vx-underground
47.6K subscribers
4.12K photos
440 videos
84 files
1.49K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
vx-underground
ultra rare kitty cat
>be me
>work on crappy computer virus website
>uploading 200gb of bad computer programs
>bored
>listening to Primer 55
>looking at cat pictures

ok ttyl, gonna let stuff upload
πŸ™58😁14🫑7πŸ‘3πŸ‘2😒2😎1
Cats 🀝 Malware
πŸ’―86πŸ₯°15❀6πŸŽ‰4🀣3🀝3🀯2πŸ‘1😒1
vx-underground
Cats 🀝 Malware
wtf my cat has a computer virus
😱93πŸ”₯20😁8❀3πŸ‘2😒1πŸ€“1
April 14th, 2025, David M. Dorbish Jr., passed away as a result of a suspected drug overdose.

David M. Dorbish Jr. was a prolific online serial swatter who plead guilty to 15 charges in 2020.
πŸ”₯96🫑35πŸŽ‰27🀣18πŸ‘11πŸ‘6πŸ™4❀2😒1
I hate seeing people write and/or say "cyber" in the context of cybersecurity i.e. "I'm studying for cyber right now".

The word "cyber" is an adjective β€” do you study big, tall, short, tiny, blue, stinky?

/me flips desk
🀣171πŸ’―30😁13πŸ€“11πŸ‘10πŸ”₯5❀3😘3❀‍πŸ”₯2😒1
Updates to the vx-underground collection:

Papers:
- 2004-06-06 - Execution redirection thru Image File Execution Options key
- 2025-04-07 - Bypass WDAC WinDbg Preview
- 2025-04-17 - Notes on RtlGetUnloadEventTraceEx

Malwares:
- InTheWild.0152
- InTheWild.0153
- InTheWild.0154
- InTheWild.0155
- InTheWild.0156
- InTheWild.0157
- InTheWild.0158
- InTheWild.0159
πŸ”₯35❀11πŸ‘2🫑2😒1
Today virus exchange was banned from our (other) hosting provider (Wasabi). They claim our domain virus-dot-exchange has malware on it.

They cited 1 specific file hash and stated virus exchange is disabled until we can explain why we have 1 malware on the server

What the fuck?
🀣307😁19❀12🀯9πŸ€”8πŸ”₯4πŸ‘3πŸŽ‰3πŸ’―2🀝2😎2
vx-underground
Today virus exchange was banned from our (other) hosting provider (Wasabi). They claim our domain virus-dot-exchange has malware on it. They cited 1 specific file hash and stated virus exchange is disabled until we can explain why we have 1 malware on the…
No idea what's going on, but the bucket they reference has millions upon millions of malicious binaries.

How did miss the other 36,999,999 malwares
🀣197❀34😁21🫑7πŸ‘3❀‍πŸ”₯1🀯1😒1
Updates to the vx-underground collection:

- 2025-03-02 - Abusing IDispatch for Trapped COM Object Access Injecting into PPL Processes
- 2025-04-03 - CreateFileMapping to replace ReadFile
- 2025-04-08 - Notes on bypassing mailbox audit logs
πŸ‘21❀11😒3πŸ”₯2🀝2
Discord CEO stepped down. The new upcoming CEO was previously the CEO of Activision. His resume includes the implementation of micro-transactions in Call of Duty.

Imagine if Discord suddenly introduces micro-transactions, like paying $10/month for unlimited call times πŸ˜‚
🀣163🫑36😒16πŸ‘6😁6❀1
vx-underground
Discord CEO stepped down. The new upcoming CEO was previously the CEO of Activision. His resume includes the implementation of micro-transactions in Call of Duty. Imagine if Discord suddenly introduces micro-transactions, like paying $10/month for unlimited…
TeamSpeak is in the restroom, shadowboxing in their underwear, praying to God that Discord does something stupid(er) and results in a user base collapse
❀114😁36πŸ™26πŸ’―4πŸ‘1🀣1πŸ˜‡1
Hello,

To work in IT and/or cyber security...

You don't like have to like Linux, you don't have to like C (or Assembly), you don't have to like Mr Robot, you don't have to go to conferences or meetups, you don't have to prefer IRC over Discord, you don't have to have a fancy setup

You can like or dislike whatever you want. Don't feel pressured to think or behave a certain way.

ok ttyl love u, kissies
- smelly
❀253πŸ€“40🀣25πŸ’―14πŸ‘10πŸ₯°6πŸ”₯4😁3😱3🫑2😘1
Windows 11 is the more secure and privacy focused Operating System

Only real privacy enthusiasts use it
🀣119😁99πŸ’―16πŸ€“13πŸ€”7❀2😒1
vx-underground
Windows 11 is the more secure and privacy focused Operating System Only real privacy enthusiasts use it
It's so privacy focused, it takes images of what you're doing every 90 seconds to ensure you're not making any opsec mistakes.

It then saves it in a super secure location (APP DATA) so then you can review it later if you want
🀣168😁31πŸ”₯7πŸ‘7😱4❀3🀝2
This is pretty much what it's like dealing with malware droppers

You're like, oh sweet, it's a kitty cat. But then you discover it's actually a barrage of kitty cats and that's fine but you didn't expect so many at once
😁108❀38πŸ₯°13πŸ€“3πŸ‘2😱2😒1πŸ˜‡1
The naming convention "Trojan" easily confuses people i.e. Remote Access Trojan. Unfortunately, due to successful media campaigns, the term Trojan is now closely affiliated to condoms.

Instead we petition to formally change the term to something which is reminiscent of the term "Trojan Horse", and carries the same meaning

Suggestion: Horse

Example(s):

- Remote Access Horse
- Sophisticated Horse
- "... The Threat Actors inserted a Horse payload into the Word document..."

Laymen can easily identify a horse and they will understand the concept of a horse on the loose is very dangerous. You can explain to customers there is a horse loose in their computer and the horse is causing serious damage.
🀣125❀40πŸ’―9🀝7πŸ‘5πŸ”₯5πŸ₯°1😒1
vx-underground
The naming convention "Trojan" easily confuses people i.e. Remote Access Trojan. Unfortunately, due to successful media campaigns, the term Trojan is now closely affiliated to condoms. Instead we petition to formally change the term to something which is…
Imma be real with you, Chat. I've been unfathomably busy IRL and it's brought me immense joy schizo-posting satirical nonsense to thousands of people.
❀‍πŸ”₯129πŸ₯°20❀9πŸ‘8πŸ˜‡3😁2πŸ€”2😒1🫑1
Updates to the vx-underground collection:

- 2011-07-04 - Mixing x86 with x64 code
- 2018-04-11 - WoW64 internals
- 2023-04-19 - WOW64 Callback Table - FinFisher
- 2025-04-16 - Control Flow Hijacking via Data Pointers
πŸ”₯30❀5πŸ€“1
Earlier today we shared some information on a CEO of a cybersecurity company in Oklahoma, United States, allegedly intentionally deploying malware to a healthcare facility in Oklahoma City.

More details have been presented which paint a different picture than what was originally shared and it kind of complicates the issue presented.

Jeffrey Bowie, the Chief Executive Officer of cybersecurity firm Veritaco, had a warrant for his arrest issued by the United States Federal Bureau of Investigation for allegedly intentionally deploying malware to a client of Veritaco (St. Anthony Hospital). Interestingly, the FBI did not immediately notify Mr. Bowie of the arrest warrant β€” however they DID notify local media new stations. Mr. Bowie was informed of his arrest warrant by friends, family, and colleagues rather than law enforcement themselves.

Mr. Bowie has publicly released the "source code" of the malware allegedly deployed on the healthcare facility (attached image). The "malware" is a powershell script which takes images of the desktop computer every 20 seconds then sends the images back to a remote server owned by Mr. Bowie. The powershell script was deployed onto 2 machines in the healthcare facility and set to run via Windows task scheduler.

Mr. Bowie asserts the endpoint the "malware" sends data to was terminated in August, 2024. Hence, the code present is basically worthless.

1 of the computers (Computer "A") was publicly accessible and specifically designated for guests to use.

The 2nd computer (Computer "B") remained unlocked (???) was designated for sending and receiving PHI (?). Mr. Bowie asserts "unlike Computer A, no software was written."[sic]

Mr. Bowie has (as of this writing) not explicitly stated why the powershell script took screenshots every 20 seconds. Additionally, no details have been shared as to how long this "malware" has been present on machines.

Mr. Bowie asserts local media outlets have defamed his character and has stated he has placed his faith in judicial system and God to deem him not guilty of any wrong doing.

Image 1. of "malware" source code
Image 2. of him informing the hospital he has removed the "malware" from the 2nd computer
🀣68πŸ€”11πŸ‘8😒5❀2🀯2πŸ’―1