Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-03-07VolexityPaul Rascagnères
Using Memory Analysis to Detect EDR-Nullifying Malware
2023-02-28ANY.RUNANY.RUN
XLoader/FormBook: Encryption Analysis and Malware Decryption
Formbook
2023-02-27PRODAFT Threat IntelligencePRODAFT
RIG Exploit Kit: In-Depth Analysis
Dridex IcedID ISFB PureCrypter Raccoon RecordBreaker RedLine Stealer Royal Ransom Silence SmokeLoader Zloader
2023-02-21ZscalerNikolaos Pantazopoulos, Sarthak Misraa
Technical Analysis of Rhadamanthys Obfuscation Techniques
Rhadamanthys
2023-02-19Geeky Panda TalesGeekyPanda
The Infostealer Pie: Python Malware Analysis
Venus Stealer
2023-02-18malware.loveRobert Giczewski
TrueBot Analysis Part II - Static unpacker
Silence
2023-02-16ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT
Unidentified 005 (Sidecopy) ReverseRAT
2023-02-15GoogleGoogle Threat Analysis Group, Mandiant
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape
CaddyWiper Dharma HermeticWiper INDUSTROYER2 PartyTicket WhisperGate Callisto Curious Gorge MUSTANG PANDA Turla
2023-02-14TEAMT5GSS & IR Team
Worm malware Win32.Parite Deep Analysis & Scanner
Parite
2023-02-12malware.loveRobert Giczewski
TrueBot Analysis Part I - A short glimpse into packed TrueBot samples
Silence
2023-02-12Youtube (OALabs)Fabian Wosar, Sergei Frankoff
ESXiArgs Ransomware Analysis with @fwosar
ESXiArgs
2023-02-10cocomelonccocomelonc
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware
Conti
2023-02-09Github (muha2xmad)Muhammad Hasan Ali
Technical analysis of Godfather android malware
Godfather
2023-02-07SecurityScorecardVlad Pasca
A Detailed Analysis of a New Stealer Called Stealerium
Stealerium
2023-02-07SECUINFRASECUINFRA Falcon Team
Hide your Hypervisor: Analysis of ESXiArgs Ransomware
ESXiArgs
2023-02-06Quorum CyberQuorum Cyber
Malware Analysis Report Vidar - Stealerware
Vidar
2023-02-06Youtube (Motasem Hamdan)Motasem Hamdan
Malware Analysis Basics: Dissecting PE (Portable Executable) Headers | TryHackMe
2023-02-020x0d4y0x0d4y
[Zero2Automated] Complete Custom Sample Challenge Analysis
CruLoader
2023-02-02YouTube (Embee Research)Embee_research
Xworm Loader Analysis - Decoding Malware Scripts and Extracting C2's with DnSpy and CyberChef
XWorm
2023-02-02KrollElio Biasiotto, Stephen Green
Hive Ransomware Technical Analysis and Initial Access Discovery
BATLOADER Cobalt Strike Hive