Herbie Zimmerman(@HerbieZimmerman) 's Twitter Profileg
Herbie Zimmerman

@HerbieZimmerman

SOC analyst and wanna-be malware researcher.

ID:982533264

linkhttps://www.herbiez.com calendar_today01-12-2012 13:26:30

3,3K Tweets

2,5K Followers

962 Following

Matt Zorich(@reprise_99) 's Twitter Profile Photo

Microsoft Graph Activity Logs are out of public preview and now generally available. These have quickly become one of my favourite log sources for both detections and investigations, some guidance and example hunting queries here - techcommunity.microsoft.com/t5/microsoft-e…

account_circle
Jai Minton(@CyberRaiju) 's Twitter Profile Photo

Just contributed 4 new entries on behalf of Huntress to the Hijack Libs project (created by Wietze).

Tracking and stopping malicious actors is a team effort, and contributing back to projects like this, LOLBAS, MITRE ATT&CK etc helps defenders overall, so if you can, do it

Just contributed 4 new entries on behalf of @HuntressLabs to the Hijack Libs project (created by @Wietze). Tracking and stopping malicious actors is a team effort, and contributing back to projects like this, LOLBAS, MITRE ATT&CK etc helps defenders overall, so if you can, do it
account_circle
Philippe Lagadec(@decalage2) 's Twitter Profile Photo

Some threat actors are still using maldocs with VBA macros, so it must be working.
In some cases we can even see interesting and rarely used techniques. Let's analyse the following sample with oletools and cyberchef:

account_circle
Nasreddine Bencherchali(@nas_bench) 's Twitter Profile Photo

New blog post from Mohamed Ashraf and me. Where we did a deep dive into a recent KamiKakaBot sample we encountered.

Unveiling KamiKakaBot – Malware Analysis nextron-systems.com/2024/03/22/unv…

Nextron Systems

New blog post from @X__Junior and me. Where we did a deep dive into a recent KamiKakaBot sample we encountered. Unveiling KamiKakaBot – Malware Analysis nextron-systems.com/2024/03/22/unv… @nextronsystems
account_circle
Security Onion(@securityonion) 's Twitter Profile Photo

Looking for a fun project? 😁

Want to practice your 🔍 and 🕵️ skills?

Install the NEW 🧅 2.4.60 in a VM:
docs.securityonion.net/en/2.4/first-t…

Then follow along with some of our quick analysis posts:…

account_circle
John Hammond(@_JohnHammond) 's Twitter Profile Photo

Showcasing NetExec, exploiting an Active Directory environment! AND, this video comes with an interactive lab environment for you to follow along -- name your price training! You can access the material for free, you just need to cover the VM lab time. 😁youtube.com/watch?v=3SQMZz…

Showcasing NetExec, exploiting an Active Directory environment! AND, this video comes with an interactive lab environment for you to follow along -- name your price training! You can access the material for free, you just need to cover the VM lab time. 😁youtube.com/watch?v=3SQMZz…
account_circle
Herbie Zimmerman(@HerbieZimmerman) 's Twitter Profile Photo

Been a while since I came across , but saw the update.js come from hxxps://invisiblepeople[.]tv/why-i-support-regulating-the-public-feeding-of-homeless-people/<...>. Couldn't pull the file unfortunately.
urlscan.io/result/2857487…

account_circle
Jai Minton(@CyberRaiju) 's Twitter Profile Photo

As a child my old man used to say I 'cheated' in video games. Knowing game mechanics and cheating are 2 different things. On that note, my latest video is out 🎉

I demonstrate the basics of video game hacking through memory and save file manipulation.

youtu.be/8puZTOOWlqA

As a child my old man used to say I 'cheated' in video games. Knowing game mechanics and cheating are 2 different things. On that note, my latest video is out 🎉 I demonstrate the basics of video game hacking through memory and save file manipulation. youtu.be/8puZTOOWlqA
account_circle
Kostas(@Kostastsale) 's Twitter Profile Photo

When responding to potential ScreenConnect compromises, you can use the below PowerShell command to accelerate the process:

Looking for strings:
1️⃣ /SetupWizard.aspx/
2️⃣ python-requests (the user agent)

Get-ChildItem C:\inetpub\logs\LogFiles\W3SVC*\*.log | Where-Object {…

account_circle
Florian Roth(@cyb3rops) 's Twitter Profile Photo

We moved the Huntress YARA rule & some of our own into my open source repo, which is used for THOR Lite⚡️& THOR Cloud Lite 🌩️

> use use these free tools to perform compromise assessments on your hosts ✅

github.com/Neo23x0/signat…

THOR Cloud Lite
thorcloud-lite.nextron-systems.com

We moved the @HuntressLabs YARA rule & some of our own into my open source repo, which is used for THOR Lite⚡️& THOR Cloud Lite 🌩️ > use use these free tools to perform compromise assessments on your hosts ✅ github.com/Neo23x0/signat… THOR Cloud Lite thorcloud-lite.nextron-systems.com
account_circle
Florian Roth(@cyb3rops) 's Twitter Profile Photo

I've processed Huntress' awesome report on post-exploitation activities observed in relation to the vulnerability and created 15 YARA rules

Report
huntress.com/blog/slashandg…

Rules
github.com/Neo23x0/signat…
(I've put the THOR APT Scanner only rules at the end)

IOCs…

I've processed @HuntressLabs' awesome report on post-exploitation activities observed in relation to the #ScreenConnect vulnerability and created 15 YARA rules Report huntress.com/blog/slashandg… Rules github.com/Neo23x0/signat… (I've put the @thor_scanner only rules at the end) IOCs…
account_circle
Nasreddine Bencherchali(@nas_bench) 's Twitter Profile Photo

We just finished processing or in other words we just 'Slash & Grabbed' this amazing report from Huntress team. Made some updates and added some new Sigma rules. But fortunately a lot of it was already covered by old generic rules.

Here is a quick thread on every Sigma…

We just finished processing or in other words we just 'Slash & Grabbed' this amazing report from @HuntressLabs team. Made some updates and added some new Sigma rules. But fortunately a lot of it was already covered by old generic rules. Here is a quick thread on every Sigma…
account_circle
mthcht(@mthcht) 's Twitter Profile Photo

Hunt for Google Remote Desktop usage in your environnement:
Detections patterns : github.com/mthcht/ThreatH…
Destination port : github.com/mthcht/awesome…
Windows Service names : github.com/mthcht/awesome…
Windows Firewall rule name : github.com/mthcht/awesome…

account_circle