26@2x.png</image:loc>
      <image:title>Figure 4: Depicts malicious executables I analysed that are associated with the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.46.00@2x%20%281%29.avif</image:loc>
      <image:title>Figure 5: Depicts all the executables being analysed are signed by the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.46.00@2x%20%281%29.webp</image:loc>
      <image:title>Figure 5: Depicts all the executables being analysed are signed by the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B14.46.00@2x%20%281%29.png</image:loc>
      <image:title>Figure 5: Depicts all the executables being analysed are signed by the same signer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.57.52@2x.avif</image:loc>
      <image:title>Figure 6: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.57.52@2x.webp</image:loc>
      <image:title>Figure 6: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B16.57.52@2x.png</image:loc>
      <image:title>Figure 6: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.40.26@2x.avif</image:loc>
      <image:title>Figure 7: Depicts the decoded C2 IP addresses observed in the Chrome.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.40.26@2x.webp</image:loc>
      <image:title>Figure 7: Depicts the decoded C2 IP addresses observed in the Chrome.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.40.26@2x.png</image:loc>
      <image:title>Figure 7: Depicts the decoded C2 IP addresses observed in the Chrome.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.04.30@2x.avif</image:loc>
      <image:title>Figure 8: Depicts the repeating 0x04 pattern observed in the Teams1.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.04.30@2x.webp</image:loc>
      <image:title>Figure 8: Depicts the repeating 0x04 pattern observed in the Teams1.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.04.30@2x.png</image:loc>
      <image:title>Figure 8: Depicts the repeating 0x04 pattern observed in the Teams1.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.12.52@2x.avif</image:loc>
      <image:title>Figure 9: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.12.52@2x.webp</image:loc>
      <image:title>Figure 9: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.12.52@2x.png</image:loc>
      <image:title>Figure 9: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.21.18@2x.avif</image:loc>
      <image:title>Figure 10: Depicts the repeating 0x95 pattern observed in the Edge.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.21.18@2x.webp</image:loc>
      <image:title>Figure 10: Depicts the repeating 0x95 pattern observed in the Edge.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B17.21.18@2x.png</image:loc>
      <image:title>Figure 10: Depicts the repeating 0x95 pattern observed in the Edge.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.47.53@2x.avif</image:loc>
      <image:title>Figure 11: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.47.53@2x.webp</image:loc>
      <image:title>Figure 11: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.47.53@2x.png</image:loc>
      <image:title>Figure 11: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.54.38@2x.avif</image:loc>
      <image:title>Figure 12: Depicts the repeating 0x81 pattern observed in the Teams3.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.54.38@2x.webp</image:loc>
      <image:title>Figure 12: Depicts the repeating 0x81 pattern observed in the Teams3.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.54.38@2x.png</image:loc>
      <image:title>Figure 12: Depicts the repeating 0x81 pattern observed in the Teams3.exe binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.59.46@2x.avif</image:loc>
      <image:title>Figure 13: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.59.46@2x.webp</image:loc>
      <image:title>Figure 13: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B18.59.46@2x.png</image:loc>
      <image:title>Figure 13: Depicts the C2 IP addresses, DLL names, imported functions, as well as the PowerShell and system reconnaissance commands observed in the...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.28.55@2x.avif</image:loc>
      <image:title>Figure 14: Displays the .rsrc section of the Teams2.exe binary, which contains two resources—one being the legitimate Teams binary and the other a ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.28.55@2x.webp</image:loc>
      <image:title>Figure 14: Displays the .rsrc section of the Teams2.exe binary, which contains two resources—one being the legitimate Teams binary and the other a ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.28.55@2x.png</image:loc>
      <image:title>Figure 14: Displays the .rsrc section of the Teams2.exe binary, which contains two resources—one being the legitimate Teams binary and the other a ...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.23.00@2x.avif</image:loc>
      <image:title>Figure 15: Displays the Microsoft-signed Teams binary on the left and the unsigned backdoor binary details on the right</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.23.00@2x.webp</image:loc>
      <image:title>Figure 15: Displays the Microsoft-signed Teams binary on the left and the unsigned backdoor binary details on the right</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.23.00@2x.png</image:loc>
      <image:title>Figure 15: Displays the Microsoft-signed Teams binary on the left and the unsigned backdoor binary details on the right</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.41.55@2x.avif</image:loc>
      <image:title>Figure 16: Depicts the repeating 0x7F pattern observed in the backdoor binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.41.55@2x.webp</image:loc>
