Joe Security

@joe4security

Deep Malware Analysis for Windows, macOS, Linux, Android and iOS

Switzerland
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @joe4security

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @joe4security

  1. Prikvačeni tweet
    prije 5 sati

    Joe Sandbox v28 Lapis Lazuli is out 💪💪💪 Check out our latest blog post to learn more about all the improvements and new features

    Poništi
  2. 3. velj

    Meet us at the on Feb 12-13 in Fribourg and learn more about "Deep Malware Analysis". We are looking forward to meeting you there.

    Poništi
  3. 30. sij

    changed TTP, now dropping JSE script from DOC instead of Powershell to download payload: ▶️ rule for detection:

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Great malware anchor... check out all these samples available for download via keyword pivot in the macro layer: there are other _OnConnecting() prefixes to explore as well.

    Poništi
  5. 28. sij
    Poništi
  6. 27. sij

    (Microsoft Terminal Services Client Control) - OnConnecting is a new VBA macro startup method actively being used by latest downloaders. Executes only on W10.

    Poništi
  7. 24. sij
    Prikaži ovu nit
    Poništi
  8. 24. sij

    distributors started using date-aware (e.g. < 20. Jan 2020) droppers: 1st stage -> decrypts dll -> dll decrypts png from 1st stage resources -> decrypted png is -> agent tesla exe

    Prikaži ovu nit
    Poništi
  9. 22. sij

    continues to use innovative . This time dummy code loops and total process char count. ▶️ Evasion check script: ▶️ Full analysis report:

    Poništi
  10. 18. sij

    We spotted some signed using -2020-0601! Not yet sure if it is just research or pentesting. ▶️ ▶️ ▶️

    Poništi
  11. 14. sij
    Prikaži ovu nit
    Poništi
  12. 14. sij
    Prikaži ovu nit
    Poništi
  13. 14. sij
    Prikaži ovu nit
    Poništi
  14. 14. sij

    You want to get malware configs from recent ? Joe Sandbox v28 features extractors for and many more!

    Prikaži ovu nit
    Poništi
  15. Poništi
  16. 8. sij

    We have analyzed 03baf522fb9c86bd5512a0ee72457f86 with our brand new Deep .NET tracing technology 🚀. Check it out: ▶️ Blog Post: ▶️ .NET tracing files: ▶️ Decompiled .NET projects:

    Prikaži ovu nit
    Poništi
  17. 31. pro 2019.

    Thank to all our customers and supporters for the great 2019! The Joe Security team wishes you success, satisfaction and many pleasant moments in 2020!

    Poništi
  18. 18. pro 2019.

    Evasive VBA macro droppers are on the raise! In our latest blog post we outline how the works and how Joe Sandbox bypasses it: Blog: Analysis Report:

    Poništi
  19. 10. pro 2019.

    We have successfully added new mappings from Joe Sandbox's behavior signatures to MITRE's ATT&CK! Check-out the nice matrix for / analysis!

    Poništi
  20. 26. stu 2019.

    Nice trick to remove system restore points found in . Discovered by Hybrid Decompliation (disassembly on memory dumps). Ref . Sample signed by Infoware Cloud Limited!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·