ottoto · @ottoto2017
129 followers · 2006 posts · Server prattohome.com

「マルウェア ローダーの詳細: 今年これまでの攻撃の 80% を引き起こしたビッグ 3 」: The Register

Robin の 3 つのマルウェア ローダーが、今年これまでに観察されたコンピュータやネットワークに対する攻撃の 80% の原因となっています。 」

theregister.com/2023/08/28/top

#qbot #socgholish #raspberry #prattohome #theresister

Last updated 1 year ago

mithrandir · @mithrandir
79 followers · 189 posts · Server defcon.social

Completed Part 3 of my personal series.

The article digs into the follow-up payloads delivered once the Update.js is executed on a victim machine.

Interestingly, I saw RAT and an unknown (to me) PowerShell C2 beacon be delivered together.

If anyone can shed more light on what the PowerShell may be, it would be much appreciated!

Big thanks to @rmceoin for help along the way.

rerednawyerg.github.io/posts/m

#socgholish #netsupport

Last updated 1 year ago

mithrandir · @mithrandir
75 followers · 180 posts · Server defcon.social

leads to RAT downloaded from --> http://wudugf[.]top/f23.svg

Credit to @rmceoin for the help getting the C2 to respond.

C2: *.nodes.gammalambdalambda.org

#socgholish #netsupport

Last updated 1 year ago

mithrandir · @mithrandir
15 followers · 64 posts · Server defcon.social

I've published the second in a series of blog posts on SocGholish related activity. The latest installment focuses on breaking down the fake update payload itself.

rerednawyerg.github.io/malware

#socgholish #malware #intel #fakeupdates

Last updated 2 years ago

mithrandir · @mithrandir
10 followers · 62 posts · Server defcon.social

I've been wanting to start a malware analysis/RE blog as I improve my skills. I published my first analysis a few days ago. Started out by analyzing a site with a malicious JavaScript inject leading to a SocGholish payload.

rerednawyerg.github.io/malware

#socgholish #malware #fakeupdates

Last updated 2 years ago

Ghost0x0 · @ghost0x0
155 followers · 219 posts · Server mastodon.online
Ghost0x0 · @ghost0x0
228 followers · 282 posts · Server mastodon.online