Click here to download all references as Bib-File.•
2023-04-13
⋅
GOV.PL
⋅
QUARTERRIG - Malware Analysis Report QUARTERRIG |
2023-04-13
⋅
GOV.PL
⋅
SNOWYAMBER - Malware Analysis Report GraphicalNeutrino |
2023-04-13
⋅
Google
⋅
Continuing our work to hold cybercriminal ecosystems accountable CryptBot |
2023-04-13
⋅
d01a
⋅
Aurora Stealer deep dive Analysis Aurora Stealer |
2023-04-10
⋅
Twitter (@embee_research)
⋅
Redline Stealer - Static Analysis and C2 Extraction Amadey RedLine Stealer |
2023-04-10
⋅
Sequretek
⋅
Kutaki Stealer - Analysis Kutaki |
2023-04-09
⋅
LianSecurity
⋅
Nexus Android Trojan Analysis Report Nexus S.O.V.A. |
2023-04-05
⋅
Google
⋅
How we’re protecting users from government-backed attacks from North Korea BabyShark |
2023-04-05
⋅
Medium Ilandu
⋅
PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-04-04
⋅
Cisco Talos
⋅
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities Typhon Stealer |
2023-04-03
⋅
Trellix
⋅
A Royal Analysis of Royal Ransom Royal Ransom |
2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
2023-03-31
⋅
malware.love
⋅
TrueBot Analysis Part III - Capabilities Silence |
2023-03-31
⋅
vmware
⋅
Investigating 3CX Desktop Application Attacks: What You Need to Know 3CX Backdoor |
2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
2023-03-31
⋅
cyble
⋅
A Comprehensive Analysis of the 3CX Attack 3CX Backdoor |
2023-03-31
⋅
Zscaler
⋅
3CX Supply Chain Attack Campaign Campaign Analysis 3CX Backdoor |
2023-03-30
⋅
Zscaler
⋅
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3 Formbook |
2023-03-30
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: BatLoader BATLOADER Cobalt Strike ISFB SystemBC Vidar |
2023-03-30
⋅
hasherezade's 1001 nights
⋅
Magniber ransomware analysis: Tiny Tracer in action Magniber |