Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Check out the full source code of EagleSpy and tailor it to your preferences.

#source
#malware_analysis
#malware_dev #malware
👍22🔥1
REvil_full.pdf
36.1 MB
A Detailed Analysis of The Last Version of REvil Ransomware
Prepared by: Vlad Pasca
Senior
Malware and Threat Analyst
Table of contents
Executive summary 2
Analysis and findings 2
Thread activity – sub_1282EA7 function 37
Thread activity – sub_1287677 function 37
Thread activity – sub_1284468 function 41
Thread activity – sub_12841D3 function 44
Running with the -smode parameter 48
Running with the -silent parameter 51
Running with the -path parameter 51
Running with the -nolan parameter 51
Running with the -nolocal parameter 51
Running with the -fast parameter 51
Running with the -full parameter 51
Indicators of Compromise 51
Appendix 52



#REvil #malware_analysis
6👍2🥰1
An Introduction to Bypassing User Mode EDR Hooks
Credit: Marcus Hutchins
Whilst this article is designed to stand on its own, if you’re interested, you can find my previous articles on these topics here, here, here and here. Surprisingly, despite all this research being over a decade old, it’s still completely relevant today. The more things change, the more they stay the same, I guess?
https://malwaretech.com/2023/12/an-introduction-to-bypassing-user-mode-edr-hooks.html


#Hooking #edr
#malware_dev
🔥2👾2
Introduction global hook and its cases
https://www.programmerall.com/article/21622234988/
hook, refers to a technique used to advance the use of api intercept and process windows messages. Such as a keyboard hook, the Trojans have a lot of this stuff, monitor your keyboard.


Related:
[+] GoHook, Go global keyboard and mouse listener hook

[+] Implementing Global Injection and Hooking in Windows



#Hooking
#malware_dev
👾3🗿1
Source Byte
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory GitHub Link Blog #malware_dev
This media is not supported in your browser
VIEW IN TELEGRAM
Bypassing PESieve and Moneta (The "easy" way....?)
It contains several parts.

Implementation of gargoyle
Lockd: This is the main Gargoyle component
sRDI-Master: This has been slightly re worked to provide a free mechanism.
test.profile: This sample profile shows required options to work
ShellcodeRDI.py: This is the altered python generator with the new sRDI assembly

+ Blog
+ GitHub


#malware_dev
👾5👍2
DLHell
DLHell is a tool for performing local and remote DCOM Windows DLL proxying. It can intercept DLLs on remote objects to execute arbitrary commands. The tool supports various authentication methods and provides capabilities for local and remote DLL proxying, as well as DCOM DLL proxying.


https://github.com/synacktiv/DLHell

#malware_dev
4👍1
🤯9😁3👾1
Develop your own RAT - AV & EDR Defense
credit : @dobinrutis

code : A C2 framework and RAT written in Go.

slides : 👇🏻

#go , #golang , #c2 , #malware_dev
🔥5👍1👾1
When the hunter becomes the hunted: Using custom callbacks to disable EDRs
Security software and EDR systems register their process creation callbacks in this array using functions such as PsSetCreateProcessNotifyRoutine, PsSetCreateProcessNotifyRoutineEx, and PsSetCreateProcessNotifyRoutineEx2. Each of these functions allows drivers to add their specific callbacks to the array, enabling them to monitor process creation events effectively.

How can we use that functions?

#edr #malware_dev
🔥31👍1