vx-underground
46.1K subscribers
3.95K photos
420 videos
83 files
1.45K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Sim swappers and crypto drainers seem to dislike ZachXBT. We received an anonymous message today with this video.
🀣133πŸ’―23❀6πŸ‘4πŸ€”4πŸ€“2😁1
We've updated the vx-underground malware source code collection on GitHub.

Yesterday the source code to banking trojans Android.Hook and Android.Ermac were leaked online.

*Hook is the successor to Ermac
*Thanks to 3xp0rtblog for the code

https://github.com/vxunderground/MalwareSourceCode
πŸ‘20πŸ₯°9πŸ”₯8❀3
This media is not supported in your browser
VIEW IN TELEGRAM
ZachXBT, an independent cryptocurrency investigator who monitors and tracks cryptocurrency scams, shared ANOTHER video of cryptocurrency thieves taunting him.

The sign says "Fuck ZachXBT. Chards"

That's 3 videos now 😭
😁79🀣42❀24πŸ‘10😒8😱3πŸ’―3πŸ€”2
This media is not supported in your browser
VIEW IN TELEGRAM
"Who is 29a labs?"
πŸ€”32😒16🀣5🫑5❀3
In the spirit of Halloween we will share something with you that is truly terrifying.

*Yes, this is real game made by EA
🀯89🀣65😁7πŸ”₯5😱3❀2πŸ‘1πŸ€”1
We keep getting pinged. Yes, Boeing has been removed from Lockbit ransomware groups website.

Lockbit administrative staff informed us they removed Boeing because negotiations have begun.

We don't know anything else. It is Halloween. Cya nerds tomorrow. We're busy.
😁71πŸ‘14πŸ₯°9πŸŽ‰8😎3❀2🀣1
Yesterday ALPHV ransomware group listed Advarra, a clinical research technology company

Advarra told ALPHV quote "We do not pay digital terrorists". Additionally, ALPHV tried contacting one of their executives via text message. She told ALPHV "go fuk yourself"

πŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚
🀣212😎34πŸ‘12πŸ”₯8❀4🫑3😱1
This media is not supported in your browser
VIEW IN TELEGRAM
This one simple trick will land you a job anywhere
🀣202πŸ”₯28πŸ‘10😁7πŸ‘5❀4πŸ’―3❀‍πŸ”₯1
> "DONT DO THIS!!! THIS IS A FELONY!!!"

No shit, Sherlock. It's satire
😁69🀣24πŸ€“13πŸ‘5😱2😒2❀1πŸ€”1
We are behind schedule on almost all of our tasks. 1/2 of our staff is sick.

Seasonal changes are illegal and for nerds
😒71🀣14❀‍πŸ”₯5πŸ™5
We've updated the vx-underground malware sample collection

- MedusaLocker
- XLoader
- SystemBC
- MinodoLoader
- ShellBot
- Moqhao
- XMRig
- PlayRansomware
- MoneyRansomware
- PrivateLoader
- AridGopher
- Micropsoa
- IcedId
and more...

Check it out here: vx-underground.org/
πŸ‘20πŸ€“14❀‍πŸ”₯5πŸŽ‰2
52,807 new malware samples queued for upload in our VXDB and the vx-underground website.

*Reminder our VXDB allows you to search through our malware collection and download for free 🫑

https://virus.exchange
πŸ”₯33🫑15❀‍πŸ”₯9πŸ‘4πŸ‘1
Google is introducing more new TLDs =D

.ing and .meme

New phishing links inbound!
🀣113πŸ”₯17❀4😱4😒4πŸ€“3πŸ€”2❀‍πŸ”₯1
He's not wrong
🀣110πŸ’―9❀5😁5πŸ”₯1πŸ€“1
Alternatives to 'whoami.exe'.

COM interface ideas:
- IADsADSystemInfo
- IADsWinNTSystemInfo
- IADsComputer
- WMI COM provider to query 'whoami.exe'

IADsADSystemInfo, IADsWinNTSystemInfo, and IADsComputer are all fundamentally similar in calling syntax and are pretty copy-pasta ish. Windows SDK is kind of a pain though, the GUIDs weren't located easily, so they needed to be manually defined.
Example: https://pastebin.com/raw/S32nYDAp

Advapi32 functionality:
- Advapi32!LookupAccountSidW
- Advapi32!LsaLookupSids

LookupAccountSidW is an internal wrapper that calls LsaOpenPolicy, LsaLookupSids, and subsequently LsaFreeMemory. LsaFreeMemory is a wrapper to RtlFreeHeap.
Example: https://pastebin.com/raw/zJVShnay

Other possibilities:

- NpGetUserName - gets the username from a named pipe. Requires spawning a secondary thread, creating a named pipe, connecting to it, impersonating it, ... it is a long story =D

- Offlinesame.dll - Offline sam has a lot of functionality for enumerating users and domains on the machine. This is undocumented and requires a little more work. However, it has been demonstrated loosely by 0gtweet
Example: https://github.com/gtworek/PSBits/blob/master/OfflineSAM/OfflineAddAdmin.c

tl;dr can't stop thinking about whoami.exe :(
🀣51πŸ‘11πŸ€“7❀4😎3πŸ”₯1
🀣227😁14❀‍πŸ”₯10🫑5😒4❀3πŸ’―2πŸ‘1😱1πŸ™1
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.

This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.

https://pastebin.com/raw/ZsReS7k4
πŸ‘25😒9πŸ€”5❀3πŸ”₯3πŸŽ‰2
An image illustrating the current CloudFlare status

https://www.cloudflarestatus.com/
🀣99πŸ‘8πŸ”₯8😱3😒2