Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-04-03Youtube (MalwareAnalysisForHedgehogs)Karsten Hahn
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja
3CX Backdoor
2023-03-31malware.loveRobert Giczewski
TrueBot Analysis Part III - Capabilities
Silence
2023-03-31vmwareThreat Analysis Unit
Investigating 3CX Desktop Application Attacks: What You Need to Know
3CX Backdoor
2023-03-31BlackberryThe BlackBerry Research & Intelligence Team
Initial Implants and Network Analysis Suggest the 3CX Supply Chain Operation Goes Back to Fall 2022
3CX Backdoor
2023-03-31cybleCyble
A Comprehensive Analysis of the 3CX Attack
3CX Backdoor
2023-03-31ZscalerMeghraj Nandanwar, Niraj Shivtarkar, Rohit Hegde
3CX Supply Chain Attack Campaign Campaign Analysis
3CX Backdoor
2023-03-30ZscalerBrett Stone-Gross, Javier Vicente, Nikolaos Pantazopoulos
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3
Formbook
2023-03-30eSentireeSentire Threat Response Unit (TRU)
eSentire Threat Intelligence Malware Analysis: BatLoader
BATLOADER Cobalt Strike ISFB SystemBC Vidar
2023-03-30hasherezade's 1001 nightshasherezade
Magniber ransomware analysis: Tiny Tracer in action
Magniber
2023-03-30GoogleGoogle Threat Analysis Group, Shane Huntley
TAG Bulletin: Q1 2023
2023-03-29GoogleClement Lecigne, Google Threat Analysis Group
Spyware vendors use 0-days and n-days against popular platforms
2023-03-28ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon
Chinotto
2023-03-28ANY.RUNANY.RUN
LimeRAT Malware Analysis: Extracting the Config
LimeRAT
2023-03-25davincifans101
Analysis Report of Pinduoduo's Malicious Behaviors
2023-03-24Lab52peko
Bypassing Qakbot Anti-Analysis
QakBot
2023-03-20ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Cybergun: Technical Analysis of the Armageddon's Infostealer
Pteranodon
2023-03-20Medium s2wlabHOTSAUCE, S2W TALON
Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking
2023-03-19Ilan Duhin
Vawtrak Analysis
Vawtrak
2023-03-14ViuleeenzAlessandro Strino
Dynamic Binary Instrumentation for Malware Analysis
Gozi
2023-03-14SecuiSTIC
[Threat Analysis] CHM malware targeting North Korea-related corporations