Click here to download all references as Bib-File.•
2023-04-09
⋅
LianSecurity
⋅
Nexus Android Trojan Analysis Report Nexus S.O.V.A. |
2023-04-09
⋅
LummaC2 BreakDown Lumma Stealer |
2023-04-08
⋅
Twitter (@embee_research)
⋅
Dcrat - Manual De-obfuscation of .NET Malware DCRat |
2023-04-08
⋅
Team Cymru
⋅
Deriving Insight from Threat Actor Infrastructure Raccoon |
2023-04-08
⋅
cocomelonc
⋅
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example. |
2023-04-08
⋅
kienmanowar Blog
⋅
[QuickNote] Uncovering Suspected Malware Distributed By Individuals from Vietnam AsyncRAT DCRat WorldWind |
2023-04-07
⋅
Elastic
⋅
Attack chain leads to XWORM and AGENTTESLA Agent Tesla XWorm |
2023-04-07
⋅
Microsoft
⋅
MERCURY and DEV-1084: Destructive attack on hybrid environment DarkBit Storm-1084 |
2023-04-06
⋅
OALabs
⋅
PhotoLoader ICEDID PhotoLoader |
2023-04-06
⋅
Spamhaus
⋅
Neutralizing Tofsee Spambot – Part 3 | Network-based kill switch Tofsee |
2023-04-06
⋅
Spamhaus
⋅
Neutralizing Tofsee Spambot – Part 2 | InMemoryConfig store vaccine Tofsee |
2023-04-06
⋅
Spamhaus
⋅
Neutralizing Tofsee Spambot – Part 1 | Binary file vaccine Tofsee |
2023-04-05
⋅
Google
⋅
How we’re protecting users from government-backed attacks from North Korea BabyShark |
2023-04-05
⋅
velociraptor
⋅
Automating Qakbot Decode At Scale QakBot |
2023-04-05
⋅
Outpost24
⋅
Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing Lumma Stealer |
2023-04-05
⋅
Medium Ilandu
⋅
PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-04-04
⋅
Team Cymru
⋅
A Blog with NoName Dosia |
2023-04-04
⋅
Symantec
⋅
Mantis: New Tooling Used in Attacks Against Palestinian Targets Arid Gopher Micropsia |
2023-04-04
⋅
Group-IB
⋅
The old way: BabLock, new ransomware quietly cruising around Europe, Middle East, and Asia Rorschach Ransomware |
2023-04-04
⋅
Cisco Talos
⋅
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities Typhon Stealer |