<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>contagio.deependresearch.org</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>APT/</Key><LastModified>2018-05-19T02:50:46.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/</Key><LastModified>2018-05-19T02:50:57.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/028ebdeea729a8c18ca1406ff102088d U.S. Assiatance to North Korea.zip</Key><LastModified>2023-01-19T05:26:53.000Z</LastModified><ETag>&quot;4887e4e89e285590f1eb19a183309211&quot;</ETag><Size>59043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/2024-08-22_Win_Peaklight.zip</Key><LastModified>2024-09-02T16:13:34.000Z</LastModified><ETag>&quot;ec8423eda6416a5c5983dc4258f80f95-3&quot;</ETag><Size>39783210</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/2024-09-18 Earth Baxia APT China RIPCOY _ SWORDLDR Samples.zip</Key><LastModified>2024-09-20T01:06:46.000Z</LastModified><ETag>&quot;3ad2ae9e3c32b5f64016530d1dfa7af1&quot;</ETag><Size>9697375</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/36b8f38a18856e5d5484ee5ef933706cb8372047470c63d6017d638448716dac_Final File of F4 un.zip</Key><LastModified>2023-01-19T05:23:34.000Z</LastModified><ETag>&quot;96f0af067047d01af6895172d23dcc09&quot;</ETag><Size>1314538</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/37ac149b6dc8b377d481b8d5b3147039b2aecbfe834f300a97f8de14c2a_North_Korea.zip</Key><LastModified>2023-01-19T05:49:30.000Z</LastModified><ETag>&quot;6aa6a8b2700f40c051aaa6006672a846&quot;</ETag><Size>51043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/4f6e68bff29aed584a68c21616dd8c052ba0eee220c911d98b9bb9fabe7db06a_win32update.exe.zip</Key><LastModified>2023-01-19T05:15:26.000Z</LastModified><ETag>&quot;af10a35227a208a27819c4a03cd85b36&quot;</ETag><Size>11383</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/56F0AEE46D36BB43BED513172E39A38E-North Korea.zip</Key><LastModified>2023-01-19T05:44:08.000Z</LastModified><ETag>&quot;939c919f626b583b84bf707268a8e4e5&quot;</ETag><Size>50887</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/APT_0eb3ec50b891c437186233ac2058c849269b384bbeda23cbde6e64f6443b1802_國防部人力司招聘「專案研究助理.pdf_sample.zip</Key><LastModified>2023-01-19T06:33:10.000Z</LastModified><ETag>&quot;1307141a13351fa56d4ed804fd6253a4&quot;</ETag><Size>77072</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/APT_5464cfb7c8912c0dbc8b97ac342efd1b39561dba1cb47f69ee70114c7908565a_U.S. ship thwarts second pirate attack November 18, 2009_sample.zip</Key><LastModified>2023-01-19T06:49:01.000Z</LastModified><ETag>&quot;a472989f9dda54cb643882fea837619c&quot;</ETag><Size>60087</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/CVE-2009-3957 PDF 2009-09-21 E42F8E662D39A31B596D86504B9DC287 RANDInfo.zip</Key><LastModified>2023-01-19T05:17:37.000Z</LastModified><ETag>&quot;5da572d7f1d48add81c621f7cfe28d50&quot;</ETag><Size>161011</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/CalypsoAPT_win_samp.zip</Key><LastModified>2019-11-11T05:15:10.000Z</LastModified><ETag>&quot;33af8ac55f6865e218b80154a3687176&quot;</ETag><Size>2271064</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/Poison Ivy EXE 105C80E404324938EAE633934EE44ED1 RSIS-exe.zip</Key><LastModified>2023-01-19T04:13:53.000Z</LastModified><ETag>&quot;67e273813c2b0baec90ee5e47cfba754&quot;</ETag><Size>16600</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/apt1_mandiant_contagio_samp.zip</Key><LastModified>2024-09-08T21:09:31.000Z</LastModified><ETag>&quot;c75902dcd513464671a2d7d4388e7c06&quot;</ETag><Size>14720553</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/b622b9e294647277dc40205dcf27e086_0e1fc785eff45ff0b140dbf61abf3eab_CVE-2009-0556 Threat Reduction.zip</Key><LastModified>2023-01-19T04:46:36.000Z</LastModified><ETag>&quot;f82d0a92067aaf1761a51ca7828ed130&quot;</ETag><Size>1231628</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/dafe3b4b2790d5449e397307b8fbbcffd8c02ed7cf743d6ac478baa318110100_Obama_visit_Asia.pdf_sample.zip</Key><LastModified>2023-01-19T06:21:06.000Z</LastModified><ETag>&quot;3b1136883914dd17239204ca1a60e83a&quot;</ETag><Size>32243</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/China/e13fa200c0b2ac9c9f2c722b261ca881a7bee277014ca6e85cff5db3941d6643_新型導彈技術發展1.zip</Key><LastModified>2023-01-19T05:38:30.000Z</LastModified><ETag>&quot;33502cd040ab682192b0f898406368c2&quot;</ETag><Size>153376</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Iran/</Key><LastModified>2024-09-20T03:06:31.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Iran/UNC1860 Iran APT Samples.zip</Key><LastModified>2024-09-20T03:13:38.000Z</LastModified><ETag>&quot;ed18db8fcca06f070f7fc8773201fe94-7&quot;</ETag><Size>116353955</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/North Korea/</Key><LastModified>2024-09-02T15:21:19.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/NorthKorea/</Key><LastModified>2024-09-08T23:58:45.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/NorthKorea/2022-2024_Lazarus_FUDModule.zip</Key><LastModified>2024-09-08T23:59:15.000Z</LastModified><ETag>&quot;6246fc71f7c7a4ff433e9003c382539a&quot;</ETag><Size>8986432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/NorthKorea/2023-11-23 BEAVERTAIL INVISIBLE_FERRET Lazarus.zip</Key><LastModified>2024-09-12T17:55:07.000Z</LastModified><ETag>&quot;29e95bc071934ebfeadadf2a4f68b960-9&quot;</ETag><Size>149601477</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/NorthKorea/2024-08-21_APT_NK_MoonPeak.zip</Key><LastModified>2024-09-08T23:59:15.000Z</LastModified><ETag>&quot;fd22a0de8619fe49c5e20916d595f236-2&quot;</ETag><Size>17836986</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/NorthKorea/2024-09-10_KIMSUKY_Sample.zip</Key><LastModified>2024-09-11T00:56:00.000Z</LastModified><ETag>&quot;0d0c69cc02c255a6b0a4b6c95b094dc3&quot;</ETag><Size>3184303</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/</Key><LastModified>2023-01-21T04:15:46.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/2024-10-23 TA866 WarmCookie-BadSpace.zip</Key><LastModified>2024-10-29T03:18:12.000Z</LastModified><ETag>&quot;3df232803b1cc4c1e36122dcff2eba53-3&quot;</ETag><Size>37937802</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/2024-10-31 Lunar Spider BruteRatelC4_Latrodectus.zip</Key><LastModified>2024-11-12T02:14:41.000Z</LastModified><ETag>&quot;b0ab117427ed21e645f31ad9a2cf0985&quot;</ETag><Size>11004043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/APT28-samp.zip</Key><LastModified>2023-02-19T04:18:42.000Z</LastModified><ETag>&quot;8934a2883d91a6e206865c1e9729b811-5&quot;</ETag><Size>69887958</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/APT29.zip</Key><LastModified>2023-01-22T05:54:13.000Z</LastModified><ETag>&quot;886dd59ad3936b9e5887a95802f187f4-12&quot;</ETag><Size>197709322</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/APT29_fancybear-master_passprotected.zip</Key><LastModified>2023-01-22T06:55:48.000Z</LastModified><ETag>&quot;a677ca34d80cbd42fe0d933e13d64c82&quot;</ETag><Size>196358</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/Solarwinds_Solaburst_Nobelium_samples.zip</Key><LastModified>2023-01-21T04:15:56.000Z</LastModified><ETag>&quot;82565b8784472a89546b79ecdcfc869d-39&quot;</ETag><Size>658216436</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/Russia/UNC2589_EmberBear_BleedingBear_Nodaria_samples.zip</Key><LastModified>2023-02-18T07:44:58.000Z</LastModified><ETag>&quot;4c4a200ce707264ea4b8bd9a8b938261-12&quot;</ETag><Size>203455898</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/US_IL/</Key><LastModified>2025-10-10T16:14:01.