Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-08US-CERTUS-CERT
@online{uscert:20210208:malware:f32efbc, author = {US-CERT}, title = {{Malware Analysis Report (AR21-039B): MAR-10320115-1.v1 - TEARDROP}}, date = {2021-02-08}, organization = {US-CERT}, url = {https://us-cert.cisa.gov/ncas/analysis-reports/ar21-039b}, language = {English}, urldate = {2021-02-09} } Malware Analysis Report (AR21-039B): MAR-10320115-1.v1 - TEARDROP
TEARDROP
2018-06-27Github (9b)9b
@online{9b:20180627:latest:5770e87, author = {9b}, title = {{Latest observed JS payload used for APT32 profiling}}, date = {2018-06-27}, organization = {Github (9b)}, url = {https://gist.github.com/9b/141a5c7ab8b4280901722e2cd931b7ef}, language = {English}, urldate = {2020-01-09} } Latest observed JS payload used for APT32 profiling
Unidentified JS 001 (APT32 Profiler)
2017-06-19root9broot9b
@techreport{root9b:20170619:shelltea:13b1ebd, author = {root9b}, title = {{SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry}}, date = {2017-06-19}, institution = {root9b}, url = {https://raw.githubusercontent.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/master/2017/2017.06.19.SHELLTEA_POSLURP_MALWARE/PoS%20Malware%20ShellTea%20PoSlurp_0.pdf}, language = {English}, urldate = {2021-03-22} } SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
FIN8
2017-06-19root9broot9b
@techreport{root9b:20170619:shelltea:223ad32, author = {root9b}, title = {{SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry}}, date = {2017-06-19}, institution = {root9b}, url = {https://www.root9b.com/sites/default/files/whitepapers/PoS%20Malware%20ShellTea%20PoSlurp.pdf}, language = {English}, urldate = {2021-03-24} } SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
PoSlurp FIN8
2017-06root9bMicrosoftroot9b
@online{microsoftroot9b:201706:shelltea:a318e75, author = {Microsoftroot9b}, title = {{SHELLTEA + POSLURP MALWARE: MEMORY-RESIDENT POINT-OF-SALE MALWARE ATTACKS INDUSTRY}}, date = {2017-06}, organization = {root9b}, url = {https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32/FakeRean#technicalDiv}, language = {English}, urldate = {2020-01-08} } SHELLTEA + POSLURP MALWARE: MEMORY-RESIDENT POINT-OF-SALE MALWARE ATTACKS INDUSTRY
FakeRean
2015-08root9broot9b
@techreport{root9b:201508:technical:fff6a0b, author = {root9b}, title = {{TECHNICAL FOLLOW UP - APT28}}, date = {2015-08}, institution = {root9b}, url = {https://www.root9b.com/sites/default/files/whitepapers/root9b_follow_up_report_apt28.pdf}, language = {English}, urldate = {2020-01-08} } TECHNICAL FOLLOW UP - APT28
XTunnel
2015-05-10root9broot9b
@techreport{root9b:20150510:apt28:1aab571, author = {root9b}, title = {{APT28 Targets Financial Markets}}, date = {2015-05-10}, institution = {root9b}, url = {https://www.root9b.com/sites/default/files/whitepapers/R9b_FSOFACY_0.pdf}, language = {English}, urldate = {2020-01-13} } APT28 Targets Financial Markets