Click here to download all references as Bib-File.•
2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-04-22
⋅
int 0xcc blog
⋅
Dissecting Emotet’s network communication protocol Emotet |
2018-09-18
⋅
int 0xcc blog
⋅
A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait SmokeLoader |
2018-09-06
⋅
int 0xcc blog
⋅
Dissecting DEloader malware with obfuscation Zloader |