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/US_IL/flamer pass infected666f.zip</Key><LastModified>2025-10-10T16:14:26.000Z</LastModified><ETag>&quot;e86f4ba2fef490d0f11726cd87cd4f07&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>10913636</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/tbd/</Key><LastModified>2024-10-29T02:41:54.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>APT/tbd/2024-10-25 HeptaX Ps+Bat.zip</Key><LastModified>2024-10-29T02:42:08.000Z</LastModified><ETag>&quot;451aa1b4f7478c4f35082226774e85dd&quot;</ETag><Size>2661546</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Exploits/</Key><LastModified>2023-01-22T05:39:52.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Exploits/8c3cbb55fe361a64c7b334a4095c81c9960e9d2a13c739c2968606d29bd2de15_CVE-2011-3402.zip</Key><LastModified>2025-10-10T16:18:52.000Z</LastModified><ETag>&quot;f1919976d90f17452795881b45f983ce&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>4576</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Exploits/DDE_Office_Sample.zip</Key><LastModified>2023-01-22T05:40:08.000Z</LastModified><ETag>&quot;bcfdf913794c9ed555503e1337245f0a&quot;</ETag><Size>2970424</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/</Key><LastModified>2024-09-02T17:02:53.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/2024-06-25_CICADA Ransomware_esxi.zip</Key><LastModified>2024-09-07T21:28:35.000Z</LastModified><ETag>&quot;9a365d6d04abeff1cbb29c0e9fe8a049&quot;</ETag><Size>25537</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/2024-09-03_LUXY_Ransomware.zip</Key><LastModified>2024-09-10T23:48:45.000Z</LastModified><ETag>&quot;8627d655511dcc1e0405d9367bdcb5f8&quot;</ETag><Size>198403</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/2024-09-07_SHRINKLOCKER Ransomware.zip</Key><LastModified>2024-09-07T21:33:50.000Z</LastModified><ETag>&quot;d86956500c7d8346611c3773874675e4&quot;</ETag><Size>12191991</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/2024-09_ABYSS_Win_Ransomware.zip</Key><LastModified>2024-09-03T17:29:07.000Z</LastModified><ETag>&quot;64b59ed4a16e4d0aa112c2d55902f2fb&quot;</ETag><Size>5836509</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Ransomware/2024-09_UNDERGROUND_Win_ransomware.zip</Key><LastModified>2024-09-03T17:29:36.000Z</LastModified><ETag>&quot;487c70d039066c06f923df43c161e16a&quot;</ETag><Size>2663821</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Tools/</Key><LastModified>2023-01-19T06:28:59.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>Tools/COFFEE_MicrosoftTool.zip</Key><LastModified>2023-01-19T06:29:11.000Z</LastModified><ETag>&quot;70c2730f6d561a5c23606066e14f9c84-2&quot;</ETag><Size>32241356</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>apt.html</Key><LastModified>2024-09-09T01:03:58.000Z</LastModified><ETag>&quot;926ace83bbc4b6d2b4d5c68d58d1e478&quot;</ETag><Size>6413</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>apt_china.html</Key><LastModified>2024-09-09T01:03:58.000Z</LastModified><ETag>&quot;3d1676dfa83fb8129afcf67473dfd92a&quot;</ETag><Size>6432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>apt_northkorea.html</Key><LastModified>2024-09-09T01:03:58.000Z</LastModified><ETag>&quot;a7cdfb3b055fecad3b18bab74df6122c&quot;</ETag><Size>6453</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>apt_russia.html</Key><LastModified>2024-09-09T01:03:57.000Z</LastModified><ETag>&quot;943f0b4d2d057bd5addf657cf5c3d4ea&quot;</ETag><Size>6434</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>catalog.html</Key><LastModified>2018-03-28T03:40:01.000Z</LastModified><ETag>&quot;af1de3a1640473780f06d712d36fe18c&quot;</ETag><Size>1931</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime.html</Key><LastModified>2024-09-09T01:03:58.000Z</LastModified><ETag>&quot;c8834293c4791fb43aa697795b2d53d2&quot;</ETag><Size>6427</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/</Key><LastModified>2018-03-26T01:25:58.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-08-14_OSX_Banshee_Stealer.zip</Key><LastModified>2024-09-09T00:05:01.000Z</LastModified><ETag>&quot;0347726d68df0bb9bf44045d7abd88e5&quot;</ETag><Size>4869057</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-08-23_Win_AngryStealer.zip</Key><LastModified>2024-09-02T16:52:18.000Z</LastModified><ETag>&quot;d014875e7ddc28fa1097fc047ed381be-2&quot;</ETag><Size>21764411</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-08-28_Lin_Mirai_AVtech.zip</Key><LastModified>2024-09-02T17:43:05.000Z</LastModified><ETag>&quot;99a26cffd65055745870693fca89384f&quot;</ETag><Size>1864572</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-08-29_Win_AsyncRat.zip</Key><LastModified>2024-09-02T17:25:15.000Z</LastModified><ETag>&quot;19273c845f7550af6968623ee264fd5a&quot;</ETag><Size>664536</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-02_StoneWolf_MEDUSA_Stealer.zip</Key><LastModified>2024-09-03T18:14:27.000Z</LastModified><ETag>&quot;0c6f87152b0d34098a9200e0c84f371b&quot;</ETag><Size>2142661</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-12 XWORM RAT phishing.zip</Key><LastModified>2024-09-12T23:51:52.000Z</LastModified><ETag>&quot;a7b75497c888714f070873cb78b27f5a-3&quot;</ETag><Size>40227326</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-12 _ 2023-03-13  SUPERSHELL + SHELLBOT Linux.zip</Key><LastModified>2024-09-13T01:22:21.000Z</LastModified><ETag>&quot;4aca8e6cd7f7f512081a3551f412859f-2&quot;</ETag><Size>18560286</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-17 RAPTOR TRAIN NOSEDIVE Mirai IOT botnet.zip</Key><LastModified>2024-09-19T02:37:51.000Z</LastModified><ETag>&quot;4cd60d08910c44ca1bf310c8e43c3ae5&quot;</ETag><Size>13643805</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-19 SAMBASPY Java RAT Samples.zip</Key><LastModified>2024-09-20T01:56:05.000Z</LastModified><ETag>&quot;6d50fdc539cfabb4cf32ad625c60716a-4&quot;</ETag><Size>65746859</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-23 SNIPBOT RomCom.zip</Key><LastModified>2024-09-25T23:20:36.000Z</LastModified><ETag>&quot;beb011d5e4b5a5af8a8433f6abe995ad&quot;</ETag><Size>7718686</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-24 Linux Malware Cryptocurrency Miners, DONUT LOADER, RUDEVIL RAT, KAIJI- Stager and DDoS botnet.zip</Key><LastModified>2024-10-01T00:41:11.000Z</LastModified><ETag>&quot;08b8f536bd7b2b4be603177b5b248b51-3&quot;</ETag><Size>46640860</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-09-24 PANCHAN REDTAIL Cryptojacking.zip</Key><LastModified>2024-09-26T00:30:08.000Z</LastModified><ETag>&quot;c9d6c1bb6c1ee5f99b25ddbcf18a6a0d-15&quot;</ETag><Size>255106504</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-10-03 Amnesia Stealer.zip</Key><LastModified>2024-10-10T21:20:11.000Z</LastModified><ETag>&quot;406d84ef53a368c8c911b6bb36e4a5dc-7&quot;</ETag><Size>119877868</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-11-04 CRONTRAP Emulated Linux Environments.zip</Key><LastModified>2024-11-12T02:39:10.000Z</LastModified><ETag>&quot;2cf632613c11158b1fefbb39594c2bfa-53&quot;</ETag><Size>903016860</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/2024-11_04 ToxicPanda_BankingTrojan.zip</Key><LastModified>2024-11-12T03:15:26.000Z</LastModified><ETag>&quot;15325bfec7e4ad493a5059f428964384-2&quot;</ETag><Size>19675324</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Conficker