Click here to download all references as Bib-File.•
| 2023-03-07
⋅
Volexity
⋅
Using Memory Analysis to Detect EDR-Nullifying Malware |
| 2023-02-28
⋅
ANY.RUN
⋅
XLoader/FormBook: Encryption Analysis and Malware Decryption Formbook |
| 2023-02-27
⋅
PRODAFT Threat Intelligence
⋅
RIG Exploit Kit: In-Depth Analysis Dridex IcedID ISFB PureCrypter Raccoon RecordBreaker RedLine Stealer Royal Ransom Silence SmokeLoader Zloader |
| 2023-02-21
⋅
Zscaler
⋅
Technical Analysis of Rhadamanthys Obfuscation Techniques Rhadamanthys |
| 2023-02-19
⋅
Geeky Panda Tales
⋅
The Infostealer Pie: Python Malware Analysis Venus Stealer |
| 2023-02-18
⋅
malware.love
⋅
TrueBot Analysis Part II - Static unpacker Silence |
| 2023-02-16
⋅
ThreatMon
⋅
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT Unidentified 005 (Sidecopy) ReverseRAT |
| 2023-02-15
⋅
Google
⋅
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape CaddyWiper Dharma HermeticWiper INDUSTROYER2 PartyTicket WhisperGate Callisto Curious Gorge MUSTANG PANDA Turla |
| 2023-02-14
⋅
⋅
TEAMT5
⋅
Worm malware Win32.Parite Deep Analysis & Scanner Parite |
| 2023-02-12
⋅
malware.love
⋅
TrueBot Analysis Part I - A short glimpse into packed TrueBot samples Silence |
| 2023-02-12
⋅
Youtube (OALabs)
⋅
ESXiArgs Ransomware Analysis with @fwosar ESXiArgs |
| 2023-02-10
⋅
cocomelonc
⋅
Malware analysis: part 8. Yara rule example for MurmurHash2. MurmurHash2 in Conti ransomware Conti |
| 2023-02-09
⋅
Github (muha2xmad)
⋅
Technical analysis of Godfather android malware Godfather |
| 2023-02-07
⋅
SecurityScorecard
⋅
A Detailed Analysis of a New Stealer Called Stealerium Stealerium |
| 2023-02-07
⋅
SECUINFRA
⋅
Hide your Hypervisor: Analysis of ESXiArgs Ransomware ESXiArgs |
| 2023-02-06
⋅
Quorum Cyber
⋅
Malware Analysis Report Vidar - Stealerware Vidar |
| 2023-02-06
⋅
Youtube (Motasem Hamdan)
⋅
Malware Analysis Basics: Dissecting PE (Portable Executable) Headers | TryHackMe |
| 2023-02-02
⋅
0x0d4y
⋅
[Zero2Automated] Complete Custom Sample Challenge Analysis CruLoader |
| 2023-02-02
⋅
YouTube (Embee Research)
⋅
Xworm Loader Analysis - Decoding Malware Scripts and Extracting C2's with DnSpy and CyberChef XWorm |
| 2023-02-02
⋅
Kroll
⋅
Hive Ransomware Technical Analysis and Initial Access Discovery BATLOADER Cobalt Strike Hive |