Malchanic

136 posts

Malchanic banner
Malchanic

Malchanic

@MalwareMechanic

Malware and stuff

Katılım Mart 2009
428 Takip Edilen2.2K Takipçiler
Malchanic retweetledi
nickharbour
nickharbour@nickharbour·
The #flareon10 countdown is now live at flare-on.com. Clear your weekend plans for Sept. 30th.
English
7
83
259
59.3K
Malchanic retweetledi
Mike Hunhoff
Mike Hunhoff@mehunhoff·
capa explorer integrates capa’s automated capabilities detection seamlessly with IDA Pro. The plugin aims to focus your reverse engineering efforts, especially when analyzing malware. Check it out and let us know what you think!
Hex-Rays SA@HexRaysSA

Ready for a new #PluginFocus blog post? @mehunhoff, @m_r_tz and @williballenthin from the @Mandiant FLARE Team talk about the latest version of their #capaexplorer plugin, an entry in our 2020 plugin contest 🌐 hex-rays.com/blog/plugin-fo… #IDAPro #IDAPython #IDAPlugin

English
1
7
26
4.3K
Malchanic retweetledi
Mike Hunhoff
Mike Hunhoff@mehunhoff·
🚨 capa v5 release is out! Great improvements with big additions for .NET binary analysis. Did you know that capa displays the method token + instruction offset for each .NET match? You can use this info to find the matched location in dnSpy helping focus your analysis!
Mike Hunhoff tweet media
Moritz@m_r_tz

capa v5.0.0 is out: major improvements for .NET binary analysis, 150 new/updated rules, caching to improve performance standalone and in the IDA Pro plugin, better ELF OS detection, and a lot more. github.com/mandiant/capa/… VirusTotal integration updates are next!

English
1
28
82
13.1K
Malchanic
Malchanic@MalwareMechanic·
What better way to finish off the year than a fresh release of FLARE VM?! 🥳 This release focuses on empowering community contributions and automation. Get it while its hot 🔥🔥🔥mandiant.com/resources/blog…
English
4
61
138
0
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
#DnSpyEx News 🥳😊#ElektroKill is really killing it👏❤️One of new feature added in future release will be #NEW #Window during debugging "Static Fields" - displays static fields accessed in the current method as well as static fields defined in the current method's declaring type.
Jiří Vinopal tweet mediaJiří Vinopal tweet mediaJiří Vinopal tweet media
English
5
48
165
0
Daniel Stepanic
Daniel Stepanic@DanielStepanic·
#IcedID pushed out a new dev loader last Thursday from #Emotet. It's more lean and better obfuscated. This version resolves imports dynamically, removes the cookie parameters that were used to fingerprint machine on initial request, uses in-line function for config decryption.
Daniel Stepanic tweet mediaDaniel Stepanic tweet media
Threat Insight@threatinsight

Today Proofpoint observed the #Emotet E4 botnet delivering what seems to be a development build of a new #IcedID Loader. This module has the ID 2445 and directly downloads the IcedID bot.

English
3
12
47
0
Malchanic
Malchanic@MalwareMechanic·
@fancy_4n6 @grumpy4n6 Yep, we haven’t forgotten! It’s been really busy as of late. Keep an eye out in the coming weeks 😀
English
0
0
0
0
Malchanic
Malchanic@MalwareMechanic·
@SeanTheGeek Yep, we’re in the works of refreshing it! Main goal is open sourcing the packages for community support, ease of package creation, and automation via GitHub actions. It’s been slow going but we are working on it. Trying to target a new release later this year
English
4
0
14
0
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
If you wanna quickly unpack #redline #stealer which is often exec via some native C/C++ loader - dont forget that C/C++ must load somehow .NET runtime inside the process in this case via "CLRCreateInstance" to be able to host .NET payload. Be smart, USE dnSpy follow the tweet🤠🙌
Jiří Vinopal@vinopaljiri

@MalGamy12 [1/2] If I am not wrong - what you got there is the last C/C++ loader which will be loading .NET runtime - if one wants to host .NET code as ex. "redline" from some loader written in C/C++ usually one must load .NET runtime inside the process in this case via "CLRCreateInstance"

English
4
28
106
0
Malchanic retweetledi
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
@MalGamy12 [2/2] you got last native loader which will be hosting .NET to be able to load "redline" code which is written in .NET. If you want to process the unpacking of these sh*t loading .NET payload really quickly use DNSpy. Load the original native sample, set module breakpoint - bam
Jiří Vinopal tweet mediaJiří Vinopal tweet mediaJiří Vinopal tweet mediaJiří Vinopal tweet media
English
1
1
16
0