binaries.zip</Key><LastModified>2023-01-19T05:06:19.000Z</LastModified><ETag>&quot;891be7dab2710d764004b562cc0b13ca&quot;</ETag><Size>810791</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Conficker-samp.zip</Key><LastModified>2018-03-26T01:26:43.000Z</LastModified><ETag>&quot;e853ea81a53daeed42a7c7b2724d38ae&quot;</ETag><Size>4432590</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Crime_Banking_Silon_675eb7cf5f115dbb4e9c6dcf83de5700d36d29e0d7bf5218f508b9a3650f73e7_msjet51.dll.zip</Key><LastModified>2023-01-19T05:57:11.000Z</LastModified><ETag>&quot;ca497051dc8db6a89dfc2f49c6e4098b&quot;</ETag><Size>1043727</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Crime_Opachki_6762a2e15913e66b06a0953387bd87b0f9ce22b5939fe1efd46c7120df214d7c_lib_sample.zip</Key><LastModified>2023-01-19T06:14:43.000Z</LastModified><ETag>&quot;e5ca14af619b84f8a9eabf6e9718c00c&quot;</ETag><Size>13188</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/ELF_LINUX_46_CLEAN.zip</Key><LastModified>2020-12-14T20:46:54.000Z</LastModified><ETag>&quot;47fb0d1ba3a016cbc00686e54cba9f04&quot;</ETag><Size>903721</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Lin_HiddenWasp_samp.zip</Key><LastModified>2019-06-04T11:10:02.000Z</LastModified><ETag>&quot;6a198b6e2fc351a34745ca7457a5d188&quot;</ETag><Size>4317732</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Linux_Airdropbot_mirai_samp.zip</Key><LastModified>2019-09-30T02:41:04.000Z</LastModified><ETag>&quot;20dfd37e886a849eca82fc0874acc724&quot;</ETag><Size>2999554</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Linux_Amnesia_samp.zip</Key><LastModified>2019-09-30T03:48:14.000Z</LastModified><ETag>&quot;f3161804a3284ecf0ae9da0447796338&quot;</ETag><Size>861126</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/Rootkit-umbreon.zip</Key><LastModified>2023-02-19T03:46:59.000Z</LastModified><ETag>&quot;8f1801c6654521c5c77a38b2e1931f05&quot;</ETag><Size>144639</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/divergent_nodersok_win_samp.zip</Key><LastModified>2019-09-30T12:17:29.000Z</LastModified><ETag>&quot;2e4347a2e077ce41bc20c89b26c8c1cf&quot;</ETag><Size>2455528</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/judy_part3_android_samp.zip</Key><LastModified>2019-02-01T14:25:31.000Z</LastModified><ETag>&quot;1797585fec7133277e9a20b4add992c0&quot;</ETag><Size>1355233922</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/kpotstealer(proofpoint)_win_samp.zip</Key><LastModified>2020-04-19T16:05:30.000Z</LastModified><ETag>&quot;c4b090f72b2d59a9e6b344c640b777ab&quot;</ETag><Size>79978</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/kpotstealer_win_samp.zip</Key><LastModified>2020-04-19T15:14:04.000Z</LastModified><ETag>&quot;dd8f76e14117a0a1fb88ac9542622c2d&quot;</ETag><Size>52140</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/masad_stealer_win_samp.zip</Key><LastModified>2019-10-06T19:01:16.000Z</LastModified><ETag>&quot;18f277775e904a2f4f41b0a9ed8ffe17-7&quot;</ETag><Size>104962784</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/twitterxss.zip</Key><LastModified>2023-01-19T05:03:15.000Z</LastModified><ETag>&quot;af18b971769e2a2bc96fceb88f936f9b&quot;</ETag><Size>1488</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>crime/vibleaker_android_samp.zip</Key><LastModified>2019-02-01T06:30:32.000Z</LastModified><ETag>&quot;adf4da2b3e50c4abf74dc64c7c474745&quot;</ETag><Size>5086097</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>exploits.html</Key><LastModified>2024-09-09T01:03:59.000Z</LastModified><ETag>&quot;5e15f5f5e2423bebf8cb861faad4f5e7&quot;</ETag><Size>6428</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>index.html</Key><LastModified>2024-09-09T01:03:59.000Z</LastModified><ETag>&quot;049d3667a053feba57dc426f6fbff765&quot;</ETag><Size>6399</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>ransomware.html</Key><LastModified>2024-09-09T01:03:59.000Z</LastModified><ETag>&quot;71bcd19ae5be09d52f958142468eb674&quot;</ETag><Size>6432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/</Key><LastModified>2019-01-28T03:53:57.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2017_Detecting DDE in MS Office documents – NVISO Labs.pdf</Key><LastModified>2023-01-21T06:59:13.000Z</LastModified><ETag>&quot;46b7596d8fcb3f3402b9c064ea2129e3&quot;</ETag><Size>522566</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2018_InvisiMole__Surprisingly_equipped_spyware_ESET.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;4cc85e7d0f62e307069ea01d266bf50b&quot;</ETag><Size>831235</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2020_Taurus_The_New_Stealer_in_Town_Zscaler.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;2969e937b687ade13aac0fac5da61fe6&quot;</ETag><Size>1582191</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2021_An_In-Depth_analysis_of_the_new_Taurus_Stealer_Outpost24.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;e7e2ec036793bd2d721c611f48b21b97&quot;</ETag><Size>2964216</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2022_Evacuation_and_Humanitarian_Documents_used_to_Spear_Phish_Ukrainian_Entities_Mandiant.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;b32492f1cf475527f3f1a03ed81591dc&quot;</ETag><Size>572830</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2023_Nascent Ursa_actor_card_Unit 42.pdf</Key><LastModified>2023-02-14T05:47:35.000Z</LastModified><ETag>&quot;fc6153e1d5996bafc7bfa2d09e52bf97&quot;</ETag><Size>105756</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2023_Ransomware_MBSD_History_of_ransomware_group_connections_and_transitions_ENG_Rev.2.01.png</Key><LastModified>2023-02-14T05:45:17.000Z</LastModified><ETag>&quot;e11874d6451742ab9e47050f693d2e43&quot;</ETag><Size>3969193</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2023_apt_unc1151_IOC_github.pdf</Key><LastModified>2023-02-14T05:49:22.000Z</LastModified><ETag>&quot;11f13314f9f07c1bf91c5893b1c2ae80&quot;</ETag><Size>63531</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/2024-09-10_sakaijjang_Kimsuky_TermsandConditions.pdf</Key><LastModified>2024-09-11T00:55:09.000Z</LastModified><ETag>&quot;e1b47e4b92ff6cfc557ac518e9ee004b&quot;</ETag><Size>3235305</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT 28 Sofacy APT hits high profile targets with updated toolset - Securelist.pdf</Key><LastModified>2023-02-20T05:47:43.000Z</LastModified><ETag>&quot;8b5d1899bfe9031b298e979e3e805241&quot;</ETag><Size>679887</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT 28_Sofacy&apos;s Zepakab Downloader Spotted In-The-Wild - 2019-01-Yoroi.pdf</Key><LastModified>2023-02-21T03:21:46.000Z</LastModified><ETag>&quot;74c1535ca6b2d4633b41da6c6b1928e5&quot;</ETag><Size>98507</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-2019_calypso-apt-2019-eng.pdf</Key><LastModified>2023-02-14T05:36:20.000Z</LastModified><ETag>&quot;d314c38927d950b15b774f511e7723a7&quot;</ETag><Size>5480623</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-APT28_Seedworm_ 2019-01_Group Compromises Government Agencies, Oil &amp; Gas, NGOs, Telecoms, and IT Firms.pdf</Key><LastModified>2019-01-28T14:17:49.000Z</LastModified><ETag>&quot;04ea077af5c3596f845941cc7bd061db&quot;</ETag><Size>202583</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-CobaltStrike_209-01_Targeted Attacks Abusing Google Cloud Platform Open Redirection - Netskope.pdf</Key><LastModified>2019-01-28T14:05:57.000Z</LastModified><ETag>&quot;10db7ed9c1646b7fd00a4e1a9d189e4b&quot;</ETag><Size>586685</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-DarkHydrus_2019-01_Latest Target Attack of DarkHydruns Group Against Middle East.pdf</Key><LastModified>2019-01-28T14:11:24.000Z</LastModified><ETag>&quot;f7f86c8c3ed070ac7d9a5d59f3ce16a6&quot;</ETag><Size>2145014</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-GreyEnergy+_2019-01_Welcome to 2019.pdf</Key><LastModified>2019-01-28T13:30:10.000Z</LastModified><ETag>&quot;8373f461bbfc083dce850400fdbed7d9&quot;</ETag><Size>360111</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-GreyEnergy_2019_01_ESET_GreyEnergy.pdf</Key><LastModified>2019-01-28T13:32:05.000Z</LastModified><ETag>&quot;e5a75851e5eda5588948ff2caf88d71b&quot;</ETag><Size>7935215</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-Lazarus_2019-01_Recent Lazarus Tools.pdf</Key><LastModified>2019-01-28T14:14:43.000Z</LastModified><ETag>&quot;4e498d4af6b87c88809df39f9cbbaa01&quot;</ETag><Size>292715</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT-Roma225_2018-12_The Enigmatic “Roma225” Campaign.pdf</Key><LastModified>2019-01-29T04:08:36.000Z</LastModified><ETag>&quot;4ea32725313f36b192cec946680cd996&quot;</ETag><Size>1052770</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/</Key><LastModified>2024-09-09T00:54:14.