Johannes Bader (@viql) 's Twitter Profile
Johannes Bader

@viql

Reverse engineer / malware analyst. On the hunt for domain generation algorithms. Currently side project: rosti.bin.re

ID: 1713609325

linkhttps://bin.re/ calendar_today30-08-2013 19:47:39

195 Tweet

1,1K Followers

168 Following

Johannes Bader (@viql) 's Twitter Profile Photo

Domain Generation Algorithms are straightforward to program and usually bug free. Not so the new #DGA of #BazarLoader, which goes haywire during the summer months: bin.re/blog/a-bazarlo…

Domain Generation Algorithms are straightforward to program and usually bug free. Not so the new #DGA of #BazarLoader, which goes haywire during the summer months: bin.re/blog/a-bazarlo…
Johannes Bader (@viql) 's Twitter Profile Photo

New blog post: Analysing TA551/Shathak malspam with binary refinery bin.re/blog/analysing… I show how the open source framework "binary refinery" can be effective in analysing multistage TA551 malspams with encrypted ZIP, Word document, HTA and Javascript.

New blog post: Analysing TA551/Shathak malspam with binary refinery bin.re/blog/analysing…  

I show how the open source framework "binary refinery" can be effective in analysing multistage TA551 malspams with encrypted ZIP, Word document, HTA and Javascript.
Jesko Hüttenhain (@huettenhain) 's Twitter Profile Photo

Chris Sanders 🔎 🧠 Since there's probably a few big CyberChef aficionados here, I'll go ahead and pitch my little rival project, the binary refinery: 🏭 github.com/binref/refiner… It's (almost) like CyberChef, but it's a cross platform command line toolkit.

Johannes Bader (@viql) 's Twitter Profile Photo

I published a new blog post on a Domain Generation Algorithm that uses the balance of the Bitcoin genesis block as seed. bin.re/blog/a-dga-see…

GovCERT.ch (@govcert_ch) 's Twitter Profile Photo

We published a tech paper on the #ConfuserEx obfuscation mechanism of a Ginzo .NET sample. This class of obfuscator is known as code flatteners. We describe how it can be dealt with using a Python script + IDA Pro Blog: 👉govcert.ch/blog/unflatten… Paper: 👉govcert.ch/whitepapers/un…

We published a tech paper on the #ConfuserEx obfuscation mechanism of a Ginzo .NET sample. This class of obfuscator is known as code flatteners. We describe how it can be dealt with using a Python script + IDA Pro

Blog:
👉govcert.ch/blog/unflatten…

Paper:
👉govcert.ch/whitepapers/un…
CISA Cyber (@cisacyber) 's Twitter Profile Photo

Fortinet released security updates for FortiOS to fix a heap-based buffer overflow vulnerability (CVE-2022-42475). Apply patches asap. Read more at: go.dhs.gov/Z8v

Nils Kuhnert (@0x3c7) 's Twitter Profile Photo

Just updated the "malwarebazaar" Python module to include a Python and CLI client for abuse.ch #YARAify and added a "richer" output. You can find it on Github (github.com/3c7/bazaar/rel…) and on PyPI (via "malwarebazaar"). #threatintel #malware

Just updated the "malwarebazaar" Python module to include a Python and CLI client for <a href="/abuse_ch/">abuse.ch</a> #YARAify and added a "richer" output. You can find it on Github (github.com/3c7/bazaar/rel…) and on PyPI (via "malwarebazaar").
#threatintel #malware
Jesko Hüttenhain (@huettenhain) 's Twitter Profile Photo

#BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?

#BinaryRefinery 0.5.10 can deobfuscate this sample with little effort. Only had to add one new unit for StrReverse constant folding. Not a silver bullet, obviously, but why write those regular expressions yourself when you can make me do it for you?
ThreatCat.ch (@threatcat_ch) 's Twitter Profile Photo

New video on the Domain Generation Algorithm of the file infector m0yv. We've sinkholed multiple domains & show how infections dramatically increased in the last 400+ days 📈. #m0yv #DGA youtu.be/3RYbkORtFnk

New video on the Domain Generation Algorithm of the file infector m0yv. We've sinkholed multiple domains &amp; show how infections dramatically increased in the last 400+ days 📈. #m0yv #DGA

youtu.be/3RYbkORtFnk
ThreatCat.ch (@threatcat_ch) 's Twitter Profile Photo

🛠️ .NET malware decompiling challenges: Obfuscations of strings/constants can be tedious. Automate w/ IDA Pro's Python 🐍 interface for MSIL binary patching, even for simple cases: threatcat.ch/blog/undo-dotn… #CyberSecurity #MalwareAnalysis #IDAPro #DotNET

🛠️ .NET malware decompiling challenges: Obfuscations of strings/constants can be tedious. Automate w/ IDA Pro's Python 🐍 interface for MSIL binary patching, even for simple cases: threatcat.ch/blog/undo-dotn…
#CyberSecurity #MalwareAnalysis #IDAPro #DotNET
Daniel Plohmann (@push_pnx) 's Twitter Profile Photo

I wrote a short blog post on MCRIT, the one-to-many code similarity analysis framework that we released as open source recently at Botconf.

Daniel Plohmann (@push_pnx) 's Twitter Profile Photo

I wrote a blog post about MalpediaFLOSSed, a collection of ~4 million strings extracted from 1800+ malware families and upgrading its GUI plugin to work with IDA, Ghidra, and Binary Ninja at once! Kudos to Hyun Yi for Hyara, which pioneered such cross-tool compatibility!

abuse.ch (@abuse_ch) 's Twitter Profile Photo

Nice #MooBot botnet caught by Fox_threatintel 😂 Botnet C2 domain: 🔥 putin.zelenskyj .ru Pointing to: 45.88.90.30:43957 (AS203168 Constant MOULIN 🇧🇪) DNS resolution provided by Cloudflare 🔎 Payload URLs: 🌐 urlhaus.abuse.ch/host/45.88.90.… Payload: 📄 bazaar.abuse.ch/sample/21f1caa…

Nice #MooBot botnet caught by <a href="/banthisguy9349/">Fox_threatintel</a> 😂

Botnet C2 domain:
🔥 putin.zelenskyj .ru

Pointing to:
45.88.90.30:43957 (AS203168 Constant MOULIN 🇧🇪)

DNS resolution provided by Cloudflare 🔎

Payload URLs:
🌐 urlhaus.abuse.ch/host/45.88.90.…

Payload:
📄 bazaar.abuse.ch/sample/21f1caa…
Jesko Hüttenhain (@huettenhain) 's Twitter Profile Photo

What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags! ✨ github.com/binref/refiner… ✨ flare-on11.ctfd.io/challenges

What's happening? #FlareOn11 is happening! Time to update #BinaryRefinery and snag some flags!
 ✨ github.com/binref/refiner…
 ✨ flare-on11.ctfd.io/challenges
abuse.ch (@abuse_ch) 's Twitter Profile Photo

According to GovCERT.ch , an unknown threat actor has sent out postal letters (yes, *postal* letters ✉️) to recipients in Switzerland that pretend to originate from MeteoSchweiz, luring the recipient into downloading and installing a rogue App 🔥🕵️‍♂️ The QR code in the letter

Johannes Bader (@viql) 's Twitter Profile Photo

Today, I'm releasing the first version of a small web 🚀: rosti.bin.re It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites. I hope it proves useful to some of you ... 🙏✨ #ThreatIntel

Today, I'm releasing the first version of a small web 🚀:  rosti.bin.re

It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites.

I hope it proves useful to some of you ...  🙏✨ #ThreatIntel