home.social

#malware-analysis โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #malware-analysis, aggregated by home.social.

fetched live
  1. We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Middle East!

    Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!

    Visit training.defcon.org to submit your trainer application for a two-day or three-day course by May 9, 2026.
    training.defcon.org/pages/2026

    #DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCONMiddleEast #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis

  2. CW: Full toolkit (3 samples + scripts + YARA):(no download needed)

    archive.org/details/500ms-supp

    The name references Andres Freund's 500ms SSH delay that uncovered the
    XZ backdoor.

    The core finding: JsonSchema.Net.dll shipped in Microsoft's
    DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
    release. It has a PE timestamp of year 2095. And it's signed by
    Microsoft's HSM.

    You can verify this on your own Windows 11 machine without downloading
    anything from me:

    Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"

    Compare with NuGet official: nuget.org/packages/JsonSchema.

    The toolkit also includes anomalies in Google's cloudcode_cli (104K
    internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).

    ๐Ÿ” 500ms โ€” Supply chain anomalies in Windows 11 default binaries

    JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
    โ†’ Hash โ‰  any official NuGet release
    โ†’ PE timestamp: year 2095
    โ†’ Signed by Microsoft HSM post-modification

    Verify on YOUR OWN Windows 11 (no download needed):
    Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
    Compare: nuget.org/packages/JsonSchema.Net/7.2.3

    #infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics

  3. Tried to book a bar. Ended up reverse engineering a malware campaign instead.

    A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:

    XOR-obfuscated script
    Payload delivery
    RedCap infostealer analysis
    REMnux, Ghidra & Hybrid Analysis

    Also watched the infrastructure get taken down mid-write-up.

    First time doing any RE

    blog.michaelrbparker.com/post/

    (Still haven't booked that drink.)

    #CyberSecurity #MalwareAnalysis #ThreatAnalysis

  4. ๐Ÿš€ Just released smali-lsp!

    A Language Server for Smali with:
    โ€ข Goto definition
    โ€ข Cross-references
    โ€ข Symbols & hover
    โ€ข Works with any IDE (minimal setup)

    Also includes an MCP server โ†’ plug into AI agents for faster APK analysis ๐Ÿค–

    ๐Ÿ”— github.com/Surendrajat/smali-l

  5. #ReverseEngineering mit #KI? @martin_fmi erklรคrt, wie #LLMs Malware-Muster erkennen, externe Systemaufrufe rekonstruieren & versteckte Architekturen sichtbar machen. Selbst bei obfuskiertem Code.

    Lesen & auf den Ernstfall vorbereiten: javapro.io/de/ki-gesteuertes-r

    #MalwareAnalysis

  6. APT37โ€™s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

    Observed tradecraft includes:
    โ€ข LNK-based initial execution
    โ€ข Embedded PowerShell payload extraction
    โ€ข Ruby interpreter abuse (v3.3.0)
    โ€ข Scheduled task persistence (5-minute interval)
    โ€ข USB-based covert bidirectional C2
    โ€ข Multi-stage backdoor deployment
    Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

    The removable media relay model enables:
    โ€“ Command staging offline
    โ€“ Data exfiltration without internet access
    โ€“ Lateral spread across isolated systems
    โ€“ Surveillance via Windows spyware
    This reinforces a critical point:
    Air-gap controls must extend beyond physical disconnection โ€” including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

    Are critical infrastructure operators prepared for USB-mediated C2 relays?

    Source: bleepingcomputer.com/news/secu

    Engage below.

    Follow TechNadu for high-signal threat intelligence insights.
    Repost to elevate awareness.

    #Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

  7. RE: infosec.exchange/@washi/116109

    MY MORTAL ENEMY IS THAT ONE zgRAT YARA RULE IT SHOWS UP FREAKING EVERYWHERE AND IS SO WRONG ASDHFJDSHFHASFHSDJAH

    thank you for this Washi! I learned some things about .NET from this post as well!

    popping on the #ReverseEngineering #MalwareAnalysis tags too

  8. REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

    linuxeasy.org/remnux-8-la-nuov

  9. ๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

    ๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
    ๐Ÿ“Š Difficulty: Medium
    ๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

    Description:
    "๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ด ๐˜ข ๐˜จ๐˜ณ๐˜ฐ๐˜ธ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต. ๐˜‹๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜‰๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ฑ๐˜ด ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฆ๐˜ด๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ค๐˜ฉ๐˜ข๐˜ญ๐˜ญ๐˜ฆ๐˜ฏ๐˜จ๐˜ฆ. ๐˜‹๐˜บ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ค ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ฏ๐˜ค๐˜ณ๐˜ฆ๐˜ข๐˜ด๐˜ช๐˜ฏ๐˜จ๐˜ญ๐˜บ ๐˜ฎ๐˜ฐ๐˜ท๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฐ๐˜ธ๐˜ข๐˜ณ๐˜ฅ๐˜ด ๐˜™๐˜ถ๐˜ด๐˜ต, ๐˜บ๐˜ฆ๐˜ต ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ญ๐˜ข๐˜ค๐˜ฌ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ฅ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฎ. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต-๐˜ฐ๐˜ง-๐˜ช๐˜ต๐˜ด-๐˜ฌ๐˜ช๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ฃ๐˜ณ๐˜ช๐˜ฅ๐˜จ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ค๐˜ณ๐˜ช๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜จ๐˜ข๐˜ฑ. ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ข ๐˜ญ๐˜ข๐˜ฏ๐˜จ๐˜ถ๐˜ข๐˜จ๐˜ฆ-๐˜ค๐˜ฆ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ข๐˜ค๐˜ฉ, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ง๐˜ถ๐˜ฏ๐˜ฅ๐˜ข๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ญ๐˜ด, ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ญ๐˜ข๐˜ต๐˜ฆ ๐˜ต๐˜ฐ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ฎ๐˜ฃ๐˜ญ๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ด๐˜ต๐˜ฆ๐˜ณ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ต๐˜ณ๐˜ช๐˜ข๐˜จ๐˜ฆ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜ ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ต๐˜ณ๐˜ข๐˜ค๐˜ฆ ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ง๐˜ญ๐˜ฐ๐˜ธ๐˜ด, ๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ง๐˜บ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต ๐˜ณ๐˜ฆ๐˜ข๐˜ญ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ด๐˜ข๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ด ๐˜ช๐˜ฏ ๐˜ข ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ง๐˜ง๐˜ช๐˜ค๐˜ช๐˜ฆ๐˜ฏ๐˜ต ๐˜ธ๐˜ข๐˜บ. ๐˜ž๐˜ฉ๐˜ฆ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜บ๐˜ฐ๐˜ถ'๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ฐ๐˜ฎ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฐ๐˜ณ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ญ๐˜ฆ๐˜จ๐˜ช๐˜ต๐˜ช๐˜ฎ๐˜ข๐˜ต๐˜ฆ ๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ฅ๐˜ฆ๐˜ค๐˜ณ๐˜ข๐˜ง๐˜ต ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฒ๐˜ถ๐˜ช๐˜ค๐˜ฌ๐˜ญ๐˜บ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฃ๐˜ณ๐˜ฆ๐˜ข๐˜ฌ ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ."

    About the trainer:
    Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.

    ๐Ÿ”— Training details: nsec.io/training/2026-deconstr

    #NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering

  10. The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: zeltser.com/ai-malware-analysi

    Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.

    #malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI

  11. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules