Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @haroldogden
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @haroldogden
-
Harold proslijedio/la je Tweet
https://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html … It was my pleasure to work on this with
@malwaresoup and@femmeshoto, two excellent analysts. Malware analysis provided by the awesome@MalwareMechanic.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splash page: "*this document is completely safety to open"pic.twitter.com/m1PlHyO8Av
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
OSTAP downloads base64 encoded PE from 185[.]234[.]73[.]110. Returns 503 unless you use the correct User-Agent set by cscript/wscript. Final payload appears broken, crashes on Win10/Win7. 210832d0c82409f73d3053fe7dc19a5b4bed3933f62431cdb2dd5d6ff88770d2
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#trickbot Maldoc dropping and running OSTAP. Splash page almost got the natural English thing right. VBA uses CallByName, embedded table, Spanish language print statements to obfuscate and appear benign. 5cde4a660fae1ae13198ff5b83244a5a21bd0afdaa905ccd3b9e2202243afa22Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Harold proslijedio/la je Tweet
interesting sample, using minimal macro to write to startup folder for persistence & uses IE via COM to download 2 txt files (no noisy ps or abnormal exec). https://app.any.run/tasks/866b7e6a-4657-4a1f-bba9-44bfb42b7390/ …pic.twitter.com/NPlTC35ZeH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Harold proslijedio/la je Tweet
The Hybrid Enterprise idea is so amazing. It brings together complicated on-premises attack surface with the previously seperate benefits of complicated cloud attack surface.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Harold proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Harold proslijedio/la je Tweet
https://www.microsoft.com/security/blog/2019/09/26/bring-your-own-lolbin-multi-stage-fileless-nodersok-campaign-delivers-rare-node-js-based-malware/ … Does anyone have hashes of some Nodersok HTA samples? I'd like to check them out.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Harold proslijedio/la je Tweet
Some current
#emotet maldocs are dropping a JS downloader and running that to pull down the#emotet PE. Example Doc: https://www.virustotal.com/gui/file/fb25f35c54831b3641c50c760eb94ec57481d8c8b1da98dd05ba97080d54ee6a/detection … Example JS Downloader: https://www.virustotal.com/gui/file/8edfd6de52e8ad4ed2689940efb43a956d6de9b8bb2785628dc9aa2168382c62/detection …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jscript dropped on Document_Open(), executed on Document_Close(): 03a59fc379b9256b73e13780d15753f90ee13be74059d8ed11626d5868cadb7e
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fresh
#trickbot downloading from 185[.]130[.]104[.]157/marga/karlmarks[.]php. Sample maldoc: aa84bf6be31b9ae7f8fae6248a9bc0a57b7a40fc1af1c6c40d81edb853d12ab5 VBA filler taken from https://analystcave.com/vba-arraylist-using-vba-arraylist-excel/ … probably to evade ML signatures.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maldocs delivering JS that downloads
#trickbot are experimenting with where to save their JS before running. Doc saves the JS to the current document's ADS: {CURRENT_FILE_NAME}.docm:tushe 9c2bc57c4cefbdc2413b69732154e22bada7e743c396752b6bd33a07caa3f33bHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Here's a list of maldocs we've seen matching this builder style and their download URLs - based on searching on VBA built-ins "Chr:CreateObject:CreateTextFile:Shell:StrReverse:Write" Many 2nd stage hashes are for the XSL that is dropped. https://gist.github.com/harold-ogden-walmart/94cc78b441072f84fccdef17cc94ec66 …https://twitter.com/autumn_good_35/status/1157259439222616066 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Disregard, took the screenshots in the article at face value... StrReverse and Chr(34) are consistent with the July 9 Dridex maldoc VBA. The screenshot in the article was partially deobfuscated.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The maldoc VBA used in this campaign is the same used in Dridex campaigns a month ago, but possibly an earlier version. Dridex maldocs from ~July 9 moved "chr(34)" to not be on the same line as "Shell", and used StrReverse on the XSL file pathhttps://research.checkpoint.com/cobalt-group-returns-to-kazakhstan/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Analysis and emulation of a Dridex maldoc Part 2 is up! Documented how I go about generating VBA with Python, QA the result, and a video showing how to insert the generated VBA into a Word doc to emulate a Dridex maldoc.https://medium.com/@haroldogden/malicious-document-delivering-dridex-analysis-and-emulation-part-2-eb33fb6e3582 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some samples built with this VBA (They download and execute putty - password "123", just like Dridex): https://www.virustotal.com/gui/file/302cd9afaa3da5840c528ecdeeb29c6a02185417617ade7c2ad14925be2a338d/detection … https://www.virustotal.com/gui/file/b55dedf6974c9f335e52322372b5ead676ff48ff3b5516771ee6d1d9bc96244b/detection … Don't take my word for it though, please treat all office files like malware. 3/3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Progress so far in this branch of the Adaptive Doc Builder: https://github.com/haroldogden/adb/tree/dridex_20190709 … - detailed write up coming tomorrow on how to build your own with the script output. Each doc takes about a minute. Here's an example: one of these is Dridex, the other three are from ADB. 2/3pic.twitter.com/iTYE2HTKvn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Done with a VBA builder to emulate Dridex from earlier this month. 5 code modules, 1 XSL payload that runs with wmic os get /format:"{payload_path}". Still can't figure out how to add a text box control to a form with pywin32's COM client, so it's not a full doc builder yet. 1/3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spending some quality time with a Dridex maldoc this weekend. While the goal is to have a new builder in the Adaptive Document Builder in the next few days, I also documented my analysis process. Here's how I pick apart a maldoc before making a builder:https://medium.com/@haroldogden/malicious-document-delivering-dridex-analysis-and-emulation-part-1-b5ef43cfbb97?sk=48fdcdd33a50543cc53ea28d4994a7ad …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.