I was requested to poke stuff with a stick because of stuff happening in r/PiratedGames
https://malwaresourcecode.com/home/my-projects/write-ups/r-piratedgames-drama.-is-it-malware-yes.-is-it-cool-malware-no
https://malwaresourcecode.com/home/my-projects/write-ups/r-piratedgames-drama.-is-it-malware-yes.-is-it-cool-malware-no
Malwaresourcecode
r/PiratedGames drama. Is it malware? Yes. Is it cool malware? No | malware source code
π47π16β€9π«‘4π’1
Watched police body cam footage of a guy who robbed a bank. He went in with a gun, a slid a piece of paper telling the bank teller to give him all the money.
He received over $1,000 in cash. He was caught moments later. He is in jail and is facing over 20 years in prison.
The ex-mayor of New York pushed a "NYC Token" cryptocurrency and rug pulled over $3,000,000. He doubled his net worth in just a few days.
Nothing will happen to him.
He received over $1,000 in cash. He was caught moments later. He is in jail and is facing over 20 years in prison.
The ex-mayor of New York pushed a "NYC Token" cryptocurrency and rug pulled over $3,000,000. He doubled his net worth in just a few days.
Nothing will happen to him.
π’167π34π₯°22π10β€8π«‘6π―5π₯4π±4π2π1
Today I experienced something I had never imagined myself experiencing.
My 9 month old makes a big mess while eating. He is still learning coordination to self-feed. He's improving. I'm proud of him.
Today he made a gigantic mess while trying Jello for the first time. He decided to put it in his hair and also his pants. We're still not sure how he got the Jello so far down his pants ... but he did.
We had to wash him. He was sticky and stinky.
Because he's getting bigger he gets the "big boy tub". In essence, my wife or get in the bathtub with him and bathe him. We set him in the tub and we both wash him. The parent in the tub with him holds him, rotates him around to get the hard to wash spots, or keeps him distracted by playing with him. He loves splashing the water.
Anyway, today when I was holding him he took a massive shit in the tub. I'll spare you the details. I wasn't angry, ... but being a first time parent has been a unique experience none of the books or classes prepared us for.
That's all. I just wanted to share that with someone.
My 9 month old makes a big mess while eating. He is still learning coordination to self-feed. He's improving. I'm proud of him.
Today he made a gigantic mess while trying Jello for the first time. He decided to put it in his hair and also his pants. We're still not sure how he got the Jello so far down his pants ... but he did.
We had to wash him. He was sticky and stinky.
Because he's getting bigger he gets the "big boy tub". In essence, my wife or get in the bathtub with him and bathe him. We set him in the tub and we both wash him. The parent in the tub with him holds him, rotates him around to get the hard to wash spots, or keeps him distracted by playing with him. He loves splashing the water.
Anyway, today when I was holding him he took a massive shit in the tub. I'll spare you the details. I wasn't angry, ... but being a first time parent has been a unique experience none of the books or classes prepared us for.
That's all. I just wanted to share that with someone.
β€164π«‘70π€£59π12π11π₯°6π€6π€4π₯2π€2π€©1
Today Spaniard authorities seized 10 tonnes (metric tons, 22,000lbs, 10,000kg) of cocaine being smuggled into the country from Brazil.
The cocaine is reportedly valued at enough to purchase 3 DDR5 RAM sticks and maybe a few Claude tokens
The cocaine is reportedly valued at enough to purchase 3 DDR5 RAM sticks and maybe a few Claude tokens
π€£187π₯°13β€10π9π’2π2β€βπ₯1
Lots of drama on the internet today as TESLA announces the self-driving functionality will now require you paying a monthly subscription.
Tesla lovers are absolutely furious.
Tesla stock owners are dancing in the streets
Tesla lovers are absolutely furious.
Tesla stock owners are dancing in the streets
π€£199π₯°14π5β€2π₯1π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
π80β€27π€£21π₯°11π€4π2π’2π1
I need help.
My 9 month old son loves Ms. Rachel. For the past 3 days I've been subjected to cruel and unusual punishment. I'm trapped. I'm stuck listening to this lady sing "Wheels On The Bus" for, at minimum, 8 hours a day.
My home is a CIA torture black site. "thE wHeElS oN the BuS gO rOunD n RouNd" ... in the morning... in the afternoon... at night ... when he's trying to sleep or he's sleeping.
I'm at the point where I'll start confessing to crimes I've never committed to make this fucking song stop playing.
My 9 month old son loves Ms. Rachel. For the past 3 days I've been subjected to cruel and unusual punishment. I'm trapped. I'm stuck listening to this lady sing "Wheels On The Bus" for, at minimum, 8 hours a day.
My home is a CIA torture black site. "thE wHeElS oN the BuS gO rOunD n RouNd" ... in the morning... in the afternoon... at night ... when he's trying to sleep or he's sleeping.
