/vx/Papers/Malware Defense/Malware Analysis/2015/

0 directories 232 files
List Grid
Name
Size Modified
Up
2015-01-06 - Linux DDoS Trojan hiding itself with an embedded rootkit.pdf
392 KiB
2015-01-08 - Getmypass Point of Sale Malware Update.pdf
328 KiB
2015-01-08 - Major malvertising campaign spreads Kovter Ad Fraud malware.pdf
1.8 MiB
2015-01-09 - Chanitor Downloader Actively Installing Vawtrak.pdf
734 KiB
2015-01-11 - The Mozart RAM Scraper.pdf
382 KiB
2015-01-13 - New Carberp variant heads down under.pdf
369 KiB
2015-01-14 - Catching the “Inception Framework” Phishing Attack.pdf
1.9 MiB
2015-01-15 - Weiterentwicklung anspruchsvoller Spyware- von Agent.BTZ zu ComRAT.pdf
92 KiB
2015-01-20 - Analysis of Project Cobra.pdf
94 KiB
2015-01-21 - The DGA of Symmi.pdf
326 KiB
2015-01-22 - Malvertising Leading To Flash Zero Day Via Angler Exploit Kit.pdf
1.1 MiB
2015-01-22 - New RATs Emerge from Leaked Njw0rm Source Code.pdf
184 KiB
2015-01-22 - Scarab attackers took aim at select Russian targets since 2012.pdf
613 KiB
2015-01-26 - Storm Chasing- Hunting Hurricane Panda.pdf
442 KiB
2015-02-04 - Pawn Storm Update- iOS Espionage App Found.pdf
166 KiB
2015-02-05 - Anatomy of a Brute Force Campaign- The Story of Hee Thai Limited.pdf
652 KiB
2015-02-09 - Anthem Breach May Have Started in April 2014.pdf
759 KiB
2015-02-12 - Mobile Malware Gang Steals Millions from South Korean Users.pdf
2.7 MiB
2015-02-15 - Carbanak.pdf
160 KiB
2015-02-16 - Equation- The Death Star of Malware Galaxy.pdf
276 KiB
2015-02-16 - How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last.pdf
1.4 MiB
2015-02-17 - Ali Baba, the APT group from the Middle East.pdf
423 KiB
2015-02-17 - Angry Android hacker hides Xbot malware in popular application icons .pdf
340 KiB
2015-02-17 - BE2 extraordinary plugins, Siemens targeting, dev fails.pdf
666 KiB
2015-02-17 - The Desert Falcons targeted attacks.pdf
2.3 MiB
2015-02-18 - Babar- espionage software finally found and put under the microscope.pdf
668 KiB
2015-02-18 - Babar- Suspected Nation State Spyware In The Spotlight.pdf
812 KiB
2015-02-18 - Meet Babar, a New Malware Almost Certainly Created by France.pdf
1.4 MiB
2015-02-18 - Sexually Explicit Material Used as Lures in Recent Cyber Attacks.pdf
289 KiB
2015-02-18 - Shooting Elephants.pdf
38 KiB
2015-02-19 - Arid Viper – Israel entities targeted by malware packaged with sex video.pdf
252 KiB
2015-02-20 - The DGAs of Necurs.pdf
1.0 MiB
2015-02-23 - Cyber Kung-Fu- The Great Firewall Art of DNS Poisoning.pdf
595 KiB
2015-02-25 - KINS Banking Trojan Source Code.pdf
84 KiB
2015-02-25 - Pony Sourcecode.pdf
82 KiB
2015-02-27 - ScanBox Framework.pdf
682 KiB
2015-02-27 - The Anthem Hack- All Roads Lead to China.pdf
2.9 MiB
2015-02-27 - VB2014 paper- The pluginer - Caphaw.pdf
1004 KiB
2015-03-03 - C99Shell not dead.pdf
186 KiB
2015-03-03 - PwnPOS- Old Undetected PoS Malware Still Causing Havoc.pdf
193 KiB
2015-03-04 - And you get a POS malware name...and you get a POS malware name....and you get a POS malware name.....pdf
1.0 MiB
2015-03-04 - New crypto ransomware in town - CryptoFortress.pdf
59 KiB
2015-03-04 - Who’s Really Spreading through the Bright Star-.pdf
951 KiB
2015-03-05 - Casper Malware- After Babar and Bunny, Another Espionage Cartoon.pdf
679 KiB
2015-03-06 - Animals in the APT Farm.pdf
1.3 MiB
2015-03-07 - Slave, Banatrix and ransomware.pdf
133 KiB
