Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-01Virus BulletinMaddie Stone
Unpacking the packed unpacker: reversing an Android anti-analysis native library
Chamois
2018-12-28NetlabJiaYu
analysis of the infrastructure renewal and corresponding mode of transmission of the "double-gun" trojan horse
2018-12-24fumik0 blogfumik0
Let’s dig into Vidar – An Arkei Copycat/Forked Stealer (In-depth analysis)
Arkei Stealer Vidar
2018-12-20CoderctoCodercto
Analysis of the attack activities of Hailian Lotus APT group against large domestic investment companies
CACTUSTORCH
2018-12-19Palo Alto Networks Unit 42Kaoru Hayashi
Analysis of Smoke Loader in New Tsunami Campaign
SmokeLoader
2018-12-19Malware Traffic AnalysisBrad Duncan
MALSPAM PUSHING THE MYDOOM WORM IS STILL A THING
MyDoom
2018-12-06NSFOCUShaoming
SATAN variant analysis & handling guide
Satan
2018-12-05BotconfRémi Jullian
FORMBOOK In-depth malware analysis
Formbook
2018-12-03MicrosoftMicrosoft Defender ATP Research Team
Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers
APT29
2018-11-29360 Threat IntelligenceThreat Intelligence Center
Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups
BioData Bitter RAT WSCSPL
2018-11-29360 Threat IntelligenceQi Anxin Threat Intelligence Center
Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups
Artra Downloader
2018-11-29NSFOCUShaoming
Analysis Report of the Xorddos Malware Family
XOR DDoS
2018-11-17Youtube (Demonslay335)Michael Gillespie
Analyzing Ransomware - Beginner Static Analysis
Hermes
2018-11-08FortinetXiaopeng Zhang
Deep Analysis of TrickBot New Module pwgrab
TrickBot
2018-10-15fumik0 blogfumik0
Predator The Thief: In-depth analysis (v2.3.5)
Predator The Thief
2018-10-08NSFOCUSNSFOCUS
NuggetPhantom Analysis Report
NuggetPhantom
2018-08-20ReversingMinds' Blog51ddh4r7h4
Advanced Brazilian Malware Analysis
N40
2018-08-09CISACISA
Malware Analysis Report (AR18-221A)
KEYMARBLE
2018-08-06rinse and REpeat analysisJames Haughom
Reversing Cerber - RaaS
Cerber
2018-07-26奇安信威胁情报中心 | 事件追踪
Analysis of the latest attack activities of APT-C-35
yty VICEROY TIGER