Click here to download all references as Bib-File.•
| 2016-01-01
⋅
Forcepoint
⋅
Analysis of a Botnet Campaign Jaku |
| 2015-12-26
⋅
Flashpoint
⋅
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis vSkimmer |
| 2015-12-01
⋅
CERT.PL
⋅
ZeuS-P2P monitoring and analysis Gameover P2P |
| 2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
| 2015-11-20
⋅
A king's ransom: an analysis of the CTB-locker ransomware CTB Locker |
| 2015-10-09
⋅
InfoSec Institute
⋅
Beta Bot Analysis: Part 1 |
| 2015-10-06
⋅
Palo Alto Networks Unit 42
⋅
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes Upatre |
| 2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 1 Andromeda |
| 2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 2 Andromeda |
| 2015-09-11
⋅
GovCERT.ch
⋅
Fobber Analysis Fobber |
| 2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
| 2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
| 2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
| 2015-07-23
⋅
SecurityIntelligence
⋅
An Analysis of the Qadars Banking Trojan Qadars |
| 2015-07-02
⋅
InfoSec Institute
⋅
Win32/Lethic Botnet Analysis |
| 2015-06-26
⋅
Rovnix Payload Analysis ReactorBot |
| 2015-05-20
⋅
Sentrant
⋅
Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day Bedep |
| 2015-05-15
⋅
Malware Digger
⋅
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P) ReactorBot Rovnix |
| 2015-04-13
⋅
Hybrid-Analysis
⋅
sqlconnt1.exe Mangzamel |
| 2015-04-09
⋅
Kaspersky Labs
⋅
The Banking Trojan Emotet: Detailed Analysis Emotet |