Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-17MalwarebytesThreat Intelligence Team
@online{team:20170717:its:4b94b0b, author = {Threat Intelligence Team}, title = {{It’s baaaack: Public cyber enemy Emotet has returned}}, date = {2017-07-17}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/trojans/2020/07/long-dreaded-emotet-has-returned/}, language = {English}, urldate = {2020-07-17} } It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-07-14MalwarebytesMalwarebytes Labs
@online{labs:20170714:keeping:0759a8b, author = {Malwarebytes Labs}, title = {{Keeping up with the Petyas: Demystifying the malware family}}, date = {2017-07-14}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/cybercrime/2017/07/keeping-up-with-the-petyas-demystifying-the-malware-family/}, language = {English}, urldate = {2019-12-20} } Keeping up with the Petyas: Demystifying the malware family
EternalPetya GoldenEye PetrWrap Petya
2017-07-12MalwarebytesMalwarebytes Labs
@online{labs:20170712:net:7efe3ac, author = {Malwarebytes Labs}, title = {{A .NET malware abusing legitimate ffmpeg}}, date = {2017-07-12}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/07/malware-abusing-ffmpeg/}, language = {English}, urldate = {2019-12-20} } A .NET malware abusing legitimate ffmpeg
MobiRAT
2017-06-30MalwarebytesMalwarebytes Labs
@online{labs:20170630:eternalpetya:122fb36, author = {Malwarebytes Labs}, title = {{EternalPetya – yet another stolen piece in the package?}}, date = {2017-06-30}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/06/eternalpetya-yet-another-stolen-piece-package/}, language = {English}, urldate = {2019-12-20} } EternalPetya – yet another stolen piece in the package?
EternalPetya
2017-06-29MalwarebytesMalwarebytes Labs
@online{labs:20170629:eternalpetya:bdd5896, author = {Malwarebytes Labs}, title = {{EternalPetya and the lost Salsa20 key}}, date = {2017-06-29}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/06/eternalpetya-lost-salsa20-key/}, language = {English}, urldate = {2019-12-20} } EternalPetya and the lost Salsa20 key
EternalPetya
2017-06-08MalwarebytesMalwarebytes
@online{malwarebytes:20170608:latentbot:9f46488, author = {Malwarebytes}, title = {{LatentBot piece by piece}}, date = {2017-06-08}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/06/latentbot/}, language = {English}, urldate = {2019-11-16} } LatentBot piece by piece
LatentBot
2017-05-19MalwarebytesAdam McNeil
@online{mcneil:20170519:how:fac33a7, author = {Adam McNeil}, title = {{How did the WannaCry ransomworm spread?}}, date = {2017-05-19}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/cybercrime/2017/05/how-did-wannacry-ransomworm-spread/}, language = {English}, urldate = {2019-12-20} } How did the WannaCry ransomworm spread?