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2010_11_Fireeye_VinSelf - A new backdoor in town! « VinSelf - A new backdoor in town! _ FireEye Inc.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;e6b8431b3aed61f8d73e331390567e71&quot;</ETag><Size>401113</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2010_12_Guardian_WikiLeaks cables reveal fears over Chinese cyber warfare _ US news _ The Guardian.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;dd3a4e77b708e23e18fa4d65b97b415d&quot;</ETag><Size>158829</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2011_08_Ira Winkler_ Shady Rat Case Shows Vendors As Big a Problem As APT Itself _ CIO.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;fc94d514421348d3bf8c3905beb9a297&quot;</ETag><Size>1290641</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2011_08_Kaspersky&apos;s Thoughts on Operation Shady Rat _ Nota Bene_ Eugene Kaspersky&apos;s Official Blog.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;bac730faf7a5d37652cd4663f7c4c340&quot;</ETag><Size>416962</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2011_10_SANS_detailed-analysis-advanced-persistent-threat-malware-33814.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;f08284dc62451d7b5d87430520a21bc9&quot;</ETag><Size>2705594</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2011_Mcafee-operation-shady-rat1.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;6ed0d1c0e543c18ee4b491de4f0b5ef4&quot;</ETag><Size>4982224</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2012_06_Bloomberg_Hackers Linked to China’s Army Seen From EU to D.C. - Bloomberg.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;31c6e6b1d66a10818cb7a7bf6c8525ee&quot;</ETag><Size>203764</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2013_02_NYTimes_China’s Army Is Seen as Tied to Hacking Against U.S.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;b8cb0599030d365bc2968cd2c6557b04&quot;</ETag><Size>244595</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2013_03_Fireeye_TABMSGSQL and 44 WEBC2-YAHOO_The Dingo and the Baby « The Dingo and the Baby _ FireEye Inc.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;60f6f7507aad60389fa31dc4e7cb54b9&quot;</ETag><Size>424228</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2013_05_Fireeye_APT1 Three Months Later.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;3f4b9554a196f648a3c369754d8f07dc&quot;</ETag><Size>135675</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2013_05_Mandiant-APT1_Exposing One of China’s Cyber Espionage Units.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;936feb234f60cfbf6916ba61fbab2781&quot;</ETag><Size>6795774</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2014_05_Fireeye_The PLA and the 8_00am-5_00pm Work Day.pdf </Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;e9006de8262c34fe648fa6567ed94c7f&quot;</ETag><Size>216574</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2014_06_Crowdstrike_Hat-tribution to PLA Unit 61486 ».pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;5b6b4b964cccaf799ac33dbc43cd429e&quot;</ETag><Size>5110257</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2014_12_Vinself now with steganography - Airbus CyberSecurity.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;c5e05b1181e2634902caedb59d022467&quot;</ETag><Size>140162</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/2016_BANGAT_malware-signatures_bangat.yara at master · citizenlab_malware-signatures.pdf</Key><LastModified>2024-09-09T00:55:03.000Z</LastModified><ETag>&quot;99cff52e985138fd788f09cd090e33f2&quot;</ETag><Size>121123</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/GIF89a_Vinselfdecoder_malwaretracker.com_ Command and Control Decoder - Vinself Trojan.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;c98e35b8668cc3bc05d5d0825d8e930f&quot;</ETag><Size>69241</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT1-CommentCrew/PLA Unit 61398 _ Council on Foreign Relations Interactives.pdf</Key><LastModified>2024-09-09T00:55:04.000Z</LastModified><ETag>&quot;c9349ac0109442655036c4974aed603d&quot;</ETag><Size>55877</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28 Targets Financial markets_2015-Root9b.pdf</Key><LastModified>2023-02-19T21:21:14.000Z</LastModified><ETag>&quot;689b68139c931dd005223f1e92181779&quot;</ETag><Size>1080703</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28 and Upcoming Elections_ Evidence of Possible Interference (Part 2) - Yoroi.pdf</Key><LastModified>2023-02-21T03:15:08.000Z</LastModified><ETag>&quot;f5e2cc033231f5d3b7a131d19f5d4b59&quot;</ETag><Size>110068</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28 and Upcoming Elections_ evidence of possible interference (Par 1) - Yoroi.pdf</Key><LastModified>2023-02-21T03:15:08.000Z</LastModified><ETag>&quot;99af17ab279cff2f6adaf40906e6cbca&quot;</ETag><Size>117153</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28-Center-of-Storm_(Fireeye_2017).pdf</Key><LastModified>2023-02-21T04:06:35.000Z</LastModified><ETag>&quot;4407a86fc0f9fd1e07207ff73cb3b7ee&quot;</ETag><Size>1753680</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_A_Look_Into_Fysbis__Sofacy’s_Linux_Backdoor_2016.pdf</Key><LastModified>2023-02-20T03:24:38.000Z</LastModified><ETag>&quot;4604ec9bd4d4eb3d639d385b5803d0b3&quot;</ETag><Size>1141292</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_A_Slice_of_2017_Sofacy_Activity_Kaspersky_2017.pdf</Key><LastModified>2023-02-20T03:34:46.000Z</LastModified><ETag>&quot;fa0767be8c6ac23dba9f2abf51cad53d&quot;</ETag><Size>1352092</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Bitdefender_In-depth_analysis_of_APT28–The_Political_Cyber-Espionage.pdf</Key><LastModified>2023-02-19T22:02:56.000Z</LastModified><ETag>&quot;1a5d89f6fd3f1ed5f4e76084b0fa7806&quot;</ETag><Size>1949940</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_DealersChoice_is_Sofacy_Flash_Player_Exploit_Platform.pdf</Key><LastModified>2023-02-21T03:52:26.000Z</LastModified><ETag>&quot;910743e34d53c63bccb492dd1d976e11&quot;</ETag><Size>1783867</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Digital Attack on German Parliament_ Investigative Report on the Hack of the Left Party Infrastructure in