Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-20Outpost24Alberto Marín
@online{marn:20231120:unveiling:5bde1c0, author = {Alberto Marín}, title = {{Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection}}, date = {2023-11-20}, organization = {Outpost24}, url = {https://outpost24.com/blog/lummac2-anti-sandbox-technique-trigonometry-human-detection/}, language = {English}, urldate = {2023-11-22} } Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection
Lumma Stealer
2023-10-03Outpost24David Catalan
@online{catalan:20231003:rhadamanthys:fb542d8, author = {David Catalan}, title = {{Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis}}, date = {2023-10-03}, organization = {Outpost24}, url = {https://outpost24.com/blog/rhadamanthys-malware-analysis/}, language = {English}, urldate = {2023-10-05} } Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis
Rhadamanthys
2023-04-05Outpost24Alberto Marín
@online{marn:20230405:everything:44474d9, author = {Alberto Marín}, title = {{Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing}}, date = {2023-04-05}, organization = {Outpost24}, url = {https://outpost24.com/blog/everything-you-need-to-know-lummac2-stealer}, language = {English}, urldate = {2023-04-12} } Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing
Lumma Stealer