Click here to download all references as Bib-File.•
| 2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |
| 2014-02-16
⋅
Put As blog
⋅
Analysis of CoinThief/A "dropper" CoinThief |
| 2014-02-14
⋅
Secureworks
⋅
Analysis of DHS NCCIC Indicators jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT |
| 2014-01-01
⋅
circl.lu
⋅
TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos Cobra Carbon System Uroburos Turla |
| 2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
| 2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
| 2013-09-24
⋅
AT&T
⋅
OSX/Leverage.a Analysis Leverage |
| 2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
| 2013-09-01
⋅
Eternal Todo
⋅
Yet another Andromeda / Gamarue analysis Andromeda |
| 2013-07-19
⋅
BlackHat
⋅
End-to-End Analysis of a Domain Generating Algorithm Malware Family SuppoBox |
| 2013-05-30
⋅
CIRCL
⋅
Analysis of a stage 3 Miniduke sample MiniDuke |
| 2013-05-29
⋅
CIRCL
⋅
Malware analysis report of a Backdoor.Snifula variant Snifula |
| 2013-03-29
⋅
Computer Incident Response Center Luxembourg
⋅
Analysis Report (TLP:WHITE) Analysis of a PlugX variant (PlugX version 7.0) PlugX |
| 2012-12-15
⋅
Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2) Sedreco |
| 2012-12-12
⋅
Analysis of VirTool:WinNT/Exforel.A rootkit |
| 2012-12-05
⋅
Contagiodump Blog
⋅
OSX/Dockster.A and Win32/Trojan.Agent.AXMO Samples, pcaps, OSX malware analysis tools Dockster |
| 2012-10-23
⋅
Trend Micro
⋅
Detecting APT Activity with Network Traffic Analysis Enfal Gh0stnet Nitro sykipot taidoor |
| 2012-09-28
⋅
Dancho Danchev's Blog
⋅
Dissecting 'Operation Ababil' - an OSINT Analysis Cyber fighters of Izz Ad-Din Al Qassam |
| 2012-08-23
⋅
Trend Micro
⋅
The Taidoor Campaign: AN IN-DEPTH ANALYSIS taidoor Taidoor |
| 2012-08-03
⋅
Contagio Dump
⋅
Cridex Analysis using Volatility Feodo |