Click here to download all references as Bib-File.•
2015-10-06
⋅
Palo Alto Networks Unit 42
⋅
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes Upatre |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 1 Andromeda |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 2 Andromeda |
2015-09-11
⋅
GovCERT.ch
⋅
Fobber Analysis Fobber |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-23
⋅
SecurityIntelligence
⋅
An Analysis of the Qadars Banking Trojan Qadars |
2015-07-02
⋅
InfoSec Institute
⋅
Win32/Lethic Botnet Analysis |
2015-06-26
⋅
Rovnix Payload Analysis ReactorBot |
2015-05-20
⋅
Sentrant
⋅
Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day Bedep |
2015-05-15
⋅
Malware Digger
⋅
Rovnix Dropper Analysis (TrojanDropper:Win32/Rovnix.P) ReactorBot Rovnix |
2015-04-13
⋅
Hybrid-Analysis
⋅
sqlconnt1.exe Mangzamel |
2015-04-09
⋅
Kaspersky Labs
⋅
The Banking Trojan Emotet: Detailed Analysis Emotet |
2015-04-06
⋅
Novetta
⋅
WINNTI ANALYSIS Winnti |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |
2015-02-24
⋅
Symantec
⋅
W32.Ramnit analysis Ramnit |