Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-12Cyber And Ramen blogMike R
Analysis of njRAT PowerPoint Macros
NjRAT
2022-01-12muha2xmadMuhammad Hasan Ali
Unpacking Ramnit malware
Ramnit
2022-01-12Lab52Jagaimo Kawaii
TokyoX: DLL side-loading an unknown artifact (Part 2)
TokyoX
2022-01-12Sentinel LABSAmitai Ben Shushan Ehrlich
Wading Through Muddy Waters | Recent Activity of an Iranian State-Sponsored Threat Actor
PowGoop
2022-01-11BleepingComputerBill Toulas
New SysJoker backdoor targets Windows, macOS, and Linux
SysJoker SysJoker SysJoker
2022-01-11muha2xmadMuhammad Hasan Ali
Unpacking Dridex malware
Dridex
2022-01-11IntezerAvigayil Mechtinger, Nicole Fishbein, Ryan Robinson
New SysJoker Backdoor Targets Windows, Linux, and macOS
SysJoker SysJoker SysJoker
2022-01-10Lab52ml10
TokyoX: DLL side-loading an unknown artifact
TokyoX
2022-01-09forensicitguyTony Lambert
Inspecting a PowerShell Cobalt Strike Beacon
Cobalt Strike
2022-01-09muha2xmadMuhammad Hasan Ali
Unpacking Vmprotect packer
2022-01-08muha2xmadMuhammad Hasan Ali
Unpacking Hancitor malware
Hancitor
2022-01-07muha2xmadMuhammad Hasan Ali
Unpacking Emotet malware part 02
Emotet
2022-01-07Bill Demirkapi's BlogBill Demirkapi
Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit
2022-01-06muha2xmadMuhammad Hasan Ali
Unpacking Emotet malware part 01
Emotet
2022-01-05AhnLabASEC Analysis Team
Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash)
Appleseed Kimsuky PEBBLEDASH
2022-01-04forensicitguyTony Lambert
Extracting Indicators from a Packed Mirai Sample
Mirai
2022-01-04The Cyber Security TimesJohn Greenwood
Purple Fox malware is actively distributed via Telegram Installers
PurpleFox
2022-01-03AhnLabASEC Analysis Team
Distribution of Redline Stealer Disguised as Software Crack
DanaBot RedLine Stealer Vidar
2022-01-02Atomic Matryoshkaz3r0day_504
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer
RedLine Stealer
2022-01-02BleepingComputerLawrence Abrams
Malicious CSV text files used to install BazarBackdoor malware
BazarBackdoor