Click here to download all references as Bib-File.
2023-11-21 ⋅ Medium infoSec Write-ups ⋅ Unmasking NJRat: A Deep Dive into a Notorious Remote Access Trojan Part1 NjRAT |
2023-11-16 ⋅ Medium g0njxa ⋅ Approaching stealers devs : a brief interview with LummaC2 Lumma Stealer |
2023-10-26 ⋅ Medium walmartglobaltech ⋅ SmartApeSG NetSupportManager RAT |
2023-10-20 ⋅ Medium walmartglobaltech ⋅ IcedID gets Loaded Unidentified 111 (IcedID Loader) |
2023-09-19 ⋅ Medium (@DCSO_CyTec) ⋅ #ShortAndMalicious — DarkGate DarkGate |
2023-09-07 ⋅ Medium (@simone.kraus) ⋅ Critical Energy Infrastructure Facility Attack In Ukraine |
2023-08-30 ⋅ Medium walmartglobaltech ⋅ Gazavat / Expiro DMSniff connection and DGA analysis DMSniff Expiro |
2023-08-02 ⋅ Medium (@morimolymoly) ⋅ HUI Loader — Malware Analysis Note HUI Loader |
2023-07-31 ⋅ Medium (csg-govtech) ⋅ China-Backed Hackers Threaten Texas Military Sites, Utilities |
2023-07-23 ⋅ Medium infoSec Write-ups ⋅ Unpacking an Emotet Trojan Emotet |
2023-07-18 ⋅ Medium walmartglobaltech ⋅ NemesisProject Nemesis |
2023-06-23 ⋅ Medium (Cryptax) ⋅ Inside KangaPack: the Kangaroo packer with native decryption FluHorse |
2023-06-23 ⋅ Medium ⋅ ObserverStealer: Unmasking the New Contender in Cyber Crime ObserverStealer |
2023-05-17 ⋅ Medium (@DCSO_CyTec) ⋅ Andariel’s “Jupiter” malware and the case of the curious C2 Jupiter |
2023-05-14 ⋅ Medium ⋅ Silent Echoes: The Hidden Dialogue among Malware Entities — Spotlight on AMOS InfoStealer AMOS Aurora Stealer TitanStealer |
2023-05-09 ⋅ Medium walmartglobaltech ⋅ MetaStealer string decryption and DGA overview MetaStealer |
2023-04-19 ⋅ Medium (@simone.kraus) ⋅ Rorschach Ransomware Analysis with Attack Flow Rorschach Ransomware |
2023-04-13 ⋅ Medium Invictus Incident Response ⋅ Ransomware in the cloud |
2023-04-05 ⋅ Medium Ilandu ⋅ PortDoor - APT Backdoor analysis ACBackdoor 8.t Dropper PortDoor |
2023-03-23 ⋅ Medium s2wlab ⋅ Scarcruft Bolsters Arsenal for targeting individual Android devices RambleOn RokRAT |