      <image:title>Figure 16: Depicts the repeating 0x7F pattern observed in the backdoor binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.41.55@2x.png</image:loc>
      <image:title>Figure 16: Depicts the repeating 0x7F pattern observed in the backdoor binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.47.03@2x.avif</image:loc>
      <image:title>Figure 17: Depicts the C2 IP addresses, DLL names, imported functions, as well as the system reconnaissance commands observed in the backdoor binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.47.03@2x.webp</image:loc>
      <image:title>Figure 17: Depicts the C2 IP addresses, DLL names, imported functions, as well as the system reconnaissance commands observed in the backdoor binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-09-15%2Bat%2B19.47.03@2x.png</image:loc>
      <image:title>Figure 17: Depicts the C2 IP addresses, DLL names, imported functions, as well as the system reconnaissance commands observed in the backdoor binary</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://binhex.ninja/malware-analysis-blogs/latrodectus-malware.html</loc>
    <lastmod>2025-10-23</lastmod>
    <changefreq>Weekly</changefreq>
    <priority>0.5</priority>
    <image:image>
      <image:loc>https://binhex.ninja/favicons/light_logo.ico</image:loc>
      <image:title>BinHex Favicon</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2.avif</image:loc>
      <image:title>latrodectus image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2.webp</image:loc>
      <image:title>latrodectus image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/mal2.jpg</image:loc>
      <image:title>latrodectus image</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/p1_0.avif</image:loc>
      <image:title>Figure 1: Initial phishing lures utilized by Latrodectus , as depicted on Proofpoint’s blog</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/p1_0.webp</image:loc>
      <image:title>Figure 1: Initial phishing lures utilized by Latrodectus , as depicted on Proofpoint’s blog</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/p1_0.jpg</image:loc>
      <image:title>Figure 1: Initial phishing lures utilized by Latrodectus , as depicted on Proofpoint’s blog</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Screenshot%2B2024-04-04%2Bat%2B12.22.45%2BPM.avif</image:loc>
      <image:title>Figure 2: An example of an email originating from a contact form, featuring a legal threat and a link to the malicious URL, as illustrated in Proof...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Screenshot%2B2024-04-04%2Bat%2B12.22.45%2BPM.webp</image:loc>
      <image:title>Figure 2: An example of an email originating from a contact form, featuring a legal threat and a link to the malicious URL, as illustrated in Proof...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Screenshot%2B2024-04-04%2Bat%2B12.22.45%2BPM.png</image:loc>
      <image:title>Figure 2: An example of an email originating from a contact form, featuring a legal threat and a link to the malicious URL, as illustrated in Proof...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio.avif</image:loc>
      <image:title>Figure 3: Illustrates the latest delivery and execution chain of the Latrodectus malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio.webp</image:loc>
      <image:title>Figure 3: Illustrates the latest delivery and execution chain of the Latrodectus malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/Untitled%2BDiagram.drawio.png</image:loc>
      <image:title>Figure 3: Illustrates the latest delivery and execution chain of the Latrodectus malware</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.42.32@2x.avif</image:loc>
      <image:title>Figure 4: Displays the PDF file included in the email</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.42.32@2x.webp</image:loc>
      <image:title>Figure 4: Displays the PDF file included in the email</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.42.32@2x.png</image:loc>
      <image:title>Figure 4: Displays the PDF file included in the email</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.50.13@2x.avif</image:loc>
      <image:title>Figure 5: Depicts the opened PDF file, showcasing the download banner and highlighting the embedded external link at the bottom left corner</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.50.13@2x.webp</image:loc>
      <image:title>Figure 5: Depicts the opened PDF file, showcasing the download banner and highlighting the embedded external link at the bottom left corner</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-28%2Bat%2B23.50.13@2x.png</image:loc>
      <image:title>Figure 5: Depicts the opened PDF file, showcasing the download banner and highlighting the embedded external link at the bottom left corner</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.07.23@2x.avif</image:loc>
      <image:title>Figure 6: Illustrates the downloaded malicious JavaScript (JS) file on the user's system</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.07.23@2x.webp</image:loc>
      <image:title>Figure 6: Illustrates the downloaded malicious JavaScript (JS) file on the user's system</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.07.23@2x.png</image:loc>
      <image:title>Figure 6: Illustrates the downloaded malicious JavaScript (JS) file on the user's system</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.25.45@2x.avif</image:loc>
      <image:title>Figure 7: Displays the obfuscated JavaScript (JS) file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.25.45@2x.webp</image:loc>
      <image:title>Figure 7: Displays the obfuscated JavaScript (JS) file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B00.25.45@2x.png</image:loc>
