MalwareLab.pl
@malwarelabpl
Malware Research. Threat Inteligence. Trainings - [email protected]
ID: 1227190787244515328
https://malwarelab.pl 11-02-2020 11:21:42
19 Tweet
593 Takipçi
3 Takip Edilen
We put some hours into covering blanks about tool used by #Nazar #APT /cc: J. A. Guerrero-Saade blog.malwarelab.pl/posts/nazar_ey…
Second part (and last;) of our #Nazar's #APT tool is live. blog.malwarelab.pl/posts/nazar_ey… . With some experimental #snort/#suricata rule for you amusement #Malware #ThreatIntel #sig37 /cc J. A. Guerrero-Saade
Couple of #Lazarus #APT samples, with decoy documents referencing Lockheed Martin, BAE Systems, The Boeing Company. Downloads remote templates and drops double-base64 encoded patched sqlite3 dlls, iocs: gist.github.com/mak/81f6161f85… patched/added exports: sqlite3_stmt_all,sqlite3_stepsW
Interesting clue about operation timeline of #Higaisa based on samples from Malwarebytes's article - before jumping to shellcode loader checks if current year is in [2018,2021] time frame (it also makes quite a good #yara ) #APT #Malware #ThreatHunting #threatintel
bunch of #TA505 docs with name: Human Resources Annual Report.docx (list: github.com/MalwareLab-pl/…) mimics real vba code, will drop a dll with typical packer and #get2 with c2: shr-links[.]com probable lure email: virustotal.com/gui/file/91459… #ThreatIntel #Malware #APT #ThreatHunting
document (virustotal.com/gui/file/ab541… - Bubar Parlimen.docx) dropping #DADSTACHE, download urls: hxxps://armybar.hopto[.]org/{RemoteLoad.dotm,LogiMailApp.exe,LogiMail.dll,Encrypted} c2: tomema.myddns[.]me #Leviathan/#APT40 cc: Brian Bartholomew
This time we write about #Skidware - blog.malwarelab.pl/posts/venom/ | We found new #hackforums grade rat based on #Quasar - its hilarious, check it out #Malware //cc JAMESWT_MHT James Casperinous
Last month, for Amnesty Tech, we analyzed OSX sample of #FinFisher and provide other insights we gather along the way including some scripts aiding further analysis. If you need any help with any #malware related problems, don't hesitate to drop us an email, we are happy to help!