I'm at the point where I'll start confessing to crimes I've never committed to make this fucking song stop playing.
π€£159π₯°25π±12β€11π’6π6π«‘4π1
vx-underground
I need help. My 9 month old son loves Ms. Rachel. For the past 3 days I've been subjected to cruel and unusual punishment. I'm trapped. I'm stuck listening to this lady sing "Wheels On The Bus" for, at minimum, 8 hours a day. My home is a CIA torture blackβ¦
Imagine hearing this shit ALL DAY. I'm losing my mind. I've disconnected from reality. I don't know what's real and what isn't real.
https://www.youtube.com/watch?v=bOiYN7iU-W8
https://www.youtube.com/watch?v=bOiYN7iU-W8
YouTube
Wheels On The Bus + More Nursery Rhymes & Kids Songs - Educational Videos for Kids & Toddlers
Sing your favorite nursery rhymes & kids songs with Ms Rachel such as Wheels on The Bus! We hope you enjoy this nursery rhymes and kids songs compilation and sing along with us! Ms Rachel has the best educational videos for kids and toddlers!
Lyrics:
β¦
Lyrics:
β¦
π₯°62π’27π«‘22π€£17β€9
I've decided to poke MalwareBytes with a stick.
Why? I'm mildly curious how it works internally and I'm curious if I can produce malware custom tailored to evade it.
Why? Because sometimes I get weird ideas and want to do weird things for literally zero reason other than "sounds kind of cool".
I setup a VM for the first time in years to poke it with a stick. I didn't want to install an AV on my main machine. Yes, I will do malware analysis on my main machine but not install an AV.
After installing MalwareBytes, skimming some of the files, poking random things and saying "wtf does this thing do", I've learned some mildly interesting things but nothing revolutionary.
1. They use Jenkins for continuous integration. Does this mean anything? No.
2. Based off my minimal testing, I don't see any DLLs injected into binaries when they're loaded into memory. However, the binaries I tested are well known and well established. It might inject DLLs into unknown binaries.
3. MalwareBytes main binary is written in C#.NET. It loads a secondary MalwareBytes.dll which then displays everything. It does the same stuff Microsoft Copilot does. That is how MalwareBytes has a fancy UI and stuff.
4. MalwareBytes stores very little in HKEY_CURRENT_USER making tampering from user mode kind of hard. It's just basic settings and stuff.
5. MalwareBytes has a custom protocol handler of "malwarebytes://". It looks like it uses this for interprocess communication between other MalwareBytes modules and binaries
6. MalwareBytes ships with a (basically) blank DLL called "Sample.dll". I have no idea why.
7. MalwareBytes has 2 mini filters in place which (presumably) are the main thing responsible for detecting malware. This is standard. MalwareBytes Chameleon (one of the minifilters) looks like it's meant to prevent tampering with the actual important MalwareBytes minifilter.
8. MalwareBytes Chameleon looks like it's responsible for communicating with user mode and kernel mode components. It looks like this is done so user mode components don't communicate directly with the minifilter responsible for actually detecting malware
9. I have a lot more poking to do
10. There is a binary called "assistant.exe" which loads "assistant.dll" (more .NET) stuff. It may possible to abuse this as a LOLBIN (maybe, need to poke more, kind of). assistant.exe does things like issuing commands for scanning, updating, and displaying things in the MalwareBytes UI. It accepts commands as "assistant.exe --uri malwarebytes://"
11. I have no idea how their scanning works, but it's labeled internally as Hyperscan
12. There is a thing called ProtectedHashes. I have no idea what this is.
13. There are tons of SQLite libraries, but I have no idea what it's for. Presumably, it's for known-good and known-bad file hashes, maybe? But I have no idea where this is stored.
14. I like cats
Why? I'm mildly curious how it works internally and I'm curious if I can produce malware custom tailored to evade it.
Why? Because sometimes I get weird ideas and want to do weird things for literally zero reason other than "sounds kind of cool".
I setup a VM for the first time in years to poke it with a stick. I didn't want to install an AV on my main machine. Yes, I will do malware analysis on my main machine but not install an AV.
After installing MalwareBytes, skimming some of the files, poking random things and saying "wtf does this thing do", I've learned some mildly interesting things but nothing revolutionary.
1. They use Jenkins for continuous integration. Does this mean anything? No.
2. Based off my minimal testing, I don't see any DLLs injected into binaries when they're loaded into memory. However, the binaries I tested are well known and well established. It might inject DLLs into unknown binaries.
3. MalwareBytes main binary is written in C#.NET. It loads a secondary MalwareBytes.dll which then displays everything. It does the same stuff Microsoft Copilot does. That is how MalwareBytes has a fancy UI and stuff.