      <image:title>Figure 7: Displays the obfuscated JavaScript (JS) file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.17.23@2x.avif</image:loc>
      <image:title>Figure 8: Illustrates sections of the JavaScript (JS) file with uncommented code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.17.23@2x.webp</image:loc>
      <image:title>Figure 8: Illustrates sections of the JavaScript (JS) file with uncommented code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.17.23@2x.png</image:loc>
      <image:title>Figure 8: Illustrates sections of the JavaScript (JS) file with uncommented code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.28.54@2x.avif</image:loc>
      <image:title>Figure 9: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.28.54@2x.webp</image:loc>
      <image:title>Figure 9: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.28.54@2x.png</image:loc>
      <image:title>Figure 9: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.41.26@2x.avif</image:loc>
      <image:title>Figure 10: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.41.26@2x.webp</image:loc>
      <image:title>Figure 10: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B18.41.26@2x.png</image:loc>
      <image:title>Figure 10: Depicts the output from the document after applying the regex</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.08.14@2x.avif</image:loc>
      <image:title>Figure 11: Displays the downloaded MSI file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.08.14@2x.webp</image:loc>
      <image:title>Figure 11: Displays the downloaded MSI file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.08.14@2x.png</image:loc>
      <image:title>Figure 11: Displays the downloaded MSI file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.15.51@2x.avif</image:loc>
      <image:title>Figure 12: Illustrates the command line that will be executed post-installation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.15.51@2x.webp</image:loc>
      <image:title>Figure 12: Illustrates the command line that will be executed post-installation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.15.51@2x.png</image:loc>
      <image:title>Figure 12: Illustrates the command line that will be executed post-installation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.21.09@2x.avif</image:loc>
      <image:title>Figure 13: Displays the contents of the MSI file when opened in 7-Zip</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.21.09@2x.webp</image:loc>
      <image:title>Figure 13: Displays the contents of the MSI file when opened in 7-Zip</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.21.09@2x.png</image:loc>
      <image:title>Figure 13: Displays the contents of the MSI file when opened in 7-Zip</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.27.28@2x.avif</image:loc>
      <image:title>Figure 14: Depicts the files obtained after extracting the selected files from the MSI installer and then further extracting the .cab file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.27.28@2x.webp</image:loc>
      <image:title>Figure 14: Depicts the files obtained after extracting the selected files from the MSI installer and then further extracting the .cab file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.27.28@2x.png</image:loc>
      <image:title>Figure 14: Depicts the files obtained after extracting the selected files from the MSI installer and then further extracting the .cab file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.31.23@2x.avif</image:loc>
      <image:title>Figure 15: Depicts the SHA-256 hash of the Binary.viewer.exe file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.31.23@2x.webp</image:loc>
      <image:title>Figure 15: Depicts the SHA-256 hash of the Binary.viewer.exe file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B19.31.23@2x.png</image:loc>
      <image:title>Figure 15: Depicts the SHA-256 hash of the Binary.viewer.exe file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.10.22@2x.avif</image:loc>
      <image:title>Figure 16: Displays the listing of the homi function in Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.10.22@2x.webp</image:loc>
      <image:title>Figure 16: Displays the listing of the homi function in Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.10.22@2x.png</image:loc>
      <image:title>Figure 16: Displays the listing of the homi function in Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.17.35@2x.avif</image:loc>
      <image:title>Figure 17: Displays the listing of the decryption_function , with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.17.35@2x.webp</image:loc>
      <image:title>Figure 17: Displays the listing of the decryption_function , with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.17.35@2x.png</image:loc>
      <image:title>Figure 17: Displays the listing of the decryption_function , with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.34.46@2x.avif</image:loc>
      <image:title>Figure 18: Illustrates the manually generated loader.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.34.46@2x.webp</image:loc>
      <image:title>Figure 18: Illustrates the manually generated loader.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.34.46@2x.png</image:loc>
      <image:title>Figure 18: Illustrates the manually generated loader.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.38.01@2x.avif</image:loc>
      <image:title>Figure 19: Displays the .rsrc section on the right, highlighting the first byte pointed by the argument, with the argument itself highlighted on th...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.38.01@2x.webp</image:loc>
