mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

10K
active users

#malwareanalysis

2 posts2 participants0 posts today
Andreas Klopsch<p>🛠️ RIFT just got an upgrade!<br>Now supports FLIRT signature generation on Linux 🐧<br>Perfect for reverse engineering Rust malware 🦀<br>🔗 <a href="https://github.com/microsoft/RIFT" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/microsoft/RIFT</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/FLIRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLIRT</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a></p>
Cindʎ Xiao 🍉<p>Great analysis of the malware distributed with the esling-config-prettier NPM package compromise on Friday: <a href="https://c-b.io/2025-07-20+-+Install+Linters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">c-b.io/2025-07-20+-+Install+Li</span><span class="invisible">nters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition</span></a></p><p>By <a href="https://bsky.app/profile/c-b.io" rel="nofollow noopener" target="_blank">c-b.io on Bluesky</a> / <a href="https://x.com/cyb3rjerry" rel="nofollow noopener" target="_blank">cyb3rjerry on Twitter</a> :D</p><p><a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://infosec.exchange/tags/npmsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npmsecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a></p>
Br3akp0int<p>In this hashtag#Splunk Threat Research Team (STRT) blog, we take a close look at a malicious campaign that used a weaponized Inno Setup installer. This malicious installer runs Pascal scripts to download and install malware on victims’ computers.</p><p>We show how the attackers use services like TinyURL and Rentry to hide their activity and avoid detection. Our analysis follows the campaign up to the point where it uses the HijackLoader, a sophisticated shellcode, to load or deliver the final payload, which in this case is the Redline Stealer.</p><p>We also share the tactics, techniques, and procedures (TTPs) we identified, along with Splunk detection ideas to help spot events related to this threat. 😊 <br><a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detectionengineering</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p><p><a href="https://lnkd.in/dCTc6GZV" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dCTc6GZV</span><span class="invisible"></span></a></p>
Pyrzout :vm:<p>10 Best Free Malware Analysis Tools To Break Down The Malware Samples – 2025 <a href="https://cybersecuritynews.com/malware-analysis-tools/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/malware-</span><span class="invisible">analysis-tools/</span></a> <a href="https://social.skynetcloud.site/tags/CyberattackNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberattackNews</span></a> <a href="https://social.skynetcloud.site/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/Top10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Top10</span></a></p>

Just published version 1.16.6 of The Pdfalyzer, the surprisingly popular tool for analyzing (possibly malicious) PDFs I created after my own unpleasant encounter with such a creature. Includes a (kind of janky) #YARA rule for #GIFTEDCROOK infostealer PDFs.

* Github: github.com/michelcrypt4d4mus/p
* Pypi: pypi.org/project/pdfalyzer/
* Homebrew: formulae.brew.sh/formula/pdfal

#pypi#python#pdf

Sliver too mainstream? Cobalt Strike too patched? Say hello to Havoc.

@FortiGuardLabs just broke down a malicious Havoc C2 sample — and it’s bringing that open-source, post-exploitation energy with extra attitude.

Built for red teamers but abused by threat actors, this sample goes full dark mode:

  • Shellcode loader in C++
  • AES-encrypted payload
  • XOR junk code to slow reverse engineering
  • Dynamic API resolving
  • LOLBin delivery via regsvr32

It’s like someone asked: “What if malware devs went full GitHub?” (never go full GitHub)

🔗 Full breakdown:
fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Havoc ≠ harmless just because it’s open source
  • Monitor regsvr32, rundll32, mshta — Havoc loves its LOLBins
  • Watch for process injection + thread creation anomalies
  • Memory analysis > file-based detection here
  • Don’t assume your EDR is catching every beacon on port 443

Is it threat emulation or a real attack?

— Blue teamer having a full-blown identity crisis at 2am

Shoutout to @xpzhang and team for their amazing work!

No PE header? No problem.

@FortiGuardLabs dropped a deep dive into a malware sample dumped without a PE header — like a cybercriminal rage-quit halfway through packing their payload.

You ever load a binary in IDA and think, “Am I being punk’d?”
Yeah, it’s one of those samples.

This sample:

  • Reconstructs its own PE structure at runtime

  • Hides config data in obfuscated blobs

  • Uses anti-sandbox tricks to avoid analysis

  • Drops yet another info-stealer, because originality is dead

It’s engineered to break basic static analysis and dodge sandboxes like it’s speedrunning DEFCON CTF.

🔗 Full breakdown:
fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Static AV signatures won’t help here

  • Watch for suspicious memory allocations + hollowing patterns

  • Endpoint heuristics > file-based detection

  • Log your PowerShell and LOLBins — this thing probably brings friends

  • If your EDR cries when it sees raw shellcode, maybe give it a hug

🚨 0-day vibes from 2017? Yup, it’s still happening.

A malicious Excel file using CVE-2017-0199 is out here in 2025 dropping FormBook like it's a fresh mixtape.

The attack chain?

  • Macro-free Excel
  • Weaponized with remote .hta
  • Payload: Info-stealer FormBook

Despite being 7+ years old, this vuln still slaps in phishing campaigns — because patching is apparently a myth.

Full technical breakdown by @FortiGuardLabs: fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Watch your egress traffic
  • Harden Office apps
  • Monitor LOLBins (Living Off the Land Binaries)
  • Block outbound to shady IPs faster than your memes go viral

Don’t let your org get dunked on by a 2017 CVE in 2025. That’s not a good look.

Cybercrime group FIN6 (aka Skeleton Spider) is leveraging trusted cloud services like AWS to deliver malware through fake job applications.

Our latest analysis breaks down:
🔹 How attackers use LinkedIn & Indeed to build trust
🔹 The use of resume-themed phishing lures
🔹 Cloud-hosted infrastructure that evades detection
🔹 The delivery of the More_eggs backdoor via .LNK files
🔹 Key defense strategies for recruiters and security teams

This campaign is a masterclass in low-complexity, high-evasion phishing

📖 Read the full breakdown: dti.domaintools.com/skeleton-s

🧠💻 Tired of endless hours fighting with obfuscation techniques embedded inside of malware? Check out Anthony Galiette's #BSidesBoulder25 talk "AI-Assisted Reverse Engineering for Enhanced Malware Analysis, Deobfuscation, and Threat Coverage"! Anthony's talk provides a hands on approach to using GenAI to reduce analytