Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045F): MAR-10271944-3.v1 - North Korean Trojan: BUFFETLINE
BUFFETLINE
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045G): MAR-10135536-8.v4 - North Korean Trojan: HOPLIGHT
HOPLIGHT
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045C)
CHEESETRAY
2020-02-12VMWare Carbon BlackAC, Rachel E. King
Ryuk Ransomware Technical Analysis
Ryuk
2020-02-12MeltX0R SecurityMeltX0R
Goblin Panda APT: Recent infrastructure and RAT analysis
NewCore RAT
2020-02-08PICUS SecuritySüleyman Özarslan
Emotet Technical Analysis - Part 2 PowerShell Unveiled
Emotet
2020-02-03SANS ISCJan Kopriva
Analysis of a triple-encrypted AZORult downloader
Azorult
2020-01-30PICUS SecuritySüleyman Özarslan
Emotet Technical Analysis - Part 1 Reveal the Evil Code
Emotet
2020-01-20Virus BulletinAhnLab Security Analysis Team
Behind the scenes of GandCrab’s operation
Gandcrab
2020-01-15AT&T CybersecurityFernando Martinez
Alien Labs 2019 Analysis of Threat Groups Molerats and APT-C-37
Houdini
2020-01-15Lab52ml10
APT-C-36 recent activity analysis
LimeRAT APT-C-36
2020-01-15Marco Ramilli's BlogMarco Ramilli
Iranian Threat Actors: Preliminary Analysis
POWERSTATS
2020-01-14YoroiYoroi
Analysis Run
BitPyLock
2020-01-10ETH ZürichSteafan Soesanto
A one-sided Affair: Japan and the People's Republic of China in Cyberspace Hotspot Analysis
Budminer
2020-01-08ReaqtaReaqta
Leonardo S.p.A. Data Breach Analysis
win.fujinama
2020-01-07Hatching.ioTeam
Powershell Static Analysis & Emotet results
Emotet
2020-01-06Security-in-BitsSecurity-in-Bits
Pyrogenic Infostealer static analysis – Part 0x1
Qealler
2020-01-01DragosJoe Slowik
Threat Intelligence and the Limits of Malware Analysis
Exaramel Exaramel Industroyer Lookback NjRAT PlugX
2019-12-27YoroiYoroi
Analysis Run
Yarraq
2019-12-24Github (itsKindred)Derek Kleinhen
Bashar Bachir Infection Chain Analysis
NjRAT