NordVPN
Up to 77% Off NordVPN + 3 Extra Months
Get Deal
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Satyajit Daulaguphu

25 posts
Satyajit Daulaguphu is a Security Researcher at Trellix (Formerly FireEye). He focuses mainly on threat detection, malware research and rules creation.
MMalware Analysis
DLL side loading technique leveraged by Qakbot to carry out its attack
Read More

    How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

    • bySatyajit Daulaguphu
    • November 5, 2022
    QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
    TTech Bytes
    Best Computer for Cyber Security
    Read More

      What Is the Best Computer for Cyber Security? 8 Options

      • bySatyajit Daulaguphu
      • August 23, 2022
      Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
      MMalware Analysis
      PE structure
      Read More

        Mastering PE Structure for Malware Analysis: A Layman’s Guide

        • bySatyajit Daulaguphu
        • August 15, 2022
        In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
        MMalware Analysis
        Malware Persistence mechanisms
        Read More

          11 Critical Malware Persistence Mechanisms You Should Be Familiar With!

          • bySatyajit Daulaguphu
          • April 7, 2022
          In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
          TThreat Lab
          Macro Enabled Doc
          Read More

            How To Quickly Extract Malicious Macros From Maldoc & Triage Incident?

            • bySatyajit Daulaguphu
            • December 10, 2019
            Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an…
            TThreat Lab
            Malware analysis of a WannaCry ransomware sample
            Read More

              Dissecting WannaCry Ransomware to It’s Core – Technical Analysis

              • bySatyajit Daulaguphu
              • November 24, 2019
              Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample.…

              Subscribe to Our Newsletter

              Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

              Tech Zealots
              © 2025. All Rights Reserved.
              • Privacy Policy
              • Cookies Policy
              • Write for Us