Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-06Lukáš Štefanko, MalwareHunterTeam
Tweets on Basbanke
Basbanke
2020-07-06Cisco TalosArnaud Zobec, Ben Baker, Edmund Brumaghin, JJ Cummings
WastedLocker Goes "Big-Game Hunting" in 2020
WastedLocker
2020-07-01FortinetBen Hunter, Fred Gutierrez
EKANS Ransomware Targeting OT ICS Systems
Snake
2020-06-22FindingBad BlogspotJack Crook
Dynamic Correlation, ML and Hunting
2020-06-18Medium Huntress LabsJohn Ferrell
Hiding In Plain Sight
2020-06-17Twitter (@VK_intel)malwrhunterteam, Vitali Kremez
Tweet on signed Tinymet payload (V.02) used by TA505
TinyMet
2020-06-09MicrosoftRob Mead, Tom McElroy
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection
2020-06-08SentinelOnePhil Stokes
A Guide to macOS Threat Hunting and Incident Response
2020-06-02Pwntario BlogAnton
Hunting Malicious Macros
2020-05-26Youtube (GRIMM Cyber)Konstantin Klinger
Passive DNS for Threat Detection & Hunting (Discussing some infrastructure related to APT32)
METALJACK
2020-05-25ElasticBrent Murphy, David French, Jamie Butler
The Elastic Guide to Threat Hunting
2020-05-15SentinelOnePhil Stokes
A Guide to macOS Threat Hunting and Incident Response
2020-04-15Twitter (MalwareHunterTeam)MalwareHunterTeam
Tweet on SpyMax sample
SpyMax
2020-04-14IntrinsecJean Bichet
Deobfuscating and hunting for OSTAP, Trickbot’s dropper and best friend
ostap TrickBot
2020-04-13Twitter (MalwareHunterTeam)MalwareHunterTeam
Tweet on XploitSPY
XploitSPY
2020-02-11Twitter (@malwrhunterteam)MalwareHunterTeam
Tweet on Parallax RAT
Parallax RAT
2020-01-27Palo Alto Networks Unit 42Brittany Barbehenn, Robert Falcone
xHunt Campaign: New Watering Hole Identified for Credential Harvesting
2020-01-24ReversingLabsRobert Simmons
Hunting for Ransomware
Ryuk
2020-01-09Twitter (@malwrhunterteam)malwrhunterteam
Tweet on BitPyLock
BitPyLock
2020-01-04Medium d-hunterDoron Karmi
A Look Into Konni 2019 Campaign
Konni