home.social

#magniber — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #magniber, aggregated by home.social.

  1. Proof of Concept: #Malware Delivery via #appx/#msix packages.
    In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

    We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

    Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
    twitter.com/f0wlsec/status/148

    Detection opportunities:
    - Execution out of C:\Program Files\WindowsApps\
    - Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

    We are going to publish our #Yara rules for this tomorrow, stay tuned.

  2. Proof of Concept: #Malware Delivery via #appx/#msix packages.
    In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

    We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

    Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
    twitter.com/f0wlsec/status/148

    Detection opportunities:
    - Execution out of C:\Program Files\WindowsApps\
    - Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

    We are going to publish our #Yara rules for this tomorrow, stay tuned.

  3. Proof of Concept: #Malware Delivery via #appx/#msix packages.
    In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

    We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

    Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
    twitter.com/f0wlsec/status/148

    Detection opportunities:
    - Execution out of C:\Program Files\WindowsApps\
    - Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

    We are going to publish our #Yara rules for this tomorrow, stay tuned.

  4. Proof of Concept: #Malware Delivery via #appx/#msix packages.
    In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

    We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

    Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
    twitter.com/f0wlsec/status/148

    Detection opportunities:
    - Execution out of C:\Program Files\WindowsApps\
    - Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

    We are going to publish our #Yara rules for this tomorrow, stay tuned.

  5. Proof of Concept: #Malware Delivery via #appx/#msix packages.
    In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

    We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

    Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
    twitter.com/f0wlsec/status/148

    Detection opportunities:
    - Execution out of C:\Program Files\WindowsApps\
    - Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

    We are going to publish our #Yara rules for this tomorrow, stay tuned.