#malware-analysis โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #malware-analysis, aggregated by home.social.
-
We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Middle East!
Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!
Visit training.defcon.org to submit your trainer application for a two-day or three-day course by May 9, 2026.
https://training.defcon.org/pages/2026-middle-east-call-for-trainers#DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCONMiddleEast #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis
-
CW: Full toolkit (3 samples + scripts + YARA):(no download needed)
https://archive.org/details/500ms-supply-chain-verification-toolkit
The name references Andres Freund's 500ms SSH delay that uncovered the
XZ backdoor.The core finding: JsonSchema.Net.dll shipped in Microsoft's
DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
release. It has a PE timestamp of year 2095. And it's signed by
Microsoft's HSM.You can verify this on your own Windows 11 machine without downloading
anything from me:Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"
Compare with NuGet official: https://www.nuget.org/packages/JsonSchema.Net/7.2.3
The toolkit also includes anomalies in Google's cloudcode_cli (104K
internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).๐ 500ms โ Supply chain anomalies in Windows 11 default binaries
JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
โ Hash โ any official NuGet release
โ PE timestamp: year 2095
โ Signed by Microsoft HSM post-modificationVerify on YOUR OWN Windows 11 (no download needed):
Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
Compare: nuget.org/packages/JsonSchema.Net/7.2.3#infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics
-
Tried to book a bar. Ended up reverse engineering a malware campaign instead.
A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:
XOR-obfuscated script
Payload delivery
RedCap infostealer analysis
REMnux, Ghidra & Hybrid AnalysisAlso watched the infrastructure get taken down mid-write-up.
First time doing any RE
https://blog.michaelrbparker.com/post/17
(Still haven't booked that drink.)
-
๐ Just released smali-lsp!
A Language Server for Smali with:
โข Goto definition
โข Cross-references
โข Symbols & hover
โข Works with any IDE (minimal setup)Also includes an MCP server โ plug into AI agents for faster APK analysis ๐ค
๐ https://github.com/Surendrajat/smali-lsp
#AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik
-
#ReverseEngineering mit #KI? @martin_fmi erklรคrt, wie #LLMs Malware-Muster erkennen, externe Systemaufrufe rekonstruieren & versteckte Architekturen sichtbar machen. Selbst bei obfuskiertem Code.
Lesen & auf den Ernstfall vorbereiten: https://javapro.io/de/ki-gesteuertes-reverse-engineering-von-java-anwendungen/
-
APT37โs Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.
Observed tradecraft includes:
โข LNK-based initial execution
โข Embedded PowerShell payload extraction
โข Ruby interpreter abuse (v3.3.0)
โข Scheduled task persistence (5-minute interval)
โข USB-based covert bidirectional C2
โข Multi-stage backdoor deployment
Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.The removable media relay model enables:
โ Command staging offline
โ Data exfiltration without internet access
โ Lateral spread across isolated systems
โ Surveillance via Windows spyware
This reinforces a critical point:
Air-gap controls must extend beyond physical disconnection โ including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.Are critical infrastructure operators prepared for USB-mediated C2 relays?
Engage below.
Follow TechNadu for high-signal threat intelligence insights.
Repost to elevate awareness.#Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture
-
RE: https://infosec.exchange/@washi/116109971111061839
MY MORTAL ENEMY IS THAT ONE zgRAT YARA RULE IT SHOWS UP FREAKING EVERYWHERE AND IS SO WRONG ASDHFJDSHFHASFHSDJAH
thank you for this Washi! I learned some things about .NET from this post as well!
popping on the #ReverseEngineering #MalwareAnalysis tags too
-
REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโanalisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
-
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐ Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)Description:
"๐๐ถ๐ด๐ต-๐ฃ๐ข๐ด๐ฆ๐ฅ ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ช๐ด ๐ข ๐จ๐ณ๐ฐ๐ธ๐ช๐ฏ๐จ ๐ต๐ฉ๐ณ๐ฆ๐ข๐ต. ๐๐ฆ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ช๐ฏ๐จ ๐๐ถ๐ด๐ต ๐๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ฆ๐ฒ๐ถ๐ช๐ฑ๐ด ๐ณ๐ฆ๐ท๐ฆ๐ณ๐ด๐ฆ ๐ฆ๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ด ๐ข๐ฏ๐ฅ ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ข๐ฏ๐ข๐ญ๐บ๐ด๐ต๐ด ๐ธ๐ช๐ต๐ฉ ๐ฆ๐ด๐ด๐ฆ๐ฏ๐ต๐ช๐ข๐ญ ๐ด๐ฌ๐ช๐ญ๐ญ๐ด ๐ง๐ฐ๐ณ ๐ต๐ข๐ค๐ฌ๐ญ๐ช๐ฏ๐จ ๐ข ๐ฏ๐ฆ๐ธ ๐ค๐ฉ๐ข๐ญ๐ญ๐ฆ๐ฏ๐จ๐ฆ. ๐๐บ๐ฏ๐ข๐ฎ๐ช๐ค ๐ฃ๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ข๐ณ๐ฆ ๐ช๐ฏ๐ค๐ณ๐ฆ๐ข๐ด๐ช๐ฏ๐จ๐ญ๐บ ๐ฎ๐ฐ๐ท๐ช๐ฏ๐จ ๐ต๐ฐ๐ธ๐ข๐ณ๐ฅ๐ด ๐๐ถ๐ด๐ต, ๐บ๐ฆ๐ต ๐ณ๐ฆ๐ท๐ฆ๐ณ๐ด๐ฆ ๐ฆ๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ด ๐ญ๐ข๐ค๐ฌ ๐ต๐ฉ๐ฆ ๐ด๐ฑ๐ฆ๐ค๐ช๐ข๐ญ๐ช๐ป๐ฆ๐ฅ ๐ฌ๐ฏ๐ฐ๐ธ๐ญ๐ฆ๐ฅ๐จ๐ฆ ๐ต๐ฐ ๐ฅ๐ฆ๐ค๐ฐ๐ฅ๐ฆ ๐ต๐ฉ๐ฆ๐ฎ. ๐๐ฉ๐ช๐ด ๐ง๐ช๐ณ๐ด๐ต-๐ฐ๐ง-๐ช๐ต๐ด-๐ฌ๐ช๐ฏ๐ฅ ๐ค๐ฐ๐ถ๐ณ๐ด๐ฆ ๐ฃ๐ณ๐ช๐ฅ๐จ๐ฆ๐ด ๐ต๐ฉ๐ข๐ต ๐ค๐ณ๐ช๐ต๐ช๐ค๐ข๐ญ ๐จ๐ข๐ฑ. ๐๐ฉ๐ณ๐ฐ๐ถ๐จ๐ฉ ๐ข ๐ญ๐ข๐ฏ๐จ๐ถ๐ข๐จ๐ฆ-๐ค๐ฆ๐ฏ๐ต๐ณ๐ช๐ค ๐ข๐ฑ๐ฑ๐ณ๐ฐ๐ข๐ค๐ฉ, ๐บ๐ฐ๐ถ'๐ญ๐ญ ๐ญ๐ฆ๐ข๐ณ๐ฏ ๐๐ถ๐ด๐ต ๐ง๐ถ๐ฏ๐ฅ๐ข๐ฎ๐ฆ๐ฏ๐ต๐ข๐ญ๐ด, ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅ ๐ฉ๐ฐ๐ธ ๐๐ถ๐ด๐ต ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ด ๐ต๐ณ๐ข๐ฏ๐ด๐ญ๐ข๐ต๐ฆ ๐ต๐ฐ ๐ข๐ด๐ด๐ฆ๐ฎ๐ฃ๐ญ๐บ, ๐ข๐ฏ๐ฅ ๐ฎ๐ข๐ด๐ต๐ฆ๐ณ ๐ฑ๐ณ๐ข๐ค๐ต๐ช๐ค๐ข๐ญ ๐ต๐ณ๐ช๐ข๐จ๐ฆ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ฒ๐ถ๐ฆ๐ด. ๐ ๐ฐ๐ถ'๐ญ๐ญ ๐ต๐ณ๐ข๐ค๐ฆ ๐ฅ๐ข๐ต๐ข ๐ง๐ญ๐ฐ๐ธ๐ด, ๐ช๐ฅ๐ฆ๐ฏ๐ต๐ช๐ง๐บ ๐ง๐ถ๐ฏ๐ค๐ต๐ช๐ฐ๐ฏ๐ข๐ญ๐ช๐ต๐บ, ๐ข๐ฏ๐ฅ ๐ฅ๐ฆ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต ๐ณ๐ฆ๐ข๐ญ ๐๐ถ๐ด๐ต ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ด๐ข๐ฎ๐ฑ๐ญ๐ฆ๐ด ๐ช๐ฏ ๐ข ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ถ๐ณ๐ฆ๐ฅ, ๐ฆ๐ง๐ง๐ช๐ค๐ช๐ฆ๐ฏ๐ต ๐ธ๐ข๐บ. ๐๐ฉ๐ฆ๐ต๐ฉ๐ฆ๐ณ ๐บ๐ฐ๐ถ'๐ณ๐ฆ ๐ข๐ฏ๐ข๐ญ๐บ๐ป๐ช๐ฏ๐จ ๐ณ๐ข๐ฏ๐ด๐ฐ๐ฎ๐ธ๐ข๐ณ๐ฆ ๐ฐ๐ณ ๐ข๐ฏ๐ข๐ญ๐บ๐ป๐ช๐ฏ๐จ ๐ญ๐ฆ๐จ๐ช๐ต๐ช๐ฎ๐ข๐ต๐ฆ ๐๐ถ๐ด๐ต-๐ฃ๐ข๐ด๐ฆ๐ฅ ๐ด๐บ๐ด๐ต๐ฆ๐ฎ๐ด, ๐บ๐ฐ๐ถ'๐ญ๐ญ ๐ฅ๐ฆ๐ท๐ฆ๐ญ๐ฐ๐ฑ ๐ต๐ฉ๐ฆ ๐ต๐ณ๐ข๐ฅ๐ฆ๐ค๐ณ๐ข๐ง๐ต ๐ฏ๐ฆ๐ฆ๐ฅ๐ฆ๐ฅ ๐ต๐ฐ ๐ฒ๐ถ๐ช๐ค๐ฌ๐ญ๐บ ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅ ๐ข๐ฏ๐ฅ ๐ฃ๐ณ๐ฆ๐ข๐ฌ ๐ฅ๐ฐ๐ธ๐ฏ ๐๐ถ๐ด๐ต ๐ฃ๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ธ๐ช๐ต๐ฉ ๐ค๐ฐ๐ฏ๐ง๐ช๐ฅ๐ฆ๐ฏ๐ค๐ฆ."About the trainer:
Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.๐ Training details: https://nsec.io/training/2026-deconstructing-rust-binaries/
#NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering
-
The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: https://zeltser.com/ai-malware-analysis-remnux
Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.
#malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI
-
Malware W32/SkyAI uses AI? So do I.
#malwareanalysis #reverseengineeringhttps://cryptax.medium.com/w32-skyai-uses-ai-so-do-i-d33f04d63534
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules