Click here to download all references as Bib-File.•
2020-08-19
⋅
PT SWARM
⋅
Performing Kerberoasting without SPNs |
2020-08-19
⋅
Github (lgandx)
⋅
Responder/MultiRelay Responder |
2020-08-19
⋅
Intezer
⋅
ELF Malware Analysis 101 Part 2: Initial Analysis |
2020-08-18
⋅
CUJOAI
⋅
UPX Anti-Unpacking Techniques in IoT Malware Mozi |
2020-08-18
⋅
ID Ransomware
⋅
ThunderX Ransomware ThunderX |
2020-08-18
⋅
F-Secure
⋅
Lazarus Group Campaign Targeting the Cryptocurrency Vertical |
2020-08-18
⋅
F-Secure Labs
⋅
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical |
2020-08-18
⋅
Arete
⋅
Is Conti the New Ryuk? Conti Ryuk |
2020-08-18
⋅
Menlo Security
⋅
New Attack Alert: Duri |
2020-08-18
⋅
Medium mariohenkel
⋅
Decrypt MassLogger 2.4.0.0 configuration MASS Logger |
2020-08-17
⋅
Cado Security
⋅
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT TeamTNT |
2020-08-17
⋅
Twitter (@Arkbird_SOLG)
⋅
Short twitter thread with analysis on Loup ATM malware Loup |
2020-08-17
⋅
Aqua
⋅
Uncover Malware Payload Executions Automatically with Tracee |
2020-08-17
⋅
PWC
⋅
WellMess malware: analysis of its Command and Control (C2) server elf.wellmess |
2020-08-17
⋅
Cado Security
⋅
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials TeamTNT |
2020-08-17
⋅
Twitter (@r3c0nst)
⋅
Tweet on Loup Loup |
2020-08-16
⋅
⋅
Hatena Blog
⋅
WastedLocker IoC collection WastedLocker |
2020-08-16
⋅
kienmanowar Blog
⋅
Manual Unpacking IcedID Write-up IcedID |
2020-08-15
⋅
Twitter (@Int2e_)
⋅
Tweet on DoubleFantasy DoubleFantasy |
2020-08-14
⋅
NSA
⋅
Drovorub Malware: Fact Sheet & FAQs |