🔥 Burn Fat Fast. Discover How! 💪

Malware News

Logo of telegram channel malwr — Malware News M
Logo of telegram channel malwr — Malware News
Channel address: @malwr
Categories: Technologies
Language: English
Subscribers: 3.00K
Description from channel

The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...
Partner channel: @cveNotify
Contact: @SirMalware

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

1


The latest Messages 98

2021-03-03 20:48:16 Wubes is like Qubes containerization for Windows 10. It uses the Windows 10 sandboxing technology to isolate applications - the initial release supports Firefox..
digicat


@malwr
113 views17:48
Open / Comment
2021-03-03 20:39:24 Does an OS update change the user account creation date? User insists OS was not changed but feature update done so it affected the user creation date show in the SAM registry
Is this possible?
netau20

Yes. Windows updates can screw with lots of timestamps, including the account creation date.
lithium630

What OS are we talking about? Windows 10 (without much else info, I'll just guess that since most home PCs seem to be using it now...)

Check the registry for some additional information. System -> Setu. In there you'll see something along the lines of "Source OS (Updated on...) which will show you each update of the OS.

To get the original date of the OS install, go to Sam -> Domains -> Account. You should see two values... "F" and "V". In the F value you're going to highlight and sweep values 08 through 15 (this will be a total of 8 hex values.) Decode those in Windows 64-bit LE and you'll have the original time of the OS installation.

So that should give you the original install along with every update. And that should give you a clearer picture of what exactly is going on.
Bad_Grammer_Girl

Are you using something like RegRipper against a local user account on a Windows machine?
shinyviper


@malwr
96 views17:39
Open / Comment
2021-03-03 20:34:17 APKLeaks - Scanning APK file for URIs, endpoints & secrets
dwisiswant0


@malwr
99 views17:34
Open / Comment
2021-03-03 20:31:23 Windows Killed Process Canary - A Windows Service to detect if it has been shutdown and hibernate if multiple instances are (detecting i.e. Ryuk acitivity)
darronofsky


@malwr
93 views17:31
Open / Comment
2021-03-03 19:17:15 Py Cheatsheet, good luck; everyone starts somewhere.
Mav123005


@malwr
105 views16:17
Open / Comment
2021-03-03 15:44:39 Setting up a windows VM for hacking
I just got a new gaming laptop with an 8 core processor so now I want to get started with hacking. I want to run a few VMS and try to hack them with kali or parrot os, Ill start slow with dated OS like Windows 7, Vista and 8 etc. But how can I get a windows 8 VM file ? For those who do this how do you get them. Also for you veterans is this a good way to start? Thanks!
SpaceGhost113

This is where I prefer to go, it's the only place that I have found for a Windows XP ISO file to play with. I don't know about the software that they are posting though...

https://isoriver.com/category/windows/windows-xp/
jdicker2

https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/
AlfredoVignale


@malwr
118 views12:44
Open / Comment
2021-03-03 15:38:44 HAFNIUM targeting Exchange Servers with 0-day exploits - Microsoft Security
dmchell


@malwr
107 views12:38
Open / Comment
2021-03-01 21:27:50 Codejack (aka Remcos) Analysis Paper

https://preview.redd.it/isy4md73obk61.png?width=1777&format=png&auto=webp&s=3e824ddf086b4f56d8979cab3717caee631039ce
dkaye_mal_anst18

This one is for sure a improvement of your last one I like it.
Wouldratherplaymtg

Here is a pdf copy of this document: https://www.dropbox.com/s/3a0slxf0qtec752/Codejack\_analysis\_paper.pdf?dl=0. I am open to alternatives if you don't feel comfortable with a dropbox link :)
dkaye_mal_anst18


@malwr
82 viewsedited  18:27
Open / Comment
2021-03-01 21:24:25 DFIR Post-Mortem Report Writing
Hi,

I wanted to seek some input or available examples of DFIR Post-Mortem report writing relating to attacks such as ransomware etc.

What granularity of detail do you go into?

For example, is it better to go event by event such as:

On the server named Domain Controller One the following actions occurred:

RDP Brute force identified from external IP starting at 02:29 UTC
Tools downloaded via PowerShell at 02:44 UTC
Network Enumeration tool executed at 02:48 UTC
Procmon.exe executed at 03:00 UTC
Ransomware.exe executed at 03:07 UTC

Or

Is it better to provide a higher level synopsis such as:

On 1 August 2020, At 02:29 UTC a brute force attack was identified on Domain Controller one from the external IP x.x.x.x and successfully gained access at 02:40 UTC. Tools were dropped onto the machine at 02:44 UTC. Subsequently, evidence shows the network was scanned, processes examined and ransomware was executed encrypting all user files with specific extensions.

What are the advantages of going deeper? Will there be too much technical information for someone to understand?

I find it can sometimes lead to analysis paralysis, as in some cases you are dealing with multiple machines with numerous artifacts making it difficult to properly work out what has occurred while also keeping in mind what will the target audience actually find beneficial in knowing.

Any advice? and apologies for my two examples they are just to provide an idea of what I am thinking.
rorywag

We use both in our reports.

Executive Summary starts the report and serves as our high level synopsis. Then we will have one or two paragraphs on each stage of the incident or malware analysis. Finally, we close out with a review/round up with our evaluations/recommendations.

We include a timeline of events identified during the analysis. Ours is slightly different as it includes vulnerabilities (if applicable) and system build/implementation dates.
Farstone

Overall the client doesn't care about us showing how smart we are are
They want to know:

how the attacker got in (so they can fix it)

what the attacker did (what did they see, what did they leave behind, do they still have a problem)

what did the attacker take (reporting obligations)

They don't tend to care about the more specific or academic granularity of the attack unless it's going to help them answer the above.
randomaccess3_dfir

Always consider your audience. If this will be going to upper level executives, you're going want to at least have an executive summary in layperson's terms for them to read. Dig deeper in subsequent sections that people with more technical knowledge can read.

Back when I worked in law enforcement, the go to words of advice were to explain everything as though you are talking to a fifth grader. Obviously you want to be careful about insulting people's intelligence, but for the high level explanation, don't go into any more technical detail than is necessary to explain the series of events and subsequent steps taken.

Executives (usually) just want to get a high level understanding of what was impacted (services/applications, not ip addresses or host names), what data is or may have been compromised, whether the bleeding has been stopped, and what steps have or are going to be taken to prevent it from happening again.

For the technical audience, be thorough but also concise. Technical writing is an art form and you will pick up what works for you and your audience over time.
not_a_terrorist89


@malwr
67 views18:24
Open / Comment
2021-03-01 21:20:03 Azure Sentinel suspicious Microsoft Office activity rules
digicat


@malwr
68 views18:20
Open / Comment