Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Released my sRDI (Shellcode Reflective DLL Injection) implementation.

https://github.com/daem0nc0re/TangledWinExec/tree/main/sRDI
๐Ÿ—ฃdaem0nc0re


๐ŸŽ–@malwr
๐Ÿ‘2
Did you know that IDA Free has been updated to 8.2 and gained some new features ๐Ÿ‘‡ Give it a try today ๐ŸŒ https://hex-rays.com/ida-free/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=ida-free-updated-8-2

#IDAFree #HexRays #ReverseEngineering #MalwareAnalysis
๐Ÿ—ฃHexRaysSA


๐ŸŽ–@malwr
๐Ÿ‘1
Bypass Windows Defender with FilelessPELoader
Offensive security professional 'TheD1rkMtr' released a C++ tool, titled 'FilelessPELoader' on his Github repository earlier this year in 2023.

The publicly available tool was able to bypass the latest Windows Defender and successfully load and execute Mimikatz on a Windows system. The proof of concept along with the source code of the tool can be found in the author's Github repository over here.

As publicly available tools that claim to bypass Windows Defender are usually rapidly signatured and prevented by the AV/EDR vendors, an attempt was conducted to verify if the C++ 'FilelessPELoader' tool is still functional, and if it is still possible to bypass the latest Windows Defender on an updated Windows system.

This video posted by the Gemini Security channel on Youtube provides a step-by-step walkthrough on how to compile the C++ tool FilelessPELoader and the usage of it, demonstrating that it is STILL possible to bypass Windows Defender, loading and executing the Mimikatz.exe binary. The video also provides a demonstration on using the FilelessPELoader tool to load and execute a Meterpreter reverse shell, successfully establishing a functional reverse shell back to a Kali OS.

If you're up against Windows Defender and require a bypass, this might be the solution for you.
๐Ÿ—ฃcybermepls


๐ŸŽ–@malwr
You suspect there should be a cross-reference in the listing, but IDA isnโ€™t showing it? See how to find it ๐ŸŒ https://hex-rays.com/blog/igors-tip-of-the-week-132-finding-hidden-cross-references/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-132

#IgorsTipOfTheWeek #IDAtips #IDAPro
๐Ÿ—ฃHexRaysSA


๐ŸŽ–@malwr
๐Ÿ‘1
As promised earlier today, here is my writeup about a recent #Gozi campaign that was targeting the ๐Ÿ‡ฎ๐Ÿ‡น audience.

Covering geofence payloads handle, jscript.encode script, shellcodes analysis, APC Injection and much more!

Have fun :)

https://0xtoxin-labs.gitbook.io/malware-analysis/malware-analysis/gozi-italian-shellcode-dance
๐Ÿ—ฃ0xToxin


๐ŸŽ–@malwr
Nice blog post on using Qiling framework for automatically unpack ELF executables

https://kernemporium.github.io/posts/unpacking/

#qiling #infosec #reverseengineering #learning
๐Ÿ—ฃ0xor0ne


๐ŸŽ–@malwr
โค1๐Ÿ‘1