Click here to download all references as Bib-File.•
| 2015-04-09
⋅
Kaspersky Labs
⋅
The Banking Trojan Emotet: Detailed Analysis Emotet |
| 2015-04-06
⋅
Novetta
⋅
WINNTI ANALYSIS Winnti |
| 2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
| 2015-02-24
⋅
Symantec
⋅
W32.Ramnit analysis Ramnit |
| 2015-01-29
⋅
JPCERT/CC
⋅
Analysis of a Recent PlugX Variant - “P2P PlugX” PlugX |
| 2015-01-20
⋅
G Data
⋅
Analysis of Project Cobra Cobra Carbon System |
| 2014-11-26
⋅
CIRCL
⋅
TR-23 Analysis - NetWiredRC malware NetWire RC |
| 2014-11-01
⋅
Novetta
⋅
ZoxPNG Analysis BLACKCOFFEE |
| 2014-10-28
⋅
Novetta
⋅
Derusbi (Server Variant) Analysis Derusbi |
| 2014-10-02
⋅
CodeAndSec
⋅
FinFisher Malware Analysis - Part 2 FinFisher RAT |
| 2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
| 2014-08-07
⋅
Secureworks
⋅
Malware Analysis of the Lurk Downloader Lurk |
| 2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
| 2014-07-16
⋅
StopMalvertising
⋅
Mini Analysis of the TinyBanker Tinba Tinba |
| 2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
| 2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
| 2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
| 2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
| 2014-04-27
⋅
StopMalvertising
⋅
Analysis of the Predator Pain Keylogger HawkEye Keylogger |
| 2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |