Click here to download all references as Bib-File.•
| 2017-10-05
⋅
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell KopiLuwak |
| 2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
| 2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |