Click here to download all references as Bib-File.•
2023-07-04
⋅
Russian Panda Research Blog
⋅
Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer WhiteSnake Stealer |
2023-06-29
⋅
Disk Knight Worm Analysis Disk Knight |
2023-06-24
⋅
Twitter (@embee_research)
⋅
SmokeLoader - Malware Analysis and Decoding With Procmon SmokeLoader |
2023-06-22
⋅
ANY.RUN
⋅
Malware Analysis Gh0stBins, Chinese RAT: Malware Analysis, Protocol Description, RDP Stream Recovery Gh0stBins |
2023-06-15
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: Resident Campaign Cobalt Strike Resident Rhadamanthys WarmCookie |
2023-06-15
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: Aurora Stealer Aurora Stealer |
2023-06-15
⋅
Github (cocomelonc)
⋅
Malware analysis report: Babuk ransomware Babuk |
2023-06-08
⋅
⋅
AhnLab
⋅
Lazarus Group exploiting vulnerabilities in domestic financial security solutions LazarDoor LazarLoader |
2023-06-07
⋅
darksys0x
⋅
Analysis and Reversing of srvnet2.sys LIONTAIL |
2023-06-06
⋅
Apophis133
⋅
RedLine Technical Analysis Report RedLine Stealer |
2023-06-05
⋅
Malware Traffic Analysis
⋅
30 DAYS OF FORMBOOK: DAY 1, MONDAY 2023-06-05 Formbook |
2023-06-03
⋅
Zscaler
⋅
Technical Analysis of Bandit Stealer Bandit Stealer |
2023-06-02
⋅
MSSP Lab
⋅
Malware analysis report: SNOWYAMBER (+APT29 related malwares) GraphicalNeutrino |
2023-06-01
⋅
Infinitum IT
⋅
BlackCat Ransomware Analysis Report (Paywall) BlackCat |
2023-06-01
⋅
K7 Security
⋅
Encrypted Chaos: Analysis of Crytox Ransomware Crytox |
2023-05-29
⋅
BlackLotus stage 2 bootkit-rootkit analysis BlackLotus |
2023-05-24
⋅
BushidoToken Blog
⋅
Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz 8Base |
2023-05-24
⋅
Zscaler
⋅
Technical Analysis of Pikabot Pikabot |
2023-05-23
⋅
Cert-AgID
⋅
Technical analysis and considerations on Strela malware StrelaStealer |
2023-05-19
⋅
Twitter (@embee_research)
⋅
Analysis of Amadey Bot Infrastructure Using Shodan Amadey |