Click here to download all references as Bib-File.•
2024-02-21
⋅
YouTube (SentinelOne)
⋅
LABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor 9002 RAT PlugX ShadowPad Spyder Earth Lusca |
2024-02-21
⋅
YouTube (Invoke RE)
⋅
Analyzing Qakbot Using Binary Ninja Automation Part 3 QakBot |
2024-02-20
⋅
YouTube (Embee Research)
⋅
StealC Loader Analysis - Decoding Powershell Malware With CyberChef Stealc |
2024-02-16
⋅
YouTube (CactusCon)
⋅
Reverse Engineering Go Malware: A BianLian Story BianLian BianLian |
2024-02-09
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2 QakBot |
2024-02-09
⋅
YouTube (Embee Research)
⋅
Guloader Decoding With Cyberchef CloudEyE |
2024-02-08
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Decoding and C2 Extraction - 3 Minute Malware Analysis Speedrun Cobalt Strike |
2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
2024-02-01
⋅
YouTube (Embee Research)
⋅
Xworm Malware Analysis - Unravelling Multi-stage Malware with CyberChef and DnSpy XWorm |
2024-01-23
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot using Binary Ninja Automation QakBot |
2024-01-21
⋅
YouTube (Embee Research)
⋅
Manual Malware Decoding With Procmon - Pikabot Pikabot |
2024-01-13
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Shellcode Analysis and C2 Extraction Cobalt Strike |
2024-01-12
⋅
YouTube (BSides Cambridge UK)
⋅
Slipping The Net: Qakbot, Emotet And Defense Evasion Emotet QakBot |
2024-01-08
⋅
Fortinet
⋅
Deceptive Cracked Software Spreads Lumma Variant on YouTube Lumma Stealer |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Powershell decoding and .NET C2 Extraction (Quasar RAT) Quasar RAT |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Simple Javascript Decoding and C2 Extraction (Redline Stealer) RedLine Stealer |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Javascript Malware Analysis - Decoding an AgentTesla Loader Agent Tesla |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Decoding Obfuscated Powershell and HTA Files (Lumma Stealer) Lumma Stealer |
2023-12-12
⋅
Youtube (OALabs)
⋅
Tips For Analyzing Delphi Binaries in IDA (Danabot) DanaBot |
2023-12-05
⋅
YouTube (SecureWorks)
⋅
Emulating Qakbot with Austin Graham QakBot |