Bundestag_2016-06.pdf</Key><LastModified>2023-02-19T17:05:15.000Z</LastModified><ETag>&quot;bf270499550a8dacc516068e55927978&quot;</ETag><Size>954607</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Fancy_Bear_Pens_the_Worst_Blog_Posts_Ever_ThreatConnect_2017-11.pdf</Key><LastModified>2023-02-21T05:19:03.000Z</LastModified><ETag>&quot;f40959f1a3aa30c83e7fa0a812cf4ffa&quot;</ETag><Size>10385627</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_MicrosoftStrontium_vJoeDoe_(JusticeDept_2016-09).pdf</Key><LastModified>2023-02-21T05:24:01.000Z</LastModified><ETag>&quot;2d6238017ad6b6cc149ee48b1817466d&quot;</ETag><Size>1333526</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries_TrendMicro_2015-10.pdf</Key><LastModified>2023-02-19T20:54:52.000Z</LastModified><ETag>&quot;390c015d826ebf26ae1441e739c4962b&quot;</ETag><Size>501962</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Operation Pawn Storm Using Decoys to Evade Detection_TrendMicro_2016.pdf</Key><LastModified>2023-02-19T05:00:08.000Z</LastModified><ETag>&quot;ce254486b02be740488c0ab3278956fd&quot;</ETag><Size>3424812</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Our_Work_with_the_DNC__(Crowdstrike_2020).pdf</Key><LastModified>2023-02-21T03:57:03.000Z</LastModified><ETag>&quot;d315f65508bab550832bd9e6c41f8de5&quot;</ETag><Size>389599</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Sednit APT Group Meets Hacking Team_ESET_2016.pdf</Key><LastModified>2023-02-19T17:24:35.000Z</LastModified><ETag>&quot;1aa4572132a2de79d9fca7563299661f&quot;</ETag><Size>310449</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Sednit_ESET_2016.pdf</Key><LastModified>2023-02-19T17:24:34.000Z</LastModified><ETag>&quot;bae0221feefb37e6b81f5ca893864743&quot;</ETag><Size>1764657</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Sednit_Part2_ESET_2016.pdf</Key><LastModified>2023-02-19T18:06:05.000Z</LastModified><ETag>&quot;c3c278991ad051fbace1e2f3a4c20998&quot;</ETag><Size>2283550</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Sednit_Part3_ESET_2016-10.pdf</Key><LastModified>2023-02-19T18:02:27.000Z</LastModified><ETag>&quot;a7b4e01335aac544a12c6f88aab80cd9&quot;</ETag><Size>1526325</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_TechnicalFollowup_(Root9b).pdf</Key><LastModified>2023-02-19T20:44:55.000Z</LastModified><ETag>&quot;f57b8ed36454fbac6c3242833daa7059&quot;</ETag><Size>809285</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_Trojan.Win32.Sofacy_2016.pdf</Key><LastModified>2023-02-19T05:03:38.000Z</LastModified><ETag>&quot;ec878a91b28160411e8a604938cf496b&quot;</ETag><Size>165040</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_X-Agent_Op-Roman Holiday-Report_v6_1_CSEcyber.pdf</Key><LastModified>2023-02-21T04:27:26.000Z</LastModified><ETag>&quot;58c5ce01fca9664d17400fe3dadb2aa5&quot;</ETag><Size>923520</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_malware_prevenity_2014.pdf</Key><LastModified>2023-02-19T05:00:06.000Z</LastModified><ETag>&quot;62cb1533e87cafd3f1b02e244ff47197&quot;</ETag><Size>366499</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT28_netyksho_et_al_indictment_JusticeGov_2018-07.pdf</Key><LastModified>2023-02-21T04:46:13.000Z</LastModified><ETag>&quot;a07b13e001708861ce6ea55e94c8b90a&quot;</ETag><Size>241873</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT29-reading.zip</Key><LastModified>2023-02-12T20:24:37.000Z</LastModified><ETag>&quot;e3d94f44328d82ed486c0940642230ef-2&quot;</ETag><Size>29122585</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT29/</Key><LastModified>2023-02-12T20:24:37.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT29/APT_2020_Customer Guidance on Recent Nation-State Cyber Attacks – Microsoft Security Response Center.pdf</Key><LastModified>2023-02-12T20:24:37.000Z</LastModified><ETag>&quot;46329d09a62740ec0633ca0635f9a8ce&quot;</ETag><Size>1029350</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT29/APT_2020_Nobelium_SolarwindsThe Resurgence of Russian Threat Actor, NOBELIUM.pdf</Key><LastModified>2023-02-12T20:24:37.000Z</LastModified><ETag>&quot;b9717a52c1fff7f0aa526a6e5c4eda66&quot;</ETag><Size>292402</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2013_MiniDuke_Paper_Final.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;854ae43107ecc9eb18c9feff733c98ed&quot;</ETag><Size>2178000</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2015_Duke APT Group’s Latest Tools- Cloud Services and Linux Support.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;45718ae030db7cb67ef706063a0ca49a&quot;</ETag><Size>413818</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2015_FSecure_CozyDuke.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;b3da2c92fb2a10a16e86114b43c76288&quot;</ETag><Size>329220</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2015_Tracking MiniDionis_ CozyCar’s New Ride Is Related to Seaduke.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;40b5ef1298834997a23bb31fd4a7e2c8&quot;</ETag><Size>402371</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2015_Unit 42 Technical Analysis_ Seaduke.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;c793b0c9219cc174abf2aa676efa9587&quot;</ETag><Size>1209250</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2015_fsecure_COSMICDUKE Cosmu with a twist of MiniDukecosmicduke_whitepaper.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;0598e0f51fd713c67907b5e7d0e07560&quot;</ETag><Size>775964</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2016_Crowdstrike_Bears in the Midst Intrusion into the Democratic National Committee ».pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;afbcc797b0373a75b1ee3272e40a35bd&quot;</ETag><Size>1075323</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2016_Grizzly Steppe_ Lighting up Like A Christmas Tree – Fauie Technology.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;460ba786c99eec9416ffc96f756a2039&quot;</ETag><Size>905571</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_2019-01_Flashpoint - Targeted Attacks Against South Korean Entities May Have Been as Early as November 2017.pdf</Key><LastModified>2019-01-28T14:18:59.000Z</LastModified><ETag>&quot;fb8ac72003bb9bbf2b25c54b78aebbb1&quot;</ETag><Size>460010</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity(DHS_2017).pdf</Key><LastModified>2023-02-21T05:02:04.000Z</LastModified><ETag>&quot;eb44d95c30829c779dba3b4d98064a75&quot;</ETag><Size>1385685</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Aquarium_Sofacy_(Google_2014).pdf</Key><LastModified>2023-02-21T04:14:26.000Z</LastModified><ETag>&quot;50f2d5734ecbbbcd4b18aba76bc59578&quot;</ETag><Size>5032473</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Dear_Joohn_The_Sofacy_Group’s_Global_Campaign_PaloAlto_2018-12.pdf</Key><LastModified>2023-02-24T04:32:41.000Z</LastModified><ETag>&quot;da7c02684e40e8bf78dceafc916b087f&quot;</ETag><Size>2094526</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Hunting_for_Sofacy__Lojax_Double-Agent_Analysis_(Yoroi_2018-11).pdf</Key><LastModified>2023-02-21T03:34:36.000Z</LastModified><ETag>&quot;5f7dba3254cb40391e17d32000c7d744&quot;</ETag><Size>209598</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_IRON_TWILIGHT_Supports_Active_Measures(Secureworks_2017).pdf</Key><LastModified>2023-02-21T04:52:09.000Z</LastModified><ETag>&quot;c7c330f594994240056f72840d95deaa&quot;</ETag><Size>1005432</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Komplex_Malware_The_Return_of_Sofacy&apos;s_XAgent_(Indteger_2017).pdf</Key><LastModified>2023-02-21T03:42:36.000Z</LastModified><ETag>&quot;5c559018f2d8df0142ef3446fba75b3f&quot;</ETag><Size>242700</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_New Sofacy Attacks Against US Government Agency(PaloAlto_2016-07).pdf</Key><LastModified>2023-02-21T05:04:21.000Z</LastModified><ETag>&quot;90ad2b4780b926a05cede2f84053ca1e&quot;</ETag><Size>935987</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Operation Pawn