Click here to download all references as Bib-File.•
2015-09-11
⋅
GovCERT.ch
⋅
Fobber Analysis Fobber |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-23
⋅
SecurityIntelligence
⋅
An Analysis of the Qadars Banking Trojan Qadars |
2015-07-02
⋅
InfoSec Institute
⋅
Win32/Lethic Botnet Analysis |
2015-06-26
⋅
Rovnix Payload Analysis ReactorBot |
2015-05-20
⋅
Sentrant
⋅
Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day Bedep |
2015-05-15
⋅
Malware Digger
⋅
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P) ReactorBot Rovnix |
2015-04-13
⋅
Hybrid-Analysis
⋅
sqlconnt1.exe Mangzamel |
2015-04-09
⋅
Kaspersky Labs
⋅
The Banking Trojan Emotet: Detailed Analysis Emotet |
2015-04-06
⋅
Novetta
⋅
WINNTI ANALYSIS Winnti |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-02-24
⋅
Symantec
⋅
W32.Ramnit analysis Ramnit |
2015-01-29
⋅
JPCERT/CC
⋅
Analysis of a Recent PlugX Variant - “P2P PlugX” PlugX |
2015-01-20
⋅
G Data
⋅
Analysis of Project Cobra Cobra Carbon System |
2014-11-26
⋅
CIRCL
⋅
TR-23 Analysis - NetWiredRC malware NetWire RC |
2014-11-01
⋅
Novetta
⋅
ZoxPNG Analysis BLACKCOFFEE |
2014-10-28
⋅
Novetta
⋅
Derusbi (Server Variant) Analysis Derusbi |
2014-10-02
⋅
CodeAndSec
⋅
FinFisher Malware Analysis - Part 2 FinFisher RAT |