Click here to download all references as Bib-File.•
2023-11-20
⋅
Outpost24
⋅
Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection Lumma Stealer |
2023-10-03
⋅
Outpost24
⋅
Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis Rhadamanthys |
2023-06-13
⋅
Outpost24
⋅
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism UAC-0118 |
2023-04-05
⋅
Outpost24
⋅
Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing Lumma Stealer |