Kyle Cucci Profile Banner
Kyle Cucci Profile
Kyle Cucci

@d4rksystem

Followers
4,520
Following
513
Media
169
Statuses
2,290

Threat Research @proofpoint | Author of "Evasive Malware" @nostarch | Talks about cybercrime, threat intel, and malware stuff.

Germany
Joined September 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@d4rksystem
Kyle Cucci
1 year
I’m excited to announce that my book, “Evasive Malware”, will soon be available for pre-order! The past 2.5 years of late nights, eye strain, and carpal tunnel is almost worth it 😎 Also excited to announce that my technical reviewer is the amazing @fr0gger_ ! Stay tuned! 👇
Tweet media one
44
254
1K
@d4rksystem
Kyle Cucci
2 years
#Malware Analysis Tip: Windows registry contains an interesting key (HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\UAC\COMAutoApprovalList) that shows all COM objects that auto-elevate, bypassing UAC. Malware may be able to modify or hijack some these to elevate privileges.
Tweet media one
13
299
1K
@d4rksystem
Kyle Cucci
9 months
As a former IDA Pro guy (who must now use Ghidra because of money reasons), this guide really helped me get my Ghidra interface more IDA-like 😎 A lot of useful stuff here.
4
180
663
@d4rksystem
Kyle Cucci
4 years
#CobaltStrike hunting tip of the week: CobaltStrike uses named pipes for communication between processes. Default beacon configs use pipes in the format "MSSE-x-server", where "x" is a number from 1 to 4 characters. Hunting for this named pipe pattern may find things 😉
Tweet media one
6
189
593
@d4rksystem
Kyle Cucci
2 years
#Malware analysis tip: You can automatically extract certain files hidden inside an image file (steganography) using 7zip, such as this PK file hidden inside a JFIF image. Remove the file extension and extract with 7z, and 7z will attempt to locate embedded files and extract 🥳
Tweet media one
Tweet media two
12
120
500
@d4rksystem
Kyle Cucci
2 years
#Malware Analysis Tip: Setting the registry key "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM\ConsentPromptBehaviorAdmin" to 0 seems to disable UAC prompts. If you see a malware sample reading or modifying this key, now you know what it may be trying to do 😉
4
156
510
@d4rksystem
Kyle Cucci
4 months
Excited to share the cover for my upcoming book #EvasiveMalware ! I think @nostarch did a great job with this one. Obviously not the final final version, but let me know what you think 😄 Ps. If you try to print this, your printer will explode.
Tweet media one
33
49
487
@d4rksystem
Kyle Cucci
1 year
Interesting project for anti-forensics and evasion. Blue-teamers should study this one for learning 🤓
Tweet media one
4
136
436
@d4rksystem
Kyle Cucci
2 years
#Malware analysis tip of the week: If you spot malware using memcpy or WriteProcessMemory to write the bytes "4C 8B D1” to an arbitrary address in memory, it is probably trying to unhook AV or EDR by overwriting inline hooks. 🧐
4
89
383
@d4rksystem
Kyle Cucci
1 year
Is malware detecting your VirtualBox VM's? Is pafish giving you trouble? Try out the latest release of my PowerShell-based tool VBoxCloak! A quick and dirty way to hide your VM's from some common VM-detection techniques. VMware coming soon! 🥳
Tweet media one
Tweet media two
8
104
373
@d4rksystem
Kyle Cucci
2 years
Want to learn how a simple UAC bypass / priv elevation works? Start msconfig, go to Tools menu, select "Command Prompt", and click Launch. Depending on your system configuration, a shell will pop open as a child process of msconfig, with elevated privileges and higher integrity.
Tweet media one
Tweet media two
8
64
284
@d4rksystem
Kyle Cucci
1 year
Interested in how modern #malware evades defenses and analysis? I wrote up a summary of my new book "Evasive Malware: Understanding Deceptive and Self-Defending Threats" ( @nostarch ). DM's open to feedback or questions! :)
3
61
255
@d4rksystem
Kyle Cucci
2 years
#Malware analysis tip of the week: Malware can call DeviceIoControl with the parameter 0x7405C (IOCTL_DISK_GET_LENGTH_INFO) to check the size of the disk. This can be used as an anti-VM and anti-sandbox technique 🥳
Tweet media one
7
55
233
@d4rksystem
Kyle Cucci
5 months
In case you didn't know, #VirusTotal has this (new?) feature that can generate hunting rules for files and URL's in one click 😍 It's hidden in the "Follow" menu.
