Group for Malware Analysts. Pinned message with resources and rules: https://t.me/MalwareResearch/38033
I saw it on Twitter quite some time ago
Anyway, in terms of contents, both sites have much overlaps
Hey, can anybody share some stuff regarding Kinsing Malware.
Читать полностью…Hello i need a cyber security expert for paid mission
Читать полностью…Has anyone come across The Paradox malware before?
Just wandered around on youtube, another cheat - ok, drop in 3(?) stages
obfuscated .bat {Exploit UAC + WD}
7aa4dc47991ed55ce962b00d48f04ac8 (On anyrun)
https://app.any.run/tasks/3905f454-e0f2-4f4c-af7a-2aa33edb145a
C# dropper
f4d0884562f73348674470145b34b735 (On anyrun)
https://app.any.run/tasks/7d82ed21-930e-482c-82dc-d19a0cc431bd
It downloads a C# payload of a stub stub similar to rootkit
https://www.virustotal.com/gui/file/35e9fc6d67be2d1c6b980631212a36788eb91b75e7d7ccd2abe34707d52eb735
There is only one working C2 left - https://fdute32sdajfsda.hopto.org/
Tpeбyютcя нecкoлькo чeлoвeк для coвмecтного зapaбoткa на кpиптoвaлютe!
Минимaльнaя зaнятocть.
Oбyчeниe пpeдocтавляем.
Ждy всex жeлающиx!
Hello Nikhil, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…Hey can someone share some samples of GuLoader compiled in one zip
Читать полностью…Which LLM model did you used? How did you prompt?
Did you gave the model a source code and asked it to write ast parser to do xyz?
First off, happy Diwali to everyone and their families!
Second, this is a blog post alert!
This one is about developing tooling to deobfuscate JavaScript malware using Abstract Syntax Trees (ASTs). We will look at:
● Removal of junk comments.
● Removal of junk unused variables.
● Simplifying function bodies.
● Signaturizing ASTs to auto-rename functions.
● Deobfuscating the recently reported MintsLoader malware.
Blog link: https://nikhilh-20.github.io/blog/deob_js_ast/
Disclosure: The tooling code was generated through a LLM. I provided the ideas and directed the model to create the relevant code. Without this assistance, it would have taken me longer to codify the concept, given that I’m not deeply versed in JS.
New FedBan
Fed: Libra's Empire
FedAdmin: alex 27
User: Orkhan Jalal
User ID: 5708493409
Reason: spam
maldev academy , zero2automate. best way to learn how to analyze malware is to analyze malware - get ghidra or ida pro, a debugger, sandbox, look at samples and start playing around. ofc learn winapi c c++ c# assembly n more if u havent yet
Читать полностью…oh, that's a cool new name, i didn't knew about this site
Читать полностью…Hello Marja, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…User Oussama has 1/3 warnings; be careful!
Reason:
no paid jobs offer. Use @dfirjobs
New FedBan
Fed: Libra's Empire
FedAdmin: alex 27
User: Юрий
User ID: 1990400078
Reason: spam
Hello Mahbubor Rahman, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…The free version of ChatGPT. I think it used gpt-4-turbo, I haven't checked.
An example prompt when I was working on removing unused variables:
Even the unused variables are showing in usedVars variable. I think the problem is that you're adding a variable to usedVars even for the declaration statement. Ignore declaration statements when updated usedVars
Consider the AST of the following JS code:Читать полностью…
var xcssnuyk = thatleft0sovereigntynever;
var thatleft0falklandwith = thatleft0sovereigntynever;
var thatleft0notscottish = thatleft0sovereigntynever;
As it turns out, only the first variable is used later in the code. The other 2 are basically junk code. How would you identify such junk code using the AST?
The AST:
...
The LLM did. I didn't even know the lib existed lol
Читать полностью…Did you picked esprime library or did LLM picked it ?
Читать полностью…New FedBan
Fed: Libra's Empire
FedAdmin: Libra
User: Leviatan_09 😺
User ID: 716622107
Reason: spam
Hello Gabriel, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…