vxunderground | Unsorted

Telegram-канал vxunderground - vx-underground

14367

The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh

Subscribe to a channel

vx-underground

BasicallyHomeless,

1. You purchased the vx-underground in April, 2024. That is not 6 months ago.

2. LinusTechTips staff purchased their harddrive in November, 2023.

3. We responded to all of your e-mails regarding it.

4. Daddy, chill.

edit:

1. vx-underground harddrive*, made a typo

2. We're not mad at BasicallyHomeless. It has taken us a VERY long time to ship the harddrives because of harddrive shortages. We're just goofing around, no cap.

Читать полностью…

vx-underground

ChromeDumper - dumps stored credentials from Chrome like a generic infostealer malware. It used to work, but Chrome changes how it stores credentials fairly often, so stopped working on it

DataSharingMalcode - experimenting with various interprocess communication ideas.

Demo - Just shooting in the dark at random ideas. Experimented with things like CfOpenFileWithOplock instead of CreateFile. Lots of failing

DiscordSecrets - Disassembling the Discord binary and inserting malicious payload into it. Sort of works, stopped caring

DiscordExfil - Using Discord as a C2 using webhooks. Works, got bored with the idea

Dll1 - Throwaway DLL for debugging

EtwKeylogger - Experimented with keylogging using ETW. Someone else did it, couldn't reproduce it, gave up

FirewallAPI - Various experiments with using Windows COM to disable or alter the Windows firewall. It works, but got bored with the idea, moved on. Buggy code.

InMemoryJsExecutor - Uses Wscript engine to execute JS and VBS in-memory. It works, is buggy and unstable.

KeyboardTsf - Experimenting with keylogging using Windows Text Service Framework. It's a huge pain in the ass and requires a lot of external factors for it to work.

LetsGetWeird - Various attempts at abusing random Windows APIs for loading or executing binaries. Some of the code has been added to VXUG

LsassDump - Experimenting with dumping LSASS. Some of it is reproducing or testing others works.

Matroyshka - RecursiveLoader version 1. It's a piece of junk

Packer - Inserts malware into a section into the target PE file. Modifies entry point to jump to it. It works, can be unstable. Got bored

PancakeWare - Experimenting with file compression, some have been added to VXUG, most fail

SpywareVideo - Experimenting with turning the camera on a PC like old school RATs do. Got it working, but got bored.

Читать полностью…

vx-underground

The paper is profoundly interesting. Research indicates some users had multiple accounts across multiple CSAM sites. Using the malware stealer logs they were able to perform OSINT and tie them to real-world identities.

Читать полностью…

vx-underground

"I'm not hurting anyone" — Ruins countless lives

^ audibly laughed out loud

Читать полностью…

vx-underground

Yes, we're aware of the OpenSSH exploit – "regreSSHion".

Everyone and their grandmother is discussing it, it'd be difficult to miss it. We didn't have anything meaningful to contribute to the conversation, so we didn't mention it.

tl;dr exploit bad, its monday, nerd stuff

Читать полностью…

vx-underground

Updates to vx-underground:

- 2024-06-10 - Technical Analysis of the Latest Variant of ValleyRAT
- 2024-06-11 - A Brief History of SmokeLoader, Part 1
- 2024-06-12 - Dipping into Danger: The WARMCOOKIE backdoor
- 2024-06-12 - New backdoor BadSpace delivered by high-ranking infected websites
- 2024-06-12 - Nova Stealer, le malware made in France
- 2024-06-12 - Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day
- 2024-06-13 - DISGOMOJI Malware Used to Target Indian Government
- 2024-06-13 - Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation
- 2024-06-15 - Malware Analysis: FormBook
- 2024-06-17 - From Clipboard to Compromise: A PowerShell Self-Pwn
- 2024-06-17 - Latrodectus, are you coming back?
- 2024-06-17 - Malvertising Campaign Leads to Execution of Oyster Backdoor
- 2024-06-18 - Cloaked and Covert: Uncovering UNC3886 Espionage Operations
- 2024-06-19 - LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations
- 2024-06-19 - New North Korean based backdoor packs a punch
- 2024-06-19 - Spectre (SPC) v9 Campaigns and Updates
- 2024-06-20 - Caught in the Act: Uncovering SpyNote in Unexpected Places
- 2024-06-20 - Medusa Reborn: A New Compact Variant Discovered
- 2024-06-21 - GrimResource: Microsoft Management Console for initial access and evasion
- 2024-06-24 - Gootloader’s New Hideout Revealed: The Malware Hunt in WordPress’ Shadows
- 2024-06-24 - Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame
- 2024-06-25 - From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
- 2024-06-25 - How to detect the modular RAT CSHARP-STREAMER

Читать полностью…

vx-underground

"i'm a noob, whats the best language to start maldev?"

