CrackCodes 🇮🇳
9.02K subscribers
1.27K photos
256 videos
677 files
3.4K links
Download Telegram
Forwarded from Deadly malware xp
#tools
#Malware_analysis
SEMA - ToolChain using Symbolic Execution for Malware Analysis
https://github.com/csvl/SEMA-ToolChain
Forwarded from 卩ro 爪Cracker
Secret Handshake

A prototype malware C2 channel using x509 certificates over mTLS

I always wondered if threat actors ever used x509 certificates as part of their C2 communication, not to encrypt the network traffic but to actually embed the C2 communication in the x509 cert. After searching for something like this in the wild for 5 years I finally decided to just code it myself to see if it's possible...it is

https://github.com/jconwell/secret_handshake

#malware
Vjw0rm.pdf
5 MB
#Malware_analysis
How to Analyze JavaScript Malware - A Case Study of Vjw0rm
#Malware_analysis
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
LODEINFO.pdf
14.9 MB
#Malware_analysis
"Fighting to LODEINFO: Investigation for Continuous Cyberespionage Based on Open Source", 2023.

]-> LODEINFO Triage Tools:
https://github.com/nflabs/aa_tools/tree/main/lodeinfo
Multigenerational_Ransomware_Family_Analysis.pdf
329.7 KB
#Whitepaper
#Malware_analysis
"Multigenerational Ransomware Family Analysis Using Intezer", 2022.
Malware is a type of software that is designed to cause harm to a computer or its users. It can be used to steal personal information, damage files, or even take control of a computer.

Read Full Article

https://trickypenguin.ink/what-is-malware-and-how-to-protect-against-malware-attacks/

#malware #botnets #torjan