mthcht
banner
mthcht.bsky.social
mthcht
@mthcht.bsky.social
Threat Hunting - DFIR - Detection Engineering
🐙 https://github.com/mthcht
🐦 https://x.com/mthcht
📰 https://mthcht.medium.com
Pinned
🎭 #ThreatHunting February updates 🎭
🐙 release: github.com/mthcht/Threa...
🌐 Site: mthcht.github.io/ThreatHuntin...
🧬 yara: github.com/mthcht/Threa...
🐾 Specific artifact lists: github.com/mthcht/aweso...
Lumma Stealer - 995 sinkholed domains by Microsoft
gist.github.com/mthcht/4b16e...
Lumma Stealer sinkholed domains
Lumma Stealer sinkholed domains. GitHub Gist: instantly share code, notes, and snippets.
gist.github.com
May 24, 2025 at 3:22 PM
it used to be great...
April 2, 2025 at 8:25 PM
I started another list dedicated to mutex names for detection
github.com/mthcht/aweso...

Help me enhance this list, I still have plenty more to add!
github.com
March 27, 2025 at 7:00 PM
THIS WEBSITE HAS BEEN SEIZED

Discover domains tied to sinkhole NS servers at sinkholed.github.io

Filter by TLD or NS, export in JSON/CSV, weekly update!

Search for the known sinkhole Name Servers in DNS query logs and web access to the sinkholed domains to identify potentially compromised hosts!
sinkholed.github.io
March 8, 2025 at 12:18 AM
😯 I have 652022 sinkholed domains extracted here github.com/mthcht/aweso...
In case you don't want to do this yourself, I just discovered that you can request access to a complete list of all existing domains across 1131 TLDs on czds.icann.org for free, including NS records! The lists are updated every month, approval is required for each TLD 🌍
I have a list of NS used for sinkhole domains and seized servers: raw.githubusercontent.com/mthcht/awesome…
I'm searching for the domains, on my server I can resolve a record type for ~400 million domains per day with github.com/blechschmidt/m��� 😃 Massive improvement compared to other solutions!
March 4, 2025 at 3:10 PM
🎭 #ThreatHunting February updates 🎭
🐙 release: github.com/mthcht/Threa...
🌐 Site: mthcht.github.io/ThreatHuntin...
🧬 yara: github.com/mthcht/Threa...
🐾 Specific artifact lists: github.com/mthcht/aweso...
March 2, 2025 at 10:15 PM
Reposted by mthcht
From over at the Bad Place:
There's an interesting NTFS symlink attack outlined here:
https://dfir.ru/2025/02/23/symlink-attacks-without-code-execution/

Basically, if an NTFS filesystem is corrupted in a way to provide duplicate file names, Windows will […]

[Original post on infosec.exchange]
February 25, 2025 at 10:49 PM
Reposted by mthcht
It took just 3 hours:

RCE → Metasploit C2 → Anydesk for remote GUI-access → LockBit ransomware

Interestingly, we observed the threat actor using PDQ Deploy, a patch management tool.

Read the report here:
Confluence Exploit Leads to LockBit Ransomware
Key Takeaways The intrusion began with the exploitation of CVE-2023-22527 on an exposed Windows Confluence server, ultimately leading to the deployment of LockBit ransomware across the environment.…
thedfirreport.com
February 24, 2025 at 3:25 PM
A bookmark of my lists is now automatically generated after each update in my repo github.com/mthcht/aweso...
I'm also looking to automatically add my starred repos lists github.com/mthcht?tab=s... in this bookmark but there doesn’t seem to be a API endpoint for the stars lists 🤔 ?
February 20, 2025 at 4:47 AM
It's growing! Now at 38 services and 82 projects 🙈 What's your favorite LoLC2?
February 19, 2025 at 6:44 PM
Reposted by mthcht
Pushed a #KQL for: Successful device code sign-in from an unmanaged device.

Query is available for AADSignInEventsBeta and SigninLogs. Less known is the AADSignInEventsBeta filter for device code:
| where EndpointCall == "Cmsi:Cmsi"

🏹Query: github.com/Bert-JanP/Hu...
February 17, 2025 at 6:53 PM
In case you don't want to do this yourself, I just discovered that you can request access to a complete list of all existing domains across 1131 TLDs on czds.icann.org for free, including NS records! The lists are updated every month, approval is required for each TLD 🌍
I have a list of NS used for sinkhole domains and seized servers: raw.githubusercontent.com/mthcht/awesome…
I'm searching for the domains, on my server I can resolve a record type for ~400 million domains per day with github.com/blechschmidt/m��� 😃 Massive improvement compared to other solutions!
February 17, 2025 at 9:55 PM
Reposted by mthcht
Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time www.splunk.com/en_us/blog/s....