2015-03-09 - CryptoFortress mimics TorrentLocker but is a different ransomware.pdf
685 KiB
2015-03-10 - The DGA of Pykspa.pdf
450 KiB
2015-03-11 - Inside the EquationDrug Espionage Platform.pdf
1.4 MiB
2015-03-11 - Malvertising Targeting European Transit Users.pdf
1.7 MiB
2015-03-19 - Analyzing a Backdoor-Bot forthe MIPS Platform.pdf
75 KiB
2015-03-19 - FindPOS- New POS Malware Family Discovered.pdf
914 KiB
2015-03-19 - Rocket Kitten Showing Its Claws- Operation Woolen-GoldFish and the GHOLE campaign.pdf
398 KiB
2015-03-20 - Threat Spotlight- PoSeidon, A Deep Dive Into Point of Sale Malware.pdf
2.0 MiB
2015-03-28 - UACME.pdf
316 KiB
2015-03-30 - Fake Judicial Spam Leads to Backdoor with Fake Certificate Authority.pdf
2.7 MiB
2015-03-30 - New reconnaissance threat Trojan.Laziok targets the energy sector.pdf
594 KiB
2015-03-31 - Sinkholing Volatile Cedar DGA Infrastructure.pdf
330 KiB
2015-03-31 - Volatile Cedar - Analysis of a Global Cyber Espionage Campaign.pdf
189 KiB
2015-04-01 - NewPosThings Has New PoS Things.pdf
2.7 MiB
2015-04-09 - Beebone Botnet Takedown- Trend Micro Solutions.pdf
320 KiB
2015-04-09 - Operation Buhtrap, the trap for Russian accountants.pdf
907 KiB
2015-04-09 - The Banking Trojan Emotet- Detailed Analysis.pdf
924 KiB
2015-04-12 - SIMDA- A Botnet Takedown.pdf
2.7 MiB
2015-04-13 - Analyzing Gootkit's persistence mechanism (new ASEP inside!).pdf
347 KiB
2015-04-13 - Cyber Deterrence in Action- A story of one long HURRICANE PANDA campaign.pdf
458 KiB
2015-04-13 - sqlconnt1.exe.pdf
135 KiB
2015-04-14 - Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets.pdf
370 KiB
2015-04-15 - Betabot retrospective.pdf
1.8 MiB
2015-04-15 - Elite cyber crime group strikes back after attack by rival APT gang.pdf
619 KiB
2015-04-15 - Knowledge Fragment- Bruteforcing Andromeda Configuration Buffers.pdf
211 KiB
2015-04-15 - New POS Malware Emerges - Punkey.pdf
621 KiB
2015-04-15 - The Chronicles of the Hellsing APT- the Empire Strikes Back.pdf
2.7 MiB
2015-04-15 - The Chronicles of the Hellsing APT_the Empire Strikes Back.pdf
2.7 MiB
2015-04-17 - Andromeda-Gamarue bot loves JSON too (new versions details).pdf
836 KiB
2015-04-18 - Operation RussianDoll- Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack.pdf
87 KiB
2015-04-21 - Bedep’s DGA- Trading Foreign Exchange for Malware Domains.pdf
379 KiB
2015-04-27 - Attacks against Israeli & Palestinian interests.pdf
55 KiB
2015-04-27 - Threat Spotlight- TeslaCrypt – Decrypt It Yourself.pdf
1.0 MiB
2015-04-29 - Unboxing Linux-Mumblehard- Muttering spam from your servers.pdf
414 KiB
2015-05-04 - Threat Spotlight- Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors.pdf
659 KiB
2015-05-07 - Dissecting the “Kraken”.pdf
2.0 MiB
2015-05-10 - Third-Party Software Was Entry Point for Background-Check System Hack.pdf
138 KiB
2015-05-14 - The Naikon APT.pdf
559 KiB
2015-05-15 - Carefirst Blue Cross Breach Hits 1.1M.pdf
372 KiB
2015-05-17 - Newest addition to a happy family- KBOT.pdf
59 KiB
2015-05-18 - Cmstar Downloader- Lurid and Enfal’s New Cousin.pdf
247 KiB
2015-05-18 - TT Malware Log.pdf
135 KiB
2015-05-20 - Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day.pdf
963 KiB
2015-05-22 - The DGA of Ranbyus.pdf
445 KiB
2015-05-23 - NitlovePOS- Another New POS Malware.pdf
270 KiB
2015-05-26 - Moose – the router worm with an appetite for social networks.pdf
237 KiB
