Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-08-08ForcepointNicholas Griffin
MONSOON - Analysis Of An APT Campaign
BadNews TinyTyphon QUILTED TIGER
2016-08-08ForcepointAbel Toro, Andy Settle, Nicholas Griffin
MONSOON – ANALYSIS OF AN APT CAMPAIGN
BadNews TinyTyphon QUILTED TIGER
2016-08-01UperesiaFelix Weyne
Analysis of a packed Pony downloader
Pony
2016-08-01MalwarebytesMalwarebytes Labs
Shakti Trojan: Technical Analysis
Shakti
2016-07-12Joseph Landry, Udi Shamir
Malware Discovered – SFG: Furtim Malware Analysis
2016-05-23Reporting and Analysis Centre for Information Assurance MELANISpecialist Staff
Technical Report about the Malware used in the Cyberespionage against RUAG
Turla
2016-05-17ESET ResearchAnton Cherepanov
Operation Groundbait: Analysis of a surveillance toolkit
Prikormka
2016-05-09Malware Traffic AnalysisBrad Duncan
PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX
Bedep Unidentified 025 (Clickfraud)
2016-01-23LinkCabinLinkCabin
Imminent Monitor 4 RAT Analysis – A Glance
Imminent Monitor RAT
2016-01-01Group-IBGroup-IB
Analysis of Attacks against Trading and Bank Card Systems
Ranbyus
2016-01-01ForcepointAbel Toro, Andy Settle, Bapadittya Dey, Nicholas Griffin
Analysis of a Botnet Campaign
Jaku
2015-12-26FlashpointVitali Kremez
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis 
vSkimmer
2015-12-01CERT.PLCERT.PL
ZeuS-P2P monitoring and analysis
Gameover P2P
2015-11-300x3A SecurityYonathan Klijnsma
Inside Braviax/FakeRean: An analysis and history of a FakeAV family
2015-11-20Jos Wetzels
A king's ransom: an analysis of the CTB-locker ransomware
CTB Locker
2015-10-09InfoSec InstituteAyoub Faouzi
Beta Bot Analysis: Part 1
2015-10-06Palo Alto Networks Unit 42Richard Wartell
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes
Upatre
2015-09-29InfoSec InstituteAyoub Faouzi
Andromeda Bot Analysis part 1
Andromeda
2015-09-29InfoSec InstituteAyoub Faouzi
Andromeda Bot Analysis part 2
Andromeda