4. MalwareBytes stores very little in HKEY_CURRENT_USER making tampering from user mode kind of hard. It's just basic settings and stuff.
5. MalwareBytes has a custom protocol handler of "malwarebytes://". It looks like it uses this for interprocess communication between other MalwareBytes modules and binaries
6. MalwareBytes ships with a (basically) blank DLL called "Sample.dll". I have no idea why.
7. MalwareBytes has 2 mini filters in place which (presumably) are the main thing responsible for detecting malware. This is standard. MalwareBytes Chameleon (one of the minifilters) looks like it's meant to prevent tampering with the actual important MalwareBytes minifilter.
8. MalwareBytes Chameleon looks like it's responsible for communicating with user mode and kernel mode components. It looks like this is done so user mode components don't communicate directly with the minifilter responsible for actually detecting malware
9. I have a lot more poking to do
10. There is a binary called "assistant.exe" which loads "assistant.dll" (more .NET) stuff. It may possible to abuse this as a LOLBIN (maybe, need to poke more, kind of). assistant.exe does things like issuing commands for scanning, updating, and displaying things in the MalwareBytes UI. It accepts commands as "assistant.exe --uri malwarebytes://"
11. I have no idea how their scanning works, but it's labeled internally as Hyperscan
12. There is a thing called ProtectedHashes. I have no idea what this is.
13. There are tons of SQLite libraries, but I have no idea what it's for. Presumably, it's for known-good and known-bad file hashes, maybe? But I have no idea where this is stored.
14. I like cats
β€97π€17π€©7π₯5π5π₯°2π―2π1π€£1
Poking MalwareBytes with a stick continues. I fell down a weird rabbit hole.
MalwareBytes contains a file that is packaged with it called "malwarebytes_assistant.exe". This file is written in C#.NET, it subsequently loaded malwarebytes_assistant.dll.
As the name implies, it is indeed an assistant file. It accepts commands and does things based on the commands given to it. There's a lot of commands, but here are the interesting ones.
- AddExclusion (can't find it though)
- Deactivate
- DisableWebProtection
- StopService
- LaunchProcess
- SetRegistryValue
- CreateWFCRule
- ModifyWFCRule
- DeleteWFCRule
LaunchProcess and SetRegistryValue check the parent process of the invoker. If it is not from a process that is signed by MalwareBytes, it fails. However, everything else works. It does prompt UAC, but it says its coming from MalwareBytes.
tl;dr disable MalwareBytes, modify Windows Firewall, etc. It displays as MalwareBytes doing it.
We must continue poking it with a stick.
MalwareBytes contains a file that is packaged with it called "malwarebytes_assistant.exe". This file is written in C#.NET, it subsequently loaded malwarebytes_assistant.dll.
As the name implies, it is indeed an assistant file. It accepts commands and does things based on the commands given to it. There's a lot of commands, but here are the interesting ones.
- AddExclusion (can't find it though)
- Deactivate
- DisableWebProtection
- StopService
- LaunchProcess
- SetRegistryValue
- CreateWFCRule
- ModifyWFCRule
- DeleteWFCRule
LaunchProcess and SetRegistryValue check the parent process of the invoker. If it is not from a process that is signed by MalwareBytes, it fails. However, everything else works. It does prompt UAC, but it says its coming from MalwareBytes.
tl;dr disable MalwareBytes, modify Windows Firewall, etc. It displays as MalwareBytes doing it.
We must continue poking it with a stick.
β€40π₯14π₯°8π«‘6
vx-underground
Poking MalwareBytes with a stick continues. I fell down a weird rabbit hole. MalwareBytes contains a file that is packaged with it called "malwarebytes_assistant.exe". This file is written in C#.NET, it subsequently loaded malwarebytes_assistant.dll. Asβ¦
tl;dr
"C:\Program Files\Malwarebytes\Anti-Malware\malwarebytes_assistant.exe" --disablertp
yay no more protection
"C:\Program Files\Malwarebytes\Anti-Malware\malwarebytes_assistant.exe" --disablertp
yay no more protection
π64π€©17π₯7π5π€£5π₯°2β€1
It's 10pm and I'm reverse engineering Javascript malware targeting FiveM.
Why are people making malware for Grand Theft Auto V roleplay servers
Why are people making malware for Grand Theft Auto V roleplay servers
π’61π17π4π«‘4β€3
vx-underground
It's 10pm and I'm reverse engineering Javascript malware targeting FiveM. Why are people making malware for Grand Theft Auto V roleplay servers
I fucking HATE this shit. I hate dealing with this type of obfuscating. Ugh.
https://raw.githubusercontent.com/Linux123123/fivem-malware/refs/heads/main/second_stage/nulljj.js
https://raw.githubusercontent.com/Linux123123/fivem-malware/refs/heads/main/second_stage/nulljj.js
π«‘56β€11π’8π€―5π2π€£2π€2
I was reverse engineering this Grand Theft Auto V malware that targets FiveM stuff. It was a big ol' mess of obfuscated Javascript. I hate obfuscated Javascript.
I posted I hated obfuscated Javascript.
Subsequently, a very nice person named nullableVoidPtr deobfuscated the massive code base for me when I was sleeping. Thank you. I love you.
Anyway, when I began poking it with a stick I discovered the malware connects to blum-panel(.)me. It registers there. It's the C2.
When you visit via HTTPS it notifies you of their Discord server (also references to their Discord in their code?)?
When you connect to their Discord they advertise security services for Grand Theft Auto V stuff ... ?
What the fuck.
Dawg, do you NOT run a malware campaign and advertise it on Discord like this. Are you OUT OF YOUR MIND?
I posted I hated obfuscated Javascript.
Subsequently, a very nice person named nullableVoidPtr deobfuscated the massive code base for me when I was sleeping. Thank you. I love you.
Anyway, when I began poking it with a stick I discovered the malware connects to blum-panel(.)me. It registers there. It's the C2.
When you visit via HTTPS it notifies you of their Discord server (also references to their Discord in their code?)?
When you connect to their Discord they advertise security services for Grand Theft Auto V stuff ... ?
What the fuck.
Dawg, do you NOT run a malware campaign and advertise it on Discord like this. Are you OUT OF YOUR MIND?
π€£79β€28π8π―3π₯°1
When I shared that obfuscated Javascript payload that was targeting Grand Theft Auto V FiveM stuff, I had like 6 nerds pop out the bushes telling me how much they enjoy working with obfuscated payloads (Javascript, Lua, Powershell, etc).
WHO ARE YOU PEOPLE? WHO HURT YOU?
WHO ARE YOU PEOPLE? WHO HURT YOU?
β€74π31π€£26π€―7π’2π1π₯°1π«‘1
vx-underground
When I shared that obfuscated Javascript payload that was targeting Grand Theft Auto V FiveM stuff, I had like 6 nerds pop out the bushes telling me how much they enjoy working with obfuscated payloads (Javascript, Lua, Powershell, etc). WHO ARE YOU PEOPLE?β¦
There are people out there who unironically like deobfuscating stuff like this (see attached link).
Imagine that level of schizophrenia. Imagine waking up and enjoying pain and suffering.
https://raw.githubusercontent.com/Linux123123/fivem-malware/refs/heads/main/second_stage/nulljj.js
Imagine that level of schizophrenia. Imagine waking up and enjoying pain and suffering.
https://raw.githubusercontent.com/Linux123123/fivem-malware/refs/heads/main/second_stage/nulljj.js
π₯°58π±16β€7π«‘6π3π’3π€£2π€―1
Sabrina Thipdavone Rhodes, an Intelligence Analyst with the Nevada High Intensity Drug Trafficking Area (HIDTA) working with the United States Drug Enforcement Administration, plead guilty to theft of property of the United States.
Rhodes stole and converted to cash 243,199.0421 of the virtual currency Ripple (βXRPβ) that had been seized by the DEA.
The value of the XRP stolen from the DEA Wallet would have been approximately $689,688.
Rhodes stole and converted to cash 243,199.0421 of the virtual currency Ripple (βXRPβ) that had been seized by the DEA.
The value of the XRP stolen from the DEA Wallet would have been approximately $689,688.
π€£53β€25π€―6π₯°5
vx-underground
Sabrina Thipdavone Rhodes, an Intelligence Analyst with the Nevada High Intensity Drug Trafficking Area (HIDTA) working with the United States Drug Enforcement Administration, plead guilty to theft of property of the United States. Rhodes stole and convertedβ¦
More information, courtesy of the wonderful people of CourtWatch
https://storage.courtlistener.com/recap/gov.uscourts.cacd.989465/gov.uscourts.cacd.989465.3.0.pdf
https://storage.courtlistener.com/recap/gov.uscourts.cacd.989465/gov.uscourts.cacd.989465.3.0.pdf
CourtListener
Plea Agreement β #3 in United States v. Thipdavone Rhodes (C.D. Cal., 2:25-cr-00776) β CourtListener.com
PLEA AGREEMENT filed by Plaintiff USA as to Defendant Sabrina Thipdavone Rhodes (ctr) (Entered: 10/02/2025)
π₯°20π₯6β€3
The thing I find most admirable about my colleagues and peers in the United Kingdom is that they too dislike and distrust the government.
I'm like, "wtf y'all don't trust mfers either?" then I ask if they want to party and almost always they agree.
Good people across the pond
I'm like, "wtf y'all don't trust mfers either?" then I ask if they want to party and almost always they agree.
Good people across the pond
β€βπ₯65β€13π₯°10π5