Tweet media one
2
47
232
@d4rksystem
Kyle Cucci
1 year
Want to learn how #malware evades defenses and analysis tools? You can pre-order my new book "Evasive Malware" at Barnes & Noble for 25%-off (through 28 April)🥳 Use promo code "PREORDER25" when ordering.
5
49
229
@d4rksystem
Kyle Cucci
3 years
#CobaltStrike hunting tip of the week: CS powershell loader one-liners can often be decoded using Cyberchef. Specifically, @0xtornado has a great recipe for this (link will be in comments). The resulting shellcode can then be run through a shellcode debugger (like Scdbg)!
Tweet media one
Tweet media two
2
96
226
@d4rksystem
Kyle Cucci
2 years
#Malware analysis tip of the week: Malware can hide from a debugger by calling NtSetInformationThread and setting the ThreadHideFromDebugger flag. If this flag is set, the running code thread will no longer send debug events to the debugger, essentially hiding code execution. 🧐
3
72
223
@d4rksystem
Kyle Cucci
3 years
#CobaltStrike hunting tip of the week: #PEsieve by @hasherezade can oftentimes extract CS implants and loader shellcode directly from memory (depending, of course, on code injection methods). Try this out during investigations into suspect processes!
Tweet media one
Tweet media two
Tweet media three
3
74
209
@d4rksystem
Kyle Cucci
3 months
#MalwareAnaysis tip: I've been using "shellcode2exe" a lot lately. It makes it a lot easier to statically analyze and especially debug shellcode, or run the shellcode in a sandbox. Shellcode2exe basically adds a PE header to your raw shellcode. 🤓 Any similar tools you all use?
Tweet media one
Tweet media two
11
36
203
@d4rksystem
Kyle Cucci
1 year
The wait is over 🥳 I completed some major updates for VMwareCloak, a Powershell script that sanitizes VMware Workstation VM's from some of the common VM-detection techniques used by #malware ! Try it out and let me know how it works for you 👇
@d4rksystem
Kyle Cucci
1 year
Is malware detecting your VirtualBox VM's? Is pafish giving you trouble? Try out the latest release of my PowerShell-based tool VBoxCloak! A quick and dirty way to hide your VM's from some common VM-detection techniques. VMware coming soon! 🥳
Tweet media one
Tweet media two
8
104
373
1
58
194
@d4rksystem
Kyle Cucci
3 years
#Malware analysis tip of the week: Hooking Windows CryptoAPI functions like (CryptEncrypt and BCryptEncrypt) can help you identify what data malware is sending to a C2, before it is encrypted! 🥳 For example, this #Emotet sample:
Tweet media one
Tweet media two
3
56
180
@d4rksystem
Kyle Cucci
1 year
Excited to announce that my book "Evasive Malware: Understanding Deceptive and Self-Defending Threats" is officially on the @nostarch website for Early Access! There is even a 25% discount available! 🥳 Thanks for all the support I've gotten so far!
2
38
185
@d4rksystem
Kyle Cucci
1 year
Is malware detecting your VM's and making you sad? In case you missed it, I made some improvements to my PowerShell-based tool VBoxCloak! A quick and dirty way to hide your VM's from some common VM-detection techniques. 🥳 VMware updates coming soon!
2
68
167
@d4rksystem
Kyle Cucci
9 months
VT Academy, a free course from @VirusTotal , is really awesome. It covers the basics of VT, as well as many important incident response, threat intel, and threat hunting fundamentals.
2
47
157
@d4rksystem
Kyle Cucci
3 years
#CobaltStrike hunting tip of the week: EDR and AV got you down? Another way to detect/hunt for CS in your environment is through the deployment of Yara rules. This list has some good stuff, including Yara rules from @tenacioustek and @cyb3rops .
0
69
155
@d4rksystem
Kyle Cucci
1 month
Here is a really cool new feature in @virustotal : Code Insights! Basically it gives you an LLM-generated analysis of what the code does, for example in this VBS file 🔥 I'm not sure if this is only available in the commercial version of VT, but probably.
