Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-04Russian Panda Research BlogRussianPanda
Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer
WhiteSnake Stealer
2023-06-29Luca D'Amico
Disk Knight Worm Analysis
Disk Knight
2023-06-24Twitter (@embee_research)Embee_research
SmokeLoader - Malware Analysis and Decoding With Procmon
SmokeLoader
2023-06-22ANY.RUNANY.RUN
Malware Analysis Gh0stBins, Chinese RAT: Malware Analysis, Protocol Description, RDP Stream Recovery
Gh0stBins
2023-06-15eSentireRussianPanda
eSentire Threat Intelligence Malware Analysis: Resident Campaign
Cobalt Strike Resident Rhadamanthys WarmCookie
2023-06-15eSentireRussianPanda
eSentire Threat Intelligence Malware Analysis: Aurora Stealer
Aurora Stealer
2023-06-15Github (cocomelonc)cocomelonc
Malware analysis report: Babuk ransomware
Babuk
2023-06-08AhnLabASEC Analysis Team
Lazarus Group exploiting vulnerabilities in domestic financial security solutions
LazarDoor LazarLoader
2023-06-07darksys0xdarksys0x
Analysis and Reversing of srvnet2.sys
LIONTAIL
2023-06-06Apophis133Michelle Khalil
RedLine Technical Analysis Report
RedLine Stealer
2023-06-05Malware Traffic AnalysisBrad Duncan
30 DAYS OF FORMBOOK: DAY 1, MONDAY 2023-06-05
Formbook
2023-06-03ZscalerMallikarjun Piddannavar
Technical Analysis of Bandit Stealer
Bandit Stealer
2023-06-02MSSP Labcocomelonc
Malware analysis report: SNOWYAMBER (+APT29 related malwares)
GraphicalNeutrino
2023-06-01Infinitum ITKerime Gencay
BlackCat Ransomware Analysis Report (Paywall)
BlackCat
2023-06-01K7 SecurityRahul R
Encrypted Chaos: Analysis of Crytox Ransomware
Crytox
2023-05-29kn0s-organization
BlackLotus stage 2 bootkit-rootkit analysis
BlackLotus
2023-05-24BushidoToken BlogBushidoToken
Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz
8Base
2023-05-24ZscalerBrett Stone-Gross, Nikolaos Pantazopoulos
Technical Analysis of Pikabot
Pikabot
2023-05-23Cert-AgIDCert-AgID
Technical analysis and considerations on Strela malware
StrelaStealer
2023-05-19Twitter (@embee_research)Embee_research
Analysis of Amadey Bot Infrastructure Using Shodan
Amadey