Click here to download all references as Bib-File.
2023-11-20 ⋅ Outpost24 ⋅ Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection Lumma Stealer |
2023-10-03 ⋅ Outpost24 ⋅ Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis Rhadamanthys |
2023-04-05 ⋅ Outpost24 ⋅ Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing Lumma Stealer |