2015-05-28 - Unusual Exploit Kit Targets Chinese Users (Part 1).pdf
1.5 MiB
2015-05-29 -The MsnMM Campaigns - The Earliest Naikon APT Campaigns.pdf
2.4 MiB
2015-06-01 - Rhetoric Foreshadows Cyber Activity in the South China Sea.pdf
584 KiB
2015-06-01 - “Troldesh” – New Ransomware from Russia.pdf
733 KiB
2015-06-03 - Thamar Reservoir – An Iranian cyber-attack campaign against targets in the Middle East.pdf
157 KiB
2015-06-04 - KeyBase Keylogger Malware Family Exposed.pdf
841 KiB
2015-06-09 - New Data- Volatile Cedar Malware Campaign.pdf
824 KiB
2015-06-10 - The Mystery of Duqu 2.0- a sophisticated cyberespionage actor returns.pdf
1.9 MiB
2015-06-12 - Unusual Exploit Kit Targets Chinese Users (Part 2).pdf
1.0 MiB
2015-06-15 - Catching Up on the OPM Breach.pdf
556 KiB
2015-06-15 - Stegoloader- A Stealthy Information Stealer.pdf
282 KiB
2015-06-16 - Operation Lotus Blossom- A New Nation-State Cyberthreat-.pdf
58 KiB
2015-06-17 - The Spring Dragon APT.pdf
1.0 MiB
2015-06-18 - So Long, and Thanks for All the Domains.pdf
550 KiB
2015-06-19 - Digital Attack on German Parliament- Investigative Report on the Hack of the Left Party Infrastructure in Bundestag.pdf
791 KiB
2015-06-22 - Games are over- Winnti is now targeting pharmaceutical companies.pdf
857 KiB
2015-06-23 - Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign.pdf
82 KiB
2015-06-24 - Elusive HanJuan EK Drops New Tinba Version (updated).pdf
1.0 MiB
2015-06-24 - Stealthy Cyberespionage Campaign Attacks With Social Engineering.pdf
368 KiB
2015-06-24 - UnFIN4ished Business.pdf
55 KiB
2015-06-25 - Sundown EK Spreads LuminosityLink RAT- Light After Dark.pdf
222 KiB
2015-07-02 - Win32-Lethic Botnet Analysis.pdf
581 KiB
2015-07-05 - Spy Tech Company 'Hacking Team' Gets Hacked.pdf
280 KiB
2015-07-07 - Dyre Banking Trojan Exploits CVE-2015-0057.pdf
226 KiB
2015-07-08 - Animal Farm APT and the Shadow of French Intelligence.pdf
616 KiB
2015-07-08 - Butterfly- Profiting from high-level corporate attacks.pdf
748 KiB
2015-07-08 - Wild Neutron – Economic espionage threat actor returns with new tricks.pdf
820 KiB
2015-07-10 - Sednit APT Group Meets Hacking Team.pdf
167 KiB
2015-07-13 - Revisiting The Bunitu Trojan.pdf
618 KiB
2015-07-13 - “Forkmeiamfamous”- Seaduke, latest weapon in the Duke armory.pdf
1.1 MiB
2015-07-14 - BernhardPOS.pdf
422 KiB
2015-07-14 - TeslaCrypt 2.0 disguised as CryptoWall.pdf
737 KiB
2015-07-19 - The Faulty Precursor of Pykspa's DGA.pdf
580 KiB
2015-07-20 - Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor.pdf
208 KiB
2015-07-22 - Duke APT group's latest tools- cloud services and Linux support.pdf
240 KiB
2015-07-23 - An Analysis of the Qadars Banking Trojan.pdf
1.8 MiB
2015-07-27 - UPS- Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload.pdf
203 KiB
2015-07-30 - Operation Potao Express- Analysis of a cyber‑espionage toolkit.pdf
764 KiB
2015-07-30 - Sakula Malware Family.pdf
301 KiB
2015-07-31 - OTX Pulse on PlugX.pdf
34 KiB
2015-07-31 - OTX- FBI Flash 68 (PlugX).pdf
36 KiB
2015-08-05 - Threat Group 3390 Cyberespionage.pdf
418 KiB
2015-08-05 - Who’s Behind Your Proxy- Uncovering Bunitu’s Secrets.pdf
970 KiB
2015-08-10 - Darkhotel’s attacks in 2015.pdf
1.6 MiB
2015-08-10 - What’s Next in Malware After Kuluoz-.pdf
82 KiB
2015-08-12 - Islamic State Hacking Division.pdf
114 KiB
2015-08-12 - Tinba Trojan Sets Its Sights on Romania.pdf
2.1 MiB
2015-08-18 - Knowledge Fragment- Unwrapping Fobber.pdf
