#malwarelabdaily search results

#MalwareLabDaily 0x106 October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly
malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

#MalwareLabDaily 0x110 Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules. #BlueTeam #RedTeam #sigmarules #ATTACK github.com/j91321/conti-m…

malwarelab_eu's tweet image. #MalwareLabDaily 0x110
Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 
Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules.

#BlueTeam #RedTeam #sigmarules #ATTACK

github.com/j91321/conti-m…

#MalwareLabDaily 0x10C Using Genetic #MalwareAnalysis & Enrichment to Investigate #FancyBear - webinar by @OLRowley (@Maltego) and @AbbyMCH (@IntezerLabs) will start in approx. one hour. Registration is still open: register.gotowebinar.com/register/74698…

malwarelab_eu's tweet image. #MalwareLabDaily 0x10C
Using Genetic #MalwareAnalysis & Enrichment to Investigate #FancyBear - webinar by @OLRowley (@Maltego) and @AbbyMCH (@IntezerLabs) will start in approx. one hour.
Registration is still open:

register.gotowebinar.com/register/74698…

#MalwareLabDaily 0x111 #BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services @anyrun_app: app.any.run/tasks/27eb2089…

malwarelab_eu's tweet image. #MalwareLabDaily 0x111
#BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services

@anyrun_app:
app.any.run/tasks/27eb2089…

#MalwareLabDaily 0x10A @SANSInstitute #ThreatHunting Summit on today and tomorrow. Free registration, #DFIR and #BlueTeam talks, 12 CPE credits, etc. @sansforensics @SANSDefense sans.org/cyber-security…


Parse Migration Part 3: Setting up Cloud Code, Dashboard, and Push Notifications on Parse Server: appcoda.com/parse-migratio… VSCode #VSCodium #MalwareLabDaily #plugin


#MalwareLabDaily 0x105 #R2CON2021 talks start in less than 20 minutes. After yesterday opening and obfuscation workshop, today schedule offers @radareorg, @fridadotre, @qiling_io and other tools and non mainstream architectures. rada.re/con/2021/


#MalwareLabDaily 0x114 Recently @NVISOsecurity found 6 private keys, which are used by hundreds of #CobaltStrike servers for encrypting the communication with the beacons. This communication can be now decrypted with @DidierStevens tools👍 #BlueTeam #DFIR blog.nviso.eu/2021/10/21/cob…


#MalwareLabDaily 0x104 Webinar tomorrow, 29th September at 10:00 AM ET. Full Spectrum #CobaltStrike #Detection: A Technical Profile from @RecordedFuture’s Insikt Group #DFIR #ThreatHunting #ThreatIntelligence #BlueTeam #SOC #CSIRT go.recordedfuture.com/cobalt-strike-…


#MalwareLabDaily 0x102 #Malware often uses services for #persistence and "stealthy" execution. This #mindmap covers creation and detection of #Windows services for #blueteam, #dfir and #threathunting.

Windows Services (Creation) Mind Map covering service creation and detection methods. Link: github.com/nasbench/MindM… #Detection #BlueTeam #Windows #Services

nas_bench's tweet image. Windows Services (Creation) Mind Map covering service creation and detection methods.

Link: github.com/nasbench/MindM…

#Detection #BlueTeam #Windows #Services


#MalwareLabDaily 0x10F #ThreatHunting, #PowerShell, Fileless malware attacks. What to log and search + how to configure group policies. Event IDs 4103, 4104 for PowerShell, Event ID 4688 for process creation. Don't forget to include command line. #Windows socinvestigation.com/threat-hunting…


#MalwareLabDaily 0x107 Two #free videos from @kaspersky online #ReverseEngineering course. Lets analyze @golang #malware used in the #SolarWinds attack 👍

We released two videos for free from our online reverse engineering course. They focus on Go malware (Sunshuttle). youtu.be/_cL-OwU9pFQ youtu.be/YRqTrq11ebg Almost 2 hours of premium IDA Pro entertainment!

JusticeRage's tweet card. Reversing in action: Golang malware used in the SolarWinds attack....

youtube.com

YouTube

Reversing in action: Golang malware used in the SolarWinds attack....



