Threat Intelligence

Malware analysis, threat reports, and security research by the YonSe team. Each report is a full breakdown: from behavioral analysis to defense recommendations.

0
Reports
0
Threats Analyzed
0
IOC Extracted

Security Reports

Public threat analysis reports. Severity indicates the risk level for the end user.

8.0
Critical
2026-03-24 · IR-2026-0324-003
MAX Messenger — Privacy & Security Analysis [PRELIMINARY]

State-affiliated Russian messenger with clipboard monitoring, root detection, 14 dangerous permissions, dynamic code loading, untrusted code signing. Crashes on Android 15, refuses to run on GrapheneOS. Report incomplete — reverse engineering in progress.

collection credential access defense evasion persistence state-affiliated
7.0
High
2026-03-24 · IR-2026-0324-002
ERMAKOB.exe & Twoofthem.exe — Dropper with Process Injection

Unsigned 46 MB dropper that extracts payloads into %TEMP%\Barebones\, plays a distraction video via mpv, injects into system processes via WriteProcessMemory, and uses 40s timeout delay for sandbox evasion.

defense evasion process injection discovery dropper
8.0
Critical
2026-03-24 · IR-2026-0324-004
Telega Messenger — MITM Attack on Telegram

Unofficial Telegram client with built-in Man-in-the-Middle proxy, rogue RSA key injection, disabled PFS, suppressed secret chats, and government censorship infrastructure (RKN). All traffic interceptable.

MITM spyware RSA key injection PFS disabled censorship
9.2
Critical
2026-03-23 · IR-2026-0323-001
VEGAS.rar — Trojanized Pirated Installer

Multi-component trojan with ransomware capabilities disguised as a MAGIX VEGAS Pro 23 crack. DLL sideloading, 3 persistence mechanisms, injection into 40+ processes, certificate store tampering.

ransomware trojan.dropper privilege escalation persistence x3 dll sideloading anti-analysis

Dangerous Sites

View all
rsload.net
Trojan + Ransomware confirmed
9.2/10
telega.me
Spyware + MITM confirmed
8.0/10

What We Do

Malware Analysis

Dynamic and static malware analysis in isolated sandboxes. Full behavioral breakdown with IOC extraction.

Threat Intelligence

Threat source research, attribution, MITRE ATT&CK mapping. Tracking tactics and techniques of active threat groups.

Public Reports

We publish detailed reports publicly so that users and organizations can assess the real risks of popular threats.

Request a File Check

Have a suspicious file? Send it to us for analysis. Reach out via Telegram or Matrix — we'll take a look.