Click here to download all references as Bib-File.•
| 2021-03-31
⋅
InfoSec Handlers Diary Blog
⋅
Quick Analysis of a Modular InfoStealer Amadey |
| 2021-03-30
⋅
YouTube ( malware-traffic-analysis.net)
⋅
2021-03-29 BazaCall (BazarCall) Example BazarBackdoor |
| 2021-03-29
⋅
VMWare Carbon Black
⋅
Dridex Reloaded: Analysis of a New Dridex Campaign Dridex |
| 2021-03-27
⋅
InfoSec Handlers Diary Blog
⋅
Malware Analysis with elastic-agent and Microsoft Sandbox |
| 2021-03-25
⋅
LIFARS
⋅
DearCry Ransomware Malware Analysis and Reverse Engineering dearcry |
| 2021-03-25
⋅
VMWare Carbon Black
⋅
Memory Forensics for Virtualized Hosts |
| 2021-03-24
⋅
GoggleHeadedHacker Blog
⋅
Anti-Analysis Techniques Used in Excel 4.0 Macros |
| 2021-03-22
⋅
⋅
AhnLab
⋅
대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서 |
| 2021-03-21
⋅
Twitter (@CyberRaiju)
⋅
Twitter Thread with analysis of .NET China Chopper CHINACHOPPER |
| 2021-03-21
⋅
In the eye of our CyberSOC: Campo Loader, analysis and detection perspectives campoloader |
| 2021-03-18
⋅
VinCSS
⋅
[RE021] Qakbot analysis – Dangerous malware has been around for more than a decade QakBot |
| 2021-03-18
⋅
Varonis
⋅
Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign DarkSide |
| 2021-03-16
⋅
McAfee
⋅
Technical Analysis of Operation Diànxùn Cobalt Strike |
| 2021-03-15
⋅
Group-IB
⋅
JavaScript sniffers' new tricks: Analysis of the E1RB JS sniffer family |
| 2021-03-12
⋅
Binary Defense
⋅
IcedID GZIPLOADER Analysis IcedID |
| 2021-03-09
⋅
YouTube (John Hammond)
⋅
HAFNIUM - Post-Exploitation Analysis from Microsoft Exchange CHINACHOPPER |
| 2021-03-08
⋅
PRODAFT Threat Intelligence
⋅
FluBot - Malware Analysis Report FluBot |
| 2021-03-02
⋅
YouTube (Cerbero Suite)
⋅
Malicious Excel Document Analysis in Cerbero Suite |
| 2021-03-01
⋅
Acronis
⋅
Threat analysis: Dharma (CrySiS) ransomware Dharma |
| 2021-02-24
⋅
A41APT case - Analysis of the Stealth APT Campaign Threatening Japan SodaMaster |