vxunderground | Unsorted

Telegram-канал vxunderground - vx-underground

14367

The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh

Subscribe to a channel

vx-underground

It's been really quiet lately.

It's the calm before the storm.

Читать полностью…

vx-underground

Updates to vx-underground

Archives:
- The Old New Thing, June, 2024

Families:
- Latrodectus
- BadSpace
- XWorm
- FormBook
- Oyster
- WarmCookie
- P2PInfect
- LummaStealer
- DisgoMoji
- KoiLoader
- BlankGrabber
- BruteRatel
- CobaltStrike
- Android.SpyNote
- Amadey

Читать полностью…

vx-underground

I've got a virus on my computer

Читать полностью…

vx-underground

Hello,

We're going to be AFK this weekend. Please don't do anything crazy.

Thanks,

Читать полностью…

vx-underground

Hello,

We have returned to our pseudo-goth-weird-dark-art profile picture stage.

Have a nice day.

Читать полностью…

vx-underground

Shoutout to the homies at the United States Defense Counterintelligence and Security Agency!

Happy 4th of July and thanks for the free Robux!

*The page has been removed, but it's still cached in Google

Читать полностью…

vx-underground

Hello,

We're terribly sorry to this round of vx-underground harddrive purchasers. We've had so many headaches with our harddrive vendor it's unimaginable. They lost our purchased drives and are now arguing about reshipping drives. They initially said they'd issue a reshipping July 2nd, now they're talking about reshipping July 5th.

First and foremost, we're no longer purchasing from Seagate. Secondly, we're going to challenge the Seagate CEO and the Seagate CFO to a 2v2 on Halo 3.

Bradley & I (smelly) vs Dave Mosley & Gianluca Romano

Rules:
- Map: Guardian
- Weapons: BRs and Snipers only
- Modifications: No invis
- Grenades are OK
- Self-imposed death: -1 point(s)
- Respawn time: 5 seconds

Good luck, noobs. We've got a 50 in Team Doubles

Читать полностью…

vx-underground

FBI: There's no one else that can help us but you

The Threat Intelligence expert that retired 10 years ago:

Читать полностью…

vx-underground

It appears multiple people have not heard this phrase before. Generally speaking, "running-a-train" on someone is an act in which multiple men have sex with a woman one after another. The post is essentially saying, "fun fact: most acts of group sex are performed on me".

Читать полностью…

vx-underground

> wake up
> check news
> over 9,000 false positives for CVE-2024-6387
> more ransomware stuff
> flood of stupid ai cyber security memes
> xbox live was offline for 5 hours, no one cared
> more 8k sec filings
> ???

Читать полностью…

vx-underground

Security researcher raghav127001 believes he may have identified a host actively exploiting CVE-2024-6387. However, they're not sure (and neither are we).

We've archived the binaries before the identified host nukes them.

Possible CVE-2024-6387:
https://vx-underground.org/tmp/CVE-2024-6387

Читать полностью…

vx-underground

We've updated the vx-underground APT collection – update includes samples and papers.

