Click here to download all references as Bib-File.•
2020-11-23
⋅
Medium ryancor
⋅
Genetic Analysis of CryptoWall Ransomware Cryptowall |
2020-11-21
⋅
Medium Intel-Honey
⋅
Reversing Anubis Malware Anubis |
2020-11-15
⋅
⋅
Medium GustavoPalazolo
⋅
RansomEXX — Análise do Ransomware Utilizado no Ataque ao STJ RansomEXX |
2020-11-14
⋅
Medium 0xastrovax
⋅
Deep Dive Into Ryuk Ransomware Hermes Ryuk |
2020-11-12
⋅
Medium Sapphirex00
⋅
Diving into the Sun — SunCrypt: A new neighbour in the ransomware mafia SunCrypt |
2020-10-23
⋅
Medium Horkos
⋅
A Last Clever Knot? |
2020-10-16
⋅
Medium Doublepulsar
⋅
Second Zerologon attacker seen exploiting internet honeypot RemCom |
2020-10-14
⋅
Medium CyCraft
⋅
Taiwan Government Targeted by Multiple Cyberattacks in April 2020 Part 2: Owlproxy Malware Owlproxy |
2020-10-08
⋅
Medium CyCraft
⋅
Taiwan Government Targeted by Multiple Cyberattacks in April 2020 Part 1: Waterbear Malware |
2020-10-03
⋅
Medium vishal_thakur
⋅
Grinju Downloader: Anti-analysis (on steroids) | Part 2 Grinju Downloader |
2020-09-25
⋅
Medium cryptax
⋅
Into Android Meterpreter and how the malware launches it - part 2 Meterpreter |
2020-09-22
⋅
Medium (@vishal_thakur)
⋅
Grinju Downloader Grinju Downloader |
2020-09-18
⋅
Medium cryptax
⋅
Locating the Trojan inside an infected COVID-19 contact tracing app Meterpreter |
2020-09-10
⋅
Medium mariohenkel
⋅
Decrypting NanoCore config and dump all plugins Nanocore RAT |
2020-09-03
⋅
Medium mariohenkel
⋅
Decrypting AgentTesla strings and config Agent Tesla |
2020-08-18
⋅
Medium mariohenkel
⋅
Decrypt MassLogger 2.4.0.0 configuration MASS Logger |
2020-07-28
⋅
Medium (@vishal_thakur)
⋅
LOLSnif Malware LOLSnif |
2020-07-24
⋅
Medium tom_rock
⋅
Fifty Shades of Malware Strings |
2020-07-24
⋅
Medium (@velasco.l.n)
⋅
Exorcist Ransomware - From triaging to deep dive Exorcist |
2020-07-08
⋅
Medium (@sevdraven)
⋅
How to unpack Chinoxy backdoor and decipher the configuration of the backdoor Chinoxy |