Securityinbits's profile picture. I tweet about my learning in Malware analysis, Threat Intel, Detection engineer and DFIR journey.
Opinions are mine only!

Ayush Anand

@Securityinbits

I tweet about my learning in Malware analysis, Threat Intel, Detection engineer and DFIR journey. Opinions are mine only!

Pinned

Ever run into randomly obfuscated PowerShell? 😵‍💫 I did - thanks to a recent tool (revshell) that generate random versions of obfuscated PowerShell But here’s the fix 👇 MinusOne — written in Rust by @AirbusCERT - cleans it up in seconds.

Securityinbits's tweet image. Ever run into randomly obfuscated PowerShell? 😵‍💫

I did - thanks to a recent tool (revshell) that generate random versions of obfuscated PowerShell

But here’s the fix 👇

MinusOne — written in Rust by @AirbusCERT - cleans it up in seconds.
Securityinbits's tweet image. Ever run into randomly obfuscated PowerShell? 😵‍💫

I did - thanks to a recent tool (revshell) that generate random versions of obfuscated PowerShell

But here’s the fix 👇

MinusOne — written in Rust by @AirbusCERT - cleans it up in seconds.

Ever lost track of short-lived malware processes? Use ProcMon Process Tree to catch even exited Processes + cmdline. 1. Start capture 2. Run sample 3. Hit Ctrl+T -> full tree, even the gone ones 🚀 Bonus: Right-click root -> "Add Process & Children to Include" to cut noise.

Securityinbits's tweet image. Ever lost track of short-lived malware processes?

Use ProcMon Process Tree to catch even exited Processes + cmdline.

1. Start capture
2. Run sample
3. Hit Ctrl+T -> full tree, even the gone ones

🚀 Bonus: Right-click root -> "Add Process & Children to Include" to cut noise.
Securityinbits's tweet image. Ever lost track of short-lived malware processes?

Use ProcMon Process Tree to catch even exited Processes + cmdline.

1. Start capture
2. Run sample
3. Hit Ctrl+T -> full tree, even the gone ones

🚀 Bonus: Right-click root -> "Add Process & Children to Include" to cut noise.

Ayush Anand reposted

Turns out even built‑in cmds like nltest, net & whoami are still handy tools in real attacks. Seen them in ransomware plays & real‑world incidents. Shared tested Sigma rules + SIEM detections (KQL & Elastic) + example output to catch them🔍 👇Blog link in the reply.

Securityinbits's tweet image. Turns out even built‑in cmds like nltest, net & whoami are still handy tools in real attacks. 

Seen them in ransomware plays & real‑world incidents.

Shared tested Sigma rules + SIEM detections (KQL & Elastic) + example output to catch them🔍

👇Blog link in the reply.
Securityinbits's tweet image. Turns out even built‑in cmds like nltest, net & whoami are still handy tools in real attacks. 

Seen them in ransomware plays & real‑world incidents.

Shared tested Sigma rules + SIEM detections (KQL & Elastic) + example output to catch them🔍

👇Blog link in the reply.

Ayush Anand reposted

New Sigma release r2025-10-01 is available for download. 🌟43 New Rules 🛡️34 Rule updates 🔬27 Rule Fixes Explore the full release -> github.com/SigmaHQ/sigma/… This release introduces a bunch of new rules and updates - A bunch of CVE detections including CVE-2025-54309,…

nas_bench's tweet image. New Sigma release r2025-10-01 is available for download.

🌟43 New Rules
🛡️34 Rule updates
🔬27 Rule Fixes

Explore the full release -> github.com/SigmaHQ/sigma/…

This release introduces a bunch of new rules and updates

- A bunch of CVE detections including CVE-2025-54309,…

Ayush Anand reposted

My recent writeup on updates in #Rhadamanthys stealer, along with some scripts that may be helpful in analysis. Check it out!

🚨 Rhadamanthys v0.9.2 is here! What’s new in this multi-layered stealer’s latest evolution? We break down the updates, tactics, and what defenders need to know. Dive into our blog for the full analysis. research.checkpoint.com/2025/rhadamant…



Ayush Anand reposted

Just got my Sigma → Markdown (KQL & Elastic) converter working vibe-coded using Codex CLI - Converts into Markdown (KQL & Lucene) using sigma backends. - Saves them into your Obsidian - easy to search & link. If anyone’s interested, drop me a comment or DM. I might publish…

Securityinbits's tweet image. Just got my Sigma → Markdown (KQL & Elastic) converter working 

vibe-coded using Codex CLI

- Converts into Markdown (KQL & Lucene) using sigma backends.