Buy a dartboard, put stickie notes on it, write programming languages on them, cover your eyes, spin around 10 times, then throw the dart.

Whatever it lands on, learn that language and get good. If you miss, give up.

Читать полностью…

vx-underground

(we dont have any in stock so it doesnt matter)

Читать полностью…

vx-underground

Every week nerds ask us "do you know {ransomware_groups} onion?".

Every ransomware group's domains are archived, past and present, as well as their post history by Josh Highet on his website ransomwatch telemetry.

Now stop asking us >:(

Link: https://ransomwatch.telemetry.ltd/

Читать полностью…

vx-underground

Nerds are reporting Lockbit ransomware group's blog now requires a blog access key to visit it.

The blog access key: NDWZ3NXU66EWUFBMJWQOC2FXIIHFZFKZRULHBGAYFYX4HEIDRF5Q

Have a nice day

Читать полностью…

vx-underground

Today an unknown individual shared a photo of their new pillow. It is the official Alexandria Sheriff's Office mugshot of ex-Breached administrator Pompompurin

tl;dr don't do crime or you'll end up on a pillow

Читать полностью…

vx-underground

TeamViewer disclosed a security breach today**

https://www.teamviewer.com/en/resources/trust-center/statement/

Читать полностью…

vx-underground

> write malware
> compile binary
> need to think of sneaky name
> svchost.exe (never been done before)
> (thats a lie, everyone does that)
> tfw av vendors find the svchost.exe

Читать полностью…

vx-underground

Families that commit state-sponsored-cyber-espionage stay together ❤️

Father: Tim Vakhaevich Stigal, wanted by the United States Secret Service

Son: Amin Timovich Stigal, wanted by the United States Federal Bureau of Investigation

Читать полностью…

vx-underground

tl;dr exploring executing vbscript and jscript in-memory from a binary in c++. modexp did a c project on it, explored possibilities of it. worked with vbscript, imploded on jscript with hresult 0x80020101

got annoyed

heres the vbscript code that works: https://pastebin.com/raw/dW3w97Bx

Читать полностью…

vx-underground

vx-underground member Rad a/k/a OnlyMalware being interviewed at x33fcon

Читать полностью…

vx-underground

tl;dr being a failure is cool and badass

Failure is the standard for any sort of malware development, research, or reverse engineering. We think of ideas all the time, research them, work on developing them, then it implodes and fails to come to fruition.

Collectively, we've got dozens of failed, botched, or incomplete projects due to various setbacks and failures. Often times the code is scrapped, put on a metaphorical shelf, and hope the code will be of value sometime later down the road (sometimes years later, or never).

If you're new and you invested several hours, days, weeks, or months and your code ends up being a dead end: Welcome to the club.

Attached image is a screenshot of failed or incomplete projects. This is just the tip of the iceberg.

Читать полностью…

vx-underground

Today RecordedFuture released a research paper on using malware infostealer logs to identify CSAM consumers.

RecordedFuture identified over 3,000 individuals purchasing CSAM. All users were reported to their respective law enforcement agency.

https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers

Читать полностью…

vx-underground

stupid ai meme is kind of funny

Читать полностью…

vx-underground

We caused some confusion about our RansomHub interview post because it was worded similarly to our Lockbit ransomware interview post.

It's a new interview – nothing is being cancelled. We'll mentioned it again later on so we don't confuse people.

Читать полностью…

vx-underground

Lockbit ransomware group administrative staff agreed to go onto a livestream with us (us screensharing a Tox screen) and doing a live Q&A and allow the audience to ask questions.

Questions would be filtered, but maybe it'll be fun.

¯\_(ツ)_/¯

Читать полностью…

vx-underground

It appears security researchers, not just sim swappers and fraudsters, follow us on Telegram. It's truly a Christmas miracle

(we don't know who did this talk or what it's about)

Читать полностью…

vx-underground

> yesterday ltt posts about vxug hdd
> cool_beans.jpeg.exe
> go sleep
> wake up
> check emails
> dozens of inquiries on the vxug hdd
> ???

tl;dr video with 1,000,000+ views gets lots of attention

Читать полностью…

vx-underground

Today Linus Tech Tips released a video about the vx-underground harddrive and our collection.

First, thank you for using an image of a shadowy person with odors radiating off of them to describe smelly. 11/10.

Secondly, Linus and his group did an EXCELLENT job discussing the harddrive and the collection. We believe they accurately describe it, its use case, and the basic reasoning why this entire collection exists.

Some portions of the video are very watered down – but this high-level beginner perspective is perfect for people who are unfamiliar with malware. Additionally, in some places the nomenclature is wrong, but the general idea and principles are still 100% correct.

