Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-29GoogleGoogle Threat Analysis Group, Shane Huntley
TAG Bulletin: Q3 2021
2021-10-28PRODAFT Threat IntelligencePRODAFT
Solarmarker In-Depth Analysis
solarmarker
2021-10-28CybereasonAleksandar Milenkoski, Brian Janower
THREAT ANALYSIS REPORT: Snake Infostealer Malware
404 Keylogger
2021-10-27AT&TFernando Dominguez
Code similarity analysis with r2diaphora
Bashlite
2021-10-21cybleCyble
​​Raccoon Stealer Under the Lens: A Deep-dive Analysis
Raccoon
2021-10-20AhnLabASEC Analysis Team
VNC Malware (TinyNuke, TightVNC) Used by Kimsuky Group
TinyNuke
2021-10-20GoogleAshley Shen, Google Threat Analysis Group
Phishing campaign targets YouTube creators with cookie theft malware
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt. 1 In-depth Analysis
2021-10-14GoogleAjax Bash, Google Threat Analysis Group
Countering threats from Iran (APT35)
2021-10-12MandiantAlyssa Rahman
Defining Cobalt Strike Components So You Can BEA-CONfident in Your Analysis
Cobalt Strike
2021-10-09JPMintyJai Minton
Reverse Engineering Analysis Lab - STRRAT
STRRAT
2021-10-07VB LocalhostAdam Prescott, Sveva Vittoria Scenarelli
Back to Black(Tech): an analysis of recent BlackTech operations and an open directory full of exploits
Flagpro
2021-10-07Twitter (@billyleonard)Billy Leonard, Google Threat Analysis Group
Tweet on IOCs related to APT28
2021-10-05Seguranca InformaticaPedro Tavares
Malware analysis: Details on LockBit ransomware
LockBit
2021-10-04JPMintyJai Minton
STRRAT Analysis
STRRAT
2021-10-03blag.nullteilerfrei.deJesko Hüttenhain
Using Windows Sandbox for Malware Analysis
2021-09-29Malware Traffic AnalysisBrad Duncan
Hancitor with Cobalt Strike
Cobalt Strike Hancitor
2021-09-29Malware Traffic AnalysisBrad Duncan
2021-09-29 (Wednesday) - Hancitor with Cobalt Strike
Cobalt Strike Hancitor
2021-09-29CYBER GEEKS All Things InfosecCyberMasterV
How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear
MiniDuke