Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-05SSTICCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video)
FlowCloud
2024-06-05SekoiaCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper)
FlowCloud
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-06-03CyfoxIdan Malihi
BiBi Wiper: A Malware Analysis Amidst the Israel-Hamas-ISIS Conflict
BiBi
2024-06-03Binary DefenseBinary Defense, Shannon Mong
Wineloader – Analysis of the Infection Chain
WINELOADER
2024-05-28ReliaquestRELIAQUEST THREAT RESEARCH TEAM
BlackSuit Attack Analysis
BlackSuit
2024-05-26ZW01fMohamed Ezat
QakBOT v5 Deep Malware Analysis
QakBot
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-14Bern University of Applied ScienceBenjamin Fehrensen, Dominic Schmutz, Robin Rapp
Forensic analysis of hook Android malware
Hook
2024-05-10Qianxin Threat Intelligence CenterThreat Intelligence Center
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations
BeaverTail
2024-05-10ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four
Remcos
2024-05-08Medium (montysecurity)montysecurity
From OSINT to Disk: Wave Stealer Analysis
Wave Stealer
2024-05-06Cyber-ForensicsCyber-Forensics
Agent Tesla Malware Analysis
Agent Tesla
2024-05-03ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Three
Remcos
2024-04-30ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two
Remcos
2024-04-300x0d4y0x0d4y
Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement?
Latrodectus
2024-04-29Securite360.netMuffin
Analysis of Sarwent loader: Old ways die hard
2024-04-29ThreatMonKerime Gencay, MalwareR&DTeam
Understanding the 'Kapeka' Backdoor: Detailed Analysis by APT44
Kapeka
2024-04-24SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Analysis of Ongoing FROZEN#SHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover
Cobalt Strike Latrodectus
2024-04-24ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part One
Remcos