Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-11-15MalwarebytesJovi Umawing
Evasive maneuvers: HTML smuggling explained
2021-11-15TRUESECFabio Viggiani
ProxyShell, QBot, and Conti Ransomware Combined in a Series of Cyberattacks
Cobalt Strike Conti QakBot
2021-11-15cyber.wtf blogLuca Ebach
Guess who’s back
Emotet
2021-11-14Github (gabrielcurrie)Gabriel Currie
Ready for (nearly) anything: Five things to prepare for a cyber security incident
2021-11-14Twitter (@f0wlsec)Marius Genheimer
A static config extractor for the main component of DanaBot
DanaBot
2021-11-13ZAYOTEMHalil Filik, Mustafa Günel
Alien Technical Analysis Report
Alien
2021-11-13YouTube (AGDC Services)AGDC Services
Automate Qbot Malware String Decryption With Ghidra Script
QakBot
2021-11-13Just StillStill Hsu
Threat Spotlight - Domain Fronting
Cobalt Strike
2021-11-13Trend MicroIan Kenefick, Vladimir Kropotov
QAKBOT Loader Returns With New Techniques and Tools
QakBot
2021-11-12Twitter (@3xp0rtblog)3xp0rt
Tweets on DarkLoader
DarkLoader
2021-11-12Twitter (@Arkbird_SOLG)Arkbird
Tweets on Void Balaur using QuantLoader and ZStealer
QuantLoader ZStealer
2021-11-12Trend MicroIan Kenefick, Vladimir Kropotov
The Prelude to Ransomware: A Look into Current QAKBOT Capabilities and Global Activities
QakBot
2021-11-12360 netlabAlex.Turing, Hui Wang, YANG XU
Malware uses namesilo Parking pages and Google's custom pages to spread
2021-11-12MalwarebytesHossein Jazi
A multi-stage PowerShell based attack targets Kazakhstan
Cobalt Strike
2021-11-12Living CodeDominik Degroot
AgentTesla dropped via NSIS installer
Agent Tesla
2021-11-12CUJOAIAlbert Zsigovits
New Threat Alert: Krane Malware
2021-11-12CrowdStrikeAnmol Maurya
Golang Malware Is More than a Fad: Financial Motivation Drives Adoption
Snatch
2021-11-12Recorded FutureInsikt Group®
The Business of Fraud: Botnet Malware Dissemination
Mozi Dridex IcedID QakBot TrickBot
2021-11-12jmpesp.mem0rv4i
Malware Analysis: Syscalls: Examining how to analyse malware that uses syscalls as opposed to API calls
2021-11-11vmwareGiovanni Vigna, Jason Zhang, Stefano Ortolani, Threat Analysis Unit
Research Recap: How To Automate Malware Campaign Detection With Telemetry Peak Analyzer
Phorpiex QakBot