Click here to download all references as Bib-File.•
| 2024-03-01
⋅
HarfangLab
⋅
A Comprehensive Analysis of i-SOON’s Commercial Offering ShadowPad Winnti |
| 2024-03-01
⋅
Medium b.magnezi
⋅
Malware Analysis - Cobalt Strike Cobalt Strike |
| 2024-02-29
⋅
YouTube (Kaspersky Tech)
⋅
Unleashing the Secrets:A Full Analysis for the Complex LODEINFO v0.7.1 LODEINFO |
| 2024-02-28
⋅
EchoCTI
⋅
Raccoon Stealer V2.0 Technical Analysis Raccoon |
| 2024-02-27
⋅
splunk
⋅
Unveiling Phemedrone Stealer: Threat Analysis and Detections Phemedrone Stealer |
| 2024-02-26
⋅
cyber5w
⋅
Pikabot Loader Detailed Analysis Pikabot |
| 2024-02-22
⋅
Medium b.magnezi
⋅
Malware Analysis - XWorm XWorm |
| 2024-02-21
⋅
Invoke RE
⋅
Automating Qakbot Malware Analysis with Binary Ninja QakBot |
| 2024-02-21
⋅
Medium b.magnezi
⋅
Malware Analysis — Remcos RAT Remcos |
| 2024-02-20
⋅
YouTube (Embee Research)
⋅
StealC Loader Analysis - Decoding Powershell Malware With CyberChef Stealc |
| 2024-02-19
⋅
AhnLab
⋅
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant) Nood RAT |
| 2024-02-19
⋅
Cyber Geeks
⋅
A Technical Analysis of the BackMyData Ransomware Used to Attack Hospitals in Romania Phobos |
| 2024-02-16
⋅
Medium b.magnezi
⋅
Malware Analysis — AgentTesla Agent Tesla |
| 2024-02-08
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike |
| 2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
| 2024-02-01
⋅
⋅
Infinitum IT
⋅
DcRat Technical Analysis Report (Paywall) DCRat |
| 2024-02-01
⋅
YouTube (Embee Research)
⋅
Xworm Malware Analysis - Unravelling Multi-stage Malware with CyberChef and DnSpy XWorm |
| 2024-02-01
⋅
Securonix
⋅
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor SUBTLE-PAWS |
| 2024-01-31
⋅
Stairwell
⋅
Technical analysis: The silent torrent of VileRAT VileRAT EVILNUM |
| 2024-01-29
⋅
hacked.codes
⋅
Technical analysis of WinRAR zero-day malware and C2 protocol emulation |