MalwareLab.pl (@malwarelabpl) 's Twitter Profile
MalwareLab.pl

@malwarelabpl

Malware Research. Threat Inteligence. Trainings - [email protected]

ID: 1227190787244515328

linkhttps://malwarelab.pl calendar_today11-02-2020 11:21:42

19 Tweet

593 Followers

3 Following

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

mak at #x33fcon 2020! Fishing Elephant, or How To Build Cloud Based APT x33fcon.com/#!s/mak.md Register: x33fcon.com/#!conference.m…

<a href="/maciekkotowicz/">mak</a> at #x33fcon 2020!
Fishing Elephant, or How To Build Cloud Based APT

x33fcon.com/#!s/mak.md

Register: x33fcon.com/#!conference.m…
MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

We put some effort into analyzing #RoyalRoad (aka 8t) rtf weaponizer. Take a look blog.malwarelab.pl/posts/on_the_r… /cc nao_sec #APT #malware #ThreatIntel

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

New #aggah campaign, #GuLoader added to chain Doc: 7418b898c989e3fb0d13b5db2c9773478e23150c590acad5832ccc3c14b80a26 remote payloads: hxxp://office-updates-index[.]com/{Report.rtf,Attack.jpg,File.vbs, track.jpg,max.bin} #AgentTesla c2: fxp://ftp.centredebeautenellycettier[.]fr/

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

Second part (and last;) of our #Nazar's #APT tool is live. blog.malwarelab.pl/posts/nazar_ey… . With some experimental #snort/#suricata rule for you amusement #Malware #ThreatIntel #sig37 /cc J. A. Guerrero-Saade

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

Couple of #Lazarus #APT samples, with decoy documents referencing Lockheed Martin, BAE Systems, The Boeing Company. Downloads remote templates and drops double-base64 encoded patched sqlite3 dlls, iocs: gist.github.com/mak/81f6161f85… patched/added exports: sqlite3_stmt_all,sqlite3_stepsW

Couple of #Lazarus #APT samples, with decoy documents referencing <a href="/LockheedMartin/">Lockheed Martin</a>, <a href="/BAESystemsplc/">BAE Systems</a>, <a href="/Boeing/">The Boeing Company</a>. Downloads remote templates and drops double-base64 encoded patched sqlite3 dlls, iocs: gist.github.com/mak/81f6161f85… patched/added exports: sqlite3_stmt_all,sqlite3_stepsW
MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

We write up our analysis of a validator dropped by documents used by #Lazarus, this validator was used in a campaing described by telsy as well as the ones recenty conducted against LockheedMartin, BAESystemsplc, Boeing. blog.malwarelab.pl/posts/lazarus_… cc: Emanuele De Lucia Arkbird

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

#APT #Konni 6973fa7aed812980f0539302d64e618f Name: North Korea-South Korea Relations.doc Downloads: hxxp://footballs.sportsontheweb.net/{2,3}.dat c2:hxxp://footballs.sportsontheweb.net custom alphabet for base64 used to conceal strings

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

Interesting clue about operation timeline of #Higaisa based on samples from Malwarebytes's article - before jumping to shellcode loader checks if current year is in [2018,2021] time frame (it also makes quite a good #yara ) #APT #Malware #ThreatHunting #threatintel

Interesting clue about operation timeline of #Higaisa based on samples from <a href="/Malwarebytes/">Malwarebytes</a>'s article - before jumping to shellcode loader checks if current year is in [2018,2021] time frame (it also makes quite a good #yara ) #APT #Malware #ThreatHunting  #threatintel
MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

bunch of #TA505 docs with name: Human Resources Annual Report.docx (list: github.com/MalwareLab-pl/…) mimics real vba code, will drop a dll with typical packer and #get2 with c2: shr-links[.]com probable lure email: virustotal.com/gui/file/91459… #ThreatIntel #Malware #APT #ThreatHunting

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

document (virustotal.com/gui/file/ab541… - Bubar Parlimen.docx) dropping #DADSTACHE, download urls: hxxps://armybar.hopto[.]org/{RemoteLoad.dotm,LogiMailApp.exe,LogiMail.dll,Encrypted} c2: tomema.myddns[.]me #Leviathan/#APT40 cc: Brian Bartholomew

MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

This time we write about #Skidware - blog.malwarelab.pl/posts/venom/ | We found new #hackforums grade rat based on #Quasar - its hilarious, check it out #Malware //cc JAMESWT_MHT James Casperinous

This time we write about #Skidware - blog.malwarelab.pl/posts/venom/ | We found new #hackforums grade rat based on #Quasar - its hilarious, check it out #Malware //cc <a href="/JAMESWT_MHT/">JAMESWT_MHT</a> <a href="/James_inthe_box/">James</a> <a href="/Casperinous/">Casperinous</a>
CSIS Security Group (@csis_cyber) 's Twitter Profile Photo

mak is our next speaker at #CCCC2020. He worked before as Senior Security Researcher in Kaspersky GReAT or Principal Botnet owner at CERT.pl. He'll talk about #Fishing Elephant, or How to Build a Cloud-Based #APT. bit.ly/3dSx8E0 #Conference

<a href="/maciekkotowicz/">mak</a> is our next speaker at #CCCC2020. He worked before as Senior Security Researcher in Kaspersky GReAT or Principal Botnet owner at CERT.pl. He'll talk about #Fishing Elephant, or How to Build a Cloud-Based #APT.
bit.ly/3dSx8E0 #Conference
MalwareLab.pl (@malwarelabpl) 's Twitter Profile Photo

Last month, for Amnesty Tech, we analyzed OSX sample of #FinFisher and provide other insights we gather along the way including some scripts aiding further analysis. If you need any help with any #malware related problems, don't hesitate to drop us an email, we are happy to help!