#MalwareLabDaily 0x109 Second part of the #Top10 free #malware analysis tools by @IstroSec. #Reversing for fun and education without funds is pretty possible with these tools. #Dotnet decompiler, #Java #Bytecodeviewer by @Konloch, #oletools by @decalage2, @peepdf and #wireshark

Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files istrosec.com/blog/malware-a…

istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…
istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…
istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…


#MalwareLabDaily 0x10E @Sysinternals #Sysmon is often mentioned in various #BlueTeam, #ThreatHunting and #DFIR scenarios as a free tool to monitor #Windows system activity. Depending on the provided config, it can bring visibility into endpoints. Now, there is #Linux version, too

This post is unavailable.

#MalwareLabDaily 0x103 #REvil as #ELF file = #Ransomware which is able to run on #Linux and encrypt your files in similar way as it does it on #Windows machines Next time someone tells you that Linux is more secure because there are no viruses for Linux, just show them this video

Linux Ransomware: Take a look at #REvil and how it can encrypt your data even on a Ubuntu Linux OS youtu.be/mc0J5fEuWSM

IntezerLabs's tweet image. Linux Ransomware: Take a look at #REvil and how it can encrypt your data even on a Ubuntu Linux OS youtu.be/mc0J5fEuWSM


#MalwareLabDaily 0x108 The @VMware conference #VMworld2021 is scheduled for the next three days. There are also several talks dedicated to #security and especially malware. E.g., the Automating #ransomware remediation with the @vmw_carbonblack #cloud #SDK myevents.vmware.com/widget/vmware/…


#MalwareLabDaily 0x114 Recently @NVISOsecurity found 6 private keys, which are used by hundreds of #CobaltStrike servers for encrypting the communication with the beacons. This communication can be now decrypted with @DidierStevens tools👍 #BlueTeam #DFIR blog.nviso.eu/2021/10/21/cob…


#MalwareLabDaily 0x112 New book and interesting project dedicated to #ransomware. Read and learn about history of ransomware, what it is, how to prevent and how to remove it. And more. ransomware.org/what-is-ransom…

ransomware.org

The History of Ransomware? Understand | Prevent | Recover

Where did Ransomware get started? How did ransomware start? What was the first ransomware? What are the common current forms of ransomware?

Big News 🚨! My ransomware book is out, but the book is just one part of a bigger project, ransomware.org. A comprehensive site designed to help orgs defend against ransomware...and they are making all the content from the book available at no cost. Please visit!

uuallan's tweet image. Big News 🚨! 

My ransomware book is out, but the book is just one part of a bigger project, ransomware.org. A comprehensive site designed to help orgs defend against ransomware...and they are making all the content from the book available at no cost. Please visit!


#MalwareLabDaily 0x111 #BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services @anyrun_app: app.any.run/tasks/27eb2089…

malwarelab_eu's tweet image. #MalwareLabDaily 0x111
#BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services

@anyrun_app:
app.any.run/tasks/27eb2089…

#MalwareLabDaily 0x110 Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules. #BlueTeam #RedTeam #sigmarules #ATTACK github.com/j91321/conti-m…

malwarelab_eu's tweet image. #MalwareLabDaily 0x110
Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 
Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules.

#BlueTeam #RedTeam #sigmarules #ATTACK

github.com/j91321/conti-m…

#MalwareLabDaily 0x10F #ThreatHunting, #PowerShell, Fileless malware attacks. What to log and search + how to configure group policies. Event IDs 4103, 4104 for PowerShell, Event ID 4688 for process creation. Don't forget to include command line. #Windows socinvestigation.com/threat-hunting…


#MalwareLabDaily 0x10E @Sysinternals #Sysmon is often mentioned in various #BlueTeam, #ThreatHunting and #DFIR scenarios as a free tool to monitor #Windows system activity. Depending on the provided config, it can bring visibility into endpoints. Now, there is #Linux version, too

This post is unavailable.

#MalwareLabDaily 0x109 Second part of the #Top10 free #malware analysis tools by @IstroSec. #Reversing for fun and education without funds is pretty possible with these tools. #Dotnet decompiler, #Java #Bytecodeviewer by @Konloch, #oletools by @decalage2, @peepdf and #wireshark

Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files istrosec.com/blog/malware-a…

istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…
istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…
istrosec's tweet image. Overview of the most used and most usable #malware analysis tools. Moreover, we select the tools which are freely available. In part 2 of our selection we focused on tools suitable for analysis of #Java and #dotNET programs and #MSOffice and #PDF files

istrosec.com/blog/malware-a…


#MalwareLabDaily 0x108 The @VMware conference #VMworld2021 is scheduled for the next three days. There are also several talks dedicated to #security and especially malware. E.g., the Automating #ransomware remediation with the @vmw_carbonblack #cloud #SDK myevents.vmware.com/widget/vmware/…


#MalwareLabDaily 0x107 Two #free videos from @kaspersky online #ReverseEngineering course. Lets analyze @golang #malware used in the #SolarWinds attack 👍

We released two videos for free from our online reverse engineering course. They focus on Go malware (Sunshuttle). youtu.be/_cL-OwU9pFQ youtu.be/YRqTrq11ebg Almost 2 hours of premium IDA Pro entertainment!