Tweet media one
4
37
181
@d4rksystem
Kyle Cucci
3 months
#MalwareAnalysis tip: Inetsim is a network simulator for malware analysis. You can host your own files/payloads in inetsim really easily. I had to do this today to analyze a shellcode implant that was no longer hosted on its staging domain. Here is how to do this 👇
3
26
146
@d4rksystem
Kyle Cucci
2 years
Saw malware use DLL hijacking with an old legit copy of calc.exe. This version of calc.exe looks for a DLL called "windowscodecs.dll". Guess what happens when the malware drops a malicious DLL with the same name alongside calc.exe? 🥳
Tweet media one
Tweet media two
1
24
139
@d4rksystem
Kyle Cucci
2 years
Here is an awesome list of anti-anti-VM measures you can implement in VMWare Workstation by simply modifying your VMX file. 🥳
1
40
143
@d4rksystem
Kyle Cucci
9 months
Excited to announce I joined @proofpoint 's Threat Research team! I'm fired up to be part of a team that makes up some of the best threat intel folks, detection engineers, and malware reversers I know😈
11
4
142
@d4rksystem
Kyle Cucci
2 years
In VMware Workstation, you can add "SMBIOS.reflectHost = “True” to your VMX file to hide the default hypervisor BIOS info from #malware . Anyone know how to do this in VirtualBox? 🧐
1
35
139
@d4rksystem
Kyle Cucci
4 years
#CobaltStrike hunting tip of the week: "Beacon.dll" and "ReflectiveLoader" are hardcoded artifacts in (default!) Beacon implants. When hunting for implants in memory, these are a good clue! For example, here is an implant injected into Acrobat Reader:
Tweet media one
3
49
134
@d4rksystem
Kyle Cucci
7 months
Hey infosec fam, hope you're all doing well! 😎Just a heads up - Barnes&Noble is offering 25% off on pre-orders for my book "Evasive Malware". If you ❤️ malware, check it out! No pressure, just wanted to share with you all. Promo code is: PREORDER25.
3
26
115
@d4rksystem
Kyle Cucci
4 years
Finally added #VMware support for my #malware anti-evasion scripts. This script will attempt to sanitize your VMware malware analysis VM's by modifying registry keys, files, and processes. Get it and test it out here:
@d4rksystem
Kyle Cucci
4 years
Is #Malware detecting and evading your #VirtualBox virtual machines? Check out VBoxCloak - a Powershell script for hiding VirtualBox from malware. Guaranteed to bring down your pafish detections😄
Tweet media one
3
29
78
2
60
109
@d4rksystem
Kyle Cucci
10 months
"Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled and ready to use, within minutes." Yes please. 😎
0
23
104
@d4rksystem
Kyle Cucci
3 months
Here's a list of #shellcode analysis tools, separated by runners/emulators and converters. Thanks to all the people who contributed their favorite tools! 👇
@d4rksystem
Kyle Cucci
3 months
#MalwareAnaysis tip: I've been using "shellcode2exe" a lot lately. It makes it a lot easier to statically analyze and especially debug shellcode, or run the shellcode in a sandbox. Shellcode2exe basically adds a PE header to your raw shellcode. 🤓 Any similar tools you all use?
Tweet media one
Tweet media two
11
36
203
1
16
95
@d4rksystem
Kyle Cucci
4 months
Not sure who needs to hear this, but I was today years old when I realized how effective conditional breakpoints in x64dbg are.. I had a need to break conditionally on all VirtualAlloc calls with a size parameter > 0x3000000. Here is how to do this.😎
Tweet media one
3
16
93
@d4rksystem
Kyle Cucci
4 years
#CobaltStrike hunting tips for @virustotal : 1) The imports hash (imphash) "dc25ee78e2ef4d36faa0badf1e7461c9" is very common for Beacon implants. 2) The hardcoded pipe string "MSSE-%d-server" is very common as well. If you want to find some implants, search for these in VT 😉
Tweet media one
Tweet media two
2
32
93
@d4rksystem
Kyle Cucci
2 years
A simple stenography trick used by #malware is modifying data bytes in an image, reading the image (ReadFile), and extracting the modified bytes. For example, the highlighted bytes in this image, when executed as x86 code, could be shellcode: mov eax, [ebp+0x5] call eax
Tweet media one
0
22
87
@d4rksystem
Kyle Cucci
10 months
This analysis on a #BruteRatel agent is awesome. Nice work on this. I love to see deep-dives into adversarial emulation tools, especially tools being abused by malicious actors.❤️
1
21
87
@d4rksystem
Kyle Cucci
1 year
Interested in learning how to analyze RTF #malware ? I wrote up my step-by-step analysis of the recent 2023 NATO Summit lure maldoc. Let me know if I missed any techniques/tools that could have made this a better analysis 🤓
2
28
86
@d4rksystem
Kyle Cucci
2 years
#Malware analysis tip of the week: As an anti-analysis technique, malware can sneakily execute code by registering a malicious exception handler using the AddVectoredExceptionHandler WinAPI function. The malware can then trigger an exception which jumps to the malicious code.
