struppigel Profile Banner
Karsten Hahn Profile
Karsten Hahn

@struppigel

Followers
23K
Following
25K
Statuses
9K

MalwareAnalysisForHedgehogs, Principal Malware Researcher at GDATA, he/him πŸ¦”πŸŒˆπŸ³οΈβ€βš§οΈ

Germany
Joined May 2014
Don't wanna be here? Send us removal request.
@struppigel
Karsten Hahn
1 year
My beginner's course for malware analysis is finally ready. πŸŽ‰πŸ¦”πŸ¦”πŸ§«πŸ§‘β€πŸ”¬ Get access for free for the next 5 days by using the link below:
34
246
1K
@struppigel
Karsten Hahn
7 days
@BHinfoSecurity I teach malware analysis
1
6
23
@struppigel
Karsten Hahn
9 days
CISA found a backdoor in a patient monitor. Direct link to PDF:
Tweet media one
1
15
51
@struppigel
Karsten Hahn
14 days
0
0
1
@struppigel
Karsten Hahn
14 days
@greenplan_it Yeah, it was shared on OALabs discord. :D
0
0
1
@struppigel
Karsten Hahn
14 days
@huettenhain Thanks, I was not aware of the snip -r option. The rest I actually could have done better X)
0
0
0
@struppigel
Karsten Hahn
14 days
RT @vxunderground: Mildly irritating things seen by malware nerds: - Person saying {thing} evades EDR and/or AV, but they've never perform…
0
60
0
@struppigel
Karsten Hahn
15 days
RT @_montysecurity: Dropped a new tool for malware researchers. It is used to continuously ingest, analyze, and alert on samples given a se…
0
32
0
@struppigel
Karsten Hahn
17 days
RT @x86matthew: I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a vi…
0
346
0
@struppigel
Karsten Hahn
22 days
@decalage2 MSI which are also .JAR have been abused. MSI part is legit and validly signed. JAR is malicious.
Tweet media one
0
1
11
@struppigel
Karsten Hahn
22 days
Articles make it often seem easier than it actually is. So choosing one that looks do-able, should have the right difficulty to feel challenged but not too much. The article also serves as feedback mechanism, you can compare whether you came to the same results.
2
0
9
@struppigel
Karsten Hahn
24 days
Juicy bits in Lumma Stealer dev Q&A
Tweet media one
Tweet media two
@g0njxa
Who said what?
24 days
The people have spoken, you asked and them replied Lumma Stealer Questions & Answers πŸ•ŠοΈ πŸ•ŠοΈ clickbait content: "we will PROBABLY cease operations" Read it here:
1
2
28
@struppigel
Karsten Hahn
24 days
@vxunderground So we just use Haskell
0
0
0
@struppigel
Karsten Hahn
24 days
0
0
1
@struppigel
Karsten Hahn
25 days
@ShanHolo @lontze7 @RexorVc0 @DaveLikesMalwre @JAMESWT_MHT This decodes it sample | snip 27:209493 | rex "(..)." {1} | hex | carve -sd intarray [| alu B-147 ]| carve -sd b64 | recode | rex \".+?\" | carve -sd b64 | decompress
Tweet media one
3
0
15
@struppigel
Karsten Hahn
25 days
@DebugPrivilege Yeah, malware researcher here.
0
0
5
@struppigel
Karsten Hahn
26 days
We would have less fake news about malware on USB adapters and analysis time wasted if sandboxes changed their wording from "malicious" to "interesting to look at"--which is how they are actually understood by analysts.
2
25
65
@struppigel
Karsten Hahn
26 days
RT @dodo_sec: As promised, my Ida script for finding a common string encryption algorithm in Delphi samples has been improved and I've rele…
0
5
0