Malware Research / RedTeam / News
173 subscribers
1 file
37 links
Download Telegram
New Linux Malware 'sedexp' Hides Credit Card Skimmers Using Udev Rules

https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html

#linux #udev #analysis
us_18_Bulazel_Windows_Offender_Reverse_Engineering_Windows_Defenders.pdf
37.3 MB
Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

> A deeply technical look at Windows Defender Antivirus’ binary emulator internals

#windows #defender #reverse #emulator #av #blackhat #y2018
Ransomware Tool Matrix

- The repository contains a list of which tools each ransomware gang or extortionist gang uses
- As defenders, we should exploit the fact that many of the tools used by these cybercriminals are often reused
- We can threat hunt, deploy detections, and block these tools to eliminate the ability of adversaries to launch intrusions
- The project will be updated as additional intelligence on ransomware gang TTPs is made available

https://github.com/BushidoUK/Ransomware-Tool-Matrix

#analysis #tools
EDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections. Multiple userland unhooking techniques are also implemented to evade userland monitoring.

https://github.com/wavestone-cdt/EDRSandblast/

#tool #redteam #edr #bypass
This is a new bypass technique for memory scanners. It is useful in hiding problematic code that will be flagged by the antivirus vendors.

This is basically an improved version of Voidgate, but without all of the previous limitations.

This technique is compatible with all C2 beacons, it handles multithreaded payloads and it can handle executables generated by tools such as pe_to_shellcode, thus allowing it to run virtually any non .NET executables.

https://github.com/vxCrypt0r/Voidmaw

#tool #redteam #bypass