Malware Analysis Reports for Malware Management
Feb 2019 - CheckPoint - SpeakUp: A New Undetected Backdoor Linux Trojan
Dec 2018 - ESET - First Sednit UEFI Rootkit unveiled
Sept 2018 - PROOFPOINT - New modular downloaders fingerprint systems - Part 3: CobInt
Aug 2018 - PROOFPOINT - New modular downloaders fingerprint systems - Part 2: AdvisorsBot
Aug 2018 - PROOFPOINT - New modular downloaders fingerprint systems, prepare for more - Part 1: Marap (.IQY files)
Aug 2018 - ESET - Turla Outlook Backdoor
Apr 2018 - Symantec - New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia
Mar 2018 - FireEye - Exploring the Depths of Cmd.exe Obfuscation and Detection Techniques
Jan 2018 - MalPedia - Get reports and info on various malware families and their actors - MORE REPORTS
Dec 2017 - RSA - THE SHADOWS OF GHOSTS INSIDE THE RESPONSE OF A UNIQUE CARBANAK INTRUSION
Nov 2017 - Minerva Labs - “Emotet goes more evasive
Oct 2017 - FireEye - Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea
Oct 2017 - Talos - “Cyber Conflict” Decoy Document Used In Real Cyber Conflict - Latest APT28 attack
Mar 2017 - Palo Alto - Pulling back the Curtains on EncodedCommand PowerShell Attacks
Mar 2017 - Symantec - The increased use of PowerShell in Attacks
Mar 2017 - Kaspersky - From Shamoon to StoneDrill
Feb 2017 - Kaspersky - Fileless attacks against enterprise networks ( A GREAT reason to do good logging, it would catch this)
Aug 2016 - SecureWorks - Malware lingers with BITS
Aug 2016 - Kaspersky - Project Sauron - Top level cyber-espionage platform covertly extracts encrypted government comms
Mar 2016 - Fortinet - Dridex's New and Undiscovered Recipes
Mar 2016 - SANS ISC - Analysis of the Cyber Attack on the Ukrainian Power Grid
Feb 2016 - FireEye/Mandiant - M-Trends 2016 - Good overview of Mandiant Consulting findings in 2015
Feb 2016 - TrendLabs - FightPOS get worm routine
Feb 2016 - InfoSec Institute - PoS Malware: All you need to know - Good list of many of the PoS malware variants with details
Jan 2016 - ZScaler - Malicious Office Files Dropping Kasidet and Dridex
Jan 2016 - Arbor Networks Blog on Uncovering the Seven Pointed Dagger - Trochilus RAT
Jan 2016 - EmsiSoft Blog on Ransom32 Java cross platform Ransomware
2015 - F-Secure repo of whitepapers on Advanced Malware (Regin, BlackEnergy, CozyDuke and many others)
Dec 2015 - HackerHurricane - Dridex Analysis shows tricky shutdown and boot up persistence and how to detect and clean it
Dec 2015 - Pro PoS, Threat Spotlight: Holiday Greetings from Pro PoS – Is your payment card data someone else’s Christmas present?
