Click here to download all references as Bib-File.•
2022-12-01
⋅
SentinelOne
⋅
The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques Metador |
2022-12-01
⋅
Malware Analysis and Triage Report : PirateStealer - Discord_beta.exe PirateStealer |
2022-12-01
⋅
Zscaler
⋅
Back in Black... Basta - Technical Analysis of BlackBasta Ransomware 2.0 Black Basta |
2022-11-30
⋅
SentinelOne
⋅
RansomEXX Ransomware: In-Depth Analysis, Detection, and Mitigation RansomEXX RansomEXX |
2022-11-30
⋅
⋅
Qianxin Threat Intelligence Center
⋅
Analysis of APT29's attack activities against Italy Unidentified 098 (APT29 Slack Downloader) |
2022-11-29
⋅
⋅
Qianxin
⋅
Job hunting trap: Analysis of Lazarus attack activities using recruitment information such as Mizuho Bank of Japan as bait CageyChameleon Cur1Downloader |
2022-11-29
⋅
IBM X-Force Exchange
⋅
CargoBay BlackHat Backdoor Analysis Report (IRIS-14738) CargoBay |
2022-11-27
⋅
SecurityScorecard
⋅
A Technical Analysis of Royal Ransomware Royal Ransom |
2022-11-25
⋅
ThreatBook
⋅
Analysis of APT-C-60 Attack on South Korea Unidentified 100 (APT-Q-12) |
2022-11-24
⋅
ExploitReversing
⋅
Malware Analysis Series (MAS): Article 6 Ave Maria |
2022-11-21
⋅
vmware
⋅
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA) Dacls |
2022-11-21
⋅
BSides Sydney
⋅
X-Ray of Malware Evasion Techniques - Analysis, Dissection, Cure? Emotet |
2022-11-16
⋅
splunk
⋅
Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis Agent Tesla |
2022-11-07
⋅
ThreatMon
⋅
Arkei Staler Analysis Arkei Stealer |
2022-11-06
⋅
LMNTRIX
⋅
Analysis Of Netwire RAT NetWire RC |
2022-11-05
⋅
cocomelonc
⋅
Malware analysis: part 6. Shannon entropy. Simple python script. |
2022-11-03
⋅
ANY.RUN
⋅
What is Orcus RAT? Technical Analysis and Malware Configuration Orcus RAT |
2022-11-03
⋅
paloalto Netoworks: Unit42
⋅
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild Cobalt Strike |
2022-10-31
⋅
Cyber Geeks
⋅
A Technical Analysis of Pegasus for Android - Part 3 Chrysaor |
2022-10-27
⋅
vmware
⋅
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad) ShadowPad |