Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-08N1ght-W0lf BlogAbdallah Elshinbary
YARA for config extraction
RedLine Stealer
2022-08-07Malversegreenplan
Config Extractor per DanaBot (PARTE 1)
DanaBot
2022-08-07ResecurityResecurity
LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities
2022-08-07ResecurityResecurity
Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples
2022-08-07forensicitguyTony Lambert
Analyzing .NET Core Single File Samples (DUCKTAIL Case Study)
DUCKTAIL
2022-08-06MalwareBookReportsmuzi
A LOOK BACK AT BAZARLOADER’S DGA
BazarBackdoor
2022-08-05BrandefenseBrandefense
Fancy Bear APT Group
2022-08-05K7 SecuritySaikumaravel
Say NO to Nopyfy!
Nopyfy
2022-08-05360 netlabDaji, suqitian
The DGA family Orchard continues to change, and the new version generates DGA domain names using Bitcoin transaction information
Orchard
2022-08-05360 netlab360 Netlab
A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information
Orchard
2022-08-050xIvanTwitter (@viljoenivan)
LokiBot Analysis
Loki Password Stealer (PWS)
2022-08-04MandiantAlice Revelli, Ben Read, Emiel Haeghebaert, Luke Jenkins
ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
ROADSWEEP
2022-08-04ThreatFabricThreatFabric
Brata - a tale of three families
AmexTroll BRATA Copybara
2022-08-04ThreatFabricThreatFabric
Brata - a tale of three families
AmexTroll Copybara
2022-08-04ZscalerStuti Chaturvedi
X-FILES Stealer Evolution - An Analysis and Comparison Study
X-Files Stealer
2022-08-04Cisco TalosArnaud Zobec, Azim Khodjibaev, Edmund Brumaghin, Matt Thaxton
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns
2022-08-04CloudsekAastha Mittal, Anandeshwar Unnikrishnan
Technical Analysis of Bumblebee Malware Loader
BumbleBee
2022-08-04MandiantMandiant
Advanced Persistent Threats (APTs)
APT1 APT10 APT12 APT14 APT15 APT16 APT17 APT18 APT19 APT2 APT20 APT21 APT22 APT23 APT24 APT27 APT3 APT30 APT31 APT4 APT40 APT5 APT9 Naikon
2022-08-04nccgroupMichael Mathews, RIFT: Research and Intelligence Fusion Team
Top of the Pops: Three common ransomware entry techniques
2022-08-04BlackberryBlackBerry Research & Intelligence Team
North Korean H0lyGh0st Ransomware Has Ties to Global Geopolitics
SiennaBlue SiennaPurple Storm-0530