Common Information
Type | Value |
---|---|
Value |
explorer.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2014-03-12 | 41 | Uroburos: the snake rootkit | |||
Details | 2014-03-11 | 482 | Malware Memory Analysis for Non-Specialists: Investigating Publicly Available Memory Image for the Stuxnet Worm | |||
Details | Website | 2014-03-06 | 5 | Decoding Domain Generation Algorithms (DGAs) Part III - ZeusBot DGA Reproduction | ||
Details | 2014-03-04 | 119 | March-2014.indd | |||
Details | Website | 2014-02-20 | 1 | Decoding Domain Generation Algorithms (DGAs) Part II - Catching ZeusBot Injection into Explorer.exe | ||
Details | Website | 2014-02-12 | 4 | Decoding Domain Generation Algorithms (DGAs) - Part I | ||
Details | 2014-02-10 | 297 | Unveiling “Careto” - The Masked APT | |||
Details | Website | 2014-01-27 | 2 | VRT-2013-1003 (CVE-2013-6486): Pidgin uses clickable links to untrusted executables | ||
Details | Website | 2013-12-02 | 10 | XP 0-Day Payload Uses Multiple Anti-Analysis Tactics | ||
Details | Website | 2013-11-13 | 37 | Pray before you buy with Shylock | ||
Details | Website | 2013-10-14 | 26 | PE_MOFKSYS.A - Threat Encyclopedia | ||
Details | Website | 2013-10-11 | 1 | How to install/remove different Desktop Environments or Window Manager in Kali Linux 1.x | ||
Details | Website | 2013-10-07 | 82 | ...And (again!) ZeroAccess/Sirefef is NOT Dead (yet!) | ||
Details | 2013-09-26 | 254 | THE ‘ICEFOG’ APT: A TALE OF CLOAK AND THREE DAGGERS | |||
Details | 2013-09-19 | 45 | 2Q Report on Targeted Attack Campaigns | |||
Details | Website | 2013-09-11 | 127 | The “Kimsuky” Operation: A North Korean APT? | ||
Details | 2013-07-31 | 165 | August-2013.indd | |||
Details | Website | 2013-07-15 | 5 | HowTo: Detecting Persistence Mechanisms | ||
Details | Website | 2013-07-04 | 34 | Basic Malware Cleaning | ||
Details | 2013-07-01 | 136 | July2013.indd | |||
Details | Website | 2013-05-28 | 31 | Zeus Analysis - Memory Forensics via Volatility - Security Intelligence | ||
Details | 2013-05-20 | 105 | Safe: A Targeted Threat | |||
Details | Website | 2013-04-13 | 55 | reversing a botnet 2 – electric boogaloo – Joe's Security Blog | ||
Details | 2013-04-10 | 891 | Kaspersky Lab | |||
Details | 2013-03-27 | 163 | APT1: technical backstage |