1. Packer related API strings and no import
Rule: github.com/mgreen27/100...
2. Downloader related API strings and no import
Rule: github.com/mgreen27/100...
1. Packer related API strings and no import
Rule: github.com/mgreen27/100...
2. Downloader related API strings and no import
Rule: github.com/mgreen27/100...
1. Microsoft Teams without a MS cert
2. Detect cert metadata
github.com/mgreen27/100...
3. Anomaly detection for PE files with large difference between physical and virtual size of a section
github.com/mgreen27/100...
1. Microsoft Teams without a MS cert
2. Detect cert metadata
github.com/mgreen27/100...
3. Anomaly detection for PE files with large difference between physical and virtual size of a section
github.com/mgreen27/100...
Socks5Systemz, sample from the bazaar. 32 bit installer for the tool, based on the compilation information, strings for "\silent" and "\verysilent", and mentions of Inno Setup, used to create windows installers.
www.bitsight.com/blog/unveili...
github.com/augustvansic...
Socks5Systemz, sample from the bazaar. 32 bit installer for the tool, based on the compilation information, strings for "\silent" and "\verysilent", and mentions of Inno Setup, used to create windows installers.
www.bitsight.com/blog/unveili...
github.com/augustvansic...
A QakBot spotted in the wild (2025)
Some easy strings for dangerous api calls for encryption and WSA calls for connection functionality, an ip that upon review looks like it’s hosting a C2 (web ports with firewall deny all w/exceptions likely)
github.com/augustvansic...
A QakBot spotted in the wild (2025)
Some easy strings for dangerous api calls for encryption and WSA calls for connection functionality, an ip that upon review looks like it’s hosting a C2 (web ports with firewall deny all w/exceptions likely)
github.com/augustvansic...
This sample is a PE32 DLL that is designed for the I386 arch, in C++. I used some more hex strings this time, looks like this is either mimicking a game DLL or pretending to be. Sample was tagged to WannaCry.
github.com/augustvansic...
This sample is a PE32 DLL that is designed for the I386 arch, in C++. I used some more hex strings this time, looks like this is either mimicking a game DLL or pretending to be. Sample was tagged to WannaCry.
github.com/augustvansic...
more yara-x > Dumping a RedCurl malware pe I saw Rich Header and thought I would give it a try.
Rule: github.com/mgreen27/100...
more yara-x > Dumping a RedCurl malware pe I saw Rich Header and thought I would give it a try.
Rule: github.com/mgreen27/100...
A MacOS Macho binary from MalwareZoo: Backdoor/Worm
Some of the api calls are not core library referenced and could prevent inclusion in the App Store, so I added them as ascii strings.
Also added some dylib strings
github.com/augustvansic...
A MacOS Macho binary from MalwareZoo: Backdoor/Worm
Some of the api calls are not core library referenced and could prevent inclusion in the App Store, so I added them as ascii strings.
Also added some dylib strings
github.com/augustvansic...
Today's sample was a PE32 DLL tagged to DarkTortilla. Strings, strings and more strings made this one easy to make a rule, didn't need to throw it in Binja. A couple rules were based on environmental condition requests, signs of host enumeration.
github.com/augustvansic...
Today's sample was a PE32 DLL tagged to DarkTortilla. Strings, strings and more strings made this one easy to make a rule, didn't need to throw it in Binja. A couple rules were based on environmental condition requests, signs of host enumeration.
github.com/augustvansic...
I got some exposure to Android APK Lua Malware. Interesting file struture and execution flow, I used this resource for some help on understanding the basics and learn about some specialized tools:
par.nsf.gov/servlets/pur...
and
Rule:
github.com/augustvansic...
I got some exposure to Android APK Lua Malware. Interesting file struture and execution flow, I used this resource for some help on understanding the basics and learn about some specialized tools:
par.nsf.gov/servlets/pur...
and
Rule:
github.com/augustvansic...
Todays sample was a sample of Storm Kitty Open source Stealer/Keylogger written in C++, logs are sent to a telegram address which you can see in the strings.
malpedia.caad.fkie.fraunhofer.de/details/win....
github.com/augustvansic...
Todays sample was a sample of Storm Kitty Open source Stealer/Keylogger written in C++, logs are sent to a telegram address which you can see in the strings.
malpedia.caad.fkie.fraunhofer.de/details/win....
github.com/augustvansic...
In an IR last week, we discovered and stopped an in progress exfil. This process rule detects the in memory renamed rclone - should be cross platform.
Rule: github.com/mgreen27/100...
In an IR last week, we discovered and stopped an in progress exfil. This process rule detects the in memory renamed rclone - should be cross platform.
Rule: github.com/mgreen27/100...
Rule: github.com/mgreen27/100...
Rule: github.com/mgreen27/100...
Day 15
I had more to say than what allows in a post here so it’s on medium @ : medium.com/@august.vans...
Day 15
I had more to say than what allows in a post here so it’s on medium @ : medium.com/@august.vans...
Rule: github.com/mgreen27/100...
Rule: github.com/mgreen27/100...
Todays Sample: a PE64 EXE tagged to SpyLyRAT
Some unique loads in this directly from github.
And some common API calls that are commonly used for manipulating processes.
github.com/augustvansic...
Todays Sample: a PE64 EXE tagged to SpyLyRAT
Some unique loads in this directly from github.
And some common API calls that are commonly used for manipulating processes.
github.com/augustvansic...
Sliver Beacon EXE
Sliver uses MinGW to compile beacons, and it was definitely in strings, so I added that rule. String for sleep - time based evasion, a couple of other hardcoded strings.
I did some dynamic analysis and the domain drops payloads too.
Sliver Beacon EXE
Sliver uses MinGW to compile beacons, and it was definitely in strings, so I added that rule. String for sleep - time based evasion, a couple of other hardcoded strings.
I did some dynamic analysis and the domain drops payloads too.
github.com/mgreen27/100...
github.com/mgreen27/100...
Happy Saturday (Go Chiefs)
Today I did a quick rule for a sample of Redline, a 32 bit PE. A lot was obfuscated with this sample, but there were some C## .NET calls to use for rules.
github.com/augustvansic...
Happy Saturday (Go Chiefs)
Today I did a quick rule for a sample of Redline, a 32 bit PE. A lot was obfuscated with this sample, but there were some C## .NET calls to use for rules.
github.com/augustvansic...
PE64 DLL with a lot of capability, tagged to legion loader.
github.com/augustvansic...
PE64 DLL with a lot of capability, tagged to legion loader.
github.com/augustvansic...
github.com/mgreen27/100...
github.com/mgreen27/100...
Cobalt Strike Beacon of the EXE flavor
References from Tech Company from China in strings, debugger enum, executable called and a close handle on a variable. Interesting: Icon for binary is apple, compiled for Windows/PE64 and Windows API LIbs
github.com/augustvansic...
Cobalt Strike Beacon of the EXE flavor
References from Tech Company from China in strings, debugger enum, executable called and a close handle on a variable. Interesting: Icon for binary is apple, compiled for Windows/PE64 and Windows API LIbs
github.com/augustvansic...
Rule: github.com/mgreen27/100...
VQL: github.com/mgreen27/100...
Rule: github.com/mgreen27/100...
VQL: github.com/mgreen27/100...
Today I dug into Binlex. Binlex extracts instructions, basic blocks, and functions from binary files and organizes them into a structured hierarchy. Im still working on learning the rule syntax with blyara to create rules.
github.com/augustvansic...
Today I dug into Binlex. Binlex extracts instructions, basic blocks, and functions from binary files and organizes them into a structured hierarchy. Im still working on learning the rule syntax with blyara to create rules.
github.com/augustvansic...
A new repository that allows for you to identify Stealer family by the system information text file format commonly included in stealer malware exfiltration logs. Includes Yara rules!
Check it out and contribute!
github.com/MalBeacon/wh...
A new repository that allows for you to identify Stealer family by the system information text file format commonly included in stealer malware exfiltration logs. Includes Yara rules!
Check it out and contribute!
github.com/MalBeacon/wh...