Click here to download all references as Bib-File.•
2017-10-05
⋅
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell KopiLuwak |
2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |