Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-12-24Contagiodump BlogMila Parkour
Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan
Stabuniq
2012-12-23Contagio DumpMila Parkour
Dec 2012 Dexter - POS Infostealer samples and information
Dexter
2012-12-21Trend MicroJason Pantig
Infostealer Dexter Targets Checkout Systems
Dexter
2012-12-19ESET ResearchAleksandr Matrosov
Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems
Ranbyus
2012-12-17Contagio DumpMila Parkour
Sample for Sanny / Win32.Daws in CVE-2012-0158 "ACEAN Regional Security Forum" targeting Russian companies
Sanny
2012-12-17ContagioDumpMila Parkour
Sample for Sanny / Win32.Daws in CVE-2012-0158 "ACEAN Regional Security Forum" targeting Russian companies
ployx
2012-12-12Artem Baranov
Analysis of VirTool:WinNT/Exforel.A rootkit
2012-12-12Volatility LabsMichael Hale Ligh
Unpacking Dexter POS "Memory Dump Parsing" Malware
Dexter
2012-12-07Contagio DumpMila Parkour
Nov 2012 Worm Vobfus Samples
Vobfus
2012-12-07Contagiodump BlogMila Parkour
Aug 2012 Backdoor.Wirenet - OSX and Linux
Wirenet Wirenet
2012-12-07Contagio DumpMila Parkour
Nov 2012 - Backdoor.W32.Makadocs Sample
Makadocs
2012-12-07Contagiodump BlogMila Parkour
Aug 2012 W32.Crisis and OSX.Crisis - JAR file Samples - APT
Crisis RCS
2012-12-06Contagiodump BlogMila Parkour
Nov 2012 - W32.Narilam Sample
Narilam
2012-12-05Malware Don't Need CoffeeKafeine
The path to infection - Eye glance at the first line of "Russian Underground" - focused on Ransomware
RunForestRun Andromeda Citadel Lyposit Matsnu Reveton Sinowal UPAS Urausy
2012-12-05Contagiodump BlogMila Parkour
OSX/Dockster.A and Win32/Trojan.Agent.AXMO Samples, pcaps, OSX malware analysis tools
Dockster
2012-11-29Malware Don't Need CoffeeKafeine
Inside view of Lyposit aka (for its friends) Lucky LOCKER
Lyposit
2012-11-28SecurityIntelligenceDana Tamir
Shylock’s New Trick: Evading Malware Researchers
Shylock
2012-11-25CryptomeCryptome
Parastoo Hacks IAEA
Charming Kitten
2012-11-16SymantecTakashi Katsuki
Malware Targeting Windows 8 Uses Google Docs
Makadocs
2012-11-16Information on Security BlogKeith Tyler
China Chopper Webshell - the 4KB that Owns your Web Server