Paul Rascagneres · @r00tbsd
1252 followers · 281 posts · Server infosec.exchange

I spent few times working on , a post exploitation tools used by (aka "Earth Longzhi" by ). This tool disables kernel callbacks. With my colleagues from @volexity, we wrote a small blog post explaining how it works. But also how to detect kernel callbacks manipulation by using . As supports MS symbols we are able to parse in memory kernel objects. More details here: volexity.com/blog/2023/03/07/u

#avburner #snakecharmer #trendmicro #volatility #volshell

Last updated 1 year ago

volexity · @volexity
283 followers · 17 posts · Server infosec.exchange

@volexity details how to use to detect EDR-nullifying malware. This latest blog post uses the malware, first documented by @TrendMicro, as an example. Read more here: volexity.com/blog/2023/03/07/u

 

#memoryanalysis #avburner #dfir #threatintel

Last updated 1 year ago