Click here to download all references as Bib-File.•
| 2025-04-03
⋅
ThreatMon
⋅
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report |
| 2025-03-26
⋅
eSentire
⋅
The Long and Short(cut) of It: KoiLoader Analysis Koi Loader |
| 2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
| 2025-03-18
⋅
Trellix
⋅
Analysis of Black Basta Ransomware Chat Leaks Black Basta Black Basta |
| 2025-03-12
⋅
Youtube (AhmedS Kasmani)
⋅
Initial Analysis of Black Basta Chat Leaks Black Basta Black Basta |
| 2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |
| 2025-03-06
⋅
Outpost24
⋅
Unveiling EncryptHub: Analysis of a multi-stage malware campaign Rhadamanthys |
| 2025-03-04
⋅
Medium (A-poc)
⋅
Black Basta Leak Analysis Black Basta Black Basta |
| 2025-03-04
⋅
⋅
Genians
⋅
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack Quasar RAT |
| 2025-03-03
⋅
DeXpose
⋅
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism PureLogs Stealer |
| 2025-03-01
⋅
ZW01f
⋅
An in-depth analysis of APT37’s latest campaign RokRAT |
| 2025-02-27
⋅
Medium b.magnezi
⋅
NanoCore Malware Analysis Nanocore RAT |
| 2025-02-24
⋅
DeXpose
⋅
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector |
| 2025-02-19
⋅
0x0d4y
⋅
Technical Analysis of Lockbit4.0 Evasion Tales LockBit |
| 2025-02-13
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 2 Xloader |
| 2025-02-09
⋅
Medium (@mvaks)
⋅
Analysis of malicious mobile applications impersonating popular Polish apps — OLX, Allegro, IKO SpyNote TrickMo |
| 2025-01-27
⋅
Zscaler
⋅
Technical Analysis of Xloader Versions 6 and 7 | Part 1 Xloader |
| 2025-01-27
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer Lumma Stealer |
| 2025-01-23
⋅
ThreatMon
⋅
Helldown Ransomware Malware Analysis Report HellDown |
| 2025-01-21
⋅
KrCert
⋅
Analysis of Attack Strategies Targeting Centralized Management Solutions |