Update README.md

This commit is contained in:
Sokow86 2021-03-29 09:24:16 +02:00 committed by GitHub
parent 949466acc6
commit 5bb12a8e06
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -2,7 +2,6 @@
Just another collection of links, tools, reports and other stuff
# Table of Contents
* [Malware Reports
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#malware-reports)
* [Infostealer / Banking Malware
@ -61,6 +60,8 @@ Just another collection of links, tools, reports and other stuff
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#regretlocker)
* [HelloKitty
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#hellokitty)
* [DearCry
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#dearcry)
* [APT
](https://github.com/Sokow86/awesome-malware-resources/blob/main/README.md#apt)
* [Tutorials
@ -328,6 +329,10 @@ Daniel Bunce (0verfl0w_) - SentinelOne
### REvil
[2021]
* [The DFIR Report - Sodinokibi (aka REvil) Ransomware](https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/)
[2020]
* [German users targeted with Gootkit banker or REvil ransomware ](https://blog.malwarebytes.com/threat-analysis/2020/11/german-users-targeted-with-gootkit-banker-or-revil-ransomware/)
@ -357,7 +362,7 @@ Daniel Bunce (0verfl0w_) - SentinelOne
[2020]
* [RegretLocker Ransomware Analysis by Chuong Dong](http://chuongdong.com/reverse engineering/2020/11/17/RegretLocker/)
* [RegretLocker Ransomware Analysis by Chuong Dong](http://chuongdong.com/reverse%20engineering/2020/11/17/RegretLocker/)
### HelloKitty
@ -365,6 +370,14 @@ Daniel Bunce (0verfl0w_) - SentinelOne
* [HelloKitty Ransomware Lacks Stealth, But Still Strikes Home](https://labs.sentinelone.com/hellokitty-ransomware-lacks-stealth-but-still-strikes-home/)
### DearCry
[2021]
* [Internals of DearCry Ransomware !](https://0xthreatintel.medium.com/internals-of-dearcry-ransomware-507b84ae9ba8)
* [
DearCry ransomware attacks exploit Exchange server vulnerabilities](https://news.sophos.com/en-us/2021/03/15/dearcry-ransomware-attacks-exploit-exchange-server-vulnerabilities/)
## APT
* [Dissecting APT21 samples using a step-by-step approach](https://cybergeeks.tech/dissecting-apt21-samples-using-a-step-by-step-approach/)
@ -382,7 +395,8 @@ Daniel Bunce (0verfl0w_) - SentinelOne
### Courses
[Zero2Auto - Vitali Kremez, Overflow](https://courses.zero2auto.com)
* [Zero2Auto - Vitali Kremez, Overflow](https://courses.zero2auto.com)
* [Hasherezade - Malware Training Vol1](https://github.com/hasherezade/malware_training_vol1)
### Overview of Malware Techniques