Karsten Hahn

@struppigel

Malware Analyst at G DATA. Ransomware hunter. Author of PortEx. he/him 🦔🌈

Germany
Vrijeme pridruživanja: svibanj 2014.

Tweetovi

Blokirali ste korisnika/cu @struppigel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @struppigel

  1. Prikvačeni tweet
    13. ruj 2019.
    Prikaži ovu nit
    Poništi
  2. prije 10 sati

    Thanks for all your help. No need to answer anymore. This was identified as CryptBot by and

    Poništi
  3. 4. velj

    I found these files notable: \Files\_FilePasswords.txt \Files\_Screen.jpg \Files\_Info.txt \Files\Browsers\_FileCookies.txt \Files\Browsers\_FileForms.txt \Files\Browsers\_FileCC.txt

    Prikaži ovu nit
    Poništi
  4. 4. velj
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Would you be interested in such stickers? (RTs are appreciated)

    Poništi
  7. 3. velj

    Repository is gone now.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Analysis of a triple-encrypted AZORult downloader

    Poništi
  9. 3. velj

    Samples today: b68ee1ba36aa100a393710bc06142a742d7e59d62b8204ec4991625467c189b2 fd60c32090c2171e6fa227e2bc29f72a1c28555f62ea2f01a334fa72af87ab00 2f2db989204f89ae8d8512ff0168857a7c613c4a26d0817ffd93a552f1ce96bc

    Prikaži ovu nit
    Poništi
  10. 3. velj

    Given that download rate, we got minimum 100,000 malware downloads via this repository over the weekend alone.

    Prikaži ovu nit
    Poništi
  11. 3. velj

    Have a great Monday morning InfoSec Twitter! Remember, the coffee is only as good as you make it. Yours is probably awesome!

    Poništi
  12. 1. velj

    I've got new glasses today. 🥰 Maybe I should change my profile picture. 🤔

    Poništi
  13. 1. velj

    Repo is still up and all executables have been renewed.

    Prikaži ovu nit
    Poništi
  14. 31. sij

    Reaching almost 40,000 downloads. I contacted Atlassian support to take down the repository.

    Prikaži ovu nit
    Poništi
  15. 31. sij

    Samples are packed with Themida ✉️ ☣️1.exe --> NuclearBot ⚛️ ☣️9.exe --> Infostealer 💰 ☣️4.exe --> downloads tor.exe and 2 AutoIt files (32.exe and 64.exe), possibly miner (I am still looking into it, process graph below)

    Prikaži ovu nit
    Poništi
  16. 31. sij

    AutoHotKey sample downloads NuclearBot (among others) from public repository. Files are 1 hour old and show a few thousand downloads. 19 hours old sample has 36609 downloads. ⬇️ AHKey downloader: (13 detections)

    Prikaži ovu nit
    Poništi
  17. 31. sij

    I cut out the coffee stain on the resume with scissors. ¯\_(ツ)_/¯

    Poništi
  18. 31. sij
    Poništi
  19. 31. sij

    Alternatively: 6 years ago I got the opportunity to do my master thesis at Max Planck Institute in computer linguistics. But I ditched it for parsing PE files instead. Maybe computer linguistics would have been a nice path for me too, but we will never know.

    Prikaži ovu nit
    Poništi
  20. 31. sij

    Malware devs keep telling us we would be bored without them. I believe I would go into medical computer science, train an artificial neural net to read brain scans, drink loads of coffee and also be happy with it. Certainly not bored. What would you do?

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    30. sij

    Really excited to share this with everyone. Read about how I got access to a huge botnet and what happened after!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·