Click here to download all references as Bib-File.•
2025-08-08
⋅
abuse.ch
⋅
MalwareBazaar | SHA256 6e1b152e34c76fab5414c4210a28bb5ca47b2155e6205e58e7df78ee9de6cb64 (MorpheusLoader) Morpheus Loader |
2025-08-08
⋅
K7 Security
⋅
Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload Cmimai Stealer |
2025-08-08
⋅
AhnLab
⋅
Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project Rhadamanthys SmartLoader |
2025-08-08
⋅
Reverse The Malware
⋅
Detecting and Identifying Hidden Processes (Volatility Edition) |
2025-08-08
⋅
Reverse The Malware
⋅
Detecting and Identifying Hidden Processes (Rekall Edition) |
2025-08-08
⋅
Reverse The Malware
⋅
Detecting and Identifying Hidden Processes (MemProcFs Edition) |
2025-08-08
⋅
Reverse The Malware
⋅
Reverse Engineering ANY.RUN Sandbox |
2025-08-07
⋅
abuse.ch
⋅
MalwareBazaar | SHA256 c1d781f4c9469977a32f2ad6edea4fda98e6a8eda5aa10149be2311cb369c48a (XTinyLoader) XTinyLoader |
2025-08-06
⋅
Kaspersky
⋅
Spyware that pretends to be an antivirus LunaSpy |
2025-08-06
⋅
ANY.RUN
⋅
PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and Technology PylangGhost GolangGhost |
2025-08-06
⋅
Reverse The Malware
⋅
Reverse Engineering My Name is Yuyun Worm |
2025-08-06
⋅
Silent Push
⋅
Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569 FAKEUPDATES MintsLoader Parrot TDS Parrot TDS WebShell Raspberry Robin |
2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
2025-08-05
⋅
The DFIR Report
⋅
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira AdaptixC2 Akira BumbleBee |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of Word Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of DLL Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of PDF Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |