ReEnElec's profile picture. Reverse engineer, hardware developer and Amiga fan boy

Animalware

@ReEnElec

Reverse engineer, hardware developer and Amiga fan boy

Animalware รีโพสต์แล้ว

We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth…

.@Volexity #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets. volexity.com/blog/2025/04/2… #dfir



Animalware รีโพสต์แล้ว

🚨NEW: Elon Musk has called Senator Mark Kelly (D-AZ) a “traitor” after visiting Ukraine this weekend. Kelly is a 25-year U.S. Navy pilot veteran and retired astronaut. RETWEET if you stand with @CaptMarkKelly against Elon Musk’s unpatriotic attacks!

DisavowTrump20's tweet image. 🚨NEW: Elon Musk has called Senator Mark Kelly (D-AZ) a “traitor” after visiting Ukraine this weekend. Kelly is a 25-year U.S. Navy pilot veteran and retired astronaut.

RETWEET if you stand with @CaptMarkKelly against Elon Musk’s unpatriotic attacks!

Animalware รีโพสต์แล้ว

A specialized build of `curl` that mimics the behavior of browsers like Chrome,Firefox, and Safari to avoid anti-bot measures in web scraping and automated HTTP requests

tom_doerr's tweet image. A specialized build of `curl` that mimics the behavior of browsers like Chrome,Firefox, and Safari to avoid anti-bot measures in web scraping and automated HTTP requests

Animalware รีโพสต์แล้ว

Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin! github.com/CrowdStrike/sc…

doopsec's tweet image. Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast 
amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin!

github.com/CrowdStrike/sc…

Animalware รีโพสต์แล้ว

onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.

marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.
marsomx_'s tweet image. onedrive.exe (phoneactivate.exe #lolbin) side-loads tampered sppc.dll which in turn loads onedrive.dll and decrypts it with RC4 systemfunction033 and  hardcoded key. The decrypted payload appears to be related to #havoc (h/t @embee_research @elasticseclabs) with the mentioned C2.

The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to 47,84,196,148:443. Possible new Lolbin? I have not found any information about this.

marsomx_'s tweet image. The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to  
47,84,196,148:443. Possible new Lolbin? I have not found any information about this.
marsomx_'s tweet image. The powershell script also copies phoneactivate.exe in the temp folder as onedrive.exe, which leverages DLL sideloading and generates traffic to  
47,84,196,148:443. Possible new Lolbin? I have not found any information about this.


Animalware รีโพสต์แล้ว

Erik and @jonasl’s Network Fingerprinting talk is now online. It covers #JA4 and #JARM by @4A4133, @lcamtuf’s #p0f and @xnih’s Satori. Thanks to @netnod for having us! youtu.be/1_VbYp4Zyno

netresec's tweet card. Network Fingerprinting - Erik Hjelmvik and Jonas Lejon

youtube.com

YouTube

Network Fingerprinting - Erik Hjelmvik and Jonas Lejon


Animalware รีโพสต์แล้ว

"Swiss-army tool for scraping and extracting data from online assets, made for hackers"

tom_doerr's tweet image. "Swiss-army tool for scraping and extracting data from online assets, made for hackers"

Animalware รีโพสต์แล้ว

Give this a look, it’s called GHOSTS, it allows you to simulate/automate different types of user traffic/activities. Normally used cybersecurity testing, it might work for what you need. github.com/cmu-sei/GHOSTS

As I’m building out my ISE lab, it got me thinking. How do you simulate having users and devices on your network? Is there something that emulates an iPhone, Android, printer etc. so you can play around with profiling?



Animalware รีโพสต์แล้ว

Whenever I’m checking RDP logs and wonder if a full GUI was obtained, I often refer back to this excellent article by Ponder The Bits on RDP event log tracking: ponderthebits.com/2018/02/window…


Animalware รีโพสต์แล้ว

I know quite some people within my followers that are representing their tooling(s)/platform/organization related to infosec/threat hunting. Lets use this post to “advertise” the purpose of your tooling/platform usage so others can possibly hop in the train to learn new things!


