ReEnElec's profile picture. Reverse engineer, hardware developer and Amiga fan boy

Animalware

@ReEnElec

Reverse engineer, hardware developer and Amiga fan boy

Animalware 已轉發

We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth…

.@Volexity #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets. volexity.com/blog/2025/04/2… #dfir



Animalware 已轉發

🚨NEW: Elon Musk has called Senator Mark Kelly (D-AZ) a “traitor” after visiting Ukraine this weekend. Kelly is a 25-year U.S. Navy pilot veteran and retired astronaut. RETWEET if you stand with @CaptMarkKelly against Elon Musk’s unpatriotic attacks!

DisavowTrump20's tweet image. 🚨NEW: Elon Musk has called Senator Mark Kelly (D-AZ) a “traitor” after visiting Ukraine this weekend. Kelly is a 25-year U.S. Navy pilot veteran and retired astronaut.

RETWEET if you stand with @CaptMarkKelly against Elon Musk’s unpatriotic attacks!

Animalware 已轉發

A specialized build of `curl` that mimics the behavior of browsers like Chrome,Firefox, and Safari to avoid anti-bot measures in web scraping and automated HTTP requests

tom_doerr's tweet image. A specialized build of `curl` that mimics the behavior of browsers like Chrome,Firefox, and Safari to avoid anti-bot measures in web scraping and automated HTTP requests

Animalware 已轉發

Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin! github.com/CrowdStrike/sc…

doopsec's tweet image. Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast 
amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin!

github.com/CrowdStrike/sc…

Animalware 已轉發

onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.

marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.

The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to 47,84,196,148:443. Possible new Lolbin? I have not found any information about this.

marsomx_'s tweet image. The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to  
47,84,196,148:443. Possible new Lolbin? I have not found any information about this.
marsomx_'s tweet image. The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to  
47,84,196,148:443. Possible new Lolbin? I have not found any information about this.


Animalware 已轉發

Erik and @jonasl’s Network Fingerprinting talk is now online. It covers #JA4 and #JARM by @4A4133, @lcamtuf’s #p0f and @xnih’s Satori. Thanks to @netnod for having us! youtu.be/1_VbYp4Zyno

netresec's tweet card. Network Fingerprinting - Erik Hjelmvik and Jonas Lejon

youtube.com

YouTube

Network Fingerprinting - Erik Hjelmvik and Jonas Lejon


Animalware 已轉發

"Swiss-army tool for scraping and extracting data from online assets, made for hackers"

tom_doerr's tweet image. "Swiss-army tool for scraping and extracting data from online assets, made for hackers"

Animalware 已轉發

Give this a look, it’s called GHOSTS, it allows you to simulate/automate different types of user traffic/activities. Normally used cybersecurity testing, it might work for what you need. github.com/cmu-sei/GHOSTS

As I’m building out my ISE lab, it got me thinking. How do you simulate having users and devices on your network? Is there something that emulates an iPhone, Android, printer etc. so you can play around with profiling?



Animalware 已轉發

Whenever I’m checking RDP logs and wonder if a full GUI was obtained, I often refer back to this excellent article by Ponder The Bits on RDP event log tracking: ponderthebits.com/2018/02/window…


Animalware 已轉發

I know quite some people within my followers that are representing their tooling(s)/platform/organization related to infosec/threat hunting. Lets use this post to “advertise” the purpose of your tooling/platform usage so others can possibly hop in the train to learn new things!


Animalware 已轉發

📝 Just published a quick blog post: "Unintentional Evasion: Investigating How CMD Fragmentation Hampers Detection & Response" A recent investigation prompted me to share some quick thoughts on the topic of command line omission and fragmentation in Windows CMD, which can…


Animalware 已轉發

Mandiant released CAPA Explorer, a UI to explore CAPA results! This is pretty cool, well done @williballenthin and all! 👏 👉 mandiant.github.io/capa/explorer#… #malware #infosec #malware

fr0gger_'s tweet image. Mandiant released CAPA Explorer, a UI to explore CAPA results! This is pretty cool, well done @williballenthin and all! 👏

👉 mandiant.github.io/capa/explorer#… 

#malware #infosec #malware

Animalware 已轉發

I've open-sourced my Docker #honeypot logs from the past few years. The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests. github.com/silascutler/do…

silascutler's tweet image. I've open-sourced my Docker #honeypot logs from the past few years.  The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests.  

github.com/silascutler/do…
silascutler's tweet image. I've open-sourced my Docker #honeypot logs from the past few years.  The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests.  

github.com/silascutler/do…

Animalware 已轉發

Hello defenders 🎯 So excited to release second blog about #AiTM Hunting! This time, I wrote about using #KQL hunting queries to detect AiTM activity in a Unified Security Operations Platform. I co-authored this blog with Arjun Trivedi🚀🚀🚀 ✔️Blog : techcommunity.microsoft.com/t5/microsoft-s…


Animalware 已轉發

Great talk from Jessica Wilson on open-source #DFIR tools and workflows! - "Forensic Flows, but make them better" youtu.be/oiPumjLLpKk?si…


Animalware 已轉發

🚀Introducing OpenRelik: Open-source platform for digital forensic investigations. Modular workflows, collaboration, central artifact repository and easily extendable to support new tools in a clean, easy to use interface. openrelik.org


Animalware 已轉發

When we respond to large scale compromise, we regularly see the same kinds of configuration issues across Entra ID. If you want some insight to what we see in real world compromises, I put together an overview here - microsoft.com/en-us/security…


Animalware 已轉發

Super excited to finally release a project I have been working on for the last few months! 🎊🎊 Introducing the REx: Rule Explorer project and Detection Engineering Threat Report (DETR) 🎉🎉 br0k3nlab.com/posts/2024/07/… If you found LoFP from lolol.farm useful, this…


Animalware 已轉發

I've just resolved all broken API endpoints in DefenderHarvester. Most endpoints were changed on the backend, the downside of tapping into unofficial API's I guess :D Also, added an option to retrieve all configured suppression rules. github.com/olafhartong/De…

olafhartong's tweet image. I've just resolved all broken API endpoints in DefenderHarvester.  

Most endpoints were changed on the backend, the downside of tapping into unofficial API's I guess :D

Also, added an option to retrieve all configured suppression rules.

github.com/olafhartong/De…

Animalware 已轉發

The video of my #RSAC talk is out. Anyone interested in #ThreatHunting will want to check out it! "I Screwed Up Threat Hunting a Decade Ago, and Now We're Fixing it With PEAK" buff.ly/3zrKSWJ

DavidJBianco's tweet image. The video of my #RSAC talk is out. Anyone interested in #ThreatHunting will want to check out it!

"I Screwed Up Threat Hunting a Decade Ago, and Now We're Fixing it With PEAK"

buff.ly/3zrKSWJ

Loading...

Something went wrong.


Something went wrong.