References

Type
Url
Description

technique

http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-Dissecting-DGAs-Eight-Real-Wo

Sternfeld, U. (2016). Dissecting Domain Generation Algorithms: Eight Real World DGA Variants. Retrieved February 18, 2019.


technique

https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/

Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.


technique

https://www.welivesecurity.com/2017/12/21/sednit-update-fancy-bear-spent-year/

ESET. (2017, December 21). Sednit update: How Fancy Bear Spent the Year. Retrieved February 18, 2019.


technique

https://arxiv.org/pdf/1611.00791.pdf

Ahuja, A., Anderson, H., Grant, D., Woodbridge, J.. (2016, November 2). Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. Retrieved April 26, 2019.


technique

https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html

Dunwoody, M.. (2017, April 3). Dissecting One of APT29’s Fileless WMI and PowerShell Backdoors (POSHSPY). Retrieved April 5, 2017.


technique

http://csis.pace.edu/~ctappert/srd2017/2017PDF/d4.pdf

Chen, L., Wang, T.. (2017, May 5). Detecting Algorithmically Generated Domains Using Data Visualization and N-Grams Methods . Retrieved April 26, 2019.


technique

http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html

Brumaghin, E. et al. (2017, September 18). CCleanup: A Vast Number of Machines at Risk. Retrieved March 9, 2018.


technique

https://unit42.paloaltonetworks.com/threat-brief-understanding-domain-generation-algorithms-dga/

Unit 42. (2019, February 7). Threat Brief: Understanding Domain Generation Algorithms (DGA). Retrieved February 19, 2019.


technique

https://attack.mitre.org/techniques/T1568/002


technique

http://www.pretentiousname.com/misc/win7_uac_whitelist2.html

Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014.