
0xMado
58 posts

Sabitlenmiş Tweet

I just published MorphKatz -a polymorphic PE rewriter that breaks byte-pattern detection without changing semantics
medium.com/p/morphkatz-a-…
English

Installing a KERNEL MODE anti-cheat and BE A VICTIM? No thanks.
As an ALPHA MALE, I install random games off Steam that are free and become a victim of RANSOMWARE and EXTORTION
UwU Underground@uwu_underground
Saw ppl sayin they would never install kernel anti-cheat on their gaming rig again today 2 replies later same guy talks bout runnin OpenClaw Bro rejected kernel cheats, then installed a supply-chain Ouija board because automated copy-paste curl 'felt safer than Vanguard' CSTP
English

@joshterrill Symmetric encryption AES-128 CBC, but the interesting part is the key derivation that done in initWithAccountsSecrets , so the books are decrypted in chunks not all at once per acc+device as a DRM style.. insanely clean RE work. Respect
English

@STeach404 @vxunderground Annoyance tax, sure… we'll see how long that professional obfuscation lasts 😂
English

@vxunderground So to sum it up, no software is truly uncrackable, it's more about how annoying it is.
English

I had some people DM me and tag me on this post to determine if it's malware or "slop".
Using the software requires providing billing information prior to downloading the trial. I got mildly annoyed by this and contacted support. I requested access to the binary without needing to provide billing information.
Their support team was ... actually very, very, very polite and nice. I was kind of taken back by how polite they were. They provided me the software with a 60 day trial. I can't tell if they know I do malware development and reverse engineering because (usually) places are hesitant to just give me the stuff like this on a platter.
I would feel bad if I was hyper-critical of this product because of how polite the person running this profile is, they're just a chill dude.
To be direct:
- Is this malware? No.
- Is this slop? Probably not, no.
- Does this actually improve FPS? Yes, unironically. However, it is very important you realize this software is changing the voltage and clock speed on your machine (among other things). They're achieving this in a legitimate way by working with AMD and Intel with actual SDK (Software Development Kit) documentation.
This product went to great lengths to secure its source code. It has junk code insertion, in-memory patching (stubs), junk variables, control flow obfuscation, and it also does device finger-printing to ensure you don't steal their product. All of this was performed using professional anti-reverse engineering products.
It was a real pain in my balls to deal with. I got mildly irritated at several points. Some strings are AES256 encrypted and decrypted when needed (run-time lazy loading) making static-analysis even more difficult.
Despite all of this, none of it is malicious. They just don't want nerds stealing their stuff. At first glance however it does use methods similar to malware to avoid reverse engineering.
The application UI is also incredibly heavy. It is using the latest and great .NET UI stuff to make it look super cool and gamer-like. It launches from HyperTune.exe which then loads the actual (super obfuscated) HyperTune.dll using HOSTFXR (Google it). The obfuscation tools they used disassembled and fractionated the application entry point (and subsequent functionality) down into 1,618 other functions (see attached image)
The only saving grace was the visibility into it's dependencies and other 3rd party libraries it uses (Realm for local settings savings, Sentry for logging errors, SimpleInjector for handling classes they use, etc).
I won't go into full details on how their product actually works, I would feel bad because of support dude being a chill dude, but here is my main criticism:
- Loading of kernel-mode drivers from vendors for overclocking. They load AMD and Intel drivers based on your hardware profile on your machine. However, the driver configuration settings are set to AUTOSTART. Hence, once you use this software these kernel-mode components will auto-start even if HyperTune is not running. Additionally, uninstalling HyperTune will not uninstall these kernel-mode components. These kernel-mode components come by default with the installer in a directory called /3p/ but move to SYSTEM32 after installation (as they should be).
- For reasons I do not understand, HyperTune modifies HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU ... it disables automatic updates from Windows. I don't know why. My presumption is this could prevent potential driver conflicts, but if not managed correctly this exposes users to security vulnerabilities.
Did they actually spend $1,000,000 developing this? With a full development team, infrastructure they're using (Sentry, VERCEL, enterprise and professional anti-reverse engineering tools, etc) ...maybe...?

HYPERTUNE@hypertune_
75% of gamers are limited by their FPS. We spent $1,000,000 to even those odds.
English

@vxunderground @vxunderground
Solid writeup! That 1618 function sounds like a fun challenge, any chance you can share the sample (or just the DLL) for educational RE practice? Thanks !
English

This is who is building AgenC-OS and training the current model. We are in good hands.
MarcoDotIO@marcodotio
If I start talking about agents that glow in the dark, send me to the nearest psych ward.
English

@Proton_Pass D, is the strongest, it would take 10²⁵+ years or more to crack
English

(If I hadn't shared them) which would be the best password and why?
A) WinterMoon88
B) Flame!Rider204
C) J7$kP2!mQx9#L
D) Echo-Bicycle-Violet-77&
English

@NoahKingJr Yeah, just let AI hallucinate your bank's entire backend.
What could go wrong besides money vanishing and planes falling?
English

@vxunderground Your idea works.. Built it in pure C++ , WinRT Graphics.Capture + WinRT OCR. Stealth-captures Slack, Discord, Teams (even minimized/hidden windows) and extracts text silently. Sometimes you need to try silly things 😁
github.com/0xMohammedHass…
English

I've got a really silly idea for malware.
Windows 11 now have Windows.Graphics from the Windows Runtime API.
You can use it for taking screenshots. It's supposed to be better than the native WINAPI method because something about GPU rendering stuff, I don't know, I can't remember.
Anyway
Windows 11 also ships with an OCR library from the Windows-something-something in the WinRT as part of their AI stuff.
The point being: I think I can take a fancy screenshot of an application, like Slack, Microsoft Teams, or Discord, using WinRT then use WinRT to OCR it into readable and parseable text from C/C++
It is basically a really convoluted way to do keylogging or espionage, or whatever.
For extra flavor, use WinRT to upload the OCRd text to a remote host. Why do this instead of WinHTTP or Windows Sockets? Literally no reason other than curiosity. I have no idea how this would appear under the scope of an EDR.
Sometimes you need to try silly things.
English

Built SilentLens , a C++ tool inspired by @vxunderground idea: use WinRT's Windows. .Capture for screenshots + Windows .Media.Ocr for text extraction. Zero GDI, zero Tesseract, zero imports a YARA rule would flag. Full source:
github.com/0xMohammedHass…
English

@vxunderground Not quite. Combining GraphicsCaptureItem, Windows.Media.Ocr, and Windows.Web.Http uses pure WinRT via RoActivateInstance into runtime class DLLs, bypassing many classic Win32 user-mode hooks. However, ETW providers (Graphics-Capture, DwmCore) can still observe it
English

@NoahKingJr Claude can write a sentence about EFLAGS liveness.. I wrote a per-basic-block dataflow model for it in C++, wired it into a Zydis-based polymorphic PE rewriter, and made it bisect Microsoft Defender's signature anchors over MpCmdRun..
English

@vxunderground Their decision to normalize AI-generated vibe coding into production without clearly stated safeguards is a risky move that undermines sound security and engineering discipline .. even for a company like Coinbase..
English


I just published MalEmu: shipping the Windows malware emulator I needed — and couldn’t find off the shelf
medium.com/p/malemu-shipp…
English

After 6 years of intermittent weekend work since 2019, I'm finally shipping MalEmu v0.7.0-rc.1.
It's a Win32-first malware emulator that runs PEs inside Unicorn and auto-maps the runtime trace to MITRE ATT&CK + capa + YARA in one JSON report.
#MalwareAnalysis #DFIR

English
