3
17
77
@d4rksystem
Kyle Cucci
2 years
@JusticeRage Wow. This is kinda groundbreaking actually. I wonder how it does with more bespoke code? "This is a C2 decryption routine used by APT10".
1
2
77
@d4rksystem
Kyle Cucci
1 year
I love this new Mitre visualization tool! A great way to visualize threat actor TTP's and other data. 😍
Tweet media one
1
15
78
@d4rksystem
Kyle Cucci
4 years
Is #Malware detecting and evading your #VirtualBox virtual machines? Check out VBoxCloak - a Powershell script for hiding VirtualBox from malware. Guaranteed to bring down your pafish detections😄
Tweet media one
3
29
78
@d4rksystem
Kyle Cucci
3 years
#Malware analysis tip of the week: Running simple XOR "bruteforcing" (like the great xorsearch from @DidierStevens ) can help you find additional embedded executable code in a malicious file. Takes 30 seconds and can save a lot of time in the long run.
Tweet media one
Tweet media two
1
20
76
@d4rksystem
Kyle Cucci
1 year
I was investigating a #SmokeLoader #malware sample and noticed it deletes its zone identifier information as an evasion technique. I wrote up a quick blog post on this. Check it out if you find this as interesting as I did: 🤓 🥳
0
17
69
@d4rksystem
Kyle Cucci
4 years
For anyone learning #malware analysis, the Noob2Ninja course from @0xf0x_ is a really good free resource.
2
21
64
@d4rksystem
Kyle Cucci
3 months
In one of the malware groups I am part of, someone asked a question about malware using the "unaligned function calls" evasion technique. Here is how this technique works: (1/5)
1
8
66
@d4rksystem
Kyle Cucci
2 years
Very useful #VirusTotal hunting cheat sheet: 🥳
2
14
65
@d4rksystem
Kyle Cucci
9 months
Don't forget your OPSEC! This great blog post from @cosiveco provides some useful tips for maintaining OPSEC in threat intelligence and malware research activities. A good reminder for us all. Thanks for sending this to me, @fr0gger_ 😉
1
11
65
@d4rksystem
Kyle Cucci
1 year
Just finished final edits for some additional chapters for my book "Evasive Malware". You can pre-order it from @nostarch . Thanks to everyone for the amazing feedback so far! ❤️ Make sure to read the book summary here:
0
18
63
@d4rksystem
Kyle Cucci
2 years
Really cool guide for reversing MacOS malware. Thanks @SentinelOne .
0
28
62
@d4rksystem
Kyle Cucci
1 year
Here is a stupid-simple PowerShell script for changing a system's username, hostname, and domain. I run this script before executing #malware in my sandboxes and sometimes it circumvents some basic VM checks. 🥳
0
13
61
@d4rksystem
Kyle Cucci
4 years
Can AV vendors please stop calling #CobaltStrike and similar tools "riskware" or "PUA's/PUP's"? I think by now these "tools" are being used more often by threat actors than by pentesters...
Tweet media one
14
8
62
@d4rksystem
Kyle Cucci
1 year
Really cool presentation from researchers at @TrendMicro . Talks all about recent attacks abusing legitimate/commercial tools (for example, AnyDesk).
5
15
59
@d4rksystem
Kyle Cucci
1 year
@cyb3rops Florian, you are missing one key fact. Threat actors never use open source tooling. They only develop their own custom tooling because GitHub says “for educational use only”.
