Click here to download all references as Bib-File.•
2021-07-23
⋅
Github (Lastline-Inc)
⋅
YARA rules, IOCs and Scripts for extracting IcedID C2s IcedID |
2020-06-02
⋅
Lastline Labs
⋅
Evolution of Excel 4.0 Macro Weaponization Agent Tesla DanaBot ISFB TrickBot Zloader |
2020-03-10
⋅
Lastline
⋅
IQY files and Paradise Ransomware Paradise |
2020-02-18
⋅
Lastline
⋅
Nemty Ransomware Scaling UP: APAC Mailboxes Swarmed by Dual Downloaders Nemty Phorpiex |
2019-09-30
⋅
Lastline
⋅
HELO Winnti: Attack or Scan? Winnti |
2019-01-11
⋅
Lastline
⋅
Threat Actor “Cold River”: Network Traffic Analysis and a Deep Dive on Agent Drable Cold River |
2018-05-31
⋅
Lastline
⋅
APT28 Rollercoaster: The Lowdown on Hijacked Lo |
2018-03-09
⋅
Lastline
⋅
From Russia(?) with Code Olympic Destroyer |
2018-02-21
⋅
Lastline
⋅
Olympic Destroyer: A new Candidate in South Korea Olympic Destroyer |
2017-12-19
⋅
Lastline
⋅
Novel Excel Spreadsheet Attack Launches Password Stealing Malware Loki Bot Loki Password Stealer (PWS) |
2017-12-13
⋅
Lastline
⋅
Tyupkin ATM Malware: Take The Money Now Or Never! Tyupkin |
2016-10-24
⋅
Lastline
⋅
Evasive Malware Detects and Defeats Virtual Machine Analysis |