CapeSandbox's profile picture. Payloads or it didn't happen.

https://github.com/kevoreilly/CAPEv2

CAPE Sandbox

@CapeSandbox

Payloads or it didn't happen. https://github.com/kevoreilly/CAPEv2

CAPE Sandbox รีโพสต์แล้ว

Malware abusing the finger protocol (this one makes a comeback now and again). bleepingcomputer.com/news/security/… Caught with @CapeSandbox :)

bartblaze's tweet image. Malware abusing the finger protocol (this one makes a comeback now and again).
bleepingcomputer.com/news/security/…
Caught with @CapeSandbox :)

New cmd.exe batch deobfuscation capability integrated in CAPE! FindFixAndRun hook😎 For example: capesandbox.com/analysis/23842/ Thanks KingKDot github.com/KingKDot/Exorc…🙏 and KillerInstinct for the integration!

CapeSandbox's tweet image. New cmd.exe batch deobfuscation capability integrated in CAPE! FindFixAndRun hook😎

For example: capesandbox.com/analysis/23842/

Thanks KingKDot github.com/KingKDot/Exorc…🙏

and KillerInstinct for the integration!

CapeSandbox's tweet image. #Amadey config extraction

capesandbox.com/analysis/21966/

Thanks @YungBinary

Dropping a new malware config parser for #Amadey! Update your CAPEv2 parsers: > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor' Check it out here: github.com/CAPESandbox/CA…

YungBinary's tweet image. Dropping a new malware config parser for #Amadey!

Update your CAPEv2 parsers:
    > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor'

Check it out here:

github.com/CAPESandbox/CA…


SLOW#TEMPEST #CobaltStrike config & payload extraction capesandbox.com/analysis/14224/

CapeSandbox's tweet image. SLOW#TEMPEST #CobaltStrike config & payload extraction

capesandbox.com/analysis/14224/
CapeSandbox's tweet image. SLOW#TEMPEST #CobaltStrike config & payload extraction

capesandbox.com/analysis/14224/
CapeSandbox's tweet image. SLOW#TEMPEST #CobaltStrike config & payload extraction

capesandbox.com/analysis/14224/

Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques. unit42.paloaltonetworks.com/slow-tempest-m…

virusbtn's tweet image. Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques. unit42.paloaltonetworks.com/slow-tempest-m…


#Lumma config & payload extraction capesandbox.com/analysis/13458/ Thanks @YungBinary

CapeSandbox's tweet image. #Lumma config & payload extraction

capesandbox.com/analysis/13458/

Thanks @YungBinary
CapeSandbox's tweet image. #Lumma config & payload extraction

capesandbox.com/analysis/13458/

Thanks @YungBinary

Updated #Lumma stealer C2 extractor! See github.com/CAPESandbox/CA…

YungBinary's tweet image. Updated #Lumma stealer C2 extractor! See github.com/CAPESandbox/CA…


#Amatera payload extraction & direct syscall capture capesandbox.com/analysis/11082/

CapeSandbox's tweet image. #Amatera payload extraction & direct syscall capture

capesandbox.com/analysis/11082/
CapeSandbox's tweet image. #Amatera payload extraction & direct syscall capture

capesandbox.com/analysis/11082/
CapeSandbox's tweet image. #Amatera payload extraction & direct syscall capture

capesandbox.com/analysis/11082/

New Octowave Loader sample > Amatera Stealer. 0 VT. Proofpoint rules detect the traffic. My Yara rule detects the installer. Adobe printer driver sideloads tbb.dll, tbb.dll loads app-2.3.dll which gets stego from blood.wav, uses zxing.presentation.dll. virustotal.com/gui/file/f5c8b…

CyberRaiju's tweet image. New Octowave Loader sample > Amatera Stealer.

0 VT. 
Proofpoint rules detect the traffic.
My Yara rule detects the installer.

Adobe printer driver sideloads tbb.dll, tbb.dll loads app-2.3.dll which gets stego from blood.wav, uses zxing.presentation.dll.

virustotal.com/gui/file/f5c8b…
CyberRaiju's tweet image. New Octowave Loader sample > Amatera Stealer.

