SYMBOLCOMMON_NAMEaka. SYNONYMS
win.rozena (Back to overview)

Rozena


There is no description at this point.

References
2022-07-11Soc InvestigationBalaGanesh
@online{balaganesh:20220711:threat:3847e38, author = {BalaGanesh}, title = {{Threat Actors Delivers New Rozena backdoor with Follina Bug – Detection & Response}}, date = {2022-07-11}, organization = {Soc Investigation}, url = {https://www.socinvestigation.com/threat-actors-delivers-new-rozena-backdoor-with-follina-bug-detection-response/}, language = {English}, urldate = {2022-07-12} } Threat Actors Delivers New Rozena backdoor with Follina Bug – Detection & Response
Rozena
2022-07-06FortinetCara Lin
@online{lin:20220706:from:1196ee3, author = {Cara Lin}, title = {{From Follina to Rozena - Leveraging Discord to Distribute a Backdoor}}, date = {2022-07-06}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/follina-rozena-leveraging-discord-to-distribute-a-backdoor}, language = {English}, urldate = {2022-07-12} } From Follina to Rozena - Leveraging Discord to Distribute a Backdoor
Rozena
2019-07-16G DataG DATA Security Lab
@online{lab:20190716:analysis:26c4f96, author = {G DATA Security Lab}, title = {{Analysis: Server-side polymorphism & PowerShell backdoors}}, date = {2019-07-16}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2019/07/35061-server-side-polymorphism-powershell-backdoors}, language = {English}, urldate = {2022-03-31} } Analysis: Server-side polymorphism & PowerShell backdoors
Rozena
2018-06-29G DataG-Data
@online{gdata:20180629:where:6b57825, author = {G-Data}, title = {{Where we go, we don't need files: Analysis of fileless malware "Rozena"}}, date = {2018-06-29}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2018/06/30862-fileless-malware-rozena}, language = {English}, urldate = {2020-01-13} } Where we go, we don't need files: Analysis of fileless malware "Rozena"
Rozena

There is no Yara-Signature yet.