Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-12-11YouTube (AGDC Services)AGDC Services
@online{services:20211211:how:358bd74, author = {AGDC Services}, title = {{How To Extract & Decrypt Qbot Configs Across Variants}}, date = {2021-12-11}, organization = {YouTube (AGDC Services)}, url = {https://www.youtube.com/watch?v=M22c1JgpG-U}, language = {English}, urldate = {2021-12-20} } How To Extract & Decrypt Qbot Configs Across Variants
QakBot
2021-11-13YouTube (AGDC Services)AGDC Services
@online{services:20211113:automate:487e01f, author = {AGDC Services}, title = {{Automate Qbot Malware String Decryption With Ghidra Script}}, date = {2021-11-13}, organization = {YouTube (AGDC Services)}, url = {https://www.youtube.com/watch?v=4I0LF8Vm7SI}, language = {English}, urldate = {2021-11-19} } Automate Qbot Malware String Decryption With Ghidra Script
QakBot
2021-02-17YouTube (AGDC Services)AGDC Services
@online{services:20210217:how:d492b9b, author = {AGDC Services}, title = {{How Malware Can Resolve APIs By Hash}}, date = {2021-02-17}, organization = {YouTube (AGDC Services)}, url = {https://www.youtube.com/watch?v=q8of74upT_g}, language = {English}, urldate = {2021-02-24} } How Malware Can Resolve APIs By Hash
Emotet Mailto
2021-01-18Youtube ( AGDC Services)AGDC Services
@online{services:20210118:how:30d311c, author = {AGDC Services}, title = {{How To Reverse Engineer RC4 Crypto For Malware Analysis}}, date = {2021-01-18}, organization = {Youtube ( AGDC Services)}, url = {https://www.youtube.com/watch?v=-EQKiIbOLEc}, language = {English}, urldate = {2021-01-26} } How To Reverse Engineer RC4 Crypto For Malware Analysis
2019-10-25AGDC ServicesAGDC Services
@online{services:20191025:deep:291f303, author = {AGDC Services}, title = {{The Deep Dive Malware Analysis Approach}}, date = {2019-10-25}, organization = {AGDC Services}, url = {https://agdcservices.com/blog/the-deep-dive-malware-analysis-approach/}, language = {English}, urldate = {2021-01-11} } The Deep Dive Malware Analysis Approach