Ayush Anand (@securityinbits) 's Twitter Profile
Ayush Anand

@securityinbits

I tweet about my learning in Malware analysis and DFIR journey.
Opinions are mine only!

ID: 3483789552

linkhttps://www.securityinbits.com/ calendar_today07-09-2015 17:04:43

389 Tweet

1,1K Takipçi

256 Takip Edilen

Ayush Anand (@securityinbits) 's Twitter Profile Photo

Seeing AdaptixC2 pop up in real breaches now 🔍Hunting tips for AdaptixC2: • Look for default user-agent • Use YARA rules + config extractor from Unit 42 • Leverage C2 & hash feeds: ThreatFox, MalwareBazaar, C2IntelFeedsBot Here’s how defenders can spot it fast 👇

Seeing AdaptixC2 pop up in real breaches now

🔍Hunting tips for AdaptixC2:

• Look for default user-agent
• Use YARA rules + config extractor from <a href="/Unit42_Intel/">Unit 42</a> 

• Leverage C2 &amp; hash feeds: ThreatFox, MalwareBazaar, <a href="/drb_ra/">C2IntelFeedsBot</a> 

Here’s how defenders can spot it fast 👇
Karsten Hahn (@struppigel) 's Twitter Profile Photo

I teach malware analysis. Use this coupon for -40% on the intermediate course MAH4HEDGEHOGS …nalysis-for-hedgehogs.learnworlds.com

Ayush Anand (@securityinbits) 's Twitter Profile Photo

LSASS dump via comsvcs.dll is still in play. Recently seen in a ransomware cases Rundll32 calling MiniDump from comsvcs is a big red flag. I tested this in the lab. These 3 Sigma rules fired without fail 👇 Blog with full command and sigma rule links dropping soon..

LSASS dump via comsvcs.dll is still in play.

Recently seen in a ransomware cases

Rundll32 calling MiniDump from comsvcs is a big red flag.

I tested this in the lab. These 3 Sigma rules fired without fail 👇

Blog with full command and sigma rule links dropping soon..
Ayush Anand (@securityinbits) 's Twitter Profile Photo

Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches. What's Inside: ✅ Exact cmd ✅Visual Sigma mapping ✅ Microsoft (Kusto) + Splunk queries Thanks to Florian Roth ⚡️, Nasreddine Bencherchali & Swachchhanda Poudel for the Sigma rules 👇 Full blog link in reply

Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches.

What's Inside:
✅ Exact cmd

✅Visual Sigma mapping

✅ Microsoft (Kusto) + Splunk queries
Thanks to <a href="/cyb3rops/">Florian Roth ⚡️</a>, <a href="/nas_bench/">Nasreddine Bencherchali</a> &amp; <a href="/_swachchhanda_/">Swachchhanda Poudel</a> for the Sigma rules

👇 Full blog link in reply
YungBinary (@yungbinary) 's Twitter Profile Photo

New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro! esentire.com/blog/eye-of-th…

New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro!

esentire.com/blog/eye-of-th…
Ayush Anand (@securityinbits) 's Twitter Profile Photo

Just got my Sigma → Markdown (KQL & Elastic) converter working vibe-coded using Codex CLI - Converts into Markdown (KQL & Lucene) using sigma backends. - Saves them into your Obsidian - easy to search & link. If anyone’s interested, drop me a comment or DM. I might publish

Just got my Sigma → Markdown (KQL &amp; Elastic) converter working 

vibe-coded using Codex CLI

- Converts into Markdown (KQL &amp; Lucene) using sigma backends.

- Saves them into your Obsidian - easy to search &amp; link.

If anyone’s interested, drop me a comment or DM. I might publish
hasherezade (@hasherezade) 's Twitter Profile Photo

My recent writeup on updates in #Rhadamanthys stealer, along with some scripts that may be helpful in analysis. Check it out!

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

New Sigma release r2025-10-01 is available for download. 🌟43 New Rules 🛡️34 Rule updates 🔬27 Rule Fixes Explore the full release -> github.com/SigmaHQ/sigma/… This release introduces a bunch of new rules and updates - A bunch of CVE detections including CVE-2025-54309,

New Sigma release r2025-10-01 is available for download.

🌟43 New Rules
🛡️34 Rule updates
🔬27 Rule Fixes

Explore the full release -&gt; github.com/SigmaHQ/sigma/…

This release introduces a bunch of new rules and updates

- A bunch of CVE detections including CVE-2025-54309,
Ayush Anand (@securityinbits) 's Twitter Profile Photo

Turns out even built‑in cmds like nltest, net & whoami are still handy tools in real attacks. Seen them in ransomware plays & real‑world incidents. Shared tested Sigma rules + SIEM detections (KQL & Elastic) + example output to catch them🔍 👇Blog link in the reply.

Turns out even built‑in cmds like nltest, net &amp; whoami are still handy tools in real attacks. 

Seen them in ransomware plays &amp; real‑world incidents.

Shared tested Sigma rules + SIEM detections (KQL &amp; Elastic) + example output to catch them🔍

👇Blog link in the reply.
Ayush Anand (@securityinbits) 's Twitter Profile Photo

Ever lost track of short-lived malware processes? Use ProcMon Process Tree to catch even exited Processes + cmdline. 1. Start capture 2. Run sample 3. Hit Ctrl+T -> full tree, even the gone ones 🚀 Bonus: Right-click root -> "Add Process & Children to Include" to cut noise.

Ever lost track of short-lived malware processes?

Use ProcMon Process Tree to catch even exited Processes + cmdline.

1. Start capture
2. Run sample
3. Hit Ctrl+T -&gt; full tree, even the gone ones

🚀 Bonus: Right-click root -&gt; "Add Process &amp; Children to Include" to cut noise.