Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-19NSHCThreatRecon Team
SectorM04 Targeting Singapore – An Analysis
PlugX Termite
2019-03-18PepperMalware BlogPepper Potts
Analysis of .Net Stealer GrandSteal
GrandSteal
2019-03-18Pepper Potts
Analysis of BlackMoon (Banking Trojan)'s Evolution, And The Possibility of a Latest Version Under Development
KrBanker
2019-03-17Persianov on SecuritySveatoslav Persianov
Emotet malware analysis. Part 1
Emotet
2019-03-14DCSODCSO
Pegasus/Buhtrap analysis of the malware stage based on the leaked source code
Buhtrap
2019-03-13Security Art WorkLab52
ORANGEWORM GROUP – KWAMPIRS ANALYSIS UPDATE
Kwampirs
2019-03-11tcontre
Infor Stealer Vidar TrojanSpy Analysis...
Vidar
2019-03-05PepperMalware BlogPepper Potts
Quick Analysis of a Trickbot Sample with NSA's Ghidra SRE Framework
TrickBot
2019-02-28IntezerIgnacio Sanmillan
Technical Analysis: Pacha Group Deploying Undetected Cryptojacking Campaigns on Linux Servers
Pacha Group
2019-02-28Weixin360威胁情报中心
URLZone: Analysis of Suspected Attacks Against Japanese Hi-Tech Enterprise Employees
UrlZone
2019-02-24NDSSDave Levin, George Hughey, Katura Harvey, Richard Roberts, Stephen Herwig
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
Hajime
2019-02-23RE SolverRESolver
D-Link DNS-320 NAS Cr1ptT0r Ransomware ARM Dynamic Analysis - QEMU and Raspberry PI VM
Cr1ptT0r
2019-02-06Samip Pokharel
Analysis of multiplatform Java Jacksbot Backdoor
2019-02-01Github (Zenexer)Paul Buonopane
LNKR - Extension analysis - Flash Playlist
LNKR
2019-01-30Samip Pokharel
Analysis of NetWiredRC trojan
NetWire RC
2019-01-23NSHC RedAlert LabsThreatRecon Team
SectorA01 Custom Proxy Utility Tool Analysis
FastCash
2019-01-18Mark Edmondson
BLACK ENERGY – Analysis
BlackEnergy
2019-01-11LastlineQuentin Fois
Threat Actor “Cold River”: Network Traffic Analysis and a Deep Dive on Agent Drable
Cold River
2019-01-02PepperMalware BlogPepper Potts
Analysis of Neutrino Bot Sample (dated 2018-08-27)
2019-01-01Journal of Telecommunications and Information TechnologyMaxat Akbanov, Michael D. Logothetis, Vassilios G. Vassilakis
WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms
WannaCryptor