JusticeRage's tweet card. Reversing in action: Golang malware used in the SolarWinds attack....

youtube.com

YouTube

Reversing in action: Golang malware used in the SolarWinds attack....



#MalwareLabDaily 0x106 October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly
malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

#MalwareLabDaily 0x105 #R2CON2021 talks start in less than 20 minutes. After yesterday opening and obfuscation workshop, today schedule offers @radareorg, @fridadotre, @qiling_io and other tools and non mainstream architectures. rada.re/con/2021/


#MalwareLabDaily 0x104 Webinar tomorrow, 29th September at 10:00 AM ET. Full Spectrum #CobaltStrike #Detection: A Technical Profile from @RecordedFuture’s Insikt Group #DFIR #ThreatHunting #ThreatIntelligence #BlueTeam #SOC #CSIRT go.recordedfuture.com/cobalt-strike-…


#MalwareLabDaily 0x103 #REvil as #ELF file = #Ransomware which is able to run on #Linux and encrypt your files in similar way as it does it on #Windows machines Next time someone tells you that Linux is more secure because there are no viruses for Linux, just show them this video

Linux Ransomware: Take a look at #REvil and how it can encrypt your data even on a Ubuntu Linux OS youtu.be/mc0J5fEuWSM

IntezerLabs's tweet image. Linux Ransomware: Take a look at #REvil and how it can encrypt your data even on a Ubuntu Linux OS youtu.be/mc0J5fEuWSM


#MalwareLabDaily 0x102 #Malware often uses services for #persistence and "stealthy" execution. This #mindmap covers creation and detection of #Windows services for #blueteam, #dfir and #threathunting.

Windows Services (Creation) Mind Map covering service creation and detection methods. Link: github.com/nasbench/MindM… #Detection #BlueTeam #Windows #Services

nas_bench's tweet image. Windows Services (Creation) Mind Map covering service creation and detection methods.

Link: github.com/nasbench/MindM…

#Detection #BlueTeam #Windows #Services


#MalwareLabDaily 0x100 @HexRaysSA 2021 #Plugin Contest is over. Congratulations to the winners and all of the participants, there are new #IDAPro plugins and "toys" for the malware analyst's toolkit. Check them out at hex-rays.com/contests_detai…

plugins.hex-rays.com

Hex-Rays Plugin Repo

Discover powerful plugins for IDA Pro to streamline your workflow.

Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆 🥇 Tenet by @gaasedelen 🥈 D-810 by Boris Batteux, eShard 🥉 nmips by @galli_leo_ With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…

HexRaysSA's tweet image. Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆

🥇 Tenet by @gaasedelen

🥈 D-810 by Boris Batteux, eShard

🥉 nmips by @galli_leo_

With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…


#MalwareLabDaily 0xFF This is perfect yet still simple example how powerful #CyberChef is. This @GCHQ tool comes very handy during deobfuscation for decrypting/decoding the payloads and IOCs extraction (such as #doc example below). Moreover, it is used by #CTF players for puzzles

A silly and straightforward recipe to output the embedded URLs for CVE-2021–40444 weaponized docs or any docs with embedded links for that matter 🙂 It can’t get simpler than that but it’s still effective... bit.ly/3nudS89

Kostastsale's tweet image. A silly and straightforward recipe to output the embedded URLs for CVE-2021–40444 weaponized docs or any docs with embedded links for that matter 🙂 It can’t get simpler than that but it’s still effective...

bit.ly/3nudS89


#MalwareLabDaily 0xFE #CobaltStrike detection - great report by @RecordedFuture. It covers host-based detections (initial access, persistence, lateral movement), network-based detecions (team server and beacon traffic) and keylogger detection and C2 blocking. #ThreatIntelligence

Cobalt Strike was created with the best of intentions, but it has quickly gained traction with threat actors who use it for nefarious reasons. Learn more about how to detect Cobalt Strike in this deep-dive: bit.ly/3CpzmHF



No results for "#malwarelabdaily"

#MalwareLabDaily 0xF7 What information from web #proxy logs can we use and and how can we can use it to hunt or detect #malware and #threats? Blog post #ThreatHunting and #Detection with Web Proxy Logs by @Cyb3rMonk brings some ideas and #cheetsheet posts.bluraven.io/threat-hunting…

malwarelab_eu's tweet image. #MalwareLabDaily 0xF7
What information from web #proxy logs can we use and and how can we can use it to hunt or detect #malware and #threats?

