Click here to download all references as Bib-File.
2017-10-05 ⋅ Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell KopiLuwak |
2015-11-03 ⋅ Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
2015-10-28 ⋅ Reversing the C2C HTTP Emmental communication Retefe |