Arama Sonuçları: "#DailyScriptlet"

20 sonuç
Nick Carr
Nick Carr@ItsReallyNick·
@TrustedSec @JamesHovious @Oddvarmoe Nice @Oddvarmoe! You might also enjoy this thread and specifically the presentation by @matthewdunwoody & @danielhbohannon including some 🔥 #squiblydoo evasion: twitter.com/ItsReallyNick/… Also I have some public gists to make a crazy evasive #DailyScriptlet for the SCT itself.
Nick Carr@ItsReallyNick

Detection time! Before continuing, please watch @matthewdunwoody & @danielhbohannon's recent talk on resilient detections: twitter.com/danielhbohanno… I'll wait. Ok, now - if you have access to it, use PE metadata. Moving a file retains its InternalName/OriginalFilename/ProductName.

English
1
3
12
0
Nick Carr
Nick Carr@ItsReallyNick·
🔥🆕 #DailyScriptlet POC: 1️⃣ Uses "conditional comments" to evade dynamic/sandbox execution 2️⃣ Injects into notepad 3️⃣ 0x☕😉 79fcc7a42820b4765bb01ac0b8be5f7d VT (9/57): virustotal.com/gui/file/07904… 🗣️ "What are conditional comments?" I'm glad you asked...
Nick Carr tweet mediaNick Carr tweet media
English
1
7
29
0
Nick Carr
Nick Carr@ItsReallyNick·
Since Feb 7, I've seen 5+ new COM objects per day that fall into this specific #DailyScriptlet/DailySwearlet formatting, all with unique download links and part of a large, untargeted campaign. At ~7 static VT detections each, we can do better. Yara rule in next tweet @cyb3rops
Nick Carr@ItsReallyNick

Today's #DailyScriptlet author was detected as a pottymouth by our innovative detection platform #SwearEngine from @stvemillertime 😏. Nothing targeted, the trash talk leads to a trashy upload drop delivering anyone's malz. 🤬 uploaded 1 hr ago (7/57): virustotal.com/#/file/57edc7c…

English
1
18
41
0
RMSH Blog
RMSH Blog@RMSHblog·
RT ItsReallyNick: This #DailyScriptlet highlights the value in #DFIR hunting based on weak signals. Are Base64-encoded MS Office Files (Compound File Binary Format) within scripts expected in your environment? What about suspicious window movement and …
RMSH Blog tweet mediaRMSH Blog tweet mediaRMSH Blog tweet media
English
0
0
0
0
Nick Carr
Nick Carr@ItsReallyNick·
Finally an interesting #DailyScriptlet TTP we've been looking for but hadn't seen: Base64-encoding the full scriptlet. 🕵🏻‍♂️ This one, uploaded 3 hours ago, evades all static detection (0/57), except this tweet? How DO you launch an encoded scriptlet? 🧐😬 virustotal.com/#/file/2535a7b…
Nick Carr tweet mediaNick Carr tweet mediaNick Carr tweet media
English
2
14
36
0
Nick Carr
Nick Carr@ItsReallyNick·
Should you *actually* interactively step through static #DailyScriptlet decoding every time with @GCHQ's #CyberChef? ⁉️😬 But is it fun? ✅😍 Shellcode loader .SCT ➡️ Stage 2 shellcode URL in a few seconds with saved recipes 🐚👨🏻‍💻: hxxp://shop.strust[.]club/6rqC (still live!)
GIF
English
2
11
27
0
Nick Carr
Nick Carr@ItsReallyNick·
Sad to see widespread, lazy attacker #DailyScriptlet infrastructure re-used for so long. This stuff is extraordinarily bland but if it was caught everywhere, the domain wouldn't be used for 3+ months of Purchase Order phishing payloads 9confederatex[.]ml: virustotal.com/#/domain/9conf…
Nick Carr tweet mediaNick Carr tweet media
English
2
4
5
0
Nick Carr
Nick Carr@ItsReallyNick·
#DailyScriptlet TIP: sometimes it helps to pre-process scripts for readability when eyeballing them. You can do this with bash's "sed" command, as a @GCHQ #CyberChef recipe, or even with find & replace. Pic 1: BEFORE s/></>\n</g s/;/;\n/g s/{/{\n\t/g s/}/\n}/g Pic 2: AFTER
Nick Carr tweet mediaNick Carr tweet media
English
3
16
59
0
Nick Carr
Nick Carr@ItsReallyNick·
This phishing doc may not have a nation state hardware implant in it, but it *does* have an embedded super, micro INF file and a Base64-encoded #DailyScriptlet 💧 Drops C:\ProgramData\golangSource.ini ^looking pretty Muddy 🥽 Links to the file & extracted contents below.
Nick Carr tweet mediaNick Carr tweet mediaNick Carr tweet mediaNick Carr tweet media
English
3
38
97
0
Christopher Glyer
Christopher Glyer@cglyer·
Outlook Ruler/homepage persistence FTW! "This has been patched but we still see it leveraged b/c most orgs haven't applied patch" Just by obtaining user email creds you can get code execution on victim machine using something like a COM scriptlet #DailyScriptlet #FireEyeSummit
Christopher Glyer tweet media
English
1
0
9
0