Blog post #ThreatHunting and #Detection with Web Proxy Logs by @Cyb3rMonk brings some ideas and #cheetsheet

posts.bluraven.io/threat-hunting…

#MalwareLabDaily 0xC5 New #OpenSecurityTraining2 is now available ➡️ ost2.fyi There are learning paths for system #security, #securecoding and #vulnerability #exploitation, and #MalwareAnalysis. Keep doing what you do @OpenSecTraining 👍 #free #EducationForAll

malwarelab_eu's tweet image. #MalwareLabDaily 0xC5
New #OpenSecurityTraining2 is now available
➡️ ost2.fyi
There are learning paths for system #security, #securecoding and #vulnerability #exploitation, and #MalwareAnalysis. Keep doing what you do @OpenSecTraining 👍

#free #EducationForAll

#MalwareLabDaily 0x106 October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly
malwarelab_eu's tweet image. #MalwareLabDaily 0x106
October is a #CybersecurityAwarenessMonth. On this occasion @RangeForce released their Community Challenge Series based on network forensics and #ReverseEngineering modules. Successful learners and participants will receive the digital badge via @credly

#MalwareLabDaily 0xF9 Some people think that for #MalwareAnalysis we need lot of expensive tools. However, we can deep dive into #reversing without funds, there are lot of #free tools. See this overview of #Top10 free #malware analysis tools by @IstroSec istrosec.com/blog/malware-a…

malwarelab_eu's tweet image. #MalwareLabDaily 0xF9
Some people think that for #MalwareAnalysis we need lot of expensive tools. However, we can deep dive into #reversing without funds, there are lot of #free tools. See this overview of #Top10 free #malware analysis tools by @IstroSec

istrosec.com/blog/malware-a…

#MalwareLabDaily 0xEF Source code of #Babuk #ransomware leaked. #Windows, #ESXI and #NAS versions included. Thanks @vxunderground for notification. Leaked RAR archive contains decryptors for some of their victims, too.

malwarelab_eu's tweet image. #MalwareLabDaily 0xEF
Source code of #Babuk #ransomware leaked. #Windows, #ESXI and #NAS versions included.
Thanks @vxunderground for notification.
Leaked RAR archive contains decryptors for some of their victims, too.
malwarelab_eu's tweet image. #MalwareLabDaily 0xEF
Source code of #Babuk #ransomware leaked. #Windows, #ESXI and #NAS versions included.
Thanks @vxunderground for notification.
Leaked RAR archive contains decryptors for some of their victims, too.

#MalwareLabDaily 0xE7 Do you want to try #IncidentResponse and analysis of malware-related cases? There are couple of them on @LetsDefendIO: #REvil #Ransomware, #IcedID, #CobaltStrike. #printnightmare #vulnerability analysis is available, too. app.letsdefend.io/dfir/list/ #DFIR

malwarelab_eu's tweet image. #MalwareLabDaily 0xE7
Do you want to try #IncidentResponse and analysis of malware-related cases? There are couple of them on @LetsDefendIO: #REvil #Ransomware, #IcedID, #CobaltStrike. 
#printnightmare #vulnerability analysis is available, too. 

app.letsdefend.io/dfir/list/ #DFIR

#MalwareLabDaily 0xD7 @BlueTeamVillage @defcon talks will start in less than 30 minutes. There are topics dedicated to monitoring and #ThreatHunting with @securityonion, @osquery and @velocidex. There are also #forensics and #malware #packers workshops. dc29.blueteamvillage.org/call-for-conte…

malwarelab_eu's tweet image. #MalwareLabDaily 0xD7
@BlueTeamVillage @defcon talks will start in less than 30 minutes. There are topics dedicated to monitoring and #ThreatHunting with @securityonion, @osquery and @velocidex.
There are also #forensics and #malware #packers workshops.

