Click here to download all references as Bib-File.
2022-08-03 ⋅ 0ffset Blog ⋅ Reversing Golang Developed Ransomware: SNAKE Snake |
2022-05-27 ⋅ 0ffset Blog ⋅ BAZARLOADER: Analysing The Main Loader BazarBackdoor |
2022-04-19 ⋅ 0ffset Blog ⋅ BAZARLOADER: Unpacking An ISO File Infection BazarBackdoor |
2022-02-15 ⋅ 0ffset Blog ⋅ MATANBUCHUS: Another Loader As A Service Malware Matanbuchus |
2021-12-31 ⋅ 0ffset Blog ⋅ HANCITOR: Analysing The Main Loader Hancitor |
2021-11-23 ⋅ 0ffset Blog ⋅ HANCITOR: Analysing The Malicious Document Hancitor |
2021-10-26 ⋅ 0ffset Blog ⋅ DRIDEX: Analysing API Obfuscation Through VEH DoppelDridex |
2021-10-08 ⋅ 0ffset Blog ⋅ SQUIRRELWAFFLE – Analysing The Main Loader Cobalt Strike Squirrelwaffle |
2021-10-01 ⋅ 0ffset Blog ⋅ SQUIRRELWAFFLE – Analysing the Custom Packer Cobalt Strike Squirrelwaffle |
2021-07-24 ⋅ 0ffset Blog ⋅ Quack Quack: Analysing Qakbot’s Browser Hooking Module – Part 1 QakBot |
2021-07-06 ⋅ 0ffset Blog ⋅ New TA402/MOLERATS Malware – Decrypting .NET Reactor Strings SharpStage |
2019-07-08 ⋅ 0ffset Blog ⋅ Analyzing KSL0T (Turla’s Keylogger), Part 1 – Reupload KSL0T |
2019-07-08 ⋅ 0ffset Blog ⋅ Analyzing KSL0T (Turla’s Keylogger), Part 2 – Reupload KSL0T |
2019-05-25 ⋅ 0ffset Blog ⋅ Analyzing ISFB – The Second Loader ISFB |
2019-03-13 ⋅ 0ffset Blog ⋅ Analysing ISFB – The First Loader ISFB |
2019-02-05 ⋅ 0ffset Blog ⋅ Revisiting Hancitor in Depth |
2019-01-15 ⋅ 0ffset Blog ⋅ Analyzing COMmunication in Malware ISFB |