Click here to download all references as Bib-File.
2019-07-30 ⋅ int 0xcc blog ⋅ Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-04-22 ⋅ int 0xcc blog ⋅ Dissecting Emotet’s network communication protocol Emotet |
2018-09-18 ⋅ int 0xcc blog ⋅ A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait SmokeLoader |
2018-09-06 ⋅ int 0xcc blog ⋅ Dissecting DEloader malware with obfuscation Zloader |