Dec 2015 - Nemesis, Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record
Nov 2015 - Destover, Toolset linked to Destover Attacker’s arsenal helps them to broaden attack surface
Oct 2015 - iSight Partners ModPoS: MALWARE BEHAVIOR, CAPABILITIES AND COMMUNICATIONS
Sept 2015 - PaloAlto Networks - Chinese actors use '3102' malware on attacks of US Governemnt and EU media. Similar to the '9002' malware of 2014
Sept 2015 - DrWeb finds MWZLesson POS Malware using parts of older malware
http://news.drweb.com/show/?i=9615&lng=en&c=5
Sept 2015 - IBM Security Shifu Banking Malware attacking Japanese banks
Aug 2015 - Arbor Networks Blog on Defending the White Elephant - PlugX
Aug 2015 - Symantec - Regin: Top-tier espionage tool enables stealthy surveillance
Aug 2015 - SecureWorks - Revealing the Cyber-Kraken - Multiple Verticals
Aug 2015 - SecureWorks - Threat Group 3390 - Multiple verticals
July 2015 - FireEye Hammertoss, Cyber Threat Group APT29
June 2015 - Duqu 2.1 Kaspersky Labs updates their research
Feb 2015 - Carbanak - Kaspersky The Great bank Robbery
Aug 2014 - Analysis of Dridex / Cridex / Feodo / Bugat
Linux:
IptabLes/IptabLex (linux)
http://blog.malwaremustdie.org/2014/06/mmd-0025-2014-itw-infection-of-elf.html
http://storage.pardot.com/9892/121392/TA_DDos_Binary___Bot_IptabLes_v6_US.pdf
MAC:
OSXGetShell
http://www.symantec.com/security_response/writeup.jsp?docid=2013-020412-3611-99&tabid=2
WINDOWS:
BackOff - Retail PoS
https://www.us-cert.gov/ncas/alerts/TA14-212A
http://blog.trendmicro.com/trendlabs-security-intelligence/new-pos-malware-backoff-targets-us/
http://www.invincea.com/2014/09/analysis-of-backoff-pos-malware-gripping-the-retail-sector-reveals-lack-of-sophistication-in-malware/
CryptoLocker - Crypto
http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24786/en_US/McAfee_Labs_Threat_Advisory_Ransom_Cryptolocker.pdf
Chewbacca - Retail PoS
https://blogs.rsa.com/rsa-uncovers-new-pos-malware-operation-stealing-payment-card-personal-information/
Dexter/Project Hook - Retail Pos
http://www.arbornetworks.com/asert/wp-content/uploads/2013/12/Dexter-and-Project-Hook-Break-the-Bank.pdf
BlackPoS/Kaptoxa - Retail PoS
http://www.securitycurrent.com/resources/files/KAPTOXA-Point-of-Sale-Compromise.pdf (iSight Partners)
http://blogs.mcafee.com/mcafee-labs/analyzing-the-target-point-of-sale-malware
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24927/en_US/McAfee_Labs_Threat_Advisory_EPOS_Data_Theft.pdf
http://securityintelligence.com/target-data-breach-kaptoxa-pos-malware/
Red October
http://securelist.com/analysis/publications/36740/red-october-diplomatic-cyber-attacksinvestigation/
http://securelist.com/analysis/36830/red-october-detailed-malware-description-1-first-stage-of-attack/
SysPrep/Cryptbase.dll Priv Escalation
http://www.symantec.com/security_response/earthlink_writeup.jsp?docid=2014-050812-0239-99
The Snake/ Uroburos
http://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf
http://www.viruslist.com/sp/analysis?pubid=207271262
WinNTI (Discovered by us in June 2012 using this methodology)
http://securelist.com/analysis/internal-threats-reports/37029/winnti-more-than-just-a-game/
Mandiant APT1
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
Shady Rat
http://www.symantec.com/connect/blogs/truth-behind-shady-rat
Duqu
http://www.kaspersky.com/about/press/major_malware_outbreaks/duqu
http://www.secureworks.com/cyber-threat-intelligence/threats/duqu/
http://www.symantec.com/outbreak/?id=stuxnet
Stuxnet
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
http://www.codeproject.com/Articles/246545/Stuxnet-Malware-Analysis-Paper
http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf
https://www.mandiant.com/blog/stuxnet-memory-analysis-ioc-creation/
Gameover Zeus
http://www.secureworks.com/cyber-threat-intelligence/threats/The_Lifecycle_of_Peer_to_Peer_Gameover_ZeuS/
Zues/SpyEye
http://www.ioactive.com/pdfs/ZeusSpyEyeBankingTrojanAnalysis.pdf
Gauss
http://securelist.com/analysis/36620/gauss-abnormal-distribution/
Mini-Flame
http://securelist.com/blog/virus-watch/31730/miniflame-aka-spe-elvis-and-his-friends-5/
SkyWiper/Flame
http://securelist.com/blog/incidents/34216/full-analysis-of-flames-command-control-servers-27/
http://www.academia.edu/2394954/Flame_Malware_Analysis
http://securelist.com/blog/incidents/33002/flame-replication-via-windows-update-mitm-proxy-server-18/
http://www.crysys.hu/skywiper/skywiper.pdf
ZeroAccess
http://nakedsecurity.sophos.com/zeroaccess2/
http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99&tabid=2
Shamoon
http://securelist.com/blog/incidents/57854/shamoon-the-wiper-copycats-at-work/
http://securelist.com/blog/incidents/57784/shamoon-the-wiper-further-details-part-ii/
Wiper
http://www.secureworks.com/cyber-threat-intelligence/threats/wiper-malware-analysis-attacking-korean-financial-sector/