Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-09-15US-CERTUS-CERT
Malware Analysis Report (AR20-259A): Iranian Web Shells
CHINACHOPPER
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-11VinCSSm4n0w4r
[RE016] Malware Analysis: ModiLoader
DBatLoader
2020-09-11KISAKrCERT
Analysis of attacker's strategy of using malicious code
2020-09-08ZscalerShivang Desai
TikTok Spyware: A detailed analysis of spyware masquerading as TikTok
2020-08-31IndeChris Campbell
Analysis of the latest wave of Emotet malicious documents
Emotet
2020-08-28CYBERWISEAli Rıza Şahinkaya, Can Atakan Işık, Rıdvan Ethem Canavar
Cerberus Banking Trojan Analysis
Cerberus
2020-08-27Hatching.ioPete Cowman
Smokeloader Analysis and More Family Detections
SmokeLoader
2020-08-27MalWatchMalWatch
Win.Trojan.AgentTesla - Malware analysis & threat intelligence report
Agent Tesla
2020-08-26Kaspersky LabsGiampaolo Dedola
Transparent Tribe: Evolution analysis, part 2
AhMyth Crimson RAT Oblique RAT
2020-08-25Aqua NautilusAssaf Morag
Deep Analysis of TeamTNT Techniques Using Container Images to Attack
TeamTNT Tsunami XMRIG
2020-08-20Zero2Automated BlogDaniel Bunce
DBatLoader/ModiLoader Analysis – First Stage
DBatLoader
2020-08-20Kaspersky LabsGiampaolo Dedola
Transparent Tribe: Evolution analysis, part 1
Crimson RAT
2020-08-19US-CERTUS-CERT
Malware Analysis Report (AR20-232A)
Bankshot BLINDINGCAN
2020-08-19IntezerAvigayil Mechtinger
ELF Malware Analysis 101 Part 2: Initial Analysis
2020-08-17Twitter (@Arkbird_SOLG)Arkbird
Short twitter thread with analysis on Loup ATM malware
Loup
2020-08-17PWCPWC UK
WellMess malware: analysis of its Command and Control (C2) server
elf.wellmess
2020-08-12HackDig
Antiy's analysis report on the recent APT attacks against the Green Spot organization
2020-08-10AnomaliJoakim Kennedy, Rory Gould
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service
SMAUG
2020-08-06FireEyeNhan Huynh
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach
MASS Logger