#binaryrefinery search results

If you liked #CyberChef but would really prefer to increase your APM - maybe you are ready for #BinaryRefinery. github.com/binref/refiner… Go get the latest release 0.4.38 - it has ton of new algorithms implemented since my last public service announcement. Happy triaging!

huettenhain's tweet image. If you liked #CyberChef but would really prefer to increase your APM - maybe you are ready for #BinaryRefinery.
  github.com/binref/refiner…
Go get the latest release 0.4.38 - it has ton of new algorithms implemented since my last public service announcement. Happy triaging!

As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis. github.com/binref/refiner…

huettenhain's tweet image. As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis.
github.com/binref/refiner…

You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

arrow1326's tweet image. You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵) [1] github.com/binref/refiner…

huettenhain's tweet image. I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵)
 [1] github.com/binref/refiner…

Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them! 🏭github.com/binref/refiner…🏭

huettenhain's tweet image. Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them!
 🏭github.com/binref/refiner…🏭

What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags! ✨ github.com/binref/refiner…flare-on11.ctfd.io/challenges

huettenhain's tweet image. What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags!
 ✨ github.com/binref/refiner…
 ✨ flare-on11.ctfd.io/challenges

#BinaryRefinery v0.4.39 is out with some new stuff and a few improvements: github.com/binref/refiner… More importantly, I wrote two new tutorials: github.com/binref/refiner… Here's a teaser from #3: Automatic config extraction for good old SedUpLoader, in pure refinery:

huettenhain's tweet image. #BinaryRefinery v0.4.39 is out with some new stuff and a few improvements:
github.com/binref/refiner…
More importantly, I wrote two new tutorials:
github.com/binref/refiner…
Here's a teaser from #3: Automatic config extraction for good old SedUpLoader, in pure refinery:

I also have a #BinaryRefinery one liner: 📜 emit cap.pcap | pcap [| carve-zip ] I am not actually a broken record. I just enjoy when it works.

huettenhain's tweet image. I also have a #BinaryRefinery one liner:
📜 emit cap.pcap | pcap [| carve-zip ]
I am not actually a broken record. I just enjoy when it works.

What a great opportunity to pitch #BinaryRefinery, which doesn't need any hacks to do this: github.com/binref/refiner… Sample hash used for test: c585251f0280182ac72a6a6bc81090f000a0786a7c5c125de4c43038686bc1d6

huettenhain's tweet image. What a great opportunity to pitch #BinaryRefinery, which doesn't need any hacks to do this:
 github.com/binref/refiner…
Sample hash used for test:
c585251f0280182ac72a6a6bc81090f000a0786a7c5c125de4c43038686bc1d6

Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg h/t @huettenhain

MalwareUtkonos's tweet image. Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery

emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg

h/t @huettenhain

#BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

huettenhain's tweet image. #BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

CyberChef for Malware Analysis - DCRat Loader youtube.com/watch?v=rpp6BZ…

GuidedHacking's tweet image. CyberChef for Malware Analysis - DCRat Loader
youtube.com/watch?v=rpp6BZ…


It's a good thing that #BinaryRefinery's pemeta tool uses the pefile module. Works like a charm on the sample. github.com/binref/refiner… [ ⚠ shameless plug alert ]

huettenhain's tweet image. It's a good thing that #BinaryRefinery's pemeta tool uses the pefile module. Works like a charm on the sample.
 github.com/binref/refiner…
[ ⚠ shameless plug alert ]

Alternatively: Here's how you can do this in #BinaryRefinery from the command line. To just extract the C2: 🏭 carve -sd string | snip 1::2 To fix the obfuscated strings: 🏭 ppjscript | resub ((??string)) {1:esc[-q]:snip[1::2]:esc[-qR]} Get it here: github.com/binref/refiner…

huettenhain's tweet image. Alternatively: Here's how you can do this in #BinaryRefinery from the command line. To just extract the C2:
 🏭 carve -sd string | snip 1::2
To fix the obfuscated strings:
 🏭 ppjscript | resub ((??string)) {1:esc[-q]:snip[1::2]:esc[-qR]}
Get it here:
  github.com/binref/refiner…

