Click here to download all references as Bib-File.•
2019-06-25
⋅
IcedID aka #Bokbot Analysis with Ghidra IcedID |
2019-06-24
⋅
VirIT
⋅
Ransomware REvil - Sodinokibi: Technical analysis and Threat Intelligence Report REvil |
2019-06-21
⋅
Network Security Research Lab @ Qihoo 360
⋅
An Analysis of Linux.Ngioweb Botnet Ngioweb |
2019-06-18
⋅
Fortinet
⋅
Analysis of a New HawkEye Variant HawkEye Keylogger |
2019-06-16
⋅
Fortinet
⋅
A Deep Dive Into IcedID Malware: Part II - Analysis of the Core IcedID Payload (Parent Process) IcedID |
2019-06-03
⋅
Kindred Security
⋅
Code Analysis of Basic Cryptomining Malware RaspberryPiBotnet |
2019-06-02
⋅
VMRay
⋅
Hypervisor-based Analysis of macOS Malware Coldroot RAT |
2019-06-01
⋅
⋅
Weixin
⋅
Antiy releases analysis report of "Formula Organization" attack on Middle East SWIFT service providers |
2019-05-22
⋅
TRICKBOT - Analysis TrickBot |
2019-05-10
⋅
SophosLabs Uncut
⋅
MegaCortex, deconstructed: mysteries mount as analysis continues MegaCortex |
2019-05-09
⋅
Intezer
⋅
Technical Analysis: Pacha Group Competing against Rocke Group for Cryptocurrency Mining Foothold on the Cloud GreedyAntd Pacha Group Rocke |
2019-05-09
⋅
CISA
⋅
Malware Analysis Report (AR19-129A) ELECTRICFISH Lazarus Group |
2019-04-30
⋅
Forcepoint
⋅
TinyPOS: An analysis of a Point-Of-Sale malware ecosystem |
2019-04-30
⋅
ClearSky
⋅
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis SpyNote OopsIE |
2019-04-23
⋅
FireEye
⋅
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis |
2019-04-12
⋅
BroadAnalysis
⋅
Rig Exploit Kit delivers Bunitu Malware Bunitu |
2019-04-12
⋅
Stratosphere Lab
⋅
Analysis of an IRC based Botnet Mirai |
2019-04-10
⋅
Microsoft
⋅
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability |
2019-04-10
⋅
US-CERT
⋅
Malware Analysis Report (AR19-100A): North Korean Trojan: HOPLIGHT HOPLIGHT |
2019-04-07
⋅
Eybisi
⋅
Mobile Malware Analysis : Tricks used in Anubis Anubis |