Click here to download all references as Bib-File.•
| 2022-01-24
⋅
The DFIR Report
⋅
Cobalt Strike, a Defender’s Guide – Part 2 Cobalt Strike |
| 2022-01-24
⋅
Check Point Research
⋅
Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds |
| 2022-01-24
⋅
Proofpoint
⋅
DTPacker – a .NET Packer with a Curious Password Agent Tesla TA2536 |
| 2022-01-24
⋅
Cleafy
⋅
How BRATA is monitoring your bank account BRATA |
| 2022-01-23
⋅
Cyber And Ramen blog
⋅
Analysis of a DLL Downloader |
| 2022-01-23
⋅
forensicitguy
⋅
HCrypt Injecting BitRAT using PowerShell, HTAs, and .NET BitRAT |
| 2022-01-23
⋅
abuse.ch
⋅
N-W0rm malware samples N-W0rm |
| 2022-01-23
⋅
kienmanowar Blog
⋅
[QuickNote] Emotet epoch4 & epoch5 tactics Emotet |
| 2022-01-22
⋅
Atomic Matryoshka
⋅
Malware Headliners: Emotet Emotet |
| 2022-01-22
⋅
csirt-mon
⋅
Analysis of the Cyberattack on Ukrainian Government Resources WhisperGate |
| 2022-01-22
⋅
forensicitguy
⋅
BazarISO Analysis - Loading with Advpack.dll BazarBackdoor |
| 2022-01-21
⋅
CrowdStrike
⋅
Better Together: The Power of Managed Cybersecurity Services in the Face of Pressing Global Security Challenges LockBit LockBit BITWISE SPIDER |
| 2022-01-21
⋅
Medium (Cryptax)
⋅
Creating a safe dummy C&C to test Android bots BianLian Hydra |
| 2022-01-21
⋅
vmware
⋅
Emotet Is Not Dead (Yet) Emotet |
| 2022-01-21
⋅
MalGamy
⋅
Deep Analysis Agent Tesla Malware Agent Tesla |
| 2022-01-21
⋅
Twitte (@s4tan)
⋅
Analyzing an IDA Pro anti-decompilation code |
| 2022-01-21
⋅
Twitter (@_CPResearch_)
⋅
Tweet on WhiteLambert malware Lambert |
| 2022-01-21
⋅
Zscaler
⋅
Analysis of Xloader’s C2 Network Encryption Xloader Formbook |
| 2022-01-21
⋅
Talos Intelligence
⋅
Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation WhisperGate |
| 2022-01-21
⋅
Secureworks
⋅
WhisperGate: Not NotPetya WhisperGate |