dc29.blueteamvillage.org/call-for-conte…
malwarelab_eu's tweet image. #MalwareLabDaily 0xD7
@BlueTeamVillage @defcon talks will start in less than 30 minutes. There are topics dedicated to monitoring and #ThreatHunting with @securityonion, @osquery and @velocidex.
There are also #forensics and #malware #packers workshops.

dc29.blueteamvillage.org/call-for-conte…
malwarelab_eu's tweet image. #MalwareLabDaily 0xD7
@BlueTeamVillage @defcon talks will start in less than 30 minutes. There are topics dedicated to monitoring and #ThreatHunting with @securityonion, @osquery and @velocidex.
There are also #forensics and #malware #packers workshops.

dc29.blueteamvillage.org/call-for-conte…

#MalwareLabDaily 0xCE Analyzing #vulnerability CVE-2020-15999 in #libpng in #Chrome. Detailed blog with analysis of crash and buffer owerflow. @tetrane use their own interesting tool, #REVEN. There are also free demos available blog.tetrane.com/2021/CVE-2020-… tetrane.com/demos.html

malwarelab_eu's tweet image. #MalwareLabDaily 0xCE
Analyzing #vulnerability CVE-2020-15999 in #libpng in #Chrome. Detailed blog with analysis of crash and buffer owerflow.
@tetrane use their own interesting tool, #REVEN. There are also free demos available 

blog.tetrane.com/2021/CVE-2020-…

tetrane.com/demos.html

#MalwareLabDaily 0xE6 Older #JavaScript interpreter from @avast_antivirus turned into interactive shell by @taviso for #vulnerability research. For details please see the link, however, the shell itself can be still used for #MalwareAnalysis in sandboxes. github.com/taviso/avscript

malwarelab_eu's tweet image. #MalwareLabDaily 0xE6
Older #JavaScript interpreter from @avast_antivirus turned into interactive shell by @taviso for #vulnerability research. For details please see the link, however, the shell itself can be still used for #MalwareAnalysis in sandboxes.

github.com/taviso/avscript

#MalwareLabDaily 0x110 Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules. #BlueTeam #RedTeam #sigmarules #ATTACK github.com/j91321/conti-m…

malwarelab_eu's tweet image. #MalwareLabDaily 0x110
Older, but still interesting analysis of leaked #Conti #ransomware playbooks by @j91321 
Mapping to @MITREattack and their coverage by Atomic Red Team (@redcanary) and @sigma_hq rules.

#BlueTeam #RedTeam #sigmarules #ATTACK

github.com/j91321/conti-m…

#MalwareLabDaily 0xF6 And the answer is... Portable Executable. PE is the standard executable format in EFI environments and it can be booted by firmware.

malwarelab_eu's tweet image. #MalwareLabDaily 0xF6
And the answer is... Portable Executable.
PE is the standard executable format in EFI environments and it can be booted by firmware.
malwarelab_eu's tweet image. #MalwareLabDaily 0xF6
And the answer is... Portable Executable.
PE is the standard executable format in EFI environments and it can be booted by firmware.

Weekend #quiz (not only) for #ReverseEngineers and #Linux fans. What type of file is the pre-built Linux #kernel vmlinuz?

ELF %81.3
PE (Portable Executable) %18.8

16 vote · Final results



#MalwareLabDaily 0xDB When analyzing a malware, we often need to check if some files are known good or not. There are databases such as #NSRL, however, for quick check against current version we can use #hashlookup by @circl_lu #REST + #DNS #API circl.lu/services/hashl… #DFIR

malwarelab_eu's tweet image. #MalwareLabDaily 0xDB
When analyzing a malware, we often need to check if some files are known good or not. There are databases such as #NSRL, however, for quick check against current version we can use #hashlookup by @circl_lu 
#REST + #DNS #API 

circl.lu/services/hashl…

#DFIR
malwarelab_eu's tweet image. #MalwareLabDaily 0xDB
When analyzing a malware, we often need to check if some files are known good or not. There are databases such as #NSRL, however, for quick check against current version we can use #hashlookup by @circl_lu 
#REST + #DNS #API 

circl.lu/services/hashl…

#DFIR

#MalwareLabDaily 0xE8 #IDAPython Made Easy with #Sark - an object-oriented scripting layer/library written on top of IDAPython by @tmr232 . Simple #API, works with IDA 7.4+ and @python 3, older IDA still supported. sark.rtfd.io github.com/tmr232/Sark

malwarelab_eu's tweet image. #MalwareLabDaily 0xE8
#IDAPython Made Easy with #Sark - an object-oriented scripting layer/library written on top of IDAPython by @tmr232 .
Simple #API, works with IDA 7.4+ and @python 3, older IDA still supported.

