Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Bypass Windows Defender with FilelessPELoader
Offensive security professional 'TheD1rkMtr' released a C++ tool, titled 'FilelessPELoader' on his Github repository earlier this year in 2023.

The publicly available tool was able to bypass the latest Windows Defender and successfully load and execute Mimikatz on a Windows system. The proof of concept along with the source code of the tool can be found in the author's Github repository over here.

As publicly available tools that claim to bypass Windows Defender are usually rapidly signatured and prevented by the AV/EDR vendors, an attempt was conducted to verify if the C++ 'FilelessPELoader' tool is still functional, and if it is still possible to bypass the latest Windows Defender on an updated Windows system.

This video posted by the Gemini Security channel on Youtube provides a step-by-step walkthrough on how to compile the C++ tool FilelessPELoader and the usage of it, demonstrating that it is STILL possible to bypass Windows Defender, loading and executing the Mimikatz.exe binary. The video also provides a demonstration on using the FilelessPELoader tool to load and execute a Meterpreter reverse shell, successfully establishing a functional reverse shell back to a Kali OS.

If you're up against Windows Defender and require a bypass, this might be the solution for you.
๐Ÿ—ฃcybermepls


๐ŸŽ–@malwr
You suspect there should be a cross-reference in the listing, but IDA isnโ€™t showing it? See how to find it ๐ŸŒ https://hex-rays.com/blog/igors-tip-of-the-week-132-finding-hidden-cross-references/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-132

#IgorsTipOfTheWeek #IDAtips #IDAPro
๐Ÿ—ฃHexRaysSA


๐ŸŽ–@malwr
๐Ÿ‘1
As promised earlier today, here is my writeup about a recent #Gozi campaign that was targeting the ๐Ÿ‡ฎ๐Ÿ‡น audience.

Covering geofence payloads handle, jscript.encode script, shellcodes analysis, APC Injection and much more!

Have fun :)

https://0xtoxin-labs.gitbook.io/malware-analysis/malware-analysis/gozi-italian-shellcode-dance
๐Ÿ—ฃ0xToxin


๐ŸŽ–@malwr
Nice blog post on using Qiling framework for automatically unpack ELF executables

https://kernemporium.github.io/posts/unpacking/

#qiling #infosec #reverseengineering #learning
๐Ÿ—ฃ0xor0ne


๐ŸŽ–@malwr
โค1๐Ÿ‘1
Weโ€™ve just published a short #IDAPro tutorial about the #Disassembly window. Watch it now ๐ŸŒ https://youtu.be/cgELfAUg8C4

#IDAProTutorials #IDAPro #hexrays #LearningIDA
๐Ÿ—ฃHexRaysSA


๐ŸŽ–@malwr
Android Attack: Reversing React Native Applications
https://securityqueens.co.uk/android-attack-reversing-react-native-applications/
๐Ÿ—ฃpentest_swissky


๐ŸŽ–@malwr
Happy to announce the release of my JADX dynamic scripting plugin, JADXecute. Now you write and share scripts to automate your Android APK analysis! #ReverseEngineering

https://github.com/LaurieWired/JADXecute
๐Ÿ—ฃlauriewired


๐ŸŽ–@malwr
Here's a short blog on using Frida to write and bypass detections for your TTPs. We can use good ol' userland hooking + JavaScript bindings to avoid writing complex kernel code, which lets us quickly develop test cases and improve our techniques.

https://passthehashbrowns.github.io/using-frida-for-rapid-detection-testing
๐Ÿ—ฃpassthehashbrwn


๐ŸŽ–@malwr
Icicle is a multi architecture emulation framework designed for firmware fuzzing.
Very interesting research work

Paper: https://arxiv.org/pdf/2301.13346.pdf
github repo (pre-release): https://github.com/icicle-emu/icicle

#fuzzing #firmware #infosec #cybersecurity
๐Ÿ—ฃ0xor0ne


๐ŸŽ–@malwr
โค1