Saptarshi Laha

Saptarshi Laha

Security Researcher ・ Malware Analyst ・ Reverse Engineer ・ Hardware Hacker

I am a Threat Intelligence Analyst based in Ireland, specializing in Reverse Engineering, Malware Analysis, and Windows Kernel Driver Development. I focus on dissecting advanced malware and conducting low-level security research, particularly on kernel-level threats. I actively participate in Reverse Engineering CTFs and undertake Hardware Hacking challenges to continually hone my skills.

Skills

Reverse Engineering

🐛

Malware Analysis

⚙️

Driver Development

🐍

Python Programming

©️

C Programming

💾

x86-64 Assembly Programming

🔧

Hardware Hacking

Experience

2025 - Present

Security Analyst (DIR)

Squarespace Ltd. • Squarespace House, Dublin, Ireland

2025 - 2025

Cyber Threat Intelligence Analyst

Bank of Ireland • Baggot Plaza, Dublin, Ireland

2023 - 2025

Threat Intelligence Analyst

eSentire Inc. • Ballincollig, Cork, Ireland

2022 - 2023

Senior SOC Analyst

eSentire Inc. • Ballincollig, Cork, Ireland

2021 - 2022

SOC Analyst I

eSentire Inc. • Ballincollig, Cork, Ireland

Recent Posts

Malware Analysis And CTF Writeups

Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed

Breaking the Base: AMOS Stealer’s Custom Base64 Secrets Exposed

AMOS Stealer (also known as Atomic Stealer) is a sophisticated malware targeting macOS systems. It utilizes advanced encoding/encryption schemes to obfuscate its activities and evade detection. This analysis covers the malware’s C2 communication protocols, detection strategies, and one of the key encoding/encryption methods it employs. This is just one of several active encoding and encryption techniques used by AMOS currently, which contribute to its ongoing effectiveness in avoiding security measures and compromising systems. Understanding these tactics is crucial for enhancing defenses against this evolving threat.

Read More →
Shell Shocked: The Oyster Backdoor Update

Shell Shocked: The Oyster Backdoor Update

In September 2024, a new version of the Oyster Backdoor, also known as CleanUpLoader, was discovered. It spread through fake software downloads via ads on search engines, posing as legitimate applications like Teams, Edge, and Chrome. The malware was linked to a specific company issuing certificates and showed similarities to earlier Oyster campaigns.

Read More →
Latrodectus: Unweaving the Web

Latrodectus: Unweaving the Web

Unlock the secrets of Latrodectus, a cutting-edge loader malware shaking up the cybersecurity world. Explore its evolving delivery tactics, payload execution, and decryption strategies in a detailed analysis. Delve into the inner workings of this sophisticated threat and uncover its hidden complexities.

Read More →
Koi Loader/Stealer: Part 1

Koi Loader/Stealer: Part 1

Part 1 of the overview and analysis of the Koi Loader/Koi Stealer campaign will specifically delve into the initial delivery and loading mechanism. This section will detail the infection chain, behavior of various components, and functionalities of the associated malware. The purpose and function of each script and payload involved in the campaign, such as the batch script, JavaScript file, and PowerShell scripts, will be covered.

Read More →
Zero Days CTF (2024) RE - 5

Zero Days CTF (2024) RE - 5

In this final challenge of ZeroDays CTF 2024, participants are presented with a captivating reverse engineering task encapsulated in the 'the_kings_secret.zip' challenge. As we embark on this journey, we navigate through the provided ZIP file, unraveling its intricacies to uncover hidden insights and solutions. Join us as we delve into the depths of reverse engineering, exploring the complexities of executable analysis and decryption techniques to unlock the secrets concealed within.

Read More →
Zero Days CTF (2024) RE - 4

Zero Days CTF (2024) RE - 4

Dive into the intriguing world of binary analysis with the fourth challenge, 'acup.exe'. Discover the secrets hidden within this packed executable file, as we unravel its obfuscated code and delve into its cryptographic algorithms. Through meticulous examination, we uncover the ingenious methods employed to conceal its true purpose. However, the journey doesn't end there - further exploration reveals the key to decrypting the flag, awaiting those who dare to venture into the depths of its intricacies.

Read More →