sark.rtfd.io
github.com/tmr232/Sark
malwarelab_eu's tweet image. #MalwareLabDaily 0xE8
#IDAPython Made Easy with #Sark - an object-oriented scripting layer/library written on top of IDAPython by @tmr232 .
Simple #API, works with IDA 7.4+ and @python 3, older IDA still supported.

sark.rtfd.io
github.com/tmr232/Sark
malwarelab_eu's tweet image. #MalwareLabDaily 0xE8
#IDAPython Made Easy with #Sark - an object-oriented scripting layer/library written on top of IDAPython by @tmr232 .
Simple #API, works with IDA 7.4+ and @python 3, older IDA still supported.

sark.rtfd.io
github.com/tmr232/Sark

#MalwareLabDaily 0xF2 New malware analysis service by @filescan_itsec. Free public instance available at filescan.io They also offer hourly public feeds with details 👍

malwarelab_eu's tweet image. #MalwareLabDaily 0xF2
New malware analysis service by @filescan_itsec.
Free public instance available at filescan.io
They also offer hourly public feeds with details 👍
malwarelab_eu's tweet image. #MalwareLabDaily 0xF2
New malware analysis service by @filescan_itsec.
Free public instance available at filescan.io
They also offer hourly public feeds with details 👍
malwarelab_eu's tweet image. #MalwareLabDaily 0xF2
New malware analysis service by @filescan_itsec.
Free public instance available at filescan.io
They also offer hourly public feeds with details 👍

#MalwareLabDaily 0x10C Using Genetic #MalwareAnalysis & Enrichment to Investigate #FancyBear - webinar by @OLRowley (@Maltego) and @AbbyMCH (@IntezerLabs) will start in approx. one hour. Registration is still open: register.gotowebinar.com/register/74698…

malwarelab_eu's tweet image. #MalwareLabDaily 0x10C
Using Genetic #MalwareAnalysis & Enrichment to Investigate #FancyBear - webinar by @OLRowley (@Maltego) and @AbbyMCH (@IntezerLabs) will start in approx. one hour.
Registration is still open:

register.gotowebinar.com/register/74698…

#MalwareLabDaily 0xC9 #CyberDaily email newsletter by @RecordedFuture is a concise yet valuable free source of daily #ThreatIntelligence. Also malware trends are clearly visible when something happen - e.g. #Pegasus, #REvil #Kaseya, #DearCry #ransomware go.recordedfuture.com/cyber-daily

malwarelab_eu's tweet image. #MalwareLabDaily 0xC9
#CyberDaily email newsletter by @RecordedFuture is a concise yet valuable free source of daily #ThreatIntelligence.
Also malware trends are clearly visible when something happen - e.g. #Pegasus, #REvil #Kaseya, #DearCry #ransomware

go.recordedfuture.com/cyber-daily
malwarelab_eu's tweet image. #MalwareLabDaily 0xC9
#CyberDaily email newsletter by @RecordedFuture is a concise yet valuable free source of daily #ThreatIntelligence.
Also malware trends are clearly visible when something happen - e.g. #Pegasus, #REvil #Kaseya, #DearCry #ransomware

go.recordedfuture.com/cyber-daily
malwarelab_eu's tweet image. #MalwareLabDaily 0xC9
#CyberDaily email newsletter by @RecordedFuture is a concise yet valuable free source of daily #ThreatIntelligence.
Also malware trends are clearly visible when something happen - e.g. #Pegasus, #REvil #Kaseya, #DearCry #ransomware

go.recordedfuture.com/cyber-daily

#MalwareLabDaily 0x111 #BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services @anyrun_app: app.any.run/tasks/27eb2089…

malwarelab_eu's tweet image. #MalwareLabDaily 0x111
#BlackByte #Ransomware was active mainly in August and it was interesting because it tries to kill @cyb3rops #Raccine specifically and Defender. It also performs common tasks such as disable VSS and other services

@anyrun_app:
app.any.run/tasks/27eb2089…

Loading...

Something went wrong.


Something went wrong.