WannaCryptor
2017-05-05MalwarebytesThomas Reed
@online{reed:20170505:snake:01961aa, author = {Thomas Reed}, title = {{Snake malware ported from Windows to Mac}}, date = {2017-05-05}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/05/snake-malware-ported-windows-mac/}, language = {English}, urldate = {2019-12-20} } Snake malware ported from Windows to Mac
Uroburos
2017-05-01MalwarebytesThomas Reed
@online{reed:20170501:another:74546e3, author = {Thomas Reed}, title = {{Another OSX.Dok dropper found installing new backdoor}}, date = {2017-05-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/05/another-osx-dok-dropper-found-installing-new-backdoor/}, language = {English}, urldate = {2019-12-20} } Another OSX.Dok dropper found installing new backdoor
Bella
2017-04-21MalwarebytesMalwarebytes Labs
@online{labs:20170421:elusive:3f45f0e, author = {Malwarebytes Labs}, title = {{Elusive Moker Trojan is back}}, date = {2017-04-21}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/04/elusive-moker-trojan/}, language = {English}, urldate = {2019-12-20} } Elusive Moker Trojan is back
Moker
2017-04-20MalwarebytesJérôme Segura
@online{segura:20170420:binary:eaa706a, author = {Jérôme Segura}, title = {{Binary Options malvertising campaign drops ISFB banking Trojan}}, date = {2017-04-20}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/04/binary-options-malvertising-campaign-drops-isfb-banking-trojan/}, language = {English}, urldate = {2019-12-20} } Binary Options malvertising campaign drops ISFB banking Trojan
ISFB
2017-04-06MalwarebytesMalwarebytes Labs
@online{labs:20170406:diamond:5788882, author = {Malwarebytes Labs}, title = {{Diamond Fox – part 2: let’s dive in the code}}, date = {2017-04-06}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/04/diamond-fox-p2/}, language = {English}, urldate = {2019-12-20} } Diamond Fox – part 2: let’s dive in the code
DiamondFox
2017-03-29MalwarebytesMalwarebytes Labs
@online{labs:20170329:explained:dc19964, author = {Malwarebytes Labs}, title = {{Explained: Sage ransomware}}, date = {2017-03-29}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/03/explained-sage-ransomware/}, language = {English}, urldate = {2019-12-20} } Explained: Sage ransomware
SAGE
2017-03-17MalwarebytesMalwarebytes Labs
@online{labs:20170317:diamond:67bf9e6, author = {Malwarebytes Labs}, title = {{Diamond Fox – part 1: introduction and unpacking}}, date = {2017-03-17}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/03/diamond-fox-p1/}, language = {English}, urldate = {2019-12-20} } Diamond Fox – part 1: introduction and unpacking
DiamondFox
2017-03-10MalwarebytesMalwarebytes Labs
@online{labs:20170310:explained:4186cb4, author = {Malwarebytes Labs}, title = {{Explained: Spora ransomware}}, date = {2017-03-10}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/03/spora-ransomware/}, language = {English}, urldate = {2019-12-20} } Explained: Spora ransomware
Spora
2017-02-27MalwarebytesMalwarebytes Labs
@online{labs:20170227:new:e13a158, author = {Malwarebytes Labs}, title = {{New Neutrino Bot comes in a protective loader}}, date = {2017-02-27}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/02/new-neutrino-bot-comes-in-a-protective-loader/}, language = {English}, urldate = {2019-12-20} } New Neutrino Bot comes in a protective loader
Neutrino
2017-01-31MalwarebytesMalwarebytes Labs
@online{labs:20170131:locky:92db484, author = {Malwarebytes Labs}, title = {{Locky Bart ransomware and backend server analysis}}, date = {2017-01-31}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/01/locky-bart-ransomware-and-backend-server-analysis/}, language = {English}, urldate = {2019-12-20} } Locky Bart ransomware and backend server analysis
Locky
2017-01-26MalwarebytesMalwarebytes Labs
@online{labs:20170126:zbot:b625eef, author = {Malwarebytes Labs}, title = {{Zbot with legitimate applications on board}}, date = {2017-01-26}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/cybercrime/2017/01/zbot-with-legitimate-applications-on-board/}, language = {English}, urldate = {2019-12-20} } Zbot with legitimate applications on board
Zloader
2017-01-18MalwarebytesThomas Reed
@online{reed:20170118:new:e34009a, author = {Thomas Reed}, title = {{New Mac backdoor using antiquated code}}, date = {2017-01-18}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/}, language = {English}, urldate = {2019-12-20} } New Mac backdoor using antiquated code
FruitFly
2017-01-11MalwarebytesJérôme Segura, hasherezade
@online{segura:20170111:postholiday:054ffb8, author = {Jérôme Segura and hasherezade}, title = {{Post-holiday spam campaign delivers Neutrino Bot}}, date = {2017-01-11}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/cybercrime/2017/01/post-holiday-spam-campaign-delivers-neutrino-bot/}, language = {English}, urldate = {2019-10-28} } Post-holiday spam campaign delivers Neutrino Bot
Neutrino