Common Information
Type Value
Value
explorer.exe
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2016-07-29 9 Backdooring DLL’s Part 2 – Joe's Security Blog
Details Website 2016-07-22 1 Analyzing H1N1v2: Battle injection and dynamic imports in search of configs
Details Website 2016-07-12 195 Malware Discovered - SFG: Furtim Malware Analysis
Details Website 2016-07-01 9 A year of Windows kernel font fuzzing #2: the techniques
Details Website 2016-06-30 92 Asruex: Malware Infecting through Shortcut Files - JPCERT/CC Eyes
Details Website 2016-06-22 3 Dridex is Watching You
Details Website 2016-06-21 46 The Curious Case of an Unknown Trojan Targeting German-Speaking Users
Details Website 2016-06-17 1 Dridex is Watching You
Details Website 2016-06-14 50 New Sofacy Attacks Against US Government Agency
Details Website 2016-05-26 60 Vawtrak Trojan: Bank on it Evolving
Details Website 2016-05-18 7 Digital Forensics – ShimCache Artifacts
Details Pdf 2016-05-18 392 Operation Groundbait: Analysis of a surveillance toolkit
Details Website 2016-05-10 46 Large Kovter digitally-signed malvertising campaign and MSRT cleanup release - Microsoft Security Blog
Details Website 2016-05-06 38 7ev3n ransomware turning 'HONE$T' | Malwarebytes Labs
Details Website 2016-04-28 9 Research Spotlight: The Resurgence of Qbot
Details Pdf 2016-04-28 26 LordianMosuela-April16-v3.indd
Details Website 2016-04-26 4 Dridex Update: Moving to US Financials with VNC
Details Website 2016-04-26 4 Dridex Update: Moving to US Financials with VNC
Details Website 2016-04-09 20 toolsmith #115: Volatility Acuity with VolUtility
Details Pdf 2016-03-31 75 RANSOMWARE
Details Website 2016-03-31 3 The evolution of Brazilian Malware
Details Website 2016-03-21 2 Let’s Analyze: Dridex (Part 1) – MalwareTech
Details Website 2016-03-11 14 Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market | Proofpoint US
Details Website 2016-03-11 16 Cerber ransomware: new, but mature | Malwarebytes Labs
Details Website 2016-02-25 26 System, Memory and Network Forensic Analysis with Log2timeline and Splunk (part 2)