Anonymous :anarchism: 🏴 · @YourAnonRiots
5930 followers · 36706 posts · Server mstdn.social

HotRat, a dangerous variant of the , is spreading through pirated versions of popular software and games.

thehackernews.com/2023/07/hotr

#InfoSec #informationsecurity #CyberSecurity #Malware #AsyncRAT

Last updated 2 years ago

Anonymous :anarchism: 🏴 · @YourAnonRiots
5381 followers · 32103 posts · Server mstdn.social

TOP10 last week's threats by uploads 📊

⬆️ 517 (478)
⬆️ 287 (182)
⬇️ 175 (212)
⬇️ 150 (302)
⬆️ 141 (111)
⬆️ 133 (102)
⬆️ 132 (67)
⬇️ 119 (143)
⬇️ 96 (101)
⬆️ 87 (26)

any.run/malware-trends/?utm_so

#Ransomware #CyberSecurity #InfoSec #rhadamanthys #njrat #snake #smoke #AsyncRAT #qbot #emotet #remcos #amadey #redline

Last updated 2 years ago

Rakesh Krishnan · @rakeshkrish12
0 followers · 2 posts · Server infosec.exchange
Opalsec :verified: · @Opalsec
117 followers · 59 posts · Server infosec.exchange

This week's newsletter is hot off the press, get it here: opalsec.substack.com/p/soc-gou

The escapades have gone from bad to okay and back to bad again, after attackers revised their encryption routine to bypass CISA's recovery script, and launched a 2nd wave of attacks that resulted in the reinfection of hundreds of hosts. Worst yet - we don't know how they're doing it, as the OpenSLP service (believed to be their method of ingress) has been disabled in a number of reported infections.

PowerShell isn't dead - The DFIR Report published their analysis of an apparent attack by Iran's Oilrig/APT34, whose initial infection relied exclusively on PowerShell and remained undetected for a significant period of time.

Proofpoint have unveiled , a savvy threat group that leverages the 404 Traffic Distribution System and little known AutoHotKey scripting language to cherry pick their targets.

members might find the BokuLoader Reflective Loader for useful in their next engagements, as well as - the latest PrivEsc technique to join the Potato family.

- check out a list of resources that popped up last week to help analyse malware and infections, as well as some helpful how-tos on hunting IIS backdoors and DLL abuse techniques

Happy reading, and happy Monday!

opalsec.substack.com/p/soc-gou

#esxiargs #ta866 #redteam #cobaltstrike #localpotato #blueteam #AsyncRAT #infosec #cyberattack #hacked #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #vmware #esxi

Last updated 3 years ago

Opalsec :verified: · @Opalsec
75 followers · 42 posts · Server infosec.exchange

This week's edition of SOC Goulash, our Weekend Wrap-Up of infosec news, is live and hot off the press!

opalsec.substack.com/p/soc-gou

Building on last week's flagging of the increase in abuse of , researchers have observed it being abused to deliver and payloads, as well as to harvest master passwords for Password Manager solutions like and .

ransomware have had their infrastructure seized in a multi-national law enforcement operation. The authorities lurked in their infrastructure for six months, gathering communications & information on their members and stealing 1,300 decryption keys that enabled them to avert ~$130 million in potential ransom payments.

North Korea's crypto-hunting actors have been agile in adopting emerging tradecraft and developing novel payloads. With $1 billion worth of funds brought into the hermit kingdom in 2022, orgs in the and space will need to be on guard coming into 2023.

malware continues to be developed, with new variants spotted in the wild capable of spreading via USB, upgrading old installations, and pilfering documents from hosed computers.

in the Realtek SDK have been exploited nearly 130 million times between August and December last year alone by botnets seeking to grow their numbers.

Security researchers Horizon3 intend to release a PoC for CVSS 9.8 RCE vulnerabilities in VMWare's vRealize Log Insight product this week - make sure you're patched!

For our paid subscribers, we've got some additional articles on:
1. The adoption of OneNote for payload delivery, and tips for analysis;
2. An overview of CVE-2022-34689, a critical Windows vulnerability that could be abused to intercept & decrypt encrypted communications or spoof code-signing of malicious executables;
3. A vulnerability/not-vulnerability in , with no patch and an unknown scope of impact, allowing attackers to dump plaintext credentials from the Password Manager.

As always, there's a tonne of additional goodies to be found in the newsletter that I couldn't cover here, so check it out here: opalsec.substack.com/p/soc-gou

#malvertising #AsyncRAT #xworm #bitwarden #1password #hive #cryptocurrency #defi #plugx #vulnerabilities #exploit #keepass #infosec #cyberattack #hacked #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #malware #ransomware #dfir #redteam #soc #threatintel #threatintelligence #passwordmanager #vmware #poc

Last updated 3 years ago

Br3akp0int · @Br3akp0int
36 followers · 14 posts · Server infosec.exchange

been seeing a bat-crypter being used by and other malware as a loader. so might be this analysis and my simple python script to extract the enc payload on that .bat file might help. 😊 1/4

github.com/tccontre/KnowledgeB

2/4 the .bat crypter create a series of env variable containing a string that will be concatenated to generate the powershell that will decode, decrypt and load the actual payload. we can dump pwh in process or just exploit the technique by simple 'echo' 😊

3/4 upon running the modified .bat it will dump the pwh that will decode, decrypt (aes) and decompress the actual payload. you can either modified the actual powershell or use cyber chef to decrypt the actual payload.

4/4 doing it 1 by 1 might be exhausting, so I creates a simple python script (shared above) to automatically decrypt and extract the payload from this bat-crypter loader. (specifically designed for this bat-crypter format) it also generate dbg log.

#AsyncRAT #redline #dcrat #int3 #malwareanalysis

Last updated 3 years ago

Josh Stroschein (Twitter @jstrosch) just released a new video about the detailed analysis of a malicious file leading to . Thank you for referencing our hunting rule from last week 👍
Check out the video here: youtube.com/watch?v=kK6Tsmr_wC

#onenote #AsyncRAT #yara

Last updated 3 years ago


eee4117e630dccd591635c26e6109a5f

#AsyncRAT

Last updated 3 years ago

Colin Cowie · @th3_protoCOL
609 followers · 149 posts · Server infosec.exchange

Day 4️⃣​​ of : Suspicious OneNote scripting!

During the evaluation of todays rule I found some interesting results including: &

A few can be found here:
🔗​github.com/colincowie/100DaysO

#100DaysofYARA #AsyncRAT #remcos #infostealer #iocs

Last updated 3 years ago

James_inthe_box · @james_inthe_box
212 followers · 58 posts · Server infosec.exchange

Keep an eye on those .one files coming in.....some contains nasty things (like an .hta file)

app.any.run/tasks/8bd63423-0ec

c2: mulla2022[.]hopto[.]org

#AsyncRAT

Last updated 3 years ago

KrknSec · @krknsec
27 followers · 28 posts · Server infosec.exchange

I've been messing around with dnlib lately for config extractors for .NET malware so I can avoid using byte sequences, offsets, YARA, etc. By using dnlib, I can have it directly find the class/method containing the config and extract the strings.

I can now add to my list of completions.

Also, after working on another RAT, I have more knowledge in dnlib to improve on this script and make it more reliable but I'm gonna save that for another day.

github.com/Krkn-Sec/AsyncRAT-C

#AsyncRAT

Last updated 3 years ago

Tarnkappe.info · @tarnkappeinfo
1529 followers · 3787 posts · Server social.tchncs.de

New blog analysing an sample & taking down the TAs infra

blog.bushidotoken.net/2021/07/

#AsyncRAT

Last updated 4 years ago