Click here to download all references as Bib-File.•
| 2020-02-04
⋅
Borr Malware Borr |
| 2020-02-04
⋅
0x00sec
⋅
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 |
| 2020-02-04
⋅
RevCode RAT WebMonitor RAT |
| 2020-02-03
⋅
SANS ISC
⋅
Analysis of a triple-encrypted AZORult downloader Azorult |
| 2020-02-03
⋅
⋅
ID Ransomware
⋅
PassLock Ransomware Passlock |
| 2020-02-03
⋅
Telekom
⋅
Dissecting Emotet – Part 1 Emotet |
| 2020-02-03
⋅
Dragos
⋅
EKANS Ransomware and ICS Operations Snake |
| 2020-02-03
⋅
Check Point Research
⋅
Warzone: Behind the enemy lines Ave Maria |
| 2020-02-02
⋅
ESET Research
⋅
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs Kobalos |
| 2020-02-02
⋅
Sophos Labs
⋅
Agent Tesla amps up information stealing attacks Agent Tesla |
| 2020-02-02
⋅
360 netlab
⋅
New Threat: Matryosh Botnet Is Spreading Matryosh |
| 2020-02-02
⋅
Youtube (Ghidra Ninja)
⋅
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra WannaCryptor |
| 2020-02-02
⋅
Nullteilerfrei Blog
⋅
Defeating Sodinokibi/REvil String-Obfuscation in Ghidra REvil |
| 2020-02-02
⋅
uf0 Blog
⋅
Uncovering Mimikatz ‘msv’ and collecting credentials through PyKD MimiKatz |
| 2020-02-01
⋅
ThreatFabric
⋅
2020 - Year of the RAT Anubis Cerberus Ginp Gustuff Hydra |
| 2020-02-01
⋅
⋅
ID Ransomware
⋅
FCT Ransomware FCT |
| 2020-01-31
⋅
YouTube (Context Information Security)
⋅
New AVIVORE threat group – how they operate and managing the risk PlugX |
| 2020-01-31
⋅
Avira
⋅
New wave of PlugX targets Hong Kong PlugX |
| 2020-01-31
⋅
ReversingLabs
⋅
RATs in the Library: Remote Access Trojans Hide in Plain "Public" Site CyberGate LimeRAT NjRAT Quasar RAT Revenge RAT |
| 2020-01-31
⋅
Virus Bulletin
⋅
Rich Headers: leveraging this mysterious artifact of the PE format Dridex Exaramel Industroyer Neutrino RCS Sathurbot |