Skip to content
HP Wolf Security Blog
2021-05-12T07:38:03-07:00
HP Wolf Security Blog
Leading insights, research, and analysis from the HP threat analyst team
AUTHORS
Adrian Taylor
Alex Holland
Alon Nachmany
Bill Hackley
Dan Allen
Dr Michael McGuire
Fraser Kyne
Gavin Hill
Gregory Webb
Ian Pratt
Jack Walker
James Wright
Jennifer Carole
Jessica Morales
Joe Darbyshire
Joe Malinka
Dr Josh Stroschein
Juliann Klein
Kimberly Becan
Vadim Vadim
Lucy Gissing
Matthew Rowen
Michael Rosen
Parag Dixit
Patrick Schläpfer
Ratnesh Pandey
Robert Wiggenhorn
Sherban Naum
Simon Crosby
Simon Plant
Stuart Phillips
HP Wolf Security
Toby Gray
Tomo Kamimura
TOPIC
Into the Web of Profit
Threat Insights Reports
Threat Research
Uncategorized
Search Results
DATE
AUTHOR
TITLE
CLEAR FILTERS
February 26, 2021
Hancitor Infection Chain Analysis: An Examination of its Unpacking Routine and Execution Techniques
By:
Patrick Schläpfer
READ MORE
September 24, 2019
Reawakening of Emotet: An Analysis of its JavaScript Downloader
By:
Ratnesh Pandey
READ MORE
September 3, 2019
Deobfuscating Ostap: TrickBot’s 34,000 Line JavaScript Downloader
By:
Alex Holland
READ MORE