Thrilled to share my first blog at @splunk! @mhaggis.bsky.social and I take a deep dive into the weird & exciting world of SDDL and ACEs - what they are, how they work, and how attackers can abuse them.
Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time | Splunk
Explore SDDL in Windows security with our comprehensive guide to help enhance your defensive strategy against privilege escalation attacks.
www.splunk.com
February 15, 2025 at 10:36 PM
Path masquerading zerosalarium.com/2025/01/path...

Interesting technique, if you're hunting for this, you can directly search the unicode characters in Splunk 🥷
February 13, 2025 at 1:35 AM
Most SOCs handle hundreds to thousands of detection rules in their SIEM. Proper categorization is essential when creating a new detection, as it helps define criticality, urgency, implementation effort, and verbosity level. Keeping things structured will reducing alert fatigue!
February 12, 2025 at 2:07 AM
I'll keep this updated, let me know if you have any projects to add! some C2 candidates: github.com/lolc2/lolc2....
DFIR specialist Mthcht has released LOLC2, a collection of C2 frameworks that leverage legitimate services to evade detection

lolc2.github.io
February 11, 2025 at 10:18 PM
Reposted by mthcht
Cert Central .org is live!
We track and report abused code-signing certs.

By submitting to the website, you contribute to the DB of >800 certs—a DB you can access and view.

Want to get more involved? Check out the Training and Research pages to learn more. 1/2
February 10, 2025 at 1:53 PM
#ThreatHunting ideas for detecting command-line obfuscation techniques from github.com/wietze/Invok... with Splunk!
(examples with EID 4688)

Mixed Case Randomization Detection:

This query counts uppercase/lowercase letters and return command lines with a near-equal ratio
February 9, 2025 at 7:06 PM
I have a list of NS used for sinkhole domains and seized servers: raw.githubusercontent.com/mthcht/awesome…
I'm searching for the domains, on my server I can resolve a record type for ~400 million domains per day with github.com/blechschmidt/m��� 😃 Massive improvement compared to other solutions!
February 9, 2025 at 7:01 PM
Reposted by mthcht
I frequently get asked is "what skills do I need need to excel as an analyst", so I figure this is a good opportunity to shed some light on what analysis is, and why certifications alone won't make you a good analyst.

www.jaiminton.com/high-impact-...
HISAC - High Impact Security Analysis and Communication
How to be a well rounded SOC/MDR/Cyber/Information Security Analyst.
www.jaiminton.com
February 2, 2025 at 9:28 AM
Say goodnight to the bad GUIDs !
badguids.github.io
January 31, 2025 at 8:59 AM
Reposted by mthcht
There seemed to be enough interest so I decided to do a write up on what I have found about OneDrive Offline Mode. Hate to burn a forensic artifact but I’m concerned about what Microsoft feels is secure. #DFIR

https://malwaremaloney.blogspot.com/2025/01/onedrive-offline-mode-recallish-vibes.html
MALoney (It's in the name): OneDrive Offline Mode (Recallish vibes)
Back in April 2024, Microsoft announced a new feature coming to OneDrive for Business called Offline Mode. The feature al...
malwaremaloney.blogspot.com
January 28, 2025 at 2:41 AM
Reposted by mthcht
#LOLBAS project update:

Entries now have placeholders for paths, URLs, and more. This makes it easier to visually see what parts are "variable", and for LOLBAS API users (lolbas-project.github.io/api/) it'll be easier to use with automation.

Check it out:
lolbas-project.github.io
January 28, 2025 at 3:13 PM
Reposted by mthcht
Adding character(s) to Command Line processing

www.hexacorn.com/blog/2024/01...

#threathunting
January 12, 2024 at 11:40 PM
❄️ #ThreatHunting December + January updates ❄️
🐙 release: github.com/mthcht/Threa...
🌐 Site: mthcht.github.io/ThreatHuntin...
🧬yara: github.com/mthcht/Threa...
🐾Specific artifact lists: github.com/mthcht/aweso...
January 29, 2025 at 8:54 AM