vx-underground
47.7K subscribers
4.13K photos
441 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Hello to the person who decided to name themselves 'gay4smellyvx' on Call of Duty.
🀣142❀21😁18πŸ˜‡4πŸ€”1
This media is not supported in your browser
VIEW IN TELEGRAM
Thank you for the meme submission, foilmanhacks
πŸ€“57🀣35❀17πŸ‘3😁3😱2😒1
Good morning,

Our virus exchange website is going through a serious overhaul. Moving forward, all samples submitted will automatically upload to VirusTotal. The sample uploaded will subsequently be tagged and/or renamed using the VirusTotal 'Popular threat label' naming convention.

If in the event a popular threat label is not present, but it still holds a sufficiently high enough threat score, it will default to the Kaspersky naming convention.

All malware files will be retained β€” even junk file infectors like Padodor or Berbrew. If the file is not malware we will delete it. We only want malware.

Additionally, each day our virus exchange will release a 'daily dump' 7z file. This will be every file submitted, named as stated previously, and synced to vx-underground to be available for bulk download.

An API is available for programmatic access to virus exchange. Some users have created unofficial wrappers in Python to ease API access to our malware database.

This is all free of charge. Anyone, anywhere, can access this resource and download as much as they'd like. However, we ask you consider donating to allow this to continue. Furthermore, if you're unhappy with the performance of the site, we advise larger companies to consider becoming monthly sponsors. A system at this scale, while remaining free of charge, is not easy.

We hope moving forward we can give back to individuals who submit and share samples with us by offering rewards to valued contributors... but that's a conversation at a later date and later time.

Thanks,
- smelly
❀121πŸ‘24πŸ”₯14❀‍πŸ”₯10πŸ€”5πŸ€“5πŸ‘3😒3πŸ’―3🀣1😎1
vx-underground
Good morning, Our virus exchange website is going through a serious overhaul. Moving forward, all samples submitted will automatically upload to VirusTotal. The sample uploaded will subsequently be tagged and/or renamed using the VirusTotal 'Popular threat…
As a side note, because others have asked, we have no intention on implementing malware configuration extractors, gathering C2 information, etc. That is something more along the lines of Triage. That is much more exhaustive work.

https://tria.ge
😍38πŸ‘7πŸ€“7🀣2❀1πŸ€”1😒1πŸŽ‰1
"why doesn't vxug prompt for cookies"

the only cookies present are for maintaining your session on vxug or vxdb. we dont track you, we dont collect data, we dont do ads, blah blah blah. its just malware ok download it
❀151🀣43❀‍πŸ”₯12πŸ‘10🫑8🀯4😁3😒2πŸ‘1
We've updated the vx-underground Windows malware paper collection. We have a lot more papers in queue.

Read them.

Papers:
- 2024-08-31 - Finding open file handles in PS
- 2024-08-30 - Evil MSI A story about vulnerabilities in MSI Files
- 2024-08-26 - DLL Sideloading ith LicenseDiag.exe
- 2024-08-19 - DRMBIN - Prevent binaries from running on other machines
- 2024-08-15 - Offline SAM Editing
- 2024-08-14 - Tricks with Microsoft Word and Sandboxes
- 2024-08-13 - Abusing AVEDR Exclusions to Evade Detections
- 2024-06-09 - Bypassing EDR NTDSdit protection using BlueTeam tools
πŸŽ‰29❀11🀩3🀝2πŸ‘1πŸ”₯1
Generally speaking, the ultimate goal of collecting malware is getting malware which offers intelligence in some capacity.

- Novel malware
- Stagers and/or chains (leading to malware)
- Active malware campaigns

There is a metric poop-ton of dead malware floating in cyber space which offers nothing of value. Collecting it simply allows you to add (yet another) SHA256 entry in your DB of known-bad files. It will do (probably) nothing except alter system files and be annoying.

Ideally, you'd like malware you can extract C2 information from, tie to a malware campaign, study for making detection rules, or study to learn new malware development techniques.

Old and dead malware does nothing except take up space. But, some vendors like it just to check it off as 'lol this bad fr'.

As an example: our malware ingestion can take it millions upon millions of "padodor", "berbew", "qukart", "vilsel", "zegost", or "vbclone" samples. Most of these don't even work on modern windows, drop like, 100+ copies of itself, and can't connect to anything.

tl;dr its dead
πŸ”₯64πŸ‘13πŸ’―7❀3😒3πŸ€“3πŸ‘1
Today we ingested 1,721,892 suspected malicious binaries.

Non-junk malware: less than 100,000, probably closer to 60,000
πŸ”₯55🀣11❀9😒4πŸ€“2πŸ‘1
lemon > rolex
πŸ”₯100πŸ€“31❀10πŸ‘8πŸ‘5😒1πŸ’―1
twitter algorithm πŸ˜‚πŸ˜‚πŸ˜‚
😁126🀣78πŸ’―21🫑6πŸ‘5πŸ€“5❀3πŸ”₯3πŸ₯°1
This media is not supported in your browser
VIEW IN TELEGRAM
if you cringe you lose
😱81😒48🀣32😁12πŸ”₯5πŸ˜‡5πŸ€“3πŸ™2❀1🀝1🫑1
Saw XI: Internet Dweeb Edition:

Jigsaw voice: "Hello, internet pirate, want to play a game? One of these buttons is a real pirated version of Photoshop. The other three deliver Redline information stealer. Make your choice."
🀣150😁14❀9πŸ€“7😒3🫑3πŸ‘1
Today reports surfaced on a cybersecurity incident impacting the London Transport Department

We can assert with a high degree of confidence that this 'incident' is of extreme severity. The immediate presence of the NCA and NCSC drives this point further.
😱42πŸ‘6πŸ’―6😁5🀯4πŸ€“2🀝1
Updates to vx-underground:

Papers:
- 2024-09-03 - Rundll32 and Phantom DLL lolbins
- 2024-08-17 - HookChain - A new perspective for Bypassing EDR Solutions
- 2024-08-11 - DriverJack
- 2024-08-11 - Blocking EDR drivers with HVCIDisallowedimage
- 2024-08-10 - ShimMe - Manipulating Shim and Office for Code Injection
- 2024-08-09 - Blocking EDR Drivers with WDAC policies
- 2024-08-08 - Abusing Windows Hello without a severed hand

Families:
- Android.BlankBot
- AteraAgent
- AtlantidaStealer
- Azorult
- BruteRatel
- CobaltStrike
- DCRat
- DonutLoader
- GCleaner
- Gh0stRAT
- GuLoader
- Lokibot
- LummaStealer
- Mirai
- Neshta
- NjRat
- Pony
- PureLogStealer
- RhadamanthysLoader
- Sliver
- Vidar
- XWorm
- ArcStealer
- AgentTesla
- Amadey
- Andromeda
- AsyncRAT
- AugustStealer
- CryptBot
- CyberGateRAT
- Danabot
- Formbook
- Latrodectus
- MicroClip
- Rakos
- Redline
- Remcos
- StealC
- XenoRAT

Note: someone said the artwork we use when pushing updates is scary, they requested we post something cute instead.
πŸ₯°53πŸ”₯11πŸ‘4😘4😁3❀1😒1
September 3rd, Lara Trump (daughter-in-law of former U.S. President Donald Trump) and Tiffany Trump (daughter of former U.S. President Donald Trump) had their X accounts compromised.

Their accounts briefly shilled some sort of crypto stuff. X locked the accounts within minutes.
🀣78❀10πŸ€”8πŸ‘3😁1😒1
pizza topping must be a valid email address
πŸ’―111🀣27πŸ€“21😁14🀯8❀2πŸ‘1😒1
vx-underground
pizza topping must be a valid email address
pepperoni_is_ok_i_guess_im_not_picky@gmail
🀣130❀10πŸ’―6πŸŽ‰3😁2πŸ€“1
RansomHub ransomware group claims to have ransomed Planned Parenthood
🀣85😒52πŸ”₯14πŸ€”11πŸŽ‰6πŸ™6❀‍πŸ”₯4πŸ‘4❀2🀩2πŸ’―1