Kevin Perlow

139 posts

Kevin Perlow banner
Kevin Perlow

Kevin Perlow

@KevinPerlow

RE and CTI. Feel free to take a gander at my past presentations: https://t.co/iWUyecnxC6

शामिल हुए Ocak 2011
21 फ़ॉलोइंग1.3K फ़ॉलोवर्स
Kevin Perlow
Kevin Perlow@KevinPerlow·
Not my usual subject, but I wrote my thoughts on NOAA and NWS cuts, particularly in light of the storms and tornadoes in the South/Midwest this weekend. norfolkinfosec.com/some-thoughts-… Reducing these services/relying on private companies would make these *more* dangerous. #weather #nws
English
0
1
3
525
Cat @ BlackHat Asia
Cat @ BlackHat Asia@coolestcatiknow·
Virus total community represented in dog culture
Cat @ BlackHat Asia tweet media
English
1
0
7
432
Kevin Perlow
Kevin Perlow@KevinPerlow·
Some North Korean post infection malware. Nothing groundbreaking, I just always like to see the actual code when vendors gloss over it: norfolkinfosec.com/north-koreas-p… I’ve included hashes where the files were on VT, if you want to grab them to look for yourself.
Kevin Perlow tweet mediaKevin Perlow tweet media
English
1
7
16
1.8K
Kevin Perlow
Kevin Perlow@KevinPerlow·
Some notes and testing on (what I think is) a #VIRTUALGATE sample, following Mandiant's ESXI report: norfolkinfosec.com/some-notes-on-… MD5 3c7316012cba3bbfa8a95d7277cda873 -Opens VMCI listener on 25736 -Listens -Runs what it receives via cmd Post shows RE + how to test it. Cool malware
Kevin Perlow tweet mediaKevin Perlow tweet mediaKevin Perlow tweet media
English
4
10
31
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
@0x466162 @jackcr In his defense, you get to work with the much more inviting “Dude With the Pretzel”
English
0
0
1
0
Kevin Perlow रीट्वीट किया
Cat @ BlackHat Asia
Cat @ BlackHat Asia@coolestcatiknow·
.@MITREattack v9 is out!!! A big shout out 🙌 to @patrickwardle, @thomasareed, @its_a_feature_ , and @xorrior for helping us update changes to macOS🍎. There is more to come...but let's take a moment to appreciate my new favorite gif, which summarizes this release perfectly!
ATT&CK@MITREattack

It has launched! ATT&CK v9 is now live with refactored data sources, ATT&CK for Containers, Google Workspace as a platform and more! Read about new data sources and the rest of the update at medium.com/mitre-attack/a… or attack.mitre.org/resources/upda… for new/changed groups/techniques/sw.

English
8
16
45
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
Also, my personal favorite talk from the conference was from @JamesPavur - A fantastic presentation on eavesdropping on satellite internet conversations. youtu.be/d5Sbwlu6f8o No technical satellite knowledge required (I barely know how they get up there)
YouTube video
YouTube
English
0
1
5
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
They put our BlackHat videos up the other day! :) It's a bit old now, but if you want to see how #Lazarus used ISO-8583 for the #FASTCash malware in past years, here's the URL: youtu.be/zGvQPtejX9w Feedback is always welcome - presenting to a glowing orb was not the easiest.
YouTube video
YouTube
English
0
6
17
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
@DrunkBinary I’m still waiting for the Godzilla-MMPR crossover to happen
English
1
0
1
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
Last #Lazarus #ZINC update: a source gave me the missing registry data (~2mb reg entry). Sorry for the spam... have to do this after hours. Updated w/ brief analysis of Stage 2: #Stage2" target="_blank" rel="nofollow noopener">norfolkinfosec.com/dprk-targeting… Screengrab, process launching, recon etc. That's it from me for a while :)
Kevin Perlow tweet mediaKevin Perlow tweet media
Kevin Perlow@KevinPerlow

Part II: Looking at the #DPRK /#Lazarus/#ZINC .sys malware targeting security researchers, with a hunt hypothesis as the highlight: norfolkinfosec.com/dprk-targeting… Note that I *don't* have the Stage 2 registry data. Would love to see it if someone has a copy!

English
0
5
25
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
@cyb3rops Yeah, I think in production land you’d have to be combining it with a last write time or at least one other factor to really make it work. In this case, it’s more of a starting point. I’ll add a little note to clarify.
English
1
0
0
0
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
@KevinPerlow Hi Kevin, we have a "big Registry key detection" in THOR for a long time now & found too many false positives, even with huge values, so that we had to reduce the msg level from "Warning" to "Notice", but we will look into these false positives & see if we can improve that check
English
1
0
2
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
@buherator @richinseattle @daveaitel I only wrote about the DLL. Had to pick what I could get through in a few hours. My understanding: - If you visited via browser, you got the .sys file. - If you interacted and they sent you a VS project, you got the DLL (and perhaps the C2 sent more later, who knows).
English
0
0
3
0
Richard Johnson
Richard Johnson@richinseattle·
WARNING! I can confirm this is true and I got hit by @z0x55g who sent me a Windows kernel PoC trigger. The vulnerability was real and complex to trigger. Fortunately I only ran it in VM.. in the end the VMDK I was using was actually corrupted and non-bootable, so it self-imploded
Shane Huntley@ShaneHuntley

New blog post from TAG with details of a North Korean campaign targeting security researchers working on vulnerability research and development. blog.google/threat-analysi… Stay safe out there everyone!

English
21
373
877
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
A look at some of the malware mentioned in this Google TAG research. norfolkinfosec.com/dprk-malware-t… - Two-stage (payload in ProgramData) - AV Check (Kasp, Avast) - Basic Persistence - Multiple C2s per payload More to be done re:C2 comm (unless someone does it first) #DPRK
Kevin Perlow tweet mediaKevin Perlow tweet mediaKevin Perlow tweet media
Shane Huntley@ShaneHuntley

New blog post from TAG with details of a North Korean campaign targeting security researchers working on vulnerability research and development. blog.google/threat-analysi… Stay safe out there everyone!

English
1
73
180
0
Kevin Perlow
Kevin Perlow@KevinPerlow·
@evilrez @markarenaau @craiu @Mao_Ware @VK_Intel @anthomsec @lazyactivist192 @nullcookies @0xAmit @sysopfb @WylieNewmark @markus_neis @saffronsec @DennisRand @JasonMilletary @darienhuss @kafeine @NateBeachW @bry_campbell @DeepSpaceEye @cahlberg @smoothimpact @Sachkov_GIB @bambenek @AepEap Misread. So, that’s not the one I mean. They had an older 2019 post that referenced the ecombox dot store C2 (as best I recall). That’s relevant to Mark’s question, because it provides a second independent source for the general claim.
English
2
0
0
0