- Saves them into your Obsidian - easy to search & link.

If anyone’s interested, drop me a comment or DM. I might publish…
Securityinbits's tweet image. Just got my Sigma → Markdown (KQL & Elastic) converter working 

vibe-coded using Codex CLI

- Converts into Markdown (KQL & Lucene) using sigma backends.

- Saves them into your Obsidian - easy to search & link.

If anyone’s interested, drop me a comment or DM. I might publish…

Ayush Anand reposted

New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro! esentire.com/blog/eye-of-th…

YungBinary's tweet image. New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro!

esentire.com/blog/eye-of-th…
YungBinary's tweet image. New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro!

esentire.com/blog/eye-of-th…

Ayush Anand reposted

Seeing AdaptixC2 pop up in real breaches now 🔍Hunting tips for AdaptixC2: • Look for default user-agent • Use YARA rules + config extractor from @Unit42_Intel • Leverage C2 & hash feeds: ThreatFox, MalwareBazaar, @drb_ra Here’s how defenders can spot it fast 👇

Securityinbits's tweet image. Seeing AdaptixC2 pop up in real breaches now

🔍Hunting tips for AdaptixC2:

• Look for default user-agent
• Use YARA rules + config extractor from @Unit42_Intel 

• Leverage C2 & hash feeds: ThreatFox, MalwareBazaar, @drb_ra 

Here’s how defenders can spot it fast 👇
Securityinbits's tweet image. Seeing AdaptixC2 pop up in real breaches now

🔍Hunting tips for AdaptixC2:

• Look for default user-agent
• Use YARA rules + config extractor from @Unit42_Intel 

• Leverage C2 & hash feeds: ThreatFox, MalwareBazaar, @drb_ra 

Here’s how defenders can spot it fast 👇

Ayush Anand reposted

Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches. What's Inside: ✅ Exact cmd ✅Visual Sigma mapping ✅ Microsoft (Kusto) + Splunk queries Thanks to @cyb3rops, @nas_bench & @_swachchhanda_ for the Sigma rules 👇 Full blog link in reply

Securityinbits's tweet image. Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches.

What's Inside:
✅ Exact cmd

✅Visual Sigma mapping

✅ Microsoft (Kusto) + Splunk queries
Thanks to @cyb3rops, @nas_bench & @_swachchhanda_ for the Sigma rules

👇 Full blog link in reply
Securityinbits's tweet image. Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches.

What's Inside:
✅ Exact cmd

✅Visual Sigma mapping

✅ Microsoft (Kusto) + Splunk queries
Thanks to @cyb3rops, @nas_bench & @_swachchhanda_ for the Sigma rules

👇 Full blog link in reply
Securityinbits's tweet image. Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches.

What's Inside:
✅ Exact cmd

✅Visual Sigma mapping

✅ Microsoft (Kusto) + Splunk queries
Thanks to @cyb3rops, @nas_bench & @_swachchhanda_ for the Sigma rules

👇 Full blog link in reply

Ayush Anand reposted

LSASS dump via comsvcs.dll is still in play. Recently seen in a ransomware cases Rundll32 calling MiniDump from comsvcs is a big red flag. I tested this in the lab. These 3 Sigma rules fired without fail 👇 Blog with full command and sigma rule links dropping soon..

Securityinbits's tweet image. LSASS dump via comsvcs.dll is still in play.

Recently seen in a ransomware cases

Rundll32 calling MiniDump from comsvcs is a big red flag.

I tested this in the lab. These 3 Sigma rules fired without fail 👇

Blog with full command and sigma rule links dropping soon..
Securityinbits's tweet image. LSASS dump via comsvcs.dll is still in play.

Recently seen in a ransomware cases

Rundll32 calling MiniDump from comsvcs is a big red flag.

I tested this in the lab. These 3 Sigma rules fired without fail 👇

Blog with full command and sigma rule links dropping soon..

Ayush Anand reposted

I teach malware analysis. Use this coupon for -40% on the intermediate course MAH4HEDGEHOGS …nalysis-for-hedgehogs.learnworlds.com


Loading...

Something went wrong.


Something went wrong.