Johann Aydinbas

536 posts

Johann Aydinbas banner
Johann Aydinbas

Johann Aydinbas

@jaydinbas

Reverse engineering, malware

Bergabung Aralık 2016
464 Mengikuti1.9K Pengikut
Johann Aydinbas me-retweet
Silas Cutler (p1nk)
Silas Cutler (p1nk)@silascutler·
None of this is true. DailyDarkWeb is not conducting good faith journalism or research, there are no hard questions, no challenging of their responses - all this does is give a platform to threat actors to proliferate false-information.
Silas Cutler (p1nk) tweet mediaSilas Cutler (p1nk) tweet media
English
3
8
58
17.1K
Johann Aydinbas me-retweet
Corsin Camichel 🌻
Corsin Camichel 🌻@cocaman·
Looks like I missed it since, but Strela / StrelaStealer returned on Feb 6, with some new nifty tricks: - checks mouse movements - shows a CAPTCHA you have to correctly enter before the download button is shown dropped JS sample: bazaar.abuse.ch/sample/90f5b54…
English
2
11
46
4.3K
RedDrip Team
RedDrip Team@RedDrip7·
#APT Suspected #APT28 malware VBA in xls drops dll + png. Dll extracts shellcode from png and loads .NET trojan in memory. Trojan abuses Filen API as C2 channel. 575d6f5c4d098079c4e947b38aa774b5 ("Дані для зустрічі.xls")
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
2
24
112
8.7K
Johann Aydinbas
Johann Aydinbas@jaydinbas·
Useful for #idapro - you can add custom xrefs very easily, e.g. if you know a `call eax` references some function, you can manually add an edge: add_cref(here(),get_name_ea_simple("some_func"),XREF_USER) Then reanalyze the binary and get func parameter propagation for free!
English
3
23
127
8K
Johann Aydinbas
Johann Aydinbas@jaydinbas·
Unk. C++ malware targeting Afghan users (decoy is in Pashto) Hosted by 'afghanking777000' on Github "Afghanistan Islami Emirates.iso" IoCs C2 IP 207.244.230[.]94 C2 theepad0loc93x.ddns[.]net Appears to steal *.pdf, *.ppt(x), *.doc(x), *.csv and others virustotal.com/gui/file/63f6c…
Johann Aydinbas tweet media
English
0
1
10
1.9K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
PlugX related "evv.msi", seen from Vietnam: a7161c9a7c54a47d27459655725d2ade242d0931d6272c75a36f07df45220b08 famisu[.]com 🤷‍♂️
MalwareHunterTeam tweet media
Italiano
2
8
32
7K
Johann Aydinbas
Johann Aydinbas@jaydinbas·
@malwrhunterteam VMProtected binary, fetches executables files from discauth[.]net and appears to manual map + run them. Not quite clear if malicious though, but looks sketchy
English
0
0
1
115
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
"StarServicing LLC" (Sectigo given cert) signed "Upwork.exe" sample: 1b4f9d724e345ca57ec443deca90e167d2ce1117d56ecf01831faa9104517b9d No idea what the fuck is this, but surely not something very legit... 😂 🤷‍♂️
MalwareHunterTeam tweet media
English
2
2
9
2.6K
Johann Aydinbas me-retweet
CERT Orange Cyberdefense
CERT Orange Cyberdefense@CERTCyberdef·
🔎Our CERT is releasing a new technical report on 🇰🇵Operation #DreamJob, focusing on recent evolution in its tooling. Following an IR engagement at a large manufacturing client based in 🇪🇺, we investigated artefacts we attribute to #UNC2970. ➡️Full blog: ow.ly/V4mr50Xug1l
CERT Orange Cyberdefense tweet media
English
1
51
192
22.5K
Sathwik Ram Prakki
Sathwik Ram Prakki@PrakkiSathwik·
#APT #Phishing #Malware DS_Store.zip 8313a5281796df3e920ea6558eedc9cb update.vbs 672e1010eb6b8dea7f1680b94fc716f7 DllSafeCheck64.dll 0ed85f4b01e24b186893205002f29e3a (signed, sideloaded by svchost.exe) readme.dat #Shellcode b81ae158a5d2cd7bd6c717f18ab20c41 #C2 150.109.111.36
Sathwik Ram Prakki tweet media
English
4
17
68
10.4K
Johann Aydinbas me-retweet
DCSO CyTec
DCSO CyTec@DCSO_CyTec·
🚨 How Fast You Detect - and Respond - Can Define the Outcome of a Cyber Incident 👉 Read more on our latest blog where we show how early detection and response made the difference @DCSO_CyTec/catch-them-while-you-can-5c43007ae99e" target="_blank" rel="nofollow noopener">medium.com/@DCSO_CyTec/ca…
English
0
2
2
1.7K
Johann Aydinbas
Johann Aydinbas@jaydinbas·
@Myrtus0x0 I'm partial to the 14 million Zeus source leak variants from the pre-ransomware days
English
1
0
3
264
Myrtus
Myrtus@Myrtus0x0·
am I the only one
Myrtus tweet media
English
14
10
104
8K
Johann Aydinbas
Johann Aydinbas@jaydinbas·
@cyb3rops Seems to be a VT/GTI issue, I've noticed this for lots of files. I've uploaded a DLL today, new on VT, and got a similar WINDOWS\<random>.exe path as possible name out of nowhere
English
0
0
5
991
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Does anyone know why there are so many Lockbit 5.0 ELF binaries found or uploaded as C:\Windows\[random].exe on Virustotal?
Florian Roth ⚡️ tweet media
Bitshadow@fbgwls245

LockBit 5.0 #Ransomware Linux version extension: .[a-z0-9]{16} / note: ReadMeForDecrypt.txt Sample(SHA256): 4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d

English
9
20
120
30.3K
Johann Aydinbas me-retweet
ESET Research
ESET Research@ESETresearch·
#ESETresearch has discovered the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Both groups are affiliated with the FSB, Russia’s main domestic intelligence and security agency. welivesecurity.com/en/eset-resear… 1/3
English
3
38
94
15.5K
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
I’m going to have nightmares tonight about LockBit 5.0 if I ever manage to fall asleep 💀
English
5
2
96
66.9K