What a great opportunity for a #BinaryRefinery showcase! xt exe | xt | push [ | bat | carve -d string | iffs = | b64 | pop k i | carve -sd b64 | aes --iv=eat:i eat:k | zl | peek -mm ] 📌 github.com/binref/refiner…

huettenhain's tweet image. What a great opportunity for a #BinaryRefinery showcase!

xt exe | xt | push [
  | bat
  | carve -d string
  | iffs =
  | b64
  | pop k i
  | carve -sd b64
  | aes --iv=eat:i eat:k
  | zl
  | peek -mm ]

📌 github.com/binref/refiner…

In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat. youtu.be/3MVu0s5ofxE

jstrosch's tweet image. In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat.

youtu.be/3MVu0s5ofxE


#BinaryRefinery v0.4.41 is out with two obscure new binary parsers: 🛠 Experimental support for NSIS archives, including disassembly of the setup script. 🛠 Disassembly of InnerFuse Pascal Script (IFPS) files, as well as extraction of strings from them. github.com/binref/refiner…


Recently, @StanHoppe wrote a #Qakbot configuration extractor in #BinaryRefinery. Deeply moved by this incredible feat of sheer tenacity, I decided to tweak the pipeline enough to turn it into a tutorial, which I can now proudly present: github.com/binref/refiner…


You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

arrow1326's tweet image. You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

This platform feeds me too much junk. Also, it doesn't give me my desired handle because someone registered @rattle 9 years ago. I'll be over on Mastodon for my once-in-a-blue-moon #BinaryRefinery updates. infosec.exchange/@rattle


I have a banger #BinaryRefinery release for y'all. Version 0.8.2 adds support for InnoSetup extraction: Thanks to @malcat4ever for porting part of innoextract to Python, it served as the main template for my code. Many thanks also to @SquiblydooBlog who pointed this out to me.


Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg h/t @huettenhain

MalwareUtkonos's tweet image. Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery

emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg

h/t @huettenhain

I just released v0.8 of #BinaryRefinery! github.com/binref/refiner… There are some breaking changes, but you'll notice them only if you are a power user. The vstack unit now supports using Speakeasy - at the cost of running Unicorn v1. Related post: x.com/huettenhain/st…


🌶️ Live streams resume next week - join me on Nov 26th as Jesko Hüttenhain (@huettenhain), creator of #BinaryRefinery, joins the stream to chat about it's creation and shows off some powerful use-cases! 👉 youtube.com/live/-B072w0qj…

jstrosch's tweet card. Explore Command-Line Driven Binary Transformations with Binary...

youtube.com

YouTube

Explore Command-Line Driven Binary Transformations with Binary...


What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags! ✨ github.com/binref/refiner…flare-on11.ctfd.io/challenges

huettenhain's tweet image. What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags!
 ✨ github.com/binref/refiner…
 ✨ flare-on11.ctfd.io/challenges

I also have a #BinaryRefinery one liner: 📜 emit cap.pcap | pcap [| carve-zip ] I am not actually a broken record. I just enjoy when it works.

huettenhain's tweet image. I also have a #BinaryRefinery one liner:
📜 emit cap.pcap | pcap [| carve-zip ]
I am not actually a broken record. I just enjoy when it works.

What a great opportunity for a #BinaryRefinery showcase! xt exe | xt | push [ | bat | carve -d string | iffs = | b64 | pop k i | carve -sd b64 | aes --iv=eat:i eat:k | zl | peek -mm ] 📌 github.com/binref/refiner…

huettenhain's tweet image. What a great opportunity for a #BinaryRefinery showcase!

xt exe | xt | push [
  | bat
  | carve -d string
  | iffs =
  | b64
  | pop k i
  | carve -sd b64
  | aes --iv=eat:i eat:k
  | zl
  | peek -mm ]

📌 github.com/binref/refiner…

In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat. youtu.be/3MVu0s5ofxE

jstrosch's tweet image. In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat.

youtu.be/3MVu0s5ofxE


Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them! 🏭github.com/binref/refiner…🏭

huettenhain's tweet image. Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them!
 🏭github.com/binref/refiner…🏭

Recent versions add some QoL to #BinaryRefinery (github.com/binref/refiner…): - PowerShell version 7.4 now just works. I think.😬 - Some documentation updates. - More flexibility in selecting dependencies; check the readme for more info. Vanilla install only takes a few seconds now!


