Click here to download all references as Bib-File.•
2024-12-04
⋅
Cleafy
⋅
DroidBot: Insights from a new Turkish MaaS fraud operation DroidBot |
2024-11-04
⋅
Cleafy
⋅
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM ToxicPanda |
2024-09-10
⋅
Cleafy
⋅
A new TrickMo saga: from Banking Trojan to Victim's Data Leak TrickMo |
2024-07-31
⋅
Cleafy
⋅
BingoMod: The new android RAT that steals money and wipes data BingoMod |
2024-03-24
⋅
Viuleeenz
⋅
Understanding API Hashing and build a rainbow table for LummaStealer Lumma Stealer |
2024-02-04
⋅
Viuleeenz
⋅
Understanding PEB and LDR Structures using IDA and LummaStealer Lumma Stealer |
2023-12-20
⋅
Viuleeenz
⋅
Applied Emulation - Decrypting Ursnif strings with Unicorn Gozi |
2023-11-15
⋅
Viuleeenz
⋅
Applied Emulation - Analysis of MarsStealer Mars Stealer |
2023-10-25
⋅
Viuleeenz
⋅
Vidar - payload inspection with static analysis Vidar |
2023-08-29
⋅
Viuleeenz
⋅
Agent Tesla - Building an effective decryptor Agent Tesla |
2023-06-27
⋅
Viuleeenz
⋅
IDA-Python - Locate a function independently from its offset |
2023-05-08
⋅
Viuleeenz
⋅
Extracting DDosia targets from process memory Dosia |
2023-03-21
⋅
Cleafy
⋅
Nexus: a new Android botnet? Nexus |
2023-03-14
⋅
Viuleeenz
⋅
Dynamic Binary Instrumentation for Malware Analysis Gozi |
2023-02-03
⋅
Cleafy
⋅
PixPirate: a new Brazilian Banking Trojan PixPirate |
2022-06-17
⋅
Cleafy
⋅
BRATA is evolving into an Advanced Persistent Threat BRATA |
2019-09-02
⋅
Viuleeenz
⋅
Manually unpacking of packed executable |