399 KiB
2015-08-18 - ransomware open-sources.pdf
123 KiB
2015-08-19 - Antak WebShell.pdf
114 KiB
2015-08-19 - Inside Neutrino botnet builder.pdf
864 KiB
2015-08-20 - Retefe Banking Trojan Targets Sweden, Switzerland and Japan.pdf
130 KiB
2015-08-24 - Sphinx- New Zeus Variant for Sale on the Black Market.pdf
165 KiB
2015-08-26 - Sphinx, a new variant of Zeus available for sale in the underground.pdf
533 KiB
2015-08-27 - London Calling- Two-Factor Authentication Phishing From Iran.pdf
745 KiB
2015-08-27 - New Spear Phishing Campaign Pretends to be EFF.pdf
920 KiB
2015-08-31 - Shifu- ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks.pdf
1.1 MiB
2015-09-01 - Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor.pdf
2.7 MiB
2015-09-01 - Fancy Bear.pdf
433 KiB
2015-09-03 - Three Variants of Murofet's DGA.pdf
151 KiB
2015-09-08 - Carbanak gang is back and packing new guns.pdf
484 KiB
2015-09-09 - Pony Stealer Malware.pdf
86 KiB
2015-09-09 - Satellite Turla- APT Command and Control in the Sky.pdf
1.9 MiB
2015-09-11 - CSI MacMark- Janicab.pdf
346 KiB
2015-09-11 - SUCEFUL- Next Generation ATM Malware.pdf
986 KiB
2015-09-12 - Stuxnet code.pdf
243 KiB
2015-09-14 - The Shade Encryptor- a Double Threat.pdf
440 KiB
2015-09-15 - In Pursuit of Optical Fibers and Troop Intel- Targeted Attack Distributes PlugX in Russia.pdf
767 KiB
2015-09-16 - Operation Iron Tiger- Attackers Shift from East Asia to the United States.pdf
36 KiB
2015-09-17 - The Dukes- 7 Years Of Russian Cyber-Espionage.pdf
884 KiB
2015-09-18 - Operation Arid Viper Slithers Back into View.pdf
268 KiB
2015-09-23 - Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media.pdf
282 KiB
2015-09-23 - Quaverse RAT- Remote-Access-as-a-Service.pdf
980 KiB
2015-09-23 - Ranbyus's DGA, Revisited.pdf
690 KiB
2015-09-24 - Credit Card-Scraping Kasidet Builder Leads to Spike in Detections.pdf
178 KiB
2015-09-24 - Kovter malware learns from Poweliks with persistent fileless registry update.pdf
365 KiB
2015-09-24 - Meet GreenDispenser- A New Breed of ATM Malware.pdf
430 KiB
2015-09-25 - Notes on Linux-Xor.DDoS.pdf
936 KiB
2015-09-28 - Gaza cybergang, where’s your IR team-.pdf
3.1 MiB
2015-09-28 - Hammertoss- What, Me Worry-.pdf
1.5 MiB
2015-09-28 - Two New PoS Malware Affecting US SMBs.pdf
2.7 MiB
2015-09-29 - Andromeda Bot Analysis part 1.pdf
1.2 MiB
2015-09-29 - Andromeda Bot Analysis part 2.pdf
962 KiB
2015-10-01 - Linux.Rekoobe.1.pdf
105 KiB
2015-10-06 - I am HDRoot! Part 1.pdf
481 KiB
2015-10-06 - MOKER- A NEW APT DISCOVERED WITHIN A SENSITIVE NETWORK.pdf
67 KiB
2015-10-06 - Targeted Attack Exposes OWA Weakness.pdf
110 KiB
2015-10-06 - Ticked Off- Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes.pdf
87 KiB
2015-10-07 - Hacker Group Creates Network of Fake LinkedIn Profiles.pdf
619 KiB
2015-10-08 - Dyre Malware Campaigners Innovate with Distribution Techniques.pdf
580 KiB
2015-10-09 - Beta Bot Analysis- Part 1.pdf
674 KiB
2015-10-09 - Latest TeslaCrypt Ransomware Borrows Code From Carberp Trojan.pdf
304 KiB
2015-10-12 - Keybase Logger-Clipboard-CredsStealer campaign.pdf
555 KiB
2015-10-13 - Dridex (Bugat v5) Botnet Takeover Operation.pdf
224 KiB
2015-10-13 - I am HDRoot! Part 2.pdf
1.0 MiB
2015-10-13 - New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries.pdf
2.7 MiB
2015-10-13 - Prolific Cybercrime Gang Favors Legit Login Credentials.pdf
81 KiB
