Click here to download all references as Bib-File.
2021-04-17 ⋅ YouTube (Worcester DEFCON Group) ⋅ Inside IcedID: Anatomy Of An Infostealer IcedID |
2021-02-03 ⋅ TA551/Shathak Threat Research IcedID |
2020-06-17 ⋅ Nettitude Labs ⋅ Detecting PoshC2 – Indicators of Compromise PoshC2 |
2020-01-01 ⋅ Github (nettitude) ⋅ Repository for Python Server for PoshC2 PoshC2 |
2014-04-17 ⋅ Nettitude Labs ⋅ A quick analysis of the latest Shadow Brokers dump DarkPulsar |