Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-19MeltX0R
Emissary Panda APT: Recent infrastructure and RAT analysis
ZXShell
2019-09-10Github (StrangerealIntel)StrangerealIntel
Gamaredon Analysis
Gamaredon Group
2019-09-09CISACISA
Malware Analysis Report (AR19-252A)
BADCALL BADCALL
2019-09-05vmwareSwee Lai Lee
CB Threat Analysis Unit Technical Breakdown: GermanWiper Ransomware
Ordinypt
2019-09-03Medium CSIS TechblogAleksejs Kuprins
Analysis of Joker — A Spy & Premium Subscription Bot on GooglePlay
Joker
2019-08-26InQuestJosiah Smith
Memory Analysis of TrickBot
TrickBot
2019-08-24Persianov on SecuritySveatoslav Persianov
Windows worms. Forbix worm analysis
forbiks
2019-08-15Trend MicroAliakbar Zahravi
Analysis: New Remcos RAT Arrives Via Phishing Email
Remcos
2019-08-15Sentinel LABSDaniel Bunce
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features
GootKit
2019-08-15SentinelOneDaniel Bunce
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features
GootKit
2019-07-29BluelivAlberto Marín
An analysis of a spam distribution botnet: the inner workings of Onliner Spambot
OnlinerSpambot
2019-07-25ANSSIANSSI
ANALYSIS OF THE AMCACHE
2019-07-24Github (br-data)Hakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Winnti analysis
Winnti
2019-07-22FortinetKai Lu
A Deep Dive Into IcedID Malware: Part III - Analysis of Child Processes
2019-07-19ANY.RUNANY.RUN
ANY.RUN analysis on URL
ZUpdater
2019-07-19HPAlex Holland
An Analysis of L0rdix RAT, Panel and Builder
L0rdix
2019-07-18Ahmet Bilal Can
Android Malware Analysis : Dissecting Hydra Dropper
Hydra
2019-07-16G DataG DATA Security Lab
Analysis: Server-side polymorphism & PowerShell backdoors
Rozena
2019-07-01GoggleHeadedHacker BlogJacob Pimental
Robbinhood Malware Analysis with Radare2
RobinHood
2019-07-01360 netlabAlex Turing, GenShen Ye
An Analysis of Godlua Backdoor
Godlua