vx-underground
45.9K subscribers
3.94K photos
420 videos
83 files
1.44K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Thanks to our friends TorGuard and the degenerates from the DEFCON Data Duplication Village (ly7ine) we now allow individuals to torrent vx-underground

Note: Not all torrents are available yet

You can download the torrents here:
https://vx-underground.org/Torrents
❀59πŸ”₯17πŸ€“7πŸ‘6πŸ‘2🀣2😒1
A young man, presumably from the COM scene, is beginning to gain traction on Twitter for his calm and collected thoughts. A modern day philosopher

tl;dr some kid with a gun (airsoft, maybe?), talking about beaming people (?), and saying 'fuck da opps' and some Chicago gang stuff despite being .... 11? 12? maybe 13?

https://x.com/sgtmuffon/status/1793319240641950068
🀣111😁7πŸ€“6😱4❀2πŸ‘2πŸ€”2😒2😎2πŸ”₯1
We received our first dick pic today. We don't really have anything else to say – but we felt like sharing that.
❀154🀣101πŸŽ‰27πŸ₯°17😁9🫑7😱6πŸ”₯5😒4
Good morning, afternoon, or night.

We've given away roughly $500 worth of merch for the 5 year giveaway. Dozens of people have been contacted. The giveaway is still ongoing due to the volume of people who entered.

tl;dr denial-of-service via nerd overflow
❀56πŸ€“17πŸ‘6πŸ”₯4😁1🀣1
Updates to vx-underground

Samples:
- VirusSign.2024.05.15
- VirusSign.2024.05.16
- VirusSign.2024.05.17
- VirusSign.2024.05.18
- VirusSign.2024.05.19
- VirusSign.2024.05.20
- VirusSign.2024.05.21
- VirusSign.2024.05.22

Torrents:
- vxunderground.HD.APTs.WEBRip.torrent

Papers:
- 2024-04-29 - Zloader Learns Old Tricks
- 2024-04-30 - Latrodectus [IceNova] – Technical Analysis of the New IcedID
- 2024-05-01 - Router Roulette - Cybercriminals and Nation-States Sharing Compromised Networks
- 2024-04-30 - Pouring Acid Rain
- 2024-05-05 - Latrodectus "LittleHw"
- 2024-04-17 - Redline Stealer - A Novel Approach
- 2022-04-21 - Criminals provide Ginzo stealer for free, now it is gaining traction
❀‍πŸ”₯27❀8πŸ‘7πŸ€“3πŸ”₯2😁1😎1
"O Lord Jesus Christ, our God, who hast commanded us to love one another and to bear each other's burdens, we humbly beseech Thee to protect us from all harm and danger.

Send Thy holy angels to guard and keep us in peace and safety. Preserve us from every evil assault and from those who would seek to do us harm. Grant us the strength and wisdom to trust in Thy divine providence and to remain steadfast in our faith.

For Thou art our God, and we glorify Thee, together with Thy Father, who is from everlasting, and Thine all-holy, good, and life-creating Spirit, now and ever, and unto ages of ages. Amen."

– Russian Orthodox Priest doing a Prayer of Protection for Russian ransomware operator exfil servers, 2024
🀣135πŸ˜‡25❀11πŸ™10😁3😎3πŸ‘1🀯1
Today an unknown individual got access to Ring footage of the arrest of Conor Brian Fitzpatrick a/k/a Pompompurin.

We will not share the footage of the arrest because we believe it be unnecessarily invasive to the Fitzpatrick family. Although Pompompurin had plead guilty to the crime, and has been sentenced, we do not want to showcase his family members faces and identities.

What the footage shows:
The United States Federal Bureau of Investigation pretending to be a USPS Postal Worker, saying they have a package for Mr. Fitzpatrick.

Once Mr. Fitzpatrick steps outside the door, to sign for the phony USPS package, other FBI agents swarm him with weapons drawn, instructing him to place his hands behind his head.

Mr. Fitzpatrick remains calm, puts his hands behind his head and complies the entire time. A second person, presumably his Mother, exits the home and speaks with the FBI agents. They ask if anyone else is inside the home. She tells them no one else is currently home.

The entire incident was remarkably calm. Mr. Fitzpatrick complied, there was no physical altercation ...or even swearing. The woman (again, presumably his Mother) was also very polite and complied fully. The FBI agents also seemed calm and apologized to the woman for the event that is taking place.

Pompompurin was wearing sweat pants and for a brief second his butt crack is on camera. It wasn't a very eventful raid. Β―\_(ツ)_/Β―
πŸ‘69🀣42😒16❀4πŸ”₯3😱3πŸ€“1
Today the NCA UK was discussing Operation Cronos (the takedown of Lockbit ransomware group) at SLEUTHCON – and for a brief moment in time we were on TV.

The cherry on top was the VX-UWU design as the profile picture.
🀣105πŸ”₯29❀26😎15πŸŽ‰6πŸ‘3😒3πŸ₯°1
Hello, how are you?

1. Our shipment of harddrives is on the way. We are expecting them sometime next week. Once they are received the cloning process will begin.

2. Bradley is OOO (like a loser), so giveaway winners and selections are briefly delayed

3. I love you
❀109πŸ₯°30πŸ‘8🀣5😒2🀩1
Here is some code that was written about a year for a project for vx-underground. However, due to various reasons, the code is being publicly released.

tl;dr recursive loader, painful to reverse engineer

Explanation of code:
The following code is inspired by APT Linux/Kobalos. Kobalos was malware, suspected to be tied to the Chinese government, which was fully recursive. It was novel malware.

Following this inspiration, an x64 recursive loader was developed for Windows 10 and Windows 11. When compiled the binary has no entries in the IAT. The binary resolves all APIs via NTDLL. Additional libraries are loaded via LdrLoadDll.

The code recursively calls itself to execute functions. It determines which portion of code to execute using a flag (an enum). Each 'function' is encapsulated in a switch statement. All variables are recursively passed using the 'VARIABLE_TABLE' structure. The VARIABLE_TABLE also contains further nested structures for handling API function resolving, initializing COM objects and associated classes, and data structures for some 'switch functions' which may require additional variables for tasks.

To avoid the compiler optimizing code and introducing functions into the IAT, some STDIO functionality such as ZeroMemory have been re-written in more unorthodox methods.

HTTPS requests are handled by COM via the WinHttpRequest Object.

The code basically downloads a binary from vx-underground and executes it. Currently the code will not work because the executable hosted on vx-underground for the proof-of-concept is no longer there – although it was just a copy cmd.exe.

Code may have some bugs. It can be improved upon by introducing pseudo-polymorphism by 'scrambling' the order of switch statements and enum values on each build.

Code written by smelly

You can checkout Win32.RecursiveLoader.b here: https://pastebin.com/HSTS2zwL
πŸ‘65πŸ€“37❀21❀‍πŸ”₯4πŸ”₯4😒3🀝3🫑3πŸ₯°2πŸ‘1
Thank you, Ares, for supporting us by purchasing merchandise.

(we didn't understand the video because we don't speak Ukrainian)
❀164🀣63😁14πŸ”₯9πŸ‘5πŸ€“3😒2🀝2πŸ€”1😱1πŸ’―1
This media is not supported in your browser
VIEW IN TELEGRAM
At the end of the day every alert looks like this to a SOC Analyst
🀣102❀‍πŸ”₯14❀4πŸ€”4πŸ‘1😒1
vx-underground
At the end of the day every alert looks like this to a SOC Analyst
No idea what this even means, we really liked this kitty and just tried to make something work
πŸ₯°70πŸ‘12πŸ€”6❀5πŸ‘3😒2πŸ”₯1😎1
Lots of updates coming on Monday.

Also, people have begun receiving their giveaway swag. We still have more people to select, but giving away $1,000 worth of merch is actually kind of time consuming.

Anyway, someone said their cat now uses the shirt for naps
❀69πŸ”₯11πŸ₯°9πŸ‘4😒1πŸŽ‰1
Today Donald Trump, former United States President who is seeking re-election, stated he vows to commute the sentence of former SilkRoad founder Ross Ulbricht

More information: https://www.coindesk.com/policy/2024/05/26/trump-pledges-to-free-silk-road-creator-ross-ulbricht-if-re-elected/
❀145🀯41🀣13😁11πŸ‘6πŸ”₯5πŸ‘1😒1πŸŽ‰1
😭😭😭😭
πŸ”₯120😎32🀣25😱15πŸ‘4πŸ€”4❀3😒3🫑1
Google AI being πŸ’―πŸ’―πŸ’―
πŸ”₯216🀣53πŸ’―42😁18😎12🫑6❀3πŸ‘1πŸ€”1😒1πŸŽ‰1
Good morning.

Today is the day of rest. We hope all of you have enjoyed your weekend thus far. We will see you all on Monday.

Love you
❀106πŸŽ‰7πŸ‘5πŸ˜‡5πŸ₯°3πŸ€“2πŸ”₯1😍1
This media is not supported in your browser
VIEW IN TELEGRAM
It's time for your quarterly, and mandatory, continual education video from your HR department.

You sit down, play the video, and this what you learn about data backups:
🀣95❀39🀝10πŸ€“8πŸ€”3πŸ‘1πŸ”₯1πŸŽ‰1🀩1