Click here to download all references as Bib-File.•
2021-11-21
⋅
Cyber-Anubis
⋅
Dridex Trojan | Defeating Anti-Analysis | Strings Decryption | C&C Extraction DoppelDridex Dridex |
2021-11-20
⋅
Twitter (@eduardfir)
⋅
Tweet on Velociraptor artifact analysis for Emotet Emotet |
2021-11-18
⋅
PRODAFT Threat Intelligence
⋅
Conti Ransomware Group In-Depth Analysis Conti |
2021-11-17
⋅
Infoblox
⋅
Deep Analysis of a Recent Lokibot Attack Loki Password Stealer (PWS) |
2021-11-16
⋅
AhnLab
⋅
Analysis Report of Kimsuky Group's APT Attacks (AppleSeed, PebbleDash) Appleseed PEBBLEDASH |
2021-11-16
⋅
Twitter (@kienbigmummy)
⋅
Tweet on short analysis of QakBot QakBot |
2021-11-13
⋅
ZAYOTEM
⋅
Alien Technical Analysis Report Alien |
2021-11-12
⋅
jmpesp.me
⋅
Malware Analysis: Syscalls: Examining how to analyse malware that uses syscalls as opposed to API calls |
2021-11-11
⋅
vmware
⋅
Research Recap: How To Automate Malware Campaign Detection With Telemetry Peak Analyzer Phorpiex QakBot |
2021-11-11
⋅
⋅
Qianxin
⋅
SideCopy organization's recent attack incident analysis using China-India current affairs news |
2021-11-11
⋅
Google
⋅
Analyzing a watering hole campaign using macOS exploits CDDS |
2021-11-10
⋅
⋅
AhnLab
⋅
Analysis Report of Lazarus Group’s NukeSped Malware DarkComet Tiger RAT |
2021-11-10
⋅
Twitter (@billyleonard)
⋅
Tweet on Rekoobe (used by APT31), being a fork of open source tool called Tiny SHell, used by different actor since at least 2012 Rekoobe |
2021-11-09
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware Cobalt Strike Conti |
2021-11-05
⋅
Trend Micro
⋅
A Review and Analysis of 2021 Buer Loader Campaigns Buer |
2021-11-05
⋅
Trend Micro
⋅
An Analysis of Buer Loader Buer |
2021-11-02
⋅
sysdig
⋅
Malware analysis: Hands-On Shellbot malware PerlBot |
2021-11-02
⋅
Varonis
⋅
BlackMatter Ransomware: In-Depth Analysis & Recommendations BlackMatter |
2021-11-01
⋅
Software Engineering Institute
⋅
Two Tools for Malware Analysis and Reverse Engineering in Ghidra |
2021-10-31
⋅
CYBER GEEKS All Things Infosec
⋅
A detailed analysis of the STOP/Djvu Ransomware STOP |