Click here to download all references as Bib-File.•
| 2020-11-05
⋅
SUCURI
⋅
ALFA TEaM Shell ~ v4.1-Tesla: A Feature Update Analysis |
| 2020-10-29
⋅
US-CERT
⋅
Malware Analysis Report (AR20-303B): ZEBROCY Backdoor Zebrocy |
| 2020-10-29
⋅
US-CERT
⋅
Malware Analysis Report (AR20-303A): PowerShell Script: ComRAT Agent.BTZ |
| 2020-10-26
⋅
⋅
Qianxin
⋅
Analysis of the attack activities of the Rattlesnake organization using the Buffy bilateral agreement as bait SideWinder |
| 2020-10-18
⋅
Youtube (L!NK)
⋅
Malware Analysis: Stealer - XOR, CyberChef, x64Dbg Scripting (Part 2) Raccoon |
| 2020-10-16
⋅
Google
⋅
How we're tackling evolving online threats |
| 2020-10-13
⋅
Fortinet
⋅
Deep Analysis – The EKING Variant of Phobos Ransomware Phobos |
| 2020-10-05
⋅
Zawadi Done
⋅
DarkSide ransomware analysis DarkSide |
| 2020-10-03
⋅
Youtube (L!NK)
⋅
Malware Analysis: Stealer - Mutex Check, Stackstrings, IDA (Part 1) Raccoon |
| 2020-10-03
⋅
Medium vishal_thakur
⋅
Grinju Downloader: Anti-analysis (on steroids) | Part 2 Grinju Downloader |
| 2020-10-02
⋅
Lexfo
⋅
Lockbit analysis LockBit |
| 2020-10-01
⋅
US-CERT
⋅
Malware Analysis Report (AR20-275A): Remote Access Trojan: SLOTHFULMEDIA SlothfulMedia |
| 2020-09-24
⋅
US-CERT
⋅
Analysis Report (AR20-268A): Federal Agency Compromised by Malicious Cyber Actor Cobalt Strike Meterpreter |
| 2020-09-17
⋅
PWC UK
⋅
Analysis of WellMail malware's Command and Control (C2) server WellMail |
| 2020-09-15
⋅
Seguranca Informatica
⋅
Threat analysis: The emergent URSA trojan impacts many countries using a sophisticated loader Mispadu |
| 2020-09-15
⋅
US-CERT
⋅
Malware Analysis Report (AR20-259A): Iranian Web Shells CHINACHOPPER |
| 2020-09-14
⋅
Trend Micro
⋅
Analysis of a Convoluted Attack Chain Involving Ngrok |
| 2020-09-11
⋅
VinCSS
⋅
[RE016] Malware Analysis: ModiLoader DBatLoader |
| 2020-09-11
⋅
⋅
KISA
⋅
Analysis of attacker's strategy of using malicious code |
| 2020-09-08
⋅
Zscaler
⋅
TikTok Spyware: A detailed analysis of spyware masquerading as TikTok |