Click here to download all references as Bib-File.•
2017-01-31
⋅
Malwarebytes
⋅
Locky Bart ransomware and backend server analysis Locky |
2017-01-27
⋅
Joe's Security
⋅
Deep Analysis of Android Ransom Charger Charger |
2017-01-26
⋅
Fortinet
⋅
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer Rootnik |
2017-01-26
⋅
Fortinet
⋅
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java Rootnik |
2017-01-17
⋅
Malware Traffic Analysis
⋅
EITEST RIG-V FROM 92.53.127.86 SENDS SPORA RANSOMWARE Spora |
2017-01-13
⋅
Finfisher rootkit analysis FinFisher RAT |
2017-01-04
⋅
CERT.PL
⋅
Technical analysis of CryptoMix/CryptFile2 ransomware CryptoMix |
2016-12-27
⋅
ANALYSIS OF AUGUST STEALER MALWARE August Stealer |
2016-12-06
⋅
Fortinet
⋅
Deep Analysis of the Online Banking Botnet TrickBot TrickBot |
2016-12-03
⋅
Coding and Security
⋅
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis DistTrack |
2016-11-23
⋅
G Data
⋅
Analysis: Ursnif - spying on your data since 2007 Gozi |
2016-11-21
⋅
NowSecure
⋅
Android malware analysis with Radare: Dissecting the Triada Trojan Triada |
2016-11-08
⋅
SentinelOne
⋅
Analysis of IOS.GUIINJECT Adware Library GuiInject |
2016-10-27
⋅
Sekoia
⋅
Rootkit analysisUse case on HideDRV HideDRV |
2016-10-27
⋅
Simon Roses Femerling Blog
⋅
Mirai DDoS Botnet: Source Code & Binary Analysis Mirai |
2016-10-24
⋅
Lastline
⋅
Evasive Malware Detects and Defeats Virtual Machine Analysis |
2016-10-16
⋅
RapidityNetworks
⋅
Hajime: Analysis of a decentralizedinternet worm for IoT devices Hajime |
2016-10-11
⋅
Remsec driver analysis - Part 3 Remsec |
2016-10-10
⋅
Remsec driver analysis - Part 2 Remsec |
2016-10-03
⋅
Remsec driver analysis Remsec |