      <image:title>Figure 19: Displays the .rsrc section on the right, highlighting the first byte pointed by the argument, with the argument itself highlighted on th...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B20.38.01@2x.png</image:loc>
      <image:title>Figure 19: Displays the .rsrc section on the right, highlighting the first byte pointed by the argument, with the argument itself highlighted on th...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.07.26@2x.avif</image:loc>
      <image:title>Figure 20: Illustrates the listing of the loader.bin file, with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.07.26@2x.webp</image:loc>
      <image:title>Figure 20: Illustrates the listing of the loader.bin file, with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.07.26@2x.png</image:loc>
      <image:title>Figure 20: Illustrates the listing of the loader.bin file, with the important aspects of the function highlighted</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.23.55@2x.avif</image:loc>
      <image:title>Figure 21: Displays the output PE file generated by executing the Python code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.23.55@2x.webp</image:loc>
      <image:title>Figure 21: Displays the output PE file generated by executing the Python code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.23.55@2x.png</image:loc>
      <image:title>Figure 21: Displays the output PE file generated by executing the Python code</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.29.36@2x.avif</image:loc>
      <image:title>Figure 22: Illustrates the listing of the _start function in the output binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.29.36@2x.webp</image:loc>
      <image:title>Figure 22: Illustrates the listing of the _start function in the output binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.29.36@2x.png</image:loc>
      <image:title>Figure 22: Illustrates the listing of the _start function in the output binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.33.45@2x.avif</image:loc>
      <image:title>Figure 23: Depicts the PE file present in the data section referenced in the function call</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.33.45@2x.webp</image:loc>
      <image:title>Figure 23: Depicts the PE file present in the data section referenced in the function call</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.33.45@2x.png</image:loc>
      <image:title>Figure 23: Depicts the PE file present in the data section referenced in the function call</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.40.24@2x.avif</image:loc>
      <image:title>Figure 24: Depicts the manually created latro_dumped_1.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.40.24@2x.webp</image:loc>
      <image:title>Figure 24: Depicts the manually created latro_dumped_1.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.40.24@2x.png</image:loc>
      <image:title>Figure 24: Depicts the manually created latro_dumped_1.bin file</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.42.31@2x.avif</image:loc>
      <image:title>Figure 25: Illustrates that no export symbol " scub " was found by Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.42.31@2x.webp</image:loc>
      <image:title>Figure 25: Illustrates that no export symbol " scub " was found by Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.42.31@2x.png</image:loc>
      <image:title>Figure 25: Illustrates that no export symbol " scub " was found by Binary Ninja</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.46.23@2x.avif</image:loc>
      <image:title>Figure 26: Displays the different export function names sharing the same function RVA in PE-Bear</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.46.23@2x.webp</image:loc>
      <image:title>Figure 26: Displays the different export function names sharing the same function RVA in PE-Bear</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.46.23@2x.png</image:loc>
      <image:title>Figure 26: Displays the different export function names sharing the same function RVA in PE-Bear</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.50.32@2x.avif</image:loc>
      <image:title>Figure 27: Illustrates Binary Ninja's listing of the " extra " function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.50.32@2x.webp</image:loc>
      <image:title>Figure 27: Illustrates Binary Ninja's listing of the " extra " function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B22.50.32@2x.png</image:loc>
      <image:title>Figure 27: Illustrates Binary Ninja's listing of the " extra " function</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.13.04@2x.avif</image:loc>
      <image:title>Figure 28: Illustrates the string decryption function in the final Latrodectus binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.13.04@2x.webp</image:loc>
      <image:title>Figure 28: Illustrates the string decryption function in the final Latrodectus binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.13.04@2x.png</image:loc>
      <image:title>Figure 28: Illustrates the string decryption function in the final Latrodectus binary</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.45.50@2x.avif</image:loc>
      <image:title>Figure 29: Displays a listing of some of the decrypted strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.45.50@2x.webp</image:loc>
      <image:title>Figure 29: Displays a listing of some of the decrypted strings</image:title>
    </image:image>
    <image:image>
      <image:loc>https://binhex.ninja/img/CleanShot%2B2024-04-29%2Bat%2B23.45.50@2x.png</image:loc>
      <image:title>Figure 29: Displays a listing of some of the decrypted strings</image:title>
    </image:image>
  </url>
</urlset>