vx-underground
46.3K subscribers
3.97K photos
425 videos
84 files
1.45K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
We've added a new paper to the vx-underground Windows paper collection

"Azure Outlook Command & Control that uses Microsoft Graph API for C2 communications & data exfiltration" by 0xBoku & C5pider

Check it out here: https://www.vx-underground.org/windows.html#scab
๐Ÿ˜ฑ3๐Ÿ‘2๐Ÿ”ฅ2
"Operation Dragon Castling", which has been targeting companies in South East Asia, has a stage 2 loader named CoreX. CoreX uses the same SYSCALL sorting method created by the folks over at MDSecLabs

Paper API Unhooking via SYSCALL sorting: https://papers.vx-underground.org/papers/VXUG/Mirrors/BypassingUserModeHooksandDirectInvocationofSystemCallsforRedTeams.pdf

Paper on OPERATION DRAGON CASTLING: https://decoded.avast.io/luigicamastra/operation-dragon-castling-apt-group-targeting-betting-companies/
๐Ÿ”ฅ3
Yesterday AhnLabs reported APT activity targeting South Korean users using one of the oldest tricks in the book: they send a malicious .CHM file masquerading as a legitimate CHM file.

*Malicious .CHMs appeared approx. in 1997
*Malicious .DOCX/XLS appeared approx. in 1999
๐Ÿ”ฅ7๐Ÿ‘1๐Ÿ˜ฑ1
We have made an additional 2,400,000+ malware samples available for bulk download.

Total available for bulk download: approx. 15,000,000

Have a nice day.

Download: https://samples.vx-underground.org/samples/Blocks/
๐Ÿ‘13๐Ÿ”ฅ7๐ŸŽ‰1
We have enabled reactions.
๐Ÿ”ฅ87โค17๐Ÿ’ฉ16๐ŸŽ‰12๐Ÿ‘8๐Ÿ‘Ž2๐Ÿ˜2๐Ÿค”2๐Ÿคฏ2๐Ÿคฌ1๐Ÿ˜ข1
We've updated the vx-underground Malware Defense paper collection: "Anti-UPX Unpacking Technique" by Shusei Tomonaga

Have a nice day.

Check it out here: https://vx-underground.org/av.html
โค6๐Ÿ”ฅ4๐Ÿ‘1๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
As ransomware groups, such as Lockbit, ALPHV, and HIVE, continue to ramp up operations it is important we review how these groups operate.
๐Ÿ˜31๐Ÿ”ฅ6โค3๐Ÿ‘3๐Ÿคฎ2๐Ÿ˜ฑ1๐Ÿคฉ1๐Ÿ’ฉ1
We have made an additional 2,200,000+ malware samples available for bulk download.

Total available for bulk download: approx. 17,000,000

Download: https://samples.vx-underground.org/samples/Blocks/
๐Ÿ‘6
Lockbit ransomware group has placed a $1,000,000 bounty on their own head. They state they will give $1,000,000 to any FBI agent who can locate them.
๐Ÿค”6๐Ÿ˜2๐Ÿคฌ1
The developers behind Raccoon Stealer have announced they're temporarily shutting down operations.

They cite the invasion of Ukraine as the reason why they're shutting down. They state key team members are "no longer with us".
๐Ÿ˜ข2๐Ÿ‘1
The FBI's response to Lockbit ransomware group placing a $1,000,000 bounty of their own head
๐Ÿ˜6๐Ÿ‘1
LAPSUS$ extortion group put out a message approx. 90 minutes ago. This message has appeared despite UK authorities claiming to have arrested 7 alleged members of the group yesterday.
๐Ÿค”7๐Ÿ‘2
A person being interviewed about a recent ransomware attack against a prestigious Brazilian university wore the vx-underground "Ransomware Aktivist" shirt.
๐Ÿ”ฅ27๐Ÿ˜17๐Ÿ‘2
If Malware is so bad then why does your government develop it?
๐Ÿ”ฅ29๐Ÿค”8๐Ÿคฉ3
We have submitted over 300,000 unique samples to Tria.ge! Special thanks to ReversingLabs for all the cool new malware samples too!
๐Ÿ”ฅ8๐Ÿ‘4๐Ÿ’ฉ2