Click here to download all references as Bib-File.
2023-05-19 ⋅ Twitter (@embee_research) ⋅ Analysis of Amadey Bot Infrastructure Using Shodan Amadey |
2023-05-18 ⋅ Twitter (@embee_research) ⋅ Identifying Laplas Infrastructure Using Shodan and Censys LaplasClipper |
2023-05-07 ⋅ Twitter (@embee_research) ⋅ AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints Agent Tesla |
2023-04-10 ⋅ Twitter (@embee_research) ⋅ Redline Stealer - Static Analysis and C2 Extraction Amadey RedLine Stealer |
2023-04-08 ⋅ Twitter (@embee_research) ⋅ Dcrat - Manual De-obfuscation of .NET Malware DCRat |
2022-11-14 ⋅ Twitter (@embee_research) ⋅ Twitter thread on Yara Signatures for Qakbot Encryption Routines IcedID QakBot |
2022-10-12 ⋅ Twitter (@embee_research) ⋅ Tweets on detection of Brute Ratel via API Hashes Brute Ratel C4 |
2022-10-11 ⋅ Twitter (@embee_research) ⋅ Tweet on Havoc C2 - Static Detection Via Ntdll API Hashes Havoc |