clibm079's profile picture. Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. 
Blog: http://malwareanalysisspace.blogspot.com

clibm079

@clibm079

Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. Blog: http://malwareanalysisspace.blogspot.com

Pinned

"To truly understand an adversary, you must rise to — or beyond — their depth.Because only depth reveals intent." #CyberSecurity #MalwareAnalysis #APT #NationalLevelAPT #ThreatIntel #ReverseEngineering


clibm079 reposted

Interesting FUD 'setup.pkg' @abuse_ch bazaar.abuse.ch/sample/45f9b2a… C2: 151.242.170(.)228 @500mk500 @skocherhan @clibm079

smica83's tweet image. Interesting FUD 'setup.pkg' @abuse_ch 
bazaar.abuse.ch/sample/45f9b2a… 
C2: 151.242.170(.)228 
@500mk500 @skocherhan @clibm079
smica83's tweet image. Interesting FUD 'setup.pkg' @abuse_ch 
bazaar.abuse.ch/sample/45f9b2a… 
C2: 151.242.170(.)228 
@500mk500 @skocherhan @clibm079

clibm079 reposted

I had some questions about my career and stuff. I'll answer them. 1. I got into programming really young (about 13 years old). I think I was sufficiently skilled to get an entry level programming job as young as 17, but nobody wanted to hire me or take a risk due to my age.…

My positions and pay: Helpdesk: $10.50/hr Computer Technician: $11.50/hr Helpdesk (again): $16/hr Software Engineer: $42,000/yr Software Engineer: $65,000/yr Software Engineer: $90,000/yr Malware Researcher: $165,000/yr Malware Researcher: $350,000/yr My first computer job I…



clibm079 reposted

Wrote a new blog post on defeating string obfuscation in an obfuscated NodeJS malware sample using AST: dinohacks.com/posts/2025/202…


clibm079 reposted

EvilAI exfiltrates browser data and maintains encrypted command-and-control comms, making visibility and response critical. Find out how Trend Vision One™ helps mitigate this threat: research.trendmicro.com/468BdSR


clibm079 reposted

Welcome back Hasherezade (@hasherezade) to our RE//verse review board! Hasherezade, a malware analyst and software engineer from Poland, is known for her impactful work in cybersecurity and reverse engineering. @hasherezade has created several open source tools including PE-bear,…

REverseConf's tweet image. Welcome back Hasherezade (@hasherezade) to our RE//verse review board! Hasherezade, a malware analyst and software engineer from Poland, is known for her impactful work in cybersecurity and reverse engineering. @hasherezade has created several open source tools including PE-bear,…

clibm079 reposted

I have been closely following all identifiable samples of #APT28 for two years now. @s2grupo's @LAB52io group just released a report about #NotDoor backdoor variant: lab52.io/blog/analyzing… You can find the sample in my "usual" place @abuse_ch bazaar.abuse.ch/browse/tag/APT…


clibm079 reposted

Going live with @Amr_Thabet on October 14th to talk about PowerShell persistence (something I see attackers use constantly to stay hidden in environments) 🎙 I’ll share my approach to hunting for these techniques (baseline → spot anomalies → correlate → validate) and forensic…

PaulaCqure's tweet image. Going live with @Amr_Thabet on October 14th to talk about PowerShell persistence (something I see attackers use constantly to stay hidden in environments) 🎙

I’ll share my approach to hunting for these techniques (baseline → spot anomalies → correlate → validate) and forensic…

clibm079 reposted

Excited to share our latest research on APT37(a.k.a ScarCruft, Ruby Sleet, and Velvet Chollima)’s new infection chain and C2 operation: 1⃣ Initial Access: Leveraging LNK and CHM files to deliver Rust-based and PowerShell-based malware. 2⃣ Post-Recon: Deployment of FadeStealer…

unpacker's tweet image. Excited to share our latest research on APT37(a.k.a ScarCruft, Ruby Sleet, and Velvet Chollima)’s new infection chain and C2 operation:

1⃣ Initial Access: Leveraging LNK and CHM files to deliver Rust-based and PowerShell-based malware.
2⃣ Post-Recon: Deployment of FadeStealer…
unpacker's tweet image. Excited to share our latest research on APT37(a.k.a ScarCruft, Ruby Sleet, and Velvet Chollima)’s new infection chain and C2 operation:

1⃣ Initial Access: Leveraging LNK and CHM files to deliver Rust-based and PowerShell-based malware.
2⃣ Post-Recon: Deployment of FadeStealer…

clibm079 reposted

'balah.bat' dropper from Australia with 0 detection on VT @abuse_ch bazaar.abuse.ch/sample/e96b197… Drops #QuasarRAT from here: hxxps://raw.githubusercontent(.)com/boucegame/ScamBaiting-Updated/refs/heads/main/ChromeUpdater.exe Domain: amyuni(.)com

smica83's tweet image. 'balah.bat' dropper from Australia with 0 detection on VT @abuse_ch 
bazaar.abuse.ch/sample/e96b197… 
Drops #QuasarRAT from here: 
hxxps://raw.githubusercontent(.)com/boucegame/ScamBaiting-Updated/refs/heads/main/ChromeUpdater.exe 
Domain: amyuni(.)com

clibm079 reposted

🤔 145[.]223[.]124[.]175 88[.]223[.]87[.]97 91[.]108[.]123[.]228 77[.]37[.]55[.]170 147[.]79[.]72[.]219 147[.]79[.]72[.]43 147[.]79[.]72[.]42 147[.]79[.]79[.]216 88[.]223[.]87[.]32 145[.]223[.]124[.]208 147[.]79[.]72[.]229 77[.]37[.]53[.]5 77[.]37[.]83[.]211 147[.]79[.]72[.]163…

skocherhan's tweet image. 🤔
145[.]223[.]124[.]175
88[.]223[.]87[.]97
91[.]108[.]123[.]228
77[.]37[.]55[.]170
147[.]79[.]72[.]219
147[.]79[.]72[.]43
147[.]79[.]72[.]42
147[.]79[.]79[.]216
88[.]223[.]87[.]32
145[.]223[.]124[.]208
147[.]79[.]72[.]229
77[.]37[.]53[.]5
77[.]37[.]83[.]211
147[.]79[.]72[.]163…