3
1
59
@d4rksystem
Kyle Cucci
2 months
#VirusTotal has a special field for mutexes (mutexes_created) in their Yara plugin. You can basically hunt for mutex references in the malware behaviors. I have found this useful on several occasions. Here is an example hunt for common Remcos mutexes:
Tweet media one
1
17
59
@d4rksystem
Kyle Cucci
5 months
Interested in learning one method for unpacking #StrelaStealer ? I wrote up a quick blog post on my experience with a recent sample. SHA1: 627c28a917a2c700951f574d3ea7608cbf6546a5 C2: 45[.]9.74.12/server.php Have fun 😈
4
15
60
@d4rksystem
Kyle Cucci
7 months
When analysing malware strings prior to Yara rule creation, I use a one-liner for extracting and comparing strings from a malware sample set. I wrote up a quick blog post about this here. Happy #100DaysOfYara !
1
18
59
@d4rksystem
Kyle Cucci
4 years
Pretty much sums up the new hunting fad started by the SolarWinds breach.
Tweet media one
3
11
58
@d4rksystem
Kyle Cucci
3 years
Latest #IcedID droppers download the payload to "C:\programdata\*.jpg" and seem to be executed using: "rundll32.exe C:\programdata\*.jpg, PlugInit". Some indicators to hunt for 🙂 cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @MalwarePatrol @James_inthe_box
3
20
53
@d4rksystem
Kyle Cucci
11 months
To all my friends located in the US, Barnes & Noble is running a pre-order sale (code: PREORDER25) for my upcoming book "Evasive Malware" through Friday, September 8th! 😎 Thanks to everyone who has already ordered and/or given me feedback! ❤️
0
9
52
@d4rksystem
Kyle Cucci
9 months
Dynmx is a handy detection language for malware sandbox logs. Basically, it runs rules (similar to Yara or Sigma) against malware sandbox function logs to create custom detections for malware behaviours. 😎
2
17
48
@d4rksystem
Kyle Cucci
4 years
Cool repository of malware source code from @vxunderground . Not sure how I just heard about this. Apparently I live under a rock. 🤔
1
17
46
@d4rksystem
Kyle Cucci
3 years
I'm working on a research project around evasive, context-aware, and self-defending #malware . Any experts (or wanna-be experts) see any cool new techniques being used out there in the wild? DM's open, please RT for visibility.
8
30
46
@d4rksystem
Kyle Cucci
1 year
Short update: You can pre-order the book from many sites online, but these do not include the Early Access version of the book. With Early Access, you get an early version of the book (plus the final version once it’s ready). Early access will be available from No Starch soon!
@d4rksystem
Kyle Cucci
1 year
I’m excited to announce that my book, “Evasive Malware”, will soon be available for pre-order! The past 2.5 years of late nights, eye strain, and carpal tunnel is almost worth it 😎 Also excited to announce that my technical reviewer is the amazing @fr0gger_ ! Stay tuned! 👇
Tweet media one
44
254
1K
2
6
45
@d4rksystem
Kyle Cucci
6 months
Fun #malware analysis story. I submitted a sample to a sandbox today. The sample downloads a payload, so I started analysing that. 30 minutes in and I find out I'm reversing the fake executable that inetsim returns. 🙄
6
1
45
@d4rksystem
Kyle Cucci
6 months
Merged new updates to the #VMwareCloak project, thanks to the suggestions from @t_mtsmt ! This Powershell script helps hide your analysis VM's from #malware (by modifying registry keys, killing processes, etc.) 😎 Try it out, and I'm open to feedback!
0
14
47
@d4rksystem
Kyle Cucci
3 years
Looks like some of the new #Emotet payloads are executing using: "rundll32.exe <shady_temp_dir>,Control_RunDLL" This would make for a good threat hunt. Not sure how many false-positives this would bring though.. 🙄 Thoughts?
2
6
43
@d4rksystem
Kyle Cucci
7 months
This is a no-brainer change that all orgs should try to make. This is such a prevalent attack vector. A simple GPO can make a lot of difference.
@rpargman
[email protected] ➡️DEF CON
7 months
Malware campaign uses PDFs with OneDrive URLs to download JS, user interaction required to run the JS, delivers WasabiSeed using MSI, VBS, more JS and EXE. Consider GPO to change the default file handler for JS,VBS,WSF etc. away from WScript to notepad
4
57
179
1
4
43
@d4rksystem
Kyle Cucci
3 years
#IcedID #malware DLL's being delivered from Word documents containing macros. C2: potimomainger[.]top Many have compilation timestamp "2021-06-07 11:25:48". cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box
Tweet media one
1
19
40
@d4rksystem
Kyle Cucci
3 years
#Ghidra has a nice built-in script for generating #Yara rules ("YaraGhidraGUIScript"). You can highlight a block of code and the script will generate byte sequences that can speed up Yara rule creation.