- 2024.06.05 - UAC-0020 (Vermin) attacks the Defense Forces of Ukraine using the SPECTR WPS in tandem with a legitimate SyncThing
- 2024.06.05 - Operation Crimson Palace - Sophos threat hunting unveils multiple clusters of Chinese state-sponsored activity targeting Southeast Asian government
- 2024.06.06 - Howling at the Inbox - Sticky Werewolf's Latest Malicious Aviation Attacks
- 2024.06.10 - Another battlefield - Telegram as a digital front in Russia’s war against Ukraine
- 2024.06.10 - APT and financial attacks on industrial organizations in Q1 2024
- 2024.06.10 - MIVD Ongoing state cyber espionage campaign via vulnerable edge devices
- 2024.06.11 - APT Attacks Using Cloud Storage
- 2024.06.11 - Noodle RAT - Reviewing the Backdoor Used by Chinese-Speaking Groups
- 2024.06.11 - SmallTiger Malware Used in Attacks Against South Korean Businesses (Kimsuky and Andariel)
- 2024.06.13 - Arid Viper poisons Android apps with AridSpy
- 2024.06.13 - DISGOMOJI Malware Used to Target Indian Government
- 2024.06.13 - Operation Celestial Force employs mobile and desktop malware to target Indian entities
- 2024.06.16 - China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence
- 2024.06.18 - Cloaked and Covert - Uncovering UNC3886 Espionage Operations
- 2024.06.19 - CERT-FR: Malicious activities linked to the Nobelium intrusion set
- 2024.06.19 - New North-Korean based backdoor packs a punch
- 2024.06.20 - Sustained Campaign Using Chinese Espionage Tools Targets Telcos
- 2024.06.21 - Analysis of PHANTOM-SPIKE - Attackers Leveraging CHM Files to Run Custom CSharp Backdoors Likely Targeting Victims Associated with Pakistan
- 2024.06.21 - SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques
- 2024.06.21 - Unveiling SpiceRAT - SneakyChef's latest tool targeting EMEA and Asia
- 2024.06.24 - Armageddon is more than a Grammy-nominated album
- 2024.06.24 - Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation
- 2024.06.24 - Russia-Linked CopyCop Expands to Cover US Elections, Target Political Leaders
- 2024.06.26 - ChamelGang & Friends - Cyberespionage Groups Attacking Critical Infrastructure with Ransomware
- 2024.06.26 - Russian National (Amin Timovich Stigal) Charged for Conspiring with Russian Military Intelligence to Destroy Ukrainian Government Computer Systems and Data
- 2024.06.27 - Kimsuky deploys TRANSLATEXT to target South Korean academia
- 2024.06.28 - TeamViewer links corporate cyberattack to Russian state hackers
- 2024.07.01 - CapraTube Remix - Transparent Tribe’s Android Spyware Targeting Gamers, Weapons Enthusiasts
- 2024.07.01 - Xctdoor Malware Used in Attacks Against Korean Companies (Andariel)

Читать полностью…

vx-underground

vx-underground member Rad a/k/a OnlyMalware being interviewed at x33fcon

Читать полностью…

vx-underground

tl;dr being a failure is cool and badass

Failure is the standard for any sort of malware development, research, or reverse engineering. We think of ideas all the time, research them, work on developing them, then it implodes and fails to come to fruition.

Collectively, we've got dozens of failed, botched, or incomplete projects due to various setbacks and failures. Often times the code is scrapped, put on a metaphorical shelf, and hope the code will be of value sometime later down the road (sometimes years later, or never).

If you're new and you invested several hours, days, weeks, or months and your code ends up being a dead end: Welcome to the club.

Attached image is a screenshot of failed or incomplete projects. This is just the tip of the iceberg.

Читать полностью…

vx-underground

Today RecordedFuture released a research paper on using malware infostealer logs to identify CSAM consumers.

RecordedFuture identified over 3,000 individuals purchasing CSAM. All users were reported to their respective law enforcement agency.

https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers

Читать полностью…

vx-underground

One the largest contributors to vx-underground is JaffaCakes. In the past 45+- days he has submitted over 1,250,000 unique malware samples to the vx-underground malware database.

He has successfully unlocked 4 cat pictures.

Читать полностью…

vx-underground

William Front Flip 😭😭😭

Читать полностью…

vx-underground

Hello,

We're back. It looks like everything is okay and nothing has burned to the ground. We're proud of all of you. You get +2 internet points.

Читать полностью…

vx-underground

Per request, if you'd like a copy of vx-uwu you can download it here:

https://vx-underground.org/tmp

Читать полностью…

vx-underground

Introduce completely useless and unnecessary COM abstractions into your code. EDRs think it's cool.

(it wraps to LocalAlloc, but whatever)

Читать полностью…

vx-underground

inb4 Seagate accepts the challenge, wins, they T-bag us

Читать полностью…

vx-underground

Someone put together a PowerPoint presentation on why we should follow them on Xitter.