0 VT. 
Proofpoint rules detect the traffic.
My Yara rule detects the installer.

Adobe printer driver sideloads tbb.dll, tbb.dll loads app-2.3.dll which gets stego from blood.wav, uses zxing.presentation.dll.

virustotal.com/gui/file/f5c8b…


CAPE Sandbox รีโพสต์แล้ว

We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedicated group of volunteers. After almost a year of downtime, we are extremely happy that we were able to help CAPE get back online again! 🥳 👉…

abuse_ch's tweet image. We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedicated group of volunteers. After almost a year of downtime, we are extremely happy that we were able to help CAPE get back online again! 🥳

👉…

CAPE Sandbox รีโพสต์แล้ว

[1/n] In the hope that it might be useful to someone, I am happy to share with the community my basic (and cheap) implementation of a @CapeSandbox in physical machine config, integrating Elastic Stack and Elastic agents, Suricata, Aurora-Lite agent and Sysmon. #malwareanalysis

marsomx_'s tweet image. [1/n] In the hope that it might be useful to someone, I am happy to share with the community my basic (and cheap) implementation of a @CapeSandbox in physical machine config, integrating Elastic Stack and Elastic agents, Suricata, Aurora-Lite agent and Sysmon. #malwareanalysis

#Lumma config & payload extraction

CapeSandbox's tweet image. #Lumma config & payload extraction
CapeSandbox's tweet image. #Lumma config & payload extraction
CapeSandbox's tweet image. #Lumma config & payload extraction

It is really interesting to find anti-VM techniques being used by threat actors in the wild. This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos. In this case, this was enough to make @anyrun_app to fail based on Screen Resolution

g0njxa's tweet image. It is really interesting to find anti-VM techniques being used by threat actors in the wild.

This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos.

In this case, this was enough to make @anyrun_app to fail based on Screen Resolution
g0njxa's tweet image. It is really interesting to find anti-VM techniques being used by threat actors in the wild.

This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos.

In this case, this was enough to make @anyrun_app to fail based on Screen Resolution
g0njxa's tweet image. It is really interesting to find anti-VM techniques being used by threat actors in the wild.

This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos.

In this case, this was enough to make @anyrun_app to fail based on Screen Resolution


More #BruteRatel...

CapeSandbox's tweet image. More #BruteRatel...
CapeSandbox's tweet image. More #BruteRatel...
CapeSandbox's tweet image. More #BruteRatel...

#BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨 [+] JS T1059.007 [+] Msiexec T1218.007 TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62 Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi

Max_Mal_'s tweet image. #BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨

[+] JS T1059.007
[+] Msiexec T1218.007

TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62

Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi
Max_Mal_'s tweet image. #BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨

[+] JS T1059.007
[+] Msiexec T1218.007

TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62

Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi
Max_Mal_'s tweet image. #BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨

[+] JS T1059.007
[+] Msiexec T1218.007

TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62

Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi


#BruteRatel config & payload extraction, syscall capture #BRC4

CapeSandbox's tweet image. #BruteRatel config & payload extraction, syscall capture #BRC4
CapeSandbox's tweet image. #BruteRatel config & payload extraction, syscall capture #BRC4
CapeSandbox's tweet image. #BruteRatel config & payload extraction, syscall capture #BRC4
CapeSandbox's tweet image. #BruteRatel config & payload extraction, syscall capture #BRC4

#Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll 18.09.2024 👇 wscript.exe Document-21-29-08.js msiexec.exe /V MSI152A.tmp /DontWait rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram (1/3) 👇 IOC's github.com/pr0xylife/Latr…

Cryptolaemus1's tweet image. #Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll

18.09.2024 👇

wscript.exe Document-21-29-08.js

msiexec.exe /V

MSI152A.tmp /DontWait

rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram

(1/3) 👇

IOC's
github.com/pr0xylife/Latr…


BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4

CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4

capa v7.0 dynamic output now fully integrated in CAPE Sandbox 🎉 For example: capesandbox.com/analysis/475639

CapeSandbox's tweet image. capa v7.0 dynamic output now fully integrated in CAPE Sandbox 🎉

For example: capesandbox.com/analysis/475639

CAPE Sandbox รีโพสต์แล้ว

We've uploaded our lecture on Automating Malware Triage from our Introduction to Malware Binary Triage course. Huge shout out to @unpacme @anyrun_app @malpedia @abuse_ch @cybercentre_ca @CapeSandbox @hatching_io @R3MRUM for the amazing projects mentioned youtu.be/8aWnFld4qgc

InvokeReversing's tweet card. Automating Malware Triage (Course Preview)

youtube.com

YouTube

Automating Malware Triage (Course Preview)


CAPE Sandbox รีโพสต์แล้ว

So far #CAPEsandbox on #GCP = <3


CAPE Sandbox รีโพสต์แล้ว

Lightweight blog alert! This post goes over fast Bumblebee unpacking and configuration extraction. I've come across posts where authors do the unpacking manually. I use @CapeSandbox. Don't sleep on CAPEv2! nikhilh-20.github.io/blog/fast_furi…


Loading...

Something went wrong.


Something went wrong.