'B30c.bat' FUD @abuse_ch bazaar.abuse.ch/sample/f2acb59… Drops: hxxps://seagreen-capybara-853936.hostingersite(.)com/base.ps1 bazaar.abuse.ch/sample/75130de… @skocherhan

smica83's tweet image. 'B30c.bat' FUD @abuse_ch 
bazaar.abuse.ch/sample/f2acb59… 
Drops: 
hxxps://seagreen-capybara-853936.hostingersite(.)com/base.ps1 
bazaar.abuse.ch/sample/75130de… 
@skocherhan


clibm079 reposted

It's been a busy week so I almost missed this interesting unfolding story. The newly created GitHub repository "KittenBusters/CharmingKitten" appears to be part of an exposure campaign against the Iranian Advanced Persistent Threat (APT) group Charming Kitten, aka APT35. The…


clibm079 reposted

暁は集った 🚨 NEW RESEARCH: How $81M vanished from Iran's largest crypto exchange akatsukilegion.netlify.app/nobitex_breach… Special thanks goes to @ValidinLLC @Huntio for supporting us Researchers: @TIE__SUN @Sh4dow3x3 #ThreatHunting #DFIR #Stealers #Crypto #Blockchain

_AkatsukiLegion's tweet image. 暁は集った

🚨 NEW RESEARCH: How $81M vanished from Iran's largest crypto exchange

akatsukilegion.netlify.app/nobitex_breach…

Special thanks goes to @ValidinLLC  @Huntio for supporting us
Researchers: @TIE__SUN @Sh4dow3x3 
#ThreatHunting #DFIR #Stealers #Crypto #Blockchain

clibm079 reposted

The new VirusTotal plugin for IDA Pro now integrates Code Insight into your reversing workflow, allowing you to save and use relevant analyses to contextualize other functions. blog.virustotal.com/2025/08/integr…


Part 1: Introduce rootkits and their history and a few example implementations of rootkits and mitigation strategies. Part 2: Introducing two case studies of rootkits found in the wild and hunting skills. I appreciated it; thanks for sharing. @rotemsalinas


Costin Raiu: The GReAT exit interview youtu.be/bUMqkkXj5eA?si… via @YouTube . The security conversations from @ryanaraine and @craiu were intriguing and significant; thanks for sharing. 💙

clibm079's tweet card. Costin Raiu: The GReAT exit interview

youtube.com

YouTube

Costin Raiu: The GReAT exit interview


clibm079 reposted

My malware development works and practices for [April 2025]: * Waiting thread hijacking: github.com/Whitecat18/Rus… * My Custom Shellcode: github.com/Whitecat18/Rus… * ApiHooking using Trampoline: github.com/Whitecat18/Rus… * Fixed Direct Syscall Issues: github.com/Whitecat18/Rus… *…

5mukx's tweet image. My malware development works and practices for [April 2025]:  

* Waiting thread hijacking: github.com/Whitecat18/Rus…

* My Custom Shellcode: github.com/Whitecat18/Rus…

* ApiHooking using Trampoline: github.com/Whitecat18/Rus…

* Fixed Direct Syscall Issues: github.com/Whitecat18/Rus…

*…
5mukx's tweet image. My malware development works and practices for [April 2025]:  

* Waiting thread hijacking: github.com/Whitecat18/Rus…

* My Custom Shellcode: github.com/Whitecat18/Rus…

* ApiHooking using Trampoline: github.com/Whitecat18/Rus…

* Fixed Direct Syscall Issues: github.com/Whitecat18/Rus…

*…
5mukx's tweet image. My malware development works and practices for [April 2025]:  

* Waiting thread hijacking: github.com/Whitecat18/Rus…

* My Custom Shellcode: github.com/Whitecat18/Rus…

* ApiHooking using Trampoline: github.com/Whitecat18/Rus…

* Fixed Direct Syscall Issues: github.com/Whitecat18/Rus…

*…
5mukx's tweet image. My malware development works and practices for [April 2025]:  

* Waiting thread hijacking: github.com/Whitecat18/Rus…

* My Custom Shellcode: github.com/Whitecat18/Rus…

* ApiHooking using Trampoline: github.com/Whitecat18/Rus…

* Fixed Direct Syscall Issues: github.com/Whitecat18/Rus…

*…

clibm079 reposted

My new blog for Check Point Research - check it out! 💙 // #ProcessInjection : #WaitingThreadHijacking

Thread Execution Hijacking is one of the well-known methods that can be used to run implanted code. In this blog we introduce a new injection method, that is based on this classic technique, but much stealthier - Waiting Thread Hijacking. Read More : research.checkpoint.com/2025/waiting-t…



Loading...

Something went wrong.


Something went wrong.