2015-10-15 - Archivist.pdf
151 KiB
2015-10-16 - Surveillance Malware Trends- Tracking Predator Pain and HawkEye.pdf
190 KiB
2015-10-17 - How to Write Simple but Sound Yara Rules – Part 2.pdf
226 KiB
2015-10-19 - Github Repository for AllaKore.pdf
89 KiB
2015-10-22 - Pawn Storm Targets MH17 Investigation Team.pdf
2.7 MiB
2015-10-26 - Duuzer back door Trojan targets South Korea to take over computers.pdf
265 KiB
2015-10-28 - Reversing the C2C HTTP Emmental communication.pdf
1.2 MiB
2015-11-02 - Modular trojan for hidden access to a computer.pdf
1.4 MiB
2015-11-02 - Shifu – the rise of a self-destructive banking trojan.pdf
2.0 MiB
2015-11-02 - Troj-Cryakl-B.pdf
89 KiB
2015-11-03 - Reversing the SMS C&C protocol of Emmental (1st part - understanding the code).pdf
181 KiB
2015-11-04 - A Technical Look At Dyreza.pdf
670 KiB
2015-11-04 - DroidJack isn’t the only spying software out there- Avast discovers OmniRat.pdf
352 KiB
2015-11-04 - “Offline” Ransomware Encrypts Your Data without C&C Communication.pdf
480 KiB
2015-11-05 - Sphinx Moth- Expanding our knowledge of the “Wild Neutron” - “Morpho” APT.pdf
57 KiB
2015-11-06 - OmniRAT Takes Over Android Devices Through Social Engineering Tricks.pdf
2.4 MiB
2015-11-10 - Bookworm Trojan- A Model of Modular Architecture.pdf
781 KiB
2015-11-10 - Talking to Dridex (part 0) – inside the dropper.pdf
105 KiB
2015-11-11 - AbaddonPOS- A new point of sale threat linked to Vawtrak.pdf
578 KiB
2015-11-11 - Operation Buhtrap malware distributed via ammyy.com.pdf
478 KiB
2015-11-16 - Introducing LogPOS.pdf
502 KiB
2015-11-16 - Shining the Spotlight on Cherry Picker PoS Malware.pdf
267 KiB
2015-11-17 - New Memory Scraping Technique in Cherry Picker PoS Malware.pdf
196 KiB
2015-11-20 - A king's ransom- an analysis of the CTB-locker ransomware.pdf
1007 KiB
2015-11-25 - Detecting GlassRAT using Security Analytics and ECAT.pdf
189 KiB
2015-11-30 - Inside Braviax-FakeRean- An analysis and history of a FakeAV family.pdf
104 KiB
2015-12-01 - China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets.pdf
110 KiB
2015-12-01 - Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools.pdf
2.7 MiB
2015-12-03 - Colombians major target of email campaigns delivering Xtreme RAT.pdf
569 KiB
2015-12-04 - Sofacy APT hits high profile targets with updated toolset.pdf
819 KiB
2015-12-07 - Iran-based attackers use back door threats to spy on Middle Eastern targets.pdf
41 KiB
2015-12-08 - Packrat- Seven Years of a South American Threat Actor.pdf
4.5 MiB
2015-12-08 - VT Report for SmartEyes.pdf
38 KiB
2015-12-09 - Inside Chimera Ransomware - the first 'doxingware' in wild.pdf
950 KiB
2015-12-11 - LATENTBOT- Trace Me If You Can.pdf
3.3 MiB
2015-12-15 - Newcomers in the Derusbi family.pdf
274 KiB
2015-12-16 - Nemucod malware spreads ransomware Teslacrypt around the world.pdf
780 KiB
2015-12-17 - SlemBunk- An Evolving Android Trojan Family Targeting Users of Worldwide Banking Apps.pdf
1.4 MiB
2015-12-18 - Attack on French Diplomat Linked to Operation Lotus Blossom.pdf
396 KiB
2015-12-22 - BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger.pdf
712 KiB
2015-12-22 - Kraken's two Domain Generation Algorithms.pdf
977 KiB
2015-12-26 - Backdoor- Win32-Hesetox.A- vSkimmer POS Malware Analysis .pdf
503 KiB
2015-12-31 - Overseas -Dark Inn- organization launched an APT attack on executives of domestic enterprises.pdf
738 KiB