Click here to download all references as Bib-File.•
| 2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
| 2023-03-31
⋅
malware.love
⋅
TrueBot Analysis Part III - Capabilities Silence |
| 2023-03-31
⋅
vmware
⋅
Investigating 3CX Desktop Application Attacks: What You Need to Know 3CX Backdoor |
| 2023-03-31
⋅
Blackberry
⋅
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022 3CX Backdoor |
| 2023-03-31
⋅
cyble
⋅
A Comprehensive Analysis of the 3CX Attack 3CX Backdoor |
| 2023-03-31
⋅
Zscaler
⋅
3CX Supply Chain Attack Campaign Campaign Analysis 3CX Backdoor |
| 2023-03-30
⋅
Zscaler
⋅
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3 Formbook |
| 2023-03-30
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: BatLoader BATLOADER Cobalt Strike ISFB SystemBC Vidar |
| 2023-03-30
⋅
hasherezade's 1001 nights
⋅
Magniber ransomware analysis: Tiny Tracer in action Magniber |
| 2023-03-30
⋅
Google
⋅
TAG Bulletin: Q1 2023 |
| 2023-03-29
⋅
Google
⋅
Spyware vendors use 0-days and n-days against popular platforms |
| 2023-03-28
⋅
ThreatMon
⋅
Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon Chinotto |
| 2023-03-28
⋅
ANY.RUN
⋅
LimeRAT Malware Analysis: Extracting the Config LimeRAT |
| 2023-03-25
⋅
Analysis Report of Pinduoduo's Malicious Behaviors |
| 2023-03-24
⋅
Lab52
⋅
Bypassing Qakbot Anti-Analysis QakBot |
| 2023-03-20
⋅
ThreatMon
⋅
Cybergun: Technical Analysis of the Armageddon's Infostealer Pteranodon |
| 2023-03-20
⋅
⋅
Medium s2wlab
⋅
Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking |
| 2023-03-19
⋅
Vawtrak Analysis Vawtrak |
| 2023-03-14
⋅
Viuleeenz
⋅
Dynamic Binary Instrumentation for Malware Analysis Gozi |
| 2023-03-14
⋅
⋅
Secui
⋅
[Threat Analysis] CHM malware targeting North Korea-related corporations |