Click here to download all references as Bib-File.•
2023-01-16
⋅
Medium elis531989
⋅
Dancing With Shellcodes: Analyzing Rhadamanthys Stealer Rhadamanthys |
2022-12-14
⋅
Cybereason
⋅
Royal Rumble: Analysis of Royal Ransomware Royal Ransom |
2022-04-27
⋅
Medium elis531989
⋅
The chronicles of Bumblebee: The Hook, the Bee, and the Trickbot connection BumbleBee TrickBot |
2022-02-16
⋅
Medium elis531989
⋅
Highway to Conti: Analysis of Bazarloader BazarBackdoor |
2021-11-09
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware Cobalt Strike Conti |
2021-09-22
⋅
Cybereason
⋅
Threat Analysis Report: PrintNightmare and Magniber Ransomware Magniber |
2021-09-21
⋅
Medium elis531989
⋅
The Squirrel Strikes Back: Analysis of the newly emerged cobalt-strike loader “SquirrelWaffle” Cobalt Strike Squirrelwaffle |
2021-06-21
⋅
Medium elis531989
⋅
Dissecting and automating Hancitor’s config extraction Hancitor |
2021-05-29
⋅
Twitter (@elisalem9)
⋅
Tweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452 Cobalt Strike |
2021-05-04
⋅
Twitter (@elisalem9)
⋅
Tweet on analysis of N3tw0rm ransomware |
2021-04-19
⋅
Medium elis531989
⋅
Dancing With Shellcodes: Cracking the latest version of Guloader CloudEyE |
2021-04-12
⋅
Twitter (@elisalem9)
⋅
Tweets on QakBot QakBot |
2021-01-19
⋅
Medium elis531989
⋅
Funtastic Packers And Where To Find Them Get2 IcedID QakBot |
2020-11-17
⋅
Cybereason
⋅
CHAES: Novel Malware Targeting Latin American E-Commerce Chaes |
2020-05-28
⋅
Cybereason
⋅
Valak: More than Meets the Eye Valak |
2019-12-11
⋅
Cybereason
⋅
Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware Anchor WIZARD SPIDER |
2019-02-13
⋅
Cybereason
⋅
Astaroth Malware Uses Legitimate OS and Antivirus Processes to Steal Passwords and Personal Data Astaroth |
2019-01-03
⋅
Cybereason
⋅
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack sLoad |