Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2012-12-12Artem Baranov
Analysis of VirTool:WinNT/Exforel.A rootkit
2012-12-05Contagiodump BlogMila Parkour
OSX/Dockster.A and Win32/Trojan.Agent.AXMO Samples, pcaps, OSX malware analysis tools
Dockster
2012-10-23Trend MicroJames T. Bennett, Nart Villeneuve
Detecting APT Activity with Network Traffic Analysis
Enfal Gh0stnet Nitro sykipot taidoor
2012-09-28Dancho Danchev's BlogDancho Danchev
Dissecting 'Operation Ababil' - an OSINT Analysis
Cyber fighters of Izz Ad-Din Al Qassam
2012-08-23Trend MicroThreat Research Team
The Taidoor Campaign: AN IN-DEPTH ANALYSIS
taidoor Taidoor
2012-08-03Contagio DumpAndre DiMino
Cridex Analysis using Volatility
Feodo
2012-08-02Andre M. DiMino
Cridex Analysis using Volatility
Feodo
2012-07-22Malware.luMalware.lu
Xtreme RAT analysis
Xtreme RAT
2012-04-20StopMalvertisingKimberly
Analysis of DarkMegi aka NpcDark
DarkMegi
2012-04-16SANSRong Hwa Chong
Detailed Analysis Of Sykipot (Smartcard Proxy Variant)
APT4
2012-02-01Contagio DumpMila Parkour
TDL4 - Purple Haze (Pihar) Variant - sample and analysis
Alureon
2012-01-12Contagio DumpMila Parkour
Blackhole Ramnit - samples and analysis
Ramnit
2011-10-14SANSFrankie Fu Kay Li
A Detailed Analysis of an Advanced Persistent Threat Malware
ProjectWood
2011-10-13Frankie Fu Kay Li
A Detailed Analysis of an Advanced Persistent Threat Malware
woody
2011-10-07Contagiodump BlogMila Parkour
Rustock samples and analysis links. Rustock.C, E, I, J and other variants
Rustock
2011-09-09CodeProjectAmrThabet
Stuxnet Malware Analysis Paper
Stuxnet
2011-08-04Stop Malvertising RootkitsKimberly
Analysis of ngrBot
NgrBot
2011-07-07Contagio DumpMila Parkour
Rootkit TDL-4 (TDSS, Alureon.DX, Olmarik, TDL) 32-bit and 64-bit Sample + Analysis links - Update July 7
Alureon
2011-01-30Steven K
GpCode Ransomware 2010 Simple Analysis
GPCode
2010-03-03SecureworksJoe Stewart
BlackEnergy Version 2 Threat Analysis
BlackEnergy
2009-10-08Defence Intelligence, Ministry of Defence UKMatt Thompson
Mariposa Botnet Analysis
Mariposa
2009-06-23SecureworksJoe Stewart
Virut Encryption Analysis
Virut
2009-04-01Sophos LabsMike Wood, Niall Fitzgibbon
Conficker.C A Technical Analysis
2009-03-08SRI InternationalHassen Saidi, Phillip Porras, Vinod Yegneswaran
Conficker C Analysis
Conficker
2008-11-24NoVirusThanks BlogNoVirusThanks Blog
I-Worm/Nuwar.W + Rustock.E Variant – Analysis
Rustock
2007-12-16SecureworksJoe Stewart
Pushdo - Analysis of a Modern Malware Distribution System
Pushdo
2007-10-01Arbor NetworksJose Nazario
BlackEnergy DDoS Bot Analysis
BlackEnergy
2004-10-06F-SecureEro Carrera, Gergely Erdélyi
Digital genome mapping: advanced binary malware analysis
Bagle
2004-04-15SANS GIACMatt Goldencrown
MyDoom is Your Doom: An Analysis of the MyDoom Virus
MyDoom
2004-01-30Applied Watch TechnologiesEric S. Hines
MyDoom.B Worm Analysis
MyDoom