Faraday

13 posts

Faraday

Faraday

@0xffaraday

Security Analyst @Huntresslabs | SGF2ZSBhIG5pY2UgZGF5IQ== | Personal opinions and research are my own and don’t represent my employer

Katılım Mayıs 2022
156 Takip Edilen146 Takipçiler
Faraday retweetledi
Malware Village
Malware Village@MalwareVillage·
That wraps up #MalwareVillage @DEFCON 33! 🥳 Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! 🤩 Thank you all! 🙏
Malware Village tweet mediaMalware Village tweet mediaMalware Village tweet mediaMalware Village tweet media
English
8
19
195
23.6K
Faraday retweetledi
Wietze
Wietze@Wietze·
ATT&CK v17 is out! It contains an update I have campaigned for since 2022: DLL Hijacking is now a single sub-technique, merging Search Order Hijacking & Sideloading, plus supporting related techniques. Huge thanks & congrats to the @MitreATTACK team on this release 🎉
Wietze tweet media
English
5
28
160
10.1K
Faraday
Faraday@0xffaraday·
IOCs: SC domain: virustotal.com/gui/domain/soc… Domain involved with scheduled task: http[:]//shopeasy.giize[.]com/dashboard/bor3y/update[.]php SC installer: Recently_S_S_A_Statement9030773.exe VBS file from SC: C:\Users\Public\Music\//n5R79uzirhL2.vbs
English
0
0
2
291
Faraday
Faraday@0xffaraday·
Screenconnect installer downloaded from a newly registered domain. After installation, SC is used to drop a malicious .VBS in the directory "C:\Users\Public\Music\" and creates a scheduled task named: "MicrosoftEdgeUpdateTaskMachineCore"
English
1
0
3
4.8K
Faraday
Faraday@0xffaraday·
@HuntressLabs SOC is seeing a newly suspected KoiLoader/KoiStealer attack chain. Details below:
English
1
4
7
821
Faraday retweetledi
Aura
Aura@SecurityAura·
"svchost.exe should always have services.exe as a parent process and should never be launched without any arguments/parameters" Welcome to the real world.
Aura tweet media
English
7
55
449
36.8K
Faraday
Faraday@0xffaraday·
Ensure the client config "c:\programdata\jwrapper-remote access\jwappssharedconfig\serviceconfig.xml" does not have malicious entries within the <ConnectTo> tag. This allows the agent to be used remotely from multiple domains/IPs. virustotal.com/gui/ip-address…
Faraday tweet media
English
0
0
3
231
Faraday
Faraday@0xffaraday·
@HuntressLabs SOC is seeing further malicious activity from SimpleHelp RMM. Please update your SimpleHelp instance to its latest version! IOCs in replies:
Faraday tweet media
English
1
2
9
703