Tweet media one
Tweet media two
0
7
38
@d4rksystem
Kyle Cucci
4 years
Fresh #CobaltStrike Beacons here, with Adobe theme! Are you awesome threat intel folks tracking this? hxxp://microsoft.up-adobe[.]com hxxp://flash.up-adobe[.]com @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @VK_Intel
Tweet media one
2
13
39
@d4rksystem
Kyle Cucci
4 years
Fresh #CobaltStrike beacons delivered here, with a Windows Update theme. Happy Friday! hxxps://101.32.46[.]240/ Likely C2 domain: windows-update[.]nz cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @bryceabdo
Tweet media one
0
11
38
@d4rksystem
Kyle Cucci
4 years
Fresh #CobaltStrike beacons delivered here! Happy Friday! hxxp://155.94.151[.]222:443/m7Et hxxp://156.239.157[.]66/uBZK hxxp://207.148.102[.]51/Ds6p cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @bryceabdo
1
19
37
@d4rksystem
Kyle Cucci
1 year
If you want to pre-order my book "Evasive Malware" ( @nostarch ) while also supporting @fr0gger_ and @DarkCoderSc 's #UnprotectProject , you can use the purchase code "EVASIVE25"! 🥳 More details below:
0
8
34
@d4rksystem
Kyle Cucci
3 years
Tips to avoid ransomware infections: Step 1: Install the Russian language pack on all your computers. Step 2: Change all wallpaper to the image of Putin riding a bear. Step 3: (Optional): Move to Russia.
5
6
36
@d4rksystem
Kyle Cucci
4 years
This is a great video from @DidierStevens on reversing code in a malicious document, completed entirely with #cyberchef . Sometimes I think I'm too l33t for cyberchef and would rather punish myself with command line tools, but cyberchef is amazing.
0
12
37
@d4rksystem
Kyle Cucci
3 years
#Log4j exploitation attempting to download #Mirai payloads. Delivery IP: 62.210.130.[250] Mirai C2: Nazi[.]uy cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box
Tweet media one
2
10
35
@d4rksystem
Kyle Cucci
4 years
Tweet media one
3
11
35
@d4rksystem
Kyle Cucci
1 year
Love investigating malware? You can preorder and get early access to "Evasive Malware: Understanding Deceptive and Self-Defending Threats" - use coupon code "EVASIVE25" to get 25% off and send some ❤️ to the #UnprotectProject ( @fr0gger_ / @DarkCoderSc )
Tweet media one
1
11
33
@d4rksystem
Kyle Cucci
3 years
#CobaltStrike beacon implant "Zoom Meetings.exe" using possible expired legit Zoom certificate, and using same C2 IP as this one from @malwrhunterteam . @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @bryceabdo
Tweet media one
Tweet media two
@malwrhunterteam
MalwareHunterTeam
4 years
"DES8install.exe": 2e55617db3cc088420d78898548be6e92b88e6f1e56b732284fcbef2131dd6d8 47.95.205[.]52 cc @VK_Intel @bryceabdo @JAMESWT_MHT
Tweet media one
0
2
5
2
10
33
@d4rksystem
Kyle Cucci
7 months
In the spirit of #100DaysOfYara , I've been working on a simple rule for a malware family I'm tracking, OriginBotnet. OriginBotnet is lightweight, modular offshoot of AgentTesla. I'll likely share the rule later to my Git - for now you all just get the screenshot 🤓
Tweet media one
1
5
33
@d4rksystem
Kyle Cucci
4 years
Fresh #CobaltStrike beacon implants delivered here, attempting to spoof Microsoft domain 😑 microsoft.systemservices[.]network cc @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @bryceabdo
Tweet media one
0
13
30
@d4rksystem
Kyle Cucci
4 years
Today's fresh #CobaltStrike Beacons being served with #Office365 theme. hxxp://office.microsoft365[.]ga hxxp://office.microsoft365[.]ga:8080 hxxp://xxx.vhvh[.]pw/ @malwrhunterteam @JAMESWT_MHT @malware_traffic @executemalware @abuse_ch @MalwarePatrol @James_inthe_box @VK_Intel
Tweet media one
2
15
30