L0Psec

2.8K posts

L0Psec banner
L0Psec

L0Psec

@L0Psec

reverse engineer | arm64 :) | macOS/iOS | YouTube: https://t.co/VdHNCl0Qfl

NC Katılım Ekim 2017
1.8K Takip Edilen3.5K Takipçiler
Sabitlenmiş Tweet
L0Psec
L0Psec@L0Psec·
My new site for learning macOS malware reverse engineering: l0psec.github.io/Malware_RE_Blo… I got my start in RE by using @patrickwardle's awesome blog. I would download samples and follow along. So I created this to complement that with dives into specific code from recent samples.
English
8
90
401
23.7K
L0Psec
L0Psec@L0Psec·
Attempted to grab the next AppleScript file from the domain but was not available. ecoferros\.com, which has 1 detection on VT.
L0Psec tweet media
English
0
1
5
294
L0Psec
L0Psec@L0Psec·
Another double extension compiled AppleScript file shared by @malwrhunterteam: Digital Currency Group (DCG) - Audit Confirmation Request.docx.scpt - 61b56c8c2df374861c8b23e6c555456f34e17e5638ea9965f721c3ffe77f57ca. If you go to line #1649, you can see the actual commands. 🧵
L0Psec tweet media
English
2
4
19
4.5K
L0Psec
L0Psec@L0Psec·
selfhonda\.com 1540cbb8eac28dab396cbd95445bc936d4114a0c2bcc48ffe9630896df09a8a1 - zip 60bdadd7c86d4f48ab01d3dc75efd8b627b15b92b3c908d86e37bec26214e94d - swift app mach-O http://31.57.35\.114:8080
English
0
1
6
255
L0Psec
L0Psec@L0Psec·
We've seen the backdoor functionality already but adding here.
L0Psec tweet media
English
1
1
6
297
L0Psec
L0Psec@L0Psec·
More DPRK Contagious Interview shared by @malwrhunterteam. We've seen these before. golang backdoor, swift password capture app, etc. FUD related domain: selfhonda\.com 1540cbb8eac28dab396cbd95445bc936d4114a0c2bcc48ffe9630896df09a8a1 - zip file (8 hits) 🧵
L0Psec tweet media
English
1
7
42
4.1K
L0Psec
L0Psec@L0Psec·
osascript does what we've come to expect. wallets, extensions, passwords, LaunchAgent, etc.
L0Psec tweet media
English
0
1
3
373
L0Psec
L0Psec@L0Psec·
FUD domain related to infostealer shared by @malwrhunterteam:) metramon\.com. GoogleUpdate script (8 VT hits) communicates with this domain and grabs osascript for exec. 7daeeec6a883165d6849e0611e7fe39fbc4ad340bb2aeba416fb7cec3cb92917
L0Psec tweet media
English
2
6
26
3.9K
Blacktop
Blacktop@blacktop__·
I’m pumped to be joining the team! This is going to be a great adventure 🦾🤖🍎
thaidn@XorNinja

We have some exciting news to share: @blacktop__ is joining Calif to work on a range of R&D projects focused on Apple and AI security. If you work in the Apple security ecosystem, he’s already a household name. He’s the creator of: * ipsw – the ubiquitous Apple firmware analysis tool: github.com/blacktop/ipsw * darwin-xnu-build – reproducible XNU kernel builds: github.com/blacktop/darwi… * ipsw-diffs – automated diffing of Apple releases: github.com/blacktop/ipsw-… * The only public deep-dive on Apple’s Lockdown Mode: github.com/blacktop/prese… His tooling is so good that even Apple engineers use it. If you do reverse engineering, chances are you’ve touched his Rust headless IDA MCP server: github.com/blacktop/ida-m…. People have literally collected CVEs and bug bounties just by digging through the diffs produced by his tools. With @brucedang, @Little_34306 and now @blacktop__, we're building a serious Apple security force at Calif. We’ll have more announcements in this space soon! If you're interested in Apple security, AI, automated bug discovery, reverse engineering, or hacking, we’re hiring: calif.io/jobs.

English
16
3
106
24.9K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Can you give me feedback on how to improve the YouTube videos on @AstarteSecurity? What do you think would make them better for you?
English
25
1
39
3.7K
Is Now on VT!
Is Now on VT!@Now_on_VT·
To date, none of the samples mentioned by hash in the Google Coruna blog or iVerify blog have been uploaded to @virustotal. Still monitoring the situation.
English
1
3
22
11.7K
L0Psec
L0Psec@L0Psec·
@horsepower I’m a little biased but I love this chassis for drifting.
L0Psec tweet media
English
0
2
5
174
ٍ
ٍ@horsepower·
There are currently 4 platforms I’m eyeballing. - GT86/BRZ/FRS - E36 - RX-8 - G35/G37 I think at this point, it comes down to whatever good deal falls into my hands at the right time.
English
225
18
1.3K
43.6K
L0Psec
L0Psec@L0Psec·
This appears to potentially be a part of a bigger project. NIM captures build info and we can see the name of this (GetAuditIp) often within the WebBrowserParsser path. (typo). If we look for this path in VT, there are other hits for matches in PE files with detections.
L0Psec tweet media
English
1
1
1
268
L0Psec
L0Psec@L0Psec·
Telegram communication is set up in _sendToTg__71et65udit73p_u426(). I'll make this quick. Sets up HTTP client with chat ID info (1016845012), and other data, then we have a POST request created with the telegram bot info
L0Psec tweet media
English
1
1
1
368
L0Psec
L0Psec@L0Psec·
Here's an interesting one shared by @malwrhunterteam: 1f174bb02bdf4758bfdde788bd581a8ff18378c223321c69ab5c9da8a2b6e342. NIM compiled, collects system info and sends via Telegram API bot net comms. 1 VT hit and code insights has a pretty good summary. 🧵Let's dig in.
L0Psec tweet media
English
1
3
18
3.9K