Click here to download all references as Bib-File.•
2024-01-13
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Shellcode Analysis and C2 Extraction Cobalt Strike |
2024-01-11
⋅
Forescout
⋅
Clearing the Fog of War – A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine |
2024-01-10
⋅
Medium icebre4ker
⋅
Analysis of an Info Stealer — Chapter 2: The iOS App |
2024-01-09
⋅
0x0d4y
⋅
IcedID – Technical Malware Analysis [Second Stage] IcedID PhotoLoader |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Powershell decoding and .NET C2 Extraction (Quasar RAT) Quasar RAT |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Simple Javascript Decoding and C2 Extraction (Redline Stealer) RedLine Stealer |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Javascript Malware Analysis - Decoding an AgentTesla Loader Agent Tesla |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Decoding Obfuscated Powershell and HTA Files (Lumma Stealer) Lumma Stealer |
2024-01-07
⋅
nikhilh-20
⋅
INC Linux Ransomware - Sandboxing with ELFEN and Analysis INC |
2024-01-06
⋅
kienmanowar Blog
⋅
[QuickNote] Technical Analysis of recent Pikabot Core Module Pikabot |
2024-01-05
⋅
IBM
⋅
Tomb Crypter and ChrGetPdsi Stealer Analysis Report (INT00011701) Broomstick ChrGetPdsi Stealer |
2024-01-01
⋅
Sekoia
⋅
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit |
2023-12-28
⋅
AhnLab
⋅
Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed AlphaSeed Appleseed |
2023-12-26
⋅
Github (VenzoV)
⋅
Pikabot Loader analysis, round 2! Pikabot |
2023-12-20
⋅
ThreatMon
⋅
GhostLocker Ransomware Analysis Report (Paywall) GhostLocker |
2023-12-18
⋅
Medium (Cryptax)
⋅
Organizing malware analysis with Colander: example on Android/WyrmSpy WyrmSpy |
2023-12-13
⋅
Stairwell
⋅
Kuiper ransomware analysis: Stairwell’s technical report |
2023-12-08
⋅
Twitter (@embee_research)
⋅
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction Cobalt Strike |
2023-12-01
⋅
⋅
Genians
⋅
Cases of attacks disguised as North Korean market price analysis documents, etc. CVE-2022-41128 vulnerability called with HWP, HWPX, DOCX, XLSX files |
2023-12-01
⋅
LianSecurity
⋅
BOOMSLANG Mobile fraud family analysis |