csØsf

413 posts

csØsf banner
csØsf

csØsf

@cs0sf

security and stuff

เข้าร่วม Nisan 2011
912 กำลังติดตาม345 ผู้ติดตาม
L0Psec
L0Psec@L0Psec·
for code/script exec there is getNewSc() which is cool, GETs a base64 encoded compiled AppleScript writes to /tmp/applet_, loads the script and executes it. There's more interesting functions here, but this is a quick summary.
L0Psec tweet media
English
1
0
5
212
csØsf
csØsf@cs0sf·
csØsf tweet media
ZXX
0
0
0
7
csØsf
csØsf@cs0sf·
Interesting Telnyx v4.87.2
csØsf tweet media
Indonesia
1
0
0
17
csØsf
csØsf@cs0sf·
LiteLLM compromise
csØsf tweet mediacsØsf tweet mediacsØsf tweet mediacsØsf tweet media
English
0
0
0
17
Brandon Falk
Brandon Falk@gamozolabs·
I'm like 99% sure that strings is the best reverse engineering tool.
English
8
5
123
13K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
mOnItOrInG :D
mRr3b00t tweet media
English
2
0
13
1.2K
csØsf
csØsf@cs0sf·
@James_inthe_box interesting case, multi layer calls to get shellcode, virtual allocate with wrx, write and create thread, classic but interesting.
English
1
0
2
21
csØsf
csØsf@cs0sf·
@wyliebsd @cyb3rops b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3
Français
0
0
0
125
L0Psec
L0Psec@L0Psec·
IOCs DMG -e6de9815c4a3a40acacd456dd7344acfea682f6bc6e72e02ee33cbc6e36de6b2 machO - 86f268637d7a4bfce77fc416b136a3da577c294defb2e92a6484281a6d0f6a3a focusgroovy\.com @500mk500 45.83.220\.205
English
4
1
5
1.4K
L0Psec
L0Psec@L0Psec·
More MacSync, thanks @malwrhunterteam :) e6de9815c4a3a40acacd456dd7344acfea682f6bc6e72e02ee33cbc6e36de6b2 - DMG, Currently only 1 hit on VT, reaches out to C2 and downloads/executes osascript as we've come to expect from these. let's dive in 🧵
L0Psec tweet media
English
1
4
25
3.2K
Germán Fernández
Germán Fernández@1ZRR4H·
🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir). "CRITICAL ADVISORY: Xerox Client Update Immediate action required for all Moose" + "If you're looking at this, this is part of a CSIRT approved phishing campaign" 😏 Payload: "patch.js": ac4928b95e1d016fa8941da5e0840870c97987a154d70c5ae0124055ffa07196. [+] bazaar.abuse.ch/sample/ac4928b…
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
English
4
26
91
23.9K
csØsf
csØsf@cs0sf·
@Ryan_Riordz @ValidinLLC Interesting, uses `gzzZ8Umq` as rc4 key. decode/decrypt shellcode in memory, set protection to PAGE_EXECUTE_READWRITE and execute
English
1
0
1
40
Riordz
Riordz@Ryan_Riordz·
- outlok-hotmail[.]com 🤔 (104.21.62[.146) Interesting MultiRAT find from @ValidinLLC 🔥
Riordz tweet mediaRiordz tweet mediaRiordz tweet media
English
1
4
11
1.6K
csØsf
csØsf@cs0sf·
@BlinkzSec @malwrhunterteam some of the py scripts in zip use aes/xor combination to decrypt shellcode and inject in explorer.exe and resume it
English
0
0
0
10
csØsf
csØsf@cs0sf·
@BlinkzSec @malwrhunterteam Interesting... decrypts shellcode using rc4 key `LodEFZvO` , sets protection flags and executes in memory buffer
English
1
0
0
12
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
WsgiDAV opendir: https://huge-arrangements-magnet-flu.trycloudflare[.]com/ 🤷‍♂️
MalwareHunterTeam tweet media
Lietuvių
1
1
8
3K
csØsf
csØsf@cs0sf·
@malwrhunterteam Interesting, vbscript1 > vbscript2> download/run bat > download zip > unzip > run py script > set startup
English
0
0
1
17
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
WsgiDAV opendir: https://pi-healing-sudan-kennedy.trycloudflare[.]com/ 🤷‍♂️
MalwareHunterTeam tweet media
Lietuvių
1
2
9
2.6K
blinkz
blinkz@BlinkzSec·
@malwrhunterteam Oh, right - in terms of words, the only thing that came to mind was the entry in urlhaus. Great work!
English
1
0
1
31
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
WsgiDAV opendir: https://meat-media-sl-type.trycloudflare[.]com/ 🤷‍♂️
MalwareHunterTeam tweet media
Lietuvių
1
1
7
2.8K
Salman
Salman@salmanvsf·
Interesting #ClickFix Technique uses compromised legit site with obfuscated JS fetching data from BNB Chain. jmw[.]lk -> 0xf4a32588b50a59a82fbA148d436081A48d80832A#code -> mshta "remote domain" @JAMESWT_WT @anyrun_app seen before ?
Salman tweet mediaSalman tweet mediaSalman tweet mediaSalman tweet media
English
5
7
27
4.1K