Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-20InfoSec InstitutePedro Tavares
@online{tavares:20220420:mars:6bb8872, author = {Pedro Tavares}, title = {{Mars Stealer malware analysis}}, date = {2022-04-20}, organization = {InfoSec Institute}, url = {https://resources.infosecinstitute.com/topic/mars-stealer-malware-analysis/}, language = {English}, urldate = {2022-07-25} } Mars Stealer malware analysis
Mars Stealer
2015-10-09InfoSec InstituteAyoub Faouzi
@online{faouzi:20151009:beta:fffb6be, author = {Ayoub Faouzi}, title = {{Beta Bot Analysis: Part 1}}, date = {2015-10-09}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/beta-bot-analysis-part-1/#gref}, language = {English}, urldate = {2020-01-07} } Beta Bot Analysis: Part 1
2015-09-29InfoSec InstituteAyoub Faouzi
@online{faouzi:20150929:andromeda:543098f, author = {Ayoub Faouzi}, title = {{Andromeda Bot Analysis part 2}}, date = {2015-09-29}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/andromeda-bot-analysis-part-two/}, language = {English}, urldate = {2020-01-07} } Andromeda Bot Analysis part 2
Andromeda
2015-09-29InfoSec InstituteAyoub Faouzi
@online{faouzi:20150929:andromeda:06d70c0, author = {Ayoub Faouzi}, title = {{Andromeda Bot Analysis part 1}}, date = {2015-09-29}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/andromeda-bot-analysis/}, language = {English}, urldate = {2020-01-13} } Andromeda Bot Analysis part 1
Andromeda
2015-07-02InfoSec InstituteShaman Vilen
@online{vilen:20150702:win32lethic:9d26f93, author = {Shaman Vilen}, title = {{Win32/Lethic Botnet Analysis}}, date = {2015-07-02}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/win32lethic-botnet-analysis/}, language = {English}, urldate = {2019-12-10} } Win32/Lethic Botnet Analysis
2015-02-27InfoSec InstituteRyan Mazerik
@online{mazerik:20150227:scanbox:867abf2, author = {Ryan Mazerik}, title = {{ScanBox Framework}}, date = {2015-02-27}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/scanbox-framework/}, language = {English}, urldate = {2020-01-13} } ScanBox Framework
scanbox
2011-04-19InfoSec InstituteInfosec Institute
@online{institute:20110419:tdss:9ffae6b, author = {Infosec Institute}, title = {{TDSS part 1: The x64 Dollar Question}}, date = {2011-04-19}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/tdss4-part-1/}, language = {English}, urldate = {2020-01-06} } TDSS part 1: The x64 Dollar Question
2010-11-20InfoSec InstituteGiuseppe Bonfa
@online{bonfa:20101120:kernelmode:b6d039e, author = {Giuseppe Bonfa}, title = {{The Kernel-Mode Device Driver Stealth Rootkit}}, date = {2010-11-20}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/}, language = {English}, urldate = {2020-01-13} } The Kernel-Mode Device Driver Stealth Rootkit
ZeroAccess
2010-11InfoSec InstituteGiuseppe Bonfa
@online{bonfa:201011:zeroaccess:fd02426, author = {Giuseppe Bonfa}, title = {{ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper}}, date = {2010-11}, organization = {InfoSec Institute}, url = {http://resources.infosecinstitute.com/step-by-step-tutorial-on-reverse-engineering-malware-the-zeroaccessmaxsmiscer-crimeware-rootkit/}, language = {English}, urldate = {2019-12-17} } ZEROACCESS MALWARE - PART 1: De-Obfuscating and Reversing the User-Mode Agent Dropper
ZeroAccess