Storm_(IBM_2016-02).pdf</Key><LastModified>2023-02-21T04:34:17.000Z</LastModified><ETag>&quot;eadae98cfbb6fe3abb75d59c9a38799b&quot;</ETag><Size>108136</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Sednit_update_Analysis_of_Zebrocy_ESET.pdf</Key><LastModified>2023-02-24T03:21:57.000Z</LastModified><ETag>&quot;139384f7faa319fbb98207eb72cb5711&quot;</ETag><Size>1126301</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Sofacy&apos;s_Zepakab_Downloader_Spotted_In-The-Wild_-_2019-01-Yoroi.pdf</Key><LastModified>2023-02-21T03:28:23.000Z</LastModified><ETag>&quot;74c1535ca6b2d4633b41da6c6b1928e5&quot;</ETag><Size>98507</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Sofacy’s Komplex OS X Trojan_(Palo_Alto_2016-09).pdf</Key><LastModified>2023-02-21T05:07:17.000Z</LastModified><ETag>&quot;1b441a645ecaa9504085d44a2fc66b3a&quot;</ETag><Size>1699691</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_28_Ukraine_election_2019_polls_Maldoc__analysis_-(Security_Art_Work_-_2019).pdf</Key><LastModified>2023-02-21T03:47:54.000Z</LastModified><ETag>&quot;5ce5659f9fd3145db7f680a190ce19b2&quot;</ETag><Size>1830863</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_Beyond ‘Cyber War Russia’s Use ofStrategic Cyber Espionage and Information Operations in Ukraine by Jen WeedonCyberWarinPerspective_Weedon_08.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;180bc7926b41fbf3c52e7b20b0386fd1&quot;</ETag><Size>504874</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_Crowdstrike_Our Work with the DNC_ Setting the record straight.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;d2572d63b4e3aba0554f45443a793ee8&quot;</ETag><Size>379665</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_Fireeye_rpt-apt29-hammertoss-1-1.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;9a8a5a14dbdaa5863545bce336a20e99&quot;</ETag><Size>3053417</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APT_RU_2022_Overview_of_the_Cyber_Weapons_Used_in_the_Ukraine_-_Russia_War.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;5865eaff1a40e1edf8e15b3be8bf2473&quot;</ETag><Size>1925236</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/APt_28_The_Arsenal_Behind_the_Australian_Parliament_Hack__Yoroi.pdf</Key><LastModified>2023-02-21T03:29:04.000Z</LastModified><ETag>&quot;959077bcf8fa2fd0146e1dbd577a62c8&quot;</ETag><Size>1093702</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Adobe -CVE-2009-0658, CVE-2009-0927.pdf</Key><LastModified>2023-01-19T06:25:25.000Z</LastModified><ETag>&quot;cbd31c66f0e7fe088d88f26b9ebcf067&quot;</ETag><Size>122066</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/BleedingBear_2022_UACert_twitter.pdf</Key><LastModified>2023-02-14T05:43:26.000Z</LastModified><ETag>&quot;fab5cccaae5a62b89f29aef791869b33&quot;</ETag><Size>311004</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Banking-EK-Ransom_2019-01_Emotet Malware Returns to Work After Holiday Break.pdf</Key><LastModified>2019-01-28T16:05:32.000Z</LastModified><ETag>&quot;b71d3d7aa4f91e671cb23aab934dcddd&quot;</ETag><Size>188911</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Banking_2019-01_Emotet malspam campaign exploits reliance on magic for file type detection - seanthegeek.net.pdf</Key><LastModified>2019-01-29T03:09:11.000Z</LastModified><ETag>&quot;505c42eef129e1e8841a998d42ff12c4&quot;</ETag><Size>96605</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Browser-Razy_2019-01_Spoofing search results and infecting browser extensions_ Razy in search of cryptocurrency.pdf</Key><LastModified>2019-01-28T13:50:06.000Z</LastModified><ETag>&quot;6bab1d3b0b2fd2ee9eb4c25475c397ac&quot;</ETag><Size>1249025</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-EK-Fallout_2019-01_Exploit for Recent Flash Zero-Day Added to Fallout Exploit Kit - TechBizWeb.pdf</Key><LastModified>2019-01-28T15:59:47.000Z</LastModified><ETag>&quot;34691d6fbfe39ef1a1bf33c14c0501a7&quot;</ETag><Size>72015</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-EK-Ransom-Stealer_2019-01_Vidar and GandCrab_ stealer and ransomware combo observed in the wild - Malwarebytes Labs.pdf</Key><LastModified>2019-01-28T16:09:21.000Z</LastModified><ETag>&quot;92c0bbe6e99b0ac0c18ffee56dbc004c&quot;</ETag><Size>1073417</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-EK-Ransom_2019-01_executive-brief-exploits-as-a-service.pdf</Key><LastModified>2019-01-28T15:45:28.000Z</LastModified><ETag>&quot;d92fc8048eb2f4b985e05c6779e49d90&quot;</ETag><Size>1060124</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-IOS_2019-01_Package tracking app turns users’ devices into a bot farm, violates user privacy.pdf</Key><LastModified>2019-01-28T13:54:44.000Z</LastModified><ETag>&quot;64c9bc3bc933bf6a40edf3d7f6237620&quot;</ETag><Size>336103</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Magecart_2019-01_New Year, Same Magecart_ More Web-based Supply Chain Attacks.pdf</Key><LastModified>2019-01-28T14:10:21.000Z</LastModified><ETag>&quot;c48768b5be9aa39f54e14fce275b38b2&quot;</ETag><Size>938498</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Ransom-Anatova_Happy New Year 2019! +2019-01_Anatova is here! _ McAfee Blogs.pdf</Key><LastModified>2019-01-28T15:53:56.000Z</LastModified><ETag>&quot;e96d36453dec6212d9fdb3c42e1a1bf4&quot;</ETag><Size>1633079</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-Ransom_2019-01_The Week in Ransomware - January 18th 2019 - Devs Back from Vacation.pdf</Key><LastModified>2019-01-28T15:53:15.000Z</LastModified><ETag>&quot;2e02d1129c9507c1d7c6a94cdc356d71&quot;</ETag><Size>1923120</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-TA505_2019-01_ServHelper and FlawedGrace - New malware introduced by TA505.pdf</Key><LastModified>2019-01-28T13:25:49.000Z</LastModified><ETag>&quot;de4afc7e273eca5cc8e3df1df035921a&quot;</ETag><Size>144911</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-TA505_ServHelper and FlawedGrace - New malware introduced by TA505.pdf</Key><LastModified>2019-01-28T04:42:15.000Z</LastModified><ETag>&quot;de4afc7e273eca5cc8e3df1df035921a&quot;</ETag><Size>144911</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-VeryMal-OSX_Confiant &amp; Malwarebytes Uncover Steganography Based Ad Payload That Drops Shlayer Trojan On Mac….pdf</Key><LastModified>2019-01-28T04:36:48.000Z</LastModified><ETag>&quot;1be1fb371f1a3ac7f6fbee2abcc497d9-2&quot;</ETag><Size>13616987</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-VeryMal_OSX_Shlayer_ New Mac Malware Comes out of Its Shell.pdf</Key><LastModified>2019-01-28T04:38:06.000Z</LastModified><ETag>&quot;fb20c94055374942f9ad3ce9f2470b2d&quot;</ETag><Size>1336647</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-banking-Redaman_2019-01_Russian Language Malspam Pushing Redaman Banking Malware - Unit42.pdf</Key><LastModified>2019-01-28T14:08:49.000Z</LastModified><ETag>&quot;36c60ebe970b0db3d53e842995de6e39&quot;</ETag><Size>2386737</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-banking_2019-01_IcedID Banking Trojan Teams up with Ursnif_Dreambot for Distribution.pdf</Key><LastModified>2019-01-28T13:48:57.000Z</LastModified><ETag>&quot;70fe4cc09b5046bf2232143759c0d99a&quot;</ETag><Size>233716</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-botnet-BYOB_2019-01_BYOB (Build Your Own Botnet) in action _ Perception Point.pdf</Key><LastModified>2019-01-28T13:58:14.000Z</LastModified><ETag>&quot;34fc3baf7d58a6b37202a8623e2e69ba&quot;</ETag><Size>810482</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-botnet-Router_2019-01_BlackRouter Ransomware Promoted as a RaaS by Iranian