Click here to download all references as Bib-File.•
2020-02-14
⋅
US-CERT
⋅
Malware Analysis Report (AR20-045F): MAR-10271944-3.v1 - North Korean Trojan: BUFFETLINE BUFFETLINE |
2020-02-14
⋅
US-CERT
⋅
Malware Analysis Report (AR20-045G): MAR-10135536-8.v4 - North Korean Trojan: HOPLIGHT HOPLIGHT |
2020-02-14
⋅
US-CERT
⋅
Malware Analysis Report (AR20-045C) CHEESETRAY |
2020-02-12
⋅
VMWare Carbon Black
⋅
Ryuk Ransomware Technical Analysis Ryuk |
2020-02-12
⋅
MeltX0R Security
⋅
Goblin Panda APT: Recent infrastructure and RAT analysis NewCore RAT |
2020-02-08
⋅
PICUS Security
⋅
Emotet Technical Analysis - Part 2 PowerShell Unveiled Emotet |
2020-02-03
⋅
SANS ISC
⋅
Analysis of a triple-encrypted AZORult downloader Azorult |
2020-01-30
⋅
PICUS Security
⋅
Emotet Technical Analysis - Part 1 Reveal the Evil Code Emotet |
2020-01-20
⋅
Virus Bulletin
⋅
Behind the scenes of GandCrab’s operation Gandcrab |
2020-01-15
⋅
AT&T Cybersecurity
⋅
Alien Labs 2019 Analysis of Threat Groups Molerats and APT-C-37 Houdini |
2020-01-15
⋅
Lab52
⋅
APT-C-36 recent activity analysis LimeRAT APT-C-36 |
2020-01-15
⋅
Marco Ramilli's Blog
⋅
Iranian Threat Actors: Preliminary Analysis POWERSTATS |
2020-01-14
⋅
Yoroi
⋅
Analysis Run BitPyLock |
2020-01-10
⋅
ETH Zürich
⋅
A one-sided Affair: Japan and the People's Republic of China in Cyberspace Hotspot Analysis Budminer |
2020-01-08
⋅
Reaqta
⋅
Leonardo S.p.A. Data Breach Analysis win.fujinama |
2020-01-07
⋅
Hatching.io
⋅
Powershell Static Analysis & Emotet results Emotet |
2020-01-06
⋅
Security-in-Bits
⋅
Pyrogenic Infostealer static analysis – Part 0x1 Qealler |
2020-01-01
⋅
Dragos
⋅
Threat Intelligence and the Limits of Malware Analysis Exaramel Exaramel Industroyer Lookback NjRAT PlugX |
2019-12-27
⋅
Yoroi
⋅
Analysis Run Yarraq |
2019-12-24
⋅
Github (itsKindred)
⋅
Bashar Bachir Infection Chain Analysis NjRAT |