Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-06-25Dawid Golak
IcedID aka #Bokbot Analysis with Ghidra
IcedID
2019-06-24VirITFederico Girotto, Gianfranco Tonello, Michele Zuin
Ransomware REvil - Sodinokibi: Technical analysis and Threat Intelligence Report
REvil
2019-06-21Network Security Research Lab @ Qihoo 360Alex Turing, yegenshen
An Analysis of Linux.Ngioweb Botnet
Ngioweb
2019-06-18FortinetXiaopeng Zhang
Analysis of a New HawkEye Variant
HawkEye Keylogger
2019-06-16FortinetKai Lu
A Deep Dive Into IcedID Malware: Part II - Analysis of the Core IcedID Payload (Parent Process)
IcedID
2019-06-03Kindred SecurityDerek Kleinhen
Code Analysis of Basic Cryptomining Malware
RaspberryPiBotnet
2019-06-02VMRayFelix Seele
Hypervisor-based Analysis of macOS Malware
Coldroot RAT
2019-06-01WeixinWeixin
Antiy releases analysis report of "Formula Organization" attack on Middle East SWIFT service providers
2019-05-22sneakymonk3y (Mark)
TRICKBOT - Analysis
TrickBot
2019-05-10SophosLabs UncutAndrew Brandt
MegaCortex, deconstructed: mysteries mount as analysis continues
MegaCortex
2019-05-09IntezerIgnacio Sanmillan
Technical Analysis: Pacha Group Competing against Rocke Group for Cryptocurrency Mining Foothold on the Cloud
GreedyAntd Pacha Group Rocke
2019-05-09CISACISA
Malware Analysis Report (AR19-129A)
ELECTRICFISH Lazarus Group
2019-04-30ForcepointRobert Neumann
TinyPOS: An analysis of a Point-Of-Sale malware ecosystem
2019-04-30ClearSkyClearSky Cyber Security
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis
SpyNote OopsIE
2019-04-23FireEyeJames T. Bennett, Michael Bailey
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis
2019-04-12BroadAnalysisAnalysis
Rig Exploit Kit delivers Bunitu Malware
Bunitu
2019-04-12Stratosphere LabMaría José Erquiaga
Analysis of an IRC based Botnet
Mirai
2019-04-10MicrosoftMicrosoft
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability
2019-04-10US-CERTUS-CERT
Malware Analysis Report (AR19-100A): North Korean Trojan: HOPLIGHT
HOPLIGHT
2019-04-07EybisiEybisi
Mobile Malware Analysis : Tricks used in Anubis
Anubis