As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis. github.com/binref/refiner…

huettenhain's tweet image. As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis.
github.com/binref/refiner…

I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵) [1] github.com/binref/refiner…

huettenhain's tweet image. I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵)
 [1] github.com/binref/refiner…

Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

Are you a parent with a child who struggles with their sexual identity? Check out this helpful resource. Listen in here. bit.ly/3zqloWl #binaryrefinery #raisingkids #findinganswers #licensetoparent

licensetoparent's tweet image. Are you a parent with a child who struggles with their sexual identity? Check out this helpful resource. Listen in here.
bit.ly/3zqloWl

#binaryrefinery #raisingkids #findinganswers #licensetoparent

#BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

huettenhain's tweet image. #BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

CyberChef for Malware Analysis - DCRat Loader youtube.com/watch?v=rpp6BZ…

GuidedHacking's tweet image. CyberChef for Malware Analysis - DCRat Loader
youtube.com/watch?v=rpp6BZ…


Fattening malware with low entropy junk is nothing new, but I've recently seen more cases where, rather than the overlay, bogus PE sections or resources are used for this purpose. The pestrip unit in #BinaryRefinery now has experimental support for this. github.com/binref/refiner…


If you liked #CyberChef but would really prefer to increase your APM - maybe you are ready for #BinaryRefinery. github.com/binref/refiner… Go get the latest release 0.4.38 - it has ton of new algorithms implemented since my last public service announcement. Happy triaging!

huettenhain's tweet image. If you liked #CyberChef but would really prefer to increase your APM - maybe you are ready for #BinaryRefinery.
  github.com/binref/refiner…
Go get the latest release 0.4.38 - it has ton of new algorithms implemented since my last public service announcement. Happy triaging!

#BinaryRefinery v0.4.39 is out with some new stuff and a few improvements: github.com/binref/refiner… More importantly, I wrote two new tutorials: github.com/binref/refiner… Here's a teaser from #3: Automatic config extraction for good old SedUpLoader, in pure refinery:

huettenhain's tweet image. #BinaryRefinery v0.4.39 is out with some new stuff and a few improvements:
github.com/binref/refiner…
More importantly, I wrote two new tutorials:
github.com/binref/refiner…
Here's a teaser from #3: Automatic config extraction for good old SedUpLoader, in pure refinery:

As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis. github.com/binref/refiner…

huettenhain's tweet image. As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis.
github.com/binref/refiner…

Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.
huettenhain's tweet image. Thanks to a great tip from @greglesnewich and awesome previous work by @DidierStevens, #BinaryRefinery 0.6.5 is out with a much improved MSI extraction interface. It synthesizes MSI tables into a JSON document and also extracts any scripts that it can find in those tables.

What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags! ✨ github.com/binref/refiner…flare-on11.ctfd.io/challenges

huettenhain's tweet image. What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags!
 ✨ github.com/binref/refiner…
 ✨ flare-on11.ctfd.io/challenges

I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵) [1] github.com/binref/refiner…

huettenhain's tweet image. I finished #FlareOn10! My goal is to redo all challenges over the next weeks to figure out the most elegant and purely static solution using #BinaryRefinery [1]. The CTF did already inspire some updates in the most recent version 0.6.14: (🧵)
 [1] github.com/binref/refiner…

What a great opportunity to pitch #BinaryRefinery, which doesn't need any hacks to do this: github.com/binref/refiner… Sample hash used for test: c585251f0280182ac72a6a6bc81090f000a0786a7c5c125de4c43038686bc1d6

huettenhain's tweet image. What a great opportunity to pitch #BinaryRefinery, which doesn't need any hacks to do this:
 github.com/binref/refiner…
Sample hash used for test:
c585251f0280182ac72a6a6bc81090f000a0786a7c5c125de4c43038686bc1d6

Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them! 🏭github.com/binref/refiner…🏭

huettenhain's tweet image. Did you know that #BinaryRefinery can unpack 7Zip, ACE, ASAR, CAB, CPIO, ISO, InstallShield, MSI, NSIS, PyInstaller, TAR, ZIP, and even ZPAQ archives? And you don't even have to remember the weird commands for each! The "xt" unit handles all of them!
 🏭github.com/binref/refiner…🏭