Animalware รีโพสต์แล้ว

📝 Just published a quick blog post: "Unintentional Evasion: Investigating How CMD Fragmentation Hampers Detection & Response" A recent investigation prompted me to share some quick thoughts on the topic of command line omission and fragmentation in Windows CMD, which can…


Animalware รีโพสต์แล้ว

Mandiant released CAPA Explorer, a UI to explore CAPA results! This is pretty cool, well done @williballenthin and all! 👏 👉 mandiant.github.io/capa/explorer#… #malware #infosec #malware

fr0gger_'s tweet image. Mandiant released CAPA Explorer, a UI to explore CAPA results! This is pretty cool, well done @williballenthin and all! 👏

👉 mandiant.github.io/capa/explorer#… 

#malware #infosec #malware

Animalware รีโพสต์แล้ว

I've open-sourced my Docker #honeypot logs from the past few years. The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests. github.com/silascutler/do…

silascutler's tweet image. I've open-sourced my Docker #honeypot logs from the past few years.  The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests.  

github.com/silascutler/do…
silascutler's tweet image. I've open-sourced my Docker #honeypot logs from the past few years.  The honeypot emulated a publicly accessible Docker instance (no SSL or auth) and logged requests.  

github.com/silascutler/do…

Animalware รีโพสต์แล้ว

Hello defenders 🎯 So excited to release second blog about #AiTM Hunting! This time, I wrote about using #KQL hunting queries to detect AiTM activity in a Unified Security Operations Platform. I co-authored this blog with Arjun Trivedi🚀🚀🚀 ✔️Blog : techcommunity.microsoft.com/t5/microsoft-s…


Animalware รีโพสต์แล้ว

Great talk from Jessica Wilson on open-source #DFIR tools and workflows! - "Forensic Flows, but make them better" youtu.be/oiPumjLLpKk?si…


Animalware รีโพสต์แล้ว

🚀Introducing OpenRelik: Open-source platform for digital forensic investigations. Modular workflows, collaboration, central artifact repository and easily extendable to support new tools in a clean, easy to use interface. openrelik.org


Animalware รีโพสต์แล้ว

When we respond to large scale compromise, we regularly see the same kinds of configuration issues across Entra ID. If you want some insight to what we see in real world compromises, I put together an overview here - microsoft.com/en-us/security…


Animalware รีโพสต์แล้ว

Super excited to finally release a project I have been working on for the last few months! 🎊🎊 Introducing the REx: Rule Explorer project and Detection Engineering Threat Report (DETR) 🎉🎉 br0k3nlab.com/posts/2024/07/… If you found LoFP from lolol.farm useful, this…


Animalware รีโพสต์แล้ว

I've just resolved all broken API endpoints in DefenderHarvester. Most endpoints were changed on the backend, the downside of tapping into unofficial API's I guess :D Also, added an option to retrieve all configured suppression rules. github.com/olafhartong/De…

olafhartong's tweet image. I've just resolved all broken API endpoints in DefenderHarvester.  

Most endpoints were changed on the backend, the downside of tapping into unofficial API's I guess :D

Also, added an option to retrieve all configured suppression rules.

github.com/olafhartong/De…

Animalware รีโพสต์แล้ว

The video of my #RSAC talk is out. Anyone interested in #ThreatHunting will want to check out it! "I Screwed Up Threat Hunting a Decade Ago, and Now We're Fixing it With PEAK" buff.ly/3zrKSWJ

DavidJBianco's tweet image. The video of my #RSAC talk is out. Anyone interested in #ThreatHunting will want to check out it!

"I Screwed Up Threat Hunting a Decade Ago, and Now We're Fixing it With PEAK"

buff.ly/3zrKSWJ

United States เทรนด์

Loading...

Something went wrong.


Something went wrong.