Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2015-07-02InfoSec InstituteShaman Vilen
Win32/Lethic Botnet Analysis
2015-06-26Hanan Natan
Rovnix Payload Analysis
ReactorBot
2015-05-20SentrantSergei Frankoff
Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day
Bedep
2015-05-15Malware DiggerHanan Natan
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P)
ReactorBot Rovnix
2015-04-13Hybrid-AnalysisHybrid-Analysis
sqlconnt1.exe
Mangzamel
2015-04-09Kaspersky LabsAlexey Shulmin
The Banking Trojan Emotet: Detailed Analysis
Emotet
2015-04-06NovettaNovetta
WINNTI ANALYSIS
Winnti
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-02-24SymantecSymantec Security Response
W32.Ramnit analysis
Ramnit
2015-01-29JPCERT/CCShusei Tomonaga
Analysis of a Recent PlugX Variant - “P2P PlugX”
PlugX
2015-01-20G DataG Data
Analysis of Project Cobra
Cobra Carbon System
2014-11-26CIRCLCIRCL
TR-23 Analysis - NetWiredRC malware
NetWire RC
2014-11-01NovettaNovetta
ZoxPNG Analysis
BLACKCOFFEE
2014-10-28NovettaNovetta
Derusbi (Server Variant) Analysis
Derusbi
2014-10-02CodeAndSecCodeAndSec
FinFisher Malware Analysis - Part 2
FinFisher RAT
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-08-07SecureworksBrett Stone-Gross
Malware Analysis of the Lurk Downloader
Lurk
2014-08-01Coding and SecurityCoding, Security
Soraya Malware Analysis - Dropper
soraya
2014-07-16StopMalvertisingKimberly
Mini Analysis of the TinyBanker Tinba
Tinba
2014-07-15Palo Alto Networks Unit 42Josh Grunzweig
Unit 42 Technical Analysis: Seaduke
SEADADDY