https://blog.cyble.com/2022/03/15/deep-dive-analysis-pandora-ransomware/ |
https://chuongdong.com/reverse%20engineering/2022/01/06/RookRansomware/ |
https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit.md |
https://seguranca-informatica.pt/rook-ransomware-analysis/ |
https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself |
https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/ |
https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader |
https://www.sentinelone.com/labs/new-rook-ransomware-feeds-off-the-code-of-babuk/ |