Click here to download all references as Bib-File.•
2015-01-29
⋅
JPCERT/CC
⋅
Analysis of a Recent PlugX Variant - “P2P PlugX” PlugX |
2015-01-20
⋅
G Data
⋅
Analysis of Project Cobra Cobra Carbon System |
2014-11-26
⋅
CIRCL
⋅
TR-23 Analysis - NetWiredRC malware NetWire RC |
2014-11-01
⋅
Novetta
⋅
ZoxPNG Analysis BLACKCOFFEE |
2014-10-28
⋅
Novetta
⋅
Derusbi (Server Variant) Analysis Derusbi |
2014-10-02
⋅
CodeAndSec
⋅
FinFisher Malware Analysis - Part 2 FinFisher RAT |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-08-07
⋅
Secureworks
⋅
Malware Analysis of the Lurk Downloader Lurk |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-07-16
⋅
StopMalvertising
⋅
Mini Analysis of the TinyBanker Tinba Tinba |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
2014-04-27
⋅
StopMalvertising
⋅
Analysis of the Predator Pain Keylogger HawkEye Keylogger |
2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |
2014-03-18
⋅
Windigo Linux Analysis – Ebury and Cdorked CDorked |