knight0x07 Profile Banner
neeraj Profile
neeraj

@knight0x07

Followers
1K
Following
99
Statuses
182

Security Researcher | Malware Loving Homo Sapien | I do xchg eax,eax | Tweets are my own

Hell
Joined March 2019
Don't wanna be here? Send us removal request.
@knight0x07
neeraj
2 years
Wanna analyze Malicious #OneNote documents? Check out my new C# based tool "OneNoteAnalyzer" for analyzing malicious OneNote documents Link: #malwareanalysis #reverseengineering #threathunting #infosec #cybersecurity #threatintel #threathunt #malware
2
72
206
@knight0x07
neeraj
1 month
Initial infection chain of the new #Lazarus Willo Video Interview campaign is outlined in detail within the infographic Releasing an in-depth blog abt the campaign soon. Happy New Year! @banthisguy9349 #cyber #dfir #infosec #cybersecurity #malware #threatintel #cti #dprk #apt
Tweet media one
Tweet media two
3
28
103
@knight0x07
neeraj
2 months
This was a sarcastic post 😂 nothing's “highly interesting” abt computer name check. In fact the check is never executed as the strstr() call always returns a ptr to main str since the substr is in the main str, so the if condition is never met. Likely a dev mistake or junk code.
0
0
1
@knight0x07
neeraj
2 months
#APT maldoc utilizes TryCloudFlare to download a LNK, which loads a Rust-based DLL backdoor via rundll32, the backdoor then leverages VSCode Remote Tunnel for gaining remote access to the compromised machine #cyber #dfir #infosec #cybersecurity #malware #threatintel #cti
Tweet media one
@smica83
Szabolcs Schmidt
2 months
#malware doc with zero detection (possibly APT) uploaded @abuse_ch @JAMESWT_MHT
Tweet media one
1
49
114
@knight0x07
neeraj
4 months
The persistent #XSS vuln (CVE-2023-43770) I reported in RoundCube was successfully exploiting by #APT28 💀 Anybody having the XSS payload please send it across =) #cyber #dfir #infosec #informationsecurity #cybersecurity #malware #threatintel #cti
0
2
5
@knight0x07
neeraj
6 months
Identified additional #BlackSuit #Ransomware related #CobaltStrike infrastructure based on the recent @TheDFIRReport report. Infra: #dfir #cyber #infosec #informationsecurity #cybersecurity #malware #threatintel #cti
Tweet media one
0
13
52
@knight0x07
neeraj
6 months
A PoC video demonstrating the use of TryCloudflare reverse proxy tunnel, which is abused by TAs globally in recent campaigns to conceal their C2 servers, distribute payloads and more. #cyber #redteam #dfir #infosec #informationsecurity #cybersecurity #malware #threatintel #cti
Tweet media one
Tweet media two
4
4
18
@knight0x07
neeraj
7 months
#Kimsuky employs anti-forensics by deleting the PowerShell "ConsoleHost_history.txt" file which stores the PS console command history. #apt #apt43 #cyber #dfir #infosec #cybersecurity #malware #threatintel #cti #malwareanalysis #malwareresearch #threathunting
Tweet media one
0
1
9
@knight0x07
neeraj
7 months
Wrote a PoC for OnMouseMove #HTML file used in the #Russian #APT group campaign targeting Ukraine. A classic Anti-Sandbox technique =) #apt #cyber #dfir #infosec #cybersecurity #malware #threatintel #cyberthreatintelligence #cti #malwareanalysis
0
10
33
@knight0x07
neeraj
8 months
Forest Blizzard (#APT28) GooseEgg's help command. Use the command line arguments "-?" or "--help" #APT #GooseEgg #cyber #dfir #infosec #cybersecurity #malware #threatintel #russia #security #cyberthreatintelligence #cti #malwareanalysis #malwareresearch #threathunting
Tweet media one
1
3
21
@knight0x07
neeraj
8 months
Forest Blizzard's (#APT28) GooseEgg batch script dumps SAM and LSA secrets, it also contains a remark indicating future script updates might include #LSASS Dumping. #apt #cyber #dfir #infosec #cybersecurity #malware #threatintel #cyberthreatintelligence #cti #malwareanalysis
Tweet media one
3
14
37
@knight0x07
neeraj
9 months
Tweet media one
Tweet media two
8
7
22
@knight0x07
neeraj
9 months
The tool I developed to analyze #OneNote documents - "OneNoteAnalyzer" is now a part of the #Flare VM. Flare VM: GitHub: #cyber #dfir #infosec #cybersecurity #malware #threatintel #malwareanalysis #malwareresearch #threathunting
Tweet media one
1
4
30
@knight0x07
neeraj
10 months
The site module appends new module search paths to sys.path by reading the .pth file, if the line in the .pth file starts with an "import ", it is executed via exec(line). The module is automatically imported at Python startup
Tweet media one
0
0
2
@knight0x07
neeraj
11 months
@RustyNoob619 Nice one brother! 💪
1
0
1
@knight0x07
neeraj
11 months
RT @RustyNoob619: #100DaysofYARA Day87: Detecting OCEANMAP Backdoor used by Russian APT28 Checkout @knight0x07 Te…
0
20
0
@knight0x07
neeraj
11 months
Analyzed the #Kimsuky PowerShell Backdoor & published the commented enum detailing the backdoor commands & few notes. Link: #APT #APT43 #cyber #dfir #infosec #cybersecurity #malware #threatintel #cti #malwareanalysis #malwareresearch #threathunting
Tweet media one
2
11
39