We also enjoy the enthusiasm Mr. Linus shows with the malware, he reminds us of our first time experimenting with a malware builder.

The end review saying we're the darker side of grey is a little disheartening, but ¯\_(ツ)_/¯

https://www.youtube.com/watch?v=7inhRWxQMFk

Читать полностью…

vx-underground

Large update to vx-underground:

Samples:
- VirusSign.2024.06.20
- VirusSign.2024.06.21
- VirusSign.2024.06.22
- VirusSign.2024.06.23
- VirusSign.2024.06.24
- VirusSign.2024.06.25
- VirusSign.2024.06.26
- VirusSign.2024.06.27
- VirusSign.2024.06.28
- InTheWild.0127

Papers:
- 2015-01-22 - Malvertising Leading To Flash Zero Day Via Angler Exploit Kit
- 2018-10-22 - Chalubo botnet wants to DDoS from your server or IoT device
- 2022-07-18 - Trident Ursa
- 2023-06-10 - IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
- 2023-06-13 - VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
- 2024-01-06 - Understanding Internals of SmokeLoader
- 2024-01-19 - Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021
- 2024-04-09 - BlueShell: Four Years On, Still A Formidable Threat
- 2024-04-09 - Unpacking the Blackjack Group's Fuxnet Malware
- 2024-04-24 - Analysis of Ongoing FROZENSHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover
- 2024-05-06 - HijackLoader Updates
- 2024-05-08 - From OSINT to Disk: Wave Stealer Analysis
- 2024-05-13 - Wavestealer Spotted In The Wild
- 2024-05-23 - Tracking APT SideWinder With DNS Records
- 2024-05-26 - QakBOT v5 Deep Malware Analysis
- 2024-05-28 - BlackSuit Attack Analysis
- 2024-05-30 - The Pumpkin Eclipse
- 2024-06-04 - Muhstik Malware Targets Message Queuing Services Applications
- 2024-06-05 - DarkGate switches up its tactics with new payload, email templates
- 2024-06-05 - ExMatter malware levels up: S-RM observes new variant with simultaneous remote code execution and data targeting
- 2024-06-06 - DarkGate: Make AutoIt Great Again
- 2024-06-06 - EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis

Читать полностью…

vx-underground

More ransomware, more arrests, more breaches, more malware – same ol' same ol'

Читать полностью…

vx-underground

Some people want us to start saying 'hackers' instead of Threat Actors. We'll say hackers again when people stop calling toothpaste saving tips 'pro hacks' or 'life hacks'.

It's not 1996 anymore, sorry.

Читать полностью…

vx-underground

"oTheR cOmpAnieS haVe MorE mAlwArE thAn yOu"

Ted Talk time.

First of all, we're not a company. We're just a bunch of internet nerds wildin' out on a computer.

Secondly, right now vx-underground ingests roughly 120,000 malware samples a month with a budget of a slice of pizza and some weird lookin' lint we found in our pocket.

The reality of the situation is large organizations ingest absurd quantities of malware. Antivirus vendors, (some) Threat Intelligence vendors, and Endpoint Security vendors ingest terabytes of malware a day.

We are aware of some organizations which ingest 500,000 - 1,000,000 malware samples a day. Whereas some AV vendors reportedly ingest over 5,000,000 malware samples a day. These organizations dwarf us.

Part of the reason why is simple: intelligence. Vendors are ingesting malware in large quantities, through various means such as honeypots, sharing between organizations (private exchanges), submissions from VirusTotal, and malware captured from user endpoints.

They use this data to track and monitor malware campaigns, C2 addresses (IPs or domains), look for modification of code bases, and look for any missteps and leaking of PII. They then distribute this data and update security rules, update known-good and known-bad SHA256 collections, and often work with law enforcements agencies to takedown Threat Groups. This is work that happens everyday, around the clock, 24/7 and these organizations work hard monitoring malware nerds.

Our purpose of collecting malware is historical in nature – people can download the malware, reverse the malware, and study the malware. Our malware is often hammy downs (metaphorically speaking) from larger organizations and is rarely cutting edge. It would be difficult to identify a new Threat Group from our malware collection. The advantage of our collection is it is often difficult for people to even get hammy down malware without begging someone (or some organization) OR the malware samples are scattered all over the place. Our collection is in 1 singular location making it easier to get the cool stuff nerds wanna study.

Thanks for coming to our Ted Talk.

Читать полностью…

vx-underground

When the Security Team catches a Threat Actor actively trying to compromise a machine

Читать полностью…

vx-underground

> wake up
> check news
> yet another ransomware group (brain cipher)
> polyfill supply chain attack infecting 100k websites
> more ransomware attacks
> people mad google is stopping cia / nsa operations
> cdk global ransomware drama continues
> more malware being malware

Читать полностью…
Subscribe to a channel