It's a good thing that #BinaryRefinery's pemeta tool uses the pefile module. Works like a charm on the sample. github.com/binref/refiner… [ ⚠ shameless plug alert ]

huettenhain's tweet image. It's a good thing that #BinaryRefinery's pemeta tool uses the pefile module. Works like a charm on the sample.
 github.com/binref/refiner…
[ ⚠ shameless plug alert ]

Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg h/t @huettenhain

MalwareUtkonos's tweet image. Logo SVG is item 11 in the HAR and it is Base64 encoded, so lets use another very cool tool, #BinaryRefinery

emit qNSc.har | xtjson 'log.entries.11.response.content.text' | b64 | dump white_logo.svg

h/t @huettenhain

Alternatively: Here's how you can do this in #BinaryRefinery from the command line. To just extract the C2: 🏭 carve -sd string | snip 1::2 To fix the obfuscated strings: 🏭 ppjscript | resub ((??string)) {1:esc[-q]:snip[1::2]:esc[-qR]} Get it here: github.com/binref/refiner…

huettenhain's tweet image. Alternatively: Here's how you can do this in #BinaryRefinery from the command line. To just extract the C2:
 🏭 carve -sd string | snip 1::2
To fix the obfuscated strings:
 🏭 ppjscript | resub ((??string)) {1:esc[-q]:snip[1::2]:esc[-qR]}
Get it here:
  github.com/binref/refiner…

I also have a #BinaryRefinery one liner: 📜 emit cap.pcap | pcap [| carve-zip ] I am not actually a broken record. I just enjoy when it works.

huettenhain's tweet image. I also have a #BinaryRefinery one liner:
📜 emit cap.pcap | pcap [| carve-zip ]
I am not actually a broken record. I just enjoy when it works.

You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

arrow1326's tweet image. You can extract ShadowCoil's final payload using #BinaryRefinery. Run the following one-liner to recover it:

What a great opportunity for a #BinaryRefinery showcase! xt exe | xt | push [ | bat | carve -d string | iffs = | b64 | pop k i | carve -sd b64 | aes --iv=eat:i eat:k | zl | peek -mm ] 📌 github.com/binref/refiner…

huettenhain's tweet image. What a great opportunity for a #BinaryRefinery showcase!

xt exe | xt | push [
  | bat
  | carve -d string
  | iffs =
  | b64
  | pop k i
  | carve -sd b64
  | aes --iv=eat:i eat:k
  | zl
  | peek -mm ]

📌 github.com/binref/refiner…

In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat. youtu.be/3MVu0s5ofxE

jstrosch's tweet image. In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat.

youtu.be/3MVu0s5ofxE


#BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

huettenhain's tweet image. #BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

CyberChef for Malware Analysis - DCRat Loader youtube.com/watch?v=rpp6BZ…

GuidedHacking's tweet image. CyberChef for Malware Analysis - DCRat Loader
youtube.com/watch?v=rpp6BZ…


C2 config parsing malware family Hancitor with the command line version of CyberChef called Binary Refinery. Malware samples from Malware Traffic Analysis: lnkd.in/ez76w8Cg lnkd.in/eN45U4sE Project: lnkd.in/eVp9jXYz #malware #binaryrefinery #hancitor

Yeti_Sec's tweet image. C2 config parsing malware family Hancitor with the command line version of CyberChef called Binary Refinery. 

Malware samples from Malware Traffic Analysis:
lnkd.in/ez76w8Cg
lnkd.in/eN45U4sE

Project:
lnkd.in/eVp9jXYz

#malware #binaryrefinery #hancitor

Are you a parent with a child who struggles with their sexual identity? Check out this helpful resource. Listen in here. bit.ly/3zqloWl #binaryrefinery #raisingkids #findinganswers #licensetoparent

licensetoparent's tweet image. Are you a parent with a child who struggles with their sexual identity? Check out this helpful resource. Listen in here.
bit.ly/3zqloWl

#binaryrefinery #raisingkids #findinganswers #licensetoparent

Loading...

Something went wrong.


Something went wrong.


United States Trends