Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-08Medium CSIS TechblogBenoît Ancel
An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure
Riltok magecart Anubis Azorult BetaBot Buer CoalaBot CryptBot DiamondFox DreamBot GCleaner ISFB Loki Password Stealer (PWS) MedusaLocker MeguminTrojan Nemty PsiX RedLine Stealer SmokeLoader STOP TinyNuke Vidar Zloader
2022-08-08AccidentalRebelKarlo Licudine
Malware sandbox evasion in x64 assembly by checking ram size - Part 1
2022-08-08KasperskyKaspersky Lab ICS CERT
Targeted attack on industrial enterprises and public institutions
Cotx RAT Logtu nccTrojan PortDoor
2022-08-08The DFIR ReportThe DFIR Report
BumbleBee Roasts Its Way to Domain Admin
BumbleBee Cobalt Strike
2022-08-08N1ght-W0lf BlogAbdallah Elshinbary
YARA for config extraction
RedLine Stealer
2022-08-07Malversegreenplan
Config Extractor per DanaBot (PARTE 1)
DanaBot
2022-08-07ResecurityResecurity
LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities
2022-08-07ResecurityResecurity
Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples
2022-08-07forensicitguyTony Lambert
Analyzing .NET Core Single File Samples (DUCKTAIL Case Study)
DUCKTAIL
2022-08-06MalwareBookReportsmuzi
A LOOK BACK AT BAZARLOADER’S DGA
BazarBackdoor
2022-08-05BrandefenseBrandefense
Fancy Bear APT Group
2022-08-05K7 SecuritySaikumaravel
Say NO to Nopyfy!
Nopyfy
2022-08-05360 netlabDaji, suqitian
The DGA family Orchard continues to change, and the new version generates DGA domain names using Bitcoin transaction information
Orchard
2022-08-05360 netlab360 Netlab
A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information
Orchard
2022-08-050xIvanTwitter (@viljoenivan)
LokiBot Analysis
Loki Password Stealer (PWS)
2022-08-04MandiantAlice Revelli, Ben Read, Emiel Haeghebaert, Luke Jenkins
ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations
ROADSWEEP
2022-08-04ThreatFabricThreatFabric
Brata - a tale of three families
AmexTroll BRATA Copybara
2022-08-04ThreatFabricThreatFabric
Brata - a tale of three families
AmexTroll Copybara
2022-08-04ZscalerStuti Chaturvedi
X-FILES Stealer Evolution - An Analysis and Comparison Study
X-Files Stealer
2022-08-04Cisco TalosArnaud Zobec, Azim Khodjibaev, Edmund Brumaghin, Matt Thaxton
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns