Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Analysis of DinodasRAT Linux implant | Securelist
In this article, we share our analysis of a recent version of the DinodasRAT implant for Linux, which may have been active since 2022.

https://securelist.com/dinodasrat-linux-implant/112284/


๐ŸŽ–@malwr
๐Ÿ‘1
โœ…โœ…โœ… Forward posts to the other groups โœ…โœ…โœ…
๐Ÿ‘1
Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild

Overview The SonicWall Capture Labs threat research team recently observed an interesting variant of StopCrypt ransomware. The ransomware executes its malicious activities by utilizing multi-stage shellcodes before launching a final payload that contains the file

https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/


๐ŸŽ–@malwr
Malware Development Essentials Part 1 | by Smukx | Mar, 2024 | Medium
For Malware development and security professionals, understanding the inner workings of Windows is crucial. Windows internals, the hidden world beneath the user interface, can harbor vulnerabilitiesโ€ฆ

https://smukx.medium.com/malware-development-essentials-part-1-5f4626652ed9


๐ŸŽ–@malwr
Windows Memory Forensics
How to hunt for anomalies in a Windows Memory Dump

https://blog.cyber5w.com/anomalies-hunting-in-windows-memory-dump


๐ŸŽ–@malwr
VMware ESXi Forensic with Velociraptor
Introduction During our investigations, we have come across more and more VMware ESXi hypervisors.

https://www.synacktiv.com/en/publications/vmware-esxi-forensic-with-velociraptor.html


๐ŸŽ–@malwr
New DinodasRAT Used as Linux Implants Worldwide: First Known Variant Still remains a Mystery

DinodasRAT is a C++ backdoor that was initially used to attack government organizations in Guyana. A new Linux variant targeting Red Hat and Ubuntu Linux has been discovered. The malware establishes persistence using Systemd and SystemV, communicates with C2 servers via TCP or UDP, and uses encryption. Its infrastructure has been linked to specific IP addresses and domains, affecting several countries.

https://hackhunting.com/2024/03/29/new-dinodasrat-used-as-linux-implants-worldwide-first-known-variant-still-remains-a-mystery/


๐ŸŽ–@malwr
Quick Forensics Analysis of Apache logs - SANS Internet Storm Center
Quick Forensics Analysis of Apache logs, Author: Xavier Mertens

https://isc.sans.edu/diary/30792


๐ŸŽ–@malwr
๐Ÿ‘1
In-the-Wild Windows LPE 0-days: Insights & Detection Strategies โ€” Elastic Security Labs
This article will evaluate detection methods for Windows local privilege escalation techniques based on dynamic behaviors analysis using Elastic Defend features.

https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies


๐ŸŽ–@malwr
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples
Advanced CyberChef techniques using Registers, Regex and Flow Control

https://embee-research.ghost.io/advanced-cyberchef-operations-netsupport/


๐ŸŽ–@malwr
Android Malware Vultur Expands Its Wingspan โ€“ Fox-IT International blog
Authored by Joshua Kamp Executive summary The authors behind Android banking malware Vultur have been spotted adding new technical features, which allow the malware operator to further remotely interact with the victim's mobile device. Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that areโ€ฆ

https://blog.fox-it.com/2024/03/28/android-malware-vultur-expands-its-wingspan/


๐ŸŽ–@malwr
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘3
[Nullcon Berlin 2024] The complexity of reversing Flutter applications

Flutter is a cross-platform application development platform. With the same codebase, developers write and compile native applications for Android,...

https://filestore.fortinet.com/fortiguard/research/nullcon.pdf

๐ŸŽ–@malwr