Developer.pdf</Key><LastModified>2019-01-28T15:51:05.000Z</LastModified><ETag>&quot;9021072ebd14717e9250b767fefd210a&quot;</ETag><Size>1750223</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-botnet-YARN-HADOOP_2019-01_Securonix Threat Research_ Detecting Persistent Cloud Infrastructure_Hadoop_YARN Attacks Using Security Analytics_ Moanacroner, XBash, and Others - Securonix.pdf</Key><LastModified>2019-01-28T14:01:30.000Z</LastModified><ETag>&quot;74e44016ecf63a38710f7c06686559ac&quot;</ETag><Size>3857354</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-botnet_2019-01_Hakai and Yowai botnets abuse ThinkPHP vulnerabilities _ SC Media.pdf</Key><LastModified>2019-01-28T14:03:30.000Z</LastModified><ETag>&quot;4e3b279af260de2c33ee6543e2791191&quot;</ETag><Size>54655</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-botnet_2019-01_Tapping Telegram Bots.pdf</Key><LastModified>2019-01-28T13:41:36.000Z</LastModified><ETag>&quot;7759cfa7b54677cd3c43f08a29682be4&quot;</ETag><Size>1097869</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime-ta505_2019-01_timeline_final4_0.png</Key><LastModified>2019-01-28T13:24:28.000Z</LastModified><ETag>&quot;e7e94ae9738db699e48d6604092d48b4&quot;</ETag><Size>67988</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_ 2019_HiddenWasp Malware Stings Targeted Linux Systems - Intezer.pdf</Key><LastModified>2023-01-21T22:24:51.000Z</LastModified><ETag>&quot;cb828666c0f3200fbc5d9939796deebd&quot;</ETag><Size>4516426</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2014_Linksys E-series -Remote Code Execution.pdf</Key><LastModified>2023-01-21T06:29:12.000Z</LastModified><ETag>&quot;4569238ecf684d498b4366fd477c468f&quot;</ETag><Size>83317</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2016_Amnesia_Remote Code Execution in CCTV-DVR affecting over 70 different vendors.pdf.pdf</Key><LastModified>2023-01-21T06:15:45.000Z</LastModified><ETag>&quot;0c549a59999cbf91118ee26690410bb8&quot;</ETag><Size>323389</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2016_Rootkit_TrendLabs Security Intelligence BlogPokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems - TrendLabs Security Intelligence Blog.pdf</Key><LastModified>2023-01-21T06:51:17.000Z</LastModified><ETag>&quot;59b43fa054a613bcef49f6b238dd137b&quot;</ETag><Size>805862</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2017_CyberX_-_Campaign_Radiation-1.pdf</Key><LastModified>2023-01-21T06:09:18.000Z</LastModified><ETag>&quot;9f47989d8a61733e235d42cae167eed2&quot;</ETag><Size>897274</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2017_New IoT_Linux Malware Targets DVRs, Forms Botnet.pdf</Key><LastModified>2023-01-21T06:06:31.000Z</LastModified><ETag>&quot;a75d2bbfca1c2689fb3510c87afaccfc&quot;</ETag><Size>959621</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2017_SensePost _ Macro-less code exec in msword.pdf</Key><LastModified>2023-01-21T06:57:53.000Z</LastModified><ETag>&quot;73079334f53e13a2e9ad6fe234616b3a&quot;</ETag><Size>2749021</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2019_MMD-0064-2019 - Linux_AirDropBot.pdf</Key><LastModified>2023-01-21T06:19:49.000Z</LastModified><ETag>&quot;6de6783d728192bbbe0290c774e84498&quot;</ETag><Size>3558706</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2020_Kpot_InfoSec Handlers Diary Blog - SANS Internet Storm Center.pdf</Key><LastModified>2023-01-20T05:01:39.000Z</LastModified><ETag>&quot;7271669ea882224a6d38b8f1a472d4a4&quot;</ETag><Size>320484</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_2020_New KPOT v2.0 stealer brings zero persistence and in-memory features to silently steal credentials _ Proofpoint.pdf</Key><LastModified>2023-01-20T05:03:46.000Z</LastModified><ETag>&quot;fc891030e1b26c8aa2cf7a10a5587dd4&quot;</ETag><Size>1269659</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_Banking_W32.Silon Malware Analysis Trusteer Fraud Prevention Center, October 26th, 2009.pdf</Key><LastModified>2023-01-19T05:53:55.000Z</LastModified><ETag>&quot;5292a35e9b00dcc742377be6b1d212ca&quot;</ETag><Size>622869</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_Banking_W32.Silon_Two-Headed Trojan Targets Online Banks _ Internet News.pdf</Key><LastModified>2023-01-19T05:51:50.000Z</LastModified><ETag>&quot;b55801a42dfafe0a1b48ef31540eb6f6&quot;</ETag><Size>94761</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_Opachki Link Hijacker Trojan Analysis - Research - SecureWorks.pdf</Key><LastModified>2023-01-19T06:05:03.000Z</LastModified><ETag>&quot;7aae123caec1dfc0a3e3fcbec7e0f4b3&quot;</ETag><Size>146716</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_Silence_2018_01_Group-IB_Eng_Public.pdf</Key><LastModified>2019-01-28T13:27:34.000Z</LastModified><ETag>&quot;7877ae4a546c08d65ac175e1843a07b7&quot;</ETag><Size>6298600</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Crime_ThreatExpert Report_ Mal_UnkPack-Fam, TrojanDropper_Win32_Opachki.A, Trojan-Dropper.Win32.Opachki.pdf</Key><LastModified>2023-01-19T06:00:46.000Z</LastModified><ETag>&quot;b493d7bbae6f5e24738cc54df861cc83&quot;</ETag><Size>171118</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/CyberWarinPerspective_Weedon_08.pdf</Key><LastModified>2023-01-22T06:08:33.000Z</LastModified><ETag>&quot;180bc7926b41fbf3c52e7b20b0386fd1&quot;</ETag><Size>504874</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_Microsoft Office DDE Freddie Mac Targeted Lure _ InQuest.pdf</Key><LastModified>2023-01-21T07:04:56.000Z</LastModified><ETag>&quot;bc570e4285f44ec8bb887f3b12c1b915&quot;</ETag><Size>756911</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_Microsoft Office DDE Macro-less Command Execution Vulnerability _ InQuest.pdf</Key><LastModified>2023-01-21T07:09:20.000Z</LastModified><ETag>&quot;83a581dd97f7b4d1d8e0ea735f567608&quot;</ETag><Size>139055</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_Microsoft Office DDE SEC OMB Approval Lure _ InQuest.pdf</Key><LastModified>2023-01-21T07:03:42.000Z</LastModified><ETag>&quot;3dd0a16eb5e8db49fad6aa35586ca4f0&quot;</ETag><Size>333092</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_Microsoft Office DDE Vortex Ransomware Targeting Poland _ InQuest.pdf</Key><LastModified>2023-01-21T07:07:40.000Z</LastModified><ETag>&quot;8e40d7cf86456a265a9027ebca3fcf3e&quot;</ETag><Size>361532</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_Spoofed SEC Emails Distribute Evolved DNSMessenger.pdf</Key><LastModified>2023-01-21T07:01:00.000Z</LastModified><ETag>&quot;c305d6ea36c3d06febcc8dceffc07e92&quot;</ETag><Size>1022290</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DDE_yara-rules_Microsoft_Office_DDE_Command_Execution.rule at master · InQuest_yara-rules · GitHub.pdf</Key><LastModified>2023-01-21T07:11:21.000Z</LastModified><ETag>&quot;16853b559fd32ecc1fb8363fa70af7c5&quot;</ETag><Size>216159</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DEV-0586_2022_Destructive malware targeting Ukrainian organizations - Microsoft Security Blog.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;1f0920963c20d1ca11caa624eaf0ebbf&quot;</ETag><Size>117508</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/DEV-0586_2022_TTPs_used_by_DEV-0586_APT_Group_in_WhisperGate_Attack_Targeting_Ukraine_Picusecurity.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;288ec5dc5a596174dd6ffa1fc8e9ee02&quot;</ETag><Size>387452</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/EmberBear _2021_-Lorec53-Group (1).pdf</Key><LastModified>2023-02-18T06:46:14.000Z</LastModified><ETag>&quot;96d702a7b029378470e929531a3aa4bd&quot;</ETag><Size>2670257</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/EmberBear_2022_Cyber ​​attack UAC-0056 on state organizations of Ukraine using Cobalt Strike Beacon (CERT-UA#4914).pdf</Key><LastModified>2023-02-18T04:44:28.000Z</LastModified><ETag>&quot;1df413fb655cdb7f6cf70c59ac4ae737&quot;</ETag><Size>2473215</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Ember_Bear_2022_APT_Retrospection__Lorec53,_An_Active_Russian_Hack_Group_Launched_Phishing_Attacks_Against_Georgian_Government.pdf</Key><LastModified>2023-02-18T06:30:41.000Z</LastModified><ETag>&quot;c23613379ebcd191dae632ba37a8eb0e&quot;</ETag><Size>602154</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Emberbear_Saintbear_2022_Operation Bleeding Bear_Elastic.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;31dc243dd8e7c9b9b6cc5a4c33c98eee&quot;</ETag><Size>4165026</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Fireeye_2009.07.23 Heap Spraying with Actionscript Why turning off Javascript won&apos;t help this time  .pdf</Key><LastModified>2023-01-19T06:40:57.000Z</LastModified><ETag>&quot;1a05ef5d1968c8e1f29b1f95e17d4beb&quot;</ETag><Size>839029</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/HakerMagazine_Russian_1009.pdf</Key><LastModified>2023-01-19T06:36:58.000Z</LastModified><ETag>&quot;2bfb6a48e3d2ff9e75c959903ac8b734-4&quot;</ETag><Size>65192309</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/InvisiMole_InvisiMole- The hidden part of the story_ESET.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;1c2dc632ec1db866a6e15456e1a36207&quot;</ETag><Size>2489298</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Masad Stealer_2019_ Exfiltrating using Telegram _ Official Juniper.pdf</Key><LastModified>2023-02-12T20:29:27.000Z</LastModified><ETag>&quot;eb2be8505dfbb6a377f07f5ca10e55bc&quot;</ETag><Size>1149605</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/McAfee_From Targeted PDF Attack to Backdoor in Five Stages.pdf</Key><LastModified>2023-01-19T06:43:31.000Z</LastModified><ETag>&quot;8e8dc14d9dbc7c7179661c5fc3aae35e&quot;</ETag><Size>136949</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Mobile-Android-Dropper_2019-01_Google Play Apps Drop Anubis Banking Malware, Use Motion-based Evasion Tactics - TrendLabs Security Intelligence Blog.pdf</Key><LastModified>2019-01-28T14:13:53.000Z</LastModified><ETag>&quot;2be110a1b6958f380d4cc2fdaaa21a81&quot;</ETag><Size>851620</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nobelium/</Key><LastModified>2023-02-12T20:24:37.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nobelium_2021_Solarwinds_The Resurgence of Russian Threat Actor, NOBELIUM_2021-11-03_Avertium.pdf</Key><LastModified>2023-02-12T21:02:42.000Z</LastModified><ETag>&quot;b9717a52c1fff7f0aa526a6e5c4eda66&quot;</ETag><Size>292402</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2021_APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;7c27ae8b98a7375ed808bf346fd4a62e&quot;</ETag><Size>754516</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2022_A_deep_dive_into_Saint_Bot,_a_new_downloader.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;23196bc35f078998902f861f3ce8f401&quot;</ETag><Size>2507430</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2022_BabaDeda_and_LorecCPL_downloaders_used_to_run_Outsteel_against_Ukraine_Telsy.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;5bb7555518cd67f4ade9096f3e5bf0fc&quot;</ETag><Size>4379954</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2022_Cyberattack_Saintbot_UACert.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;5b275234b7181c2d219b256303eb7bb1&quot;</ETag><Size>939799</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2022_Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine_Bitdefender.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;a8bf446eb23159e444a93d307076e541&quot;</ETag><Size>3891588</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2022_Spear_Phishing_Attacks_Target_Organizations_in_Ukraine,_Payloads_Include_the_Document_Stealer_OutSteel_and_the_Downloader_SaintBot.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;b13677a098ed53882b69df069be10685&quot;</ETag><Size>7318332</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Nodaria_2023_Graphiron__New_Russian_Information_Stealing_Malware_Deployed_Against_Ukraine.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;b86160c26f56d7166434e3692ca4b4de&quot;</ETag><Size>135199</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/SA33901_CVE-2009-0658_secunia.com_pdf_SA33901_BA.pdf</Key><LastModified>2023-01-19T05:32:52.000Z</LastModified><ETag>&quot;3137a8d7d6585fcdc7ed975882137746&quot;</ETag><Size>107336</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Sandworm_2022_Industroyer2__Industroyer_reloaded___ESET.pdf</Key><LastModified>2023-02-12T20:24:36.000Z</LastModified><ETag>&quot;934b749b573258ffc67ef4589529a79b&quot;</ETag><Size>1044458</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Sandworm_2022_IsaacWiper_and_HermeticWizard__New_wiper_and_worm_targeting_Ukraine__ESET.pdf</Key><LastModified>2023-02-17T23:18:03.000Z</LastModified><ETag>&quot;db4d687c82b112890c8a8bc9cf8d7bc5&quot;</ETag><Size>475106</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Tools-YARA_yara_tools_ Create YARA Rules In Python.pdf</Key><LastModified>2019-01-28T14:20:18.000Z</LastModified><ETag>&quot;bb28de7f8648c774023841647ca54473&quot;</ETag><Size>576757</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Tools_Virustotal_Querying VirusTotal from Excel.pdf</Key><LastModified>2019-01-28T14:16:05.000Z</LastModified><ETag>&quot;5da1633859d54c1e90a0e89f22deec17&quot;</ETag><Size>1230155</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/Tunnel of Gov_ DNC Hack and the Russian XTunnel _ Invincea.pdf</Key><LastModified>2023-02-20T06:18:47.000Z</LastModified><ETag>&quot;b1b88f78c2f4393d437da4ce743ac5e8&quot;</ETag><Size>2066483</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/UNC1151_2018_Radiostar_Alior_Bank__Poland__phishing.pdf</Key><LastModified>2023-02-16T05:17:27.000Z</LastModified><ETag>&quot;2fee5f49e5f4cec1720d7265b256009e&quot;</ETag><Size>386195</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/UNC1151_2021_Assessed_with_High_Confidence_to_have_Links_to_Belarus,_Ghostwriter_Campaign_Aligned_with_Belarusian_Government_Interests__Mandiant.pdf</Key><LastModified>2023-02-12T22:34:35.000Z</LastModified><ETag>&quot;a86c94b6aef613c1b1ead9dd8f1b1a82&quot;</ETag><Size>648656</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/[APT28]_Microsoft_Security_Intelligence_Report_Volume_19_(Microsoft_2015-11).pdf</Key><LastModified>2023-02-19T16:57:11.000Z</LastModified><ETag>&quot;feea952f001ba1a1e2141c0c2b78ff7c&quot;</ETag><Size>3703900</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/[APT28]_Russian Cybergroup Activity_(Fireeye_2015-07).pdf</Key><LastModified>2023-02-19T16:42:43.000Z</LastModified><ETag>&quot;494533977df0b5ab472d4300245e7aa1&quot;</ETag><Size>10518803</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/[APT28]_SCS14–(Fireeye-MOstrowski.TPietrzyk_2014).pdf</Key><LastModified>2023-02-19T16:42:41.000Z</LastModified><ETag>&quot;7685177f701337945695c38ccef4374d&quot;</ETag><Size>7660586</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>read/unc1151_2021_-ghostwriter-update-report_Mandiant.pdf</Key><LastModified>2023-02-12T22:44:58.000Z</LastModified><ETag>&quot;27e7af723fe7a009c69afe431f2118c1&quot;</ETag><Size>5522863</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>reading.html</Key><LastModified>2024-09-09T01:03:59.000Z</LastModified><ETag>&quot;347a29903b1b2fdd0aa264a345a448a8&quot;</ETag><Size>6438</Size><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>