Читать полностью…

vx-underground

We've introduced a new section to vx-underground: Microblog. It'll contain the occasional (probably pretty rare) opinion, rant, whatever, by vx-underground staff.

We've added a new blog post entry, some small tidbits and complaints, or something.

https://vx-underground.org/Microblog

Читать полностью…

vx-underground

Today Roll20 disclosed a security breach

Information and screenshot via drgecko_exe

Читать полностью…

vx-underground

Updates to vx-underground:

Bulk samples:
- VirusSign.2024.06.29
- VirusSign.2024.06.30
- VirusSign.2024.07.01
- VirusSign.2024.07.02
- Bazaar.2024.06

Families:
- AgentTesla
- Amadey
- BlackBastaRansomware
- Blackmoon
- DCRat
- Grandoreiro
- Latrodectus
- Remcos
- SmokeLoader
- SnakeKeylogger
- StealC
- Gomir
- Sock5Systemz
- SweetSpecter
- WineLoader

Читать полностью…

vx-underground

Mildly interesting and very silly: Threat Actors on Exploit forum continue to appear in Threat Intelligence infostealer logs because they're, in some shape or form, being victims of the malware they themselves try to weaponize.

Photo via ddd1ms

Читать полностью…

vx-underground

BasicallyHomeless,

1. You purchased the vx-underground in April, 2024. That is not 6 months ago.

2. LinusTechTips staff purchased their harddrive in November, 2023.

3. We responded to all of your e-mails regarding it.

4. Daddy, chill.

edit:

1. vx-underground harddrive*, made a typo

2. We're not mad at BasicallyHomeless. It has taken us a VERY long time to ship the harddrives because of harddrive shortages. We're just goofing around, no cap.

Читать полностью…

vx-underground

ChromeDumper - dumps stored credentials from Chrome like a generic infostealer malware. It used to work, but Chrome changes how it stores credentials fairly often, so stopped working on it

DataSharingMalcode - experimenting with various interprocess communication ideas.

Demo - Just shooting in the dark at random ideas. Experimented with things like CfOpenFileWithOplock instead of CreateFile. Lots of failing

DiscordSecrets - Disassembling the Discord binary and inserting malicious payload into it. Sort of works, stopped caring

DiscordExfil - Using Discord as a C2 using webhooks. Works, got bored with the idea

Dll1 - Throwaway DLL for debugging

EtwKeylogger - Experimented with keylogging using ETW. Someone else did it, couldn't reproduce it, gave up

FirewallAPI - Various experiments with using Windows COM to disable or alter the Windows firewall. It works, but got bored with the idea, moved on. Buggy code.

InMemoryJsExecutor - Uses Wscript engine to execute JS and VBS in-memory. It works, is buggy and unstable.

KeyboardTsf - Experimenting with keylogging using Windows Text Service Framework. It's a huge pain in the ass and requires a lot of external factors for it to work.

LetsGetWeird - Various attempts at abusing random Windows APIs for loading or executing binaries. Some of the code has been added to VXUG

LsassDump - Experimenting with dumping LSASS. Some of it is reproducing or testing others works.

Matroyshka - RecursiveLoader version 1. It's a piece of junk

Packer - Inserts malware into a section into the target PE file. Modifies entry point to jump to it. It works, can be unstable. Got bored

PancakeWare - Experimenting with file compression, some have been added to VXUG, most fail

SpywareVideo - Experimenting with turning the camera on a PC like old school RATs do. Got it working, but got bored.

Читать полностью…

vx-underground

The paper is profoundly interesting. Research indicates some users had multiple accounts across multiple CSAM sites. Using the malware stealer logs they were able to perform OSINT and tie them to real-world identities.

Читать полностью…

vx-underground

"I'm not hurting anyone" — Ruins countless lives

^ audibly laughed out loud

Читать полностью…
Subscribe to a channel