Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-04-22int 0xcc blogRaashid Bhat
Dissecting Emotet’s network communication protocol
Emotet
2018-09-18int 0xcc blogRaashid Bhat
A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait
SmokeLoader
2018-09-06int 0xcc blogRaashid Bhat
Dissecting DEloader malware with obfuscation
Zloader