Click here to download all references as Bib-File.
|2017-11-12 ⋅ Vitali Kremez Blog ⋅ |
Let's Learn: Dissecting Golroted Trojan's Process Hollowing Technique & UAC Bypass in HKCU\Environment
|2017-11-05 ⋅ Vitali Kremez Blog ⋅ |
Let's Learn: Lethic Spambot & Survey of Anti-Analysis Techniques
|2017-08-18 ⋅ Twitter (@VK_intel) ⋅ |
Tweet on extracted config from Gootkit
|2017-07-24 ⋅ Vitali Kremez Blog ⋅ |
Let's Learn: Reversing Credential and Payment Card Information Stealer 'AZORult V2'
|2015-12-26 ⋅ Flashpoint ⋅ |
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis