Click here to download all references as Bib-File.
2023-01-16 ⋅ Medium elis531989 ⋅ Dancing With Shellcodes: Analyzing Rhadamanthys Stealer Rhadamanthys |
2022-12-14 ⋅ Cybereason ⋅ Royal Rumble: Analysis of Royal Ransomware Royal Ransom |
2022-04-27 ⋅ Medium elis531989 ⋅ The chronicles of Bumblebee: The Hook, the Bee, and the Trickbot connection BumbleBee TrickBot |
2022-02-16 ⋅ Medium elis531989 ⋅ Highway to Conti: Analysis of Bazarloader BazarBackdoor |
2021-11-09 ⋅ Cybereason ⋅ THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware Cobalt Strike Conti |
2021-09-22 ⋅ Cybereason ⋅ Threat Analysis Report: PrintNightmare and Magniber Ransomware Magniber |
2021-09-21 ⋅ Medium elis531989 ⋅ The Squirrel Strikes Back: Analysis of the newly emerged cobalt-strike loader “SquirrelWaffle” Cobalt Strike Squirrelwaffle |
2021-06-21 ⋅ Medium elis531989 ⋅ Dissecting and automating Hancitor’s config extraction Hancitor |
2021-05-29 ⋅ Twitter (@elisalem9) ⋅ Tweet on obfuscation mechanism and extraction procedure of COBALTSTRIKE beacon module used by NOBELIUM/UNC2452 Cobalt Strike |
2021-05-04 ⋅ Twitter (@elisalem9) ⋅ Tweet on analysis of N3tw0rm ransomware |
2021-04-19 ⋅ Medium elis531989 ⋅ Dancing With Shellcodes: Cracking the latest version of Guloader CloudEyE |
2021-04-12 ⋅ Twitter (@elisalem9) ⋅ Tweets on QakBot QakBot |
2021-01-19 ⋅ Medium elis531989 ⋅ Funtastic Packers And Where To Find Them Get2 IcedID QakBot |
2020-11-17 ⋅ Cybereason ⋅ CHAES: Novel Malware Targeting Latin American E-Commerce |
2020-05-28 ⋅ Cybereason ⋅ Valak: More than Meets the Eye Valak |
2019-12-11 ⋅ Cybereason ⋅ Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware Anchor WIZARD SPIDER |
2019-02-13 ⋅ Cybereason ⋅ Astaroth Malware Uses Legitimate OS and Antivirus Processes to Steal Passwords and Personal Data Astaroth |
2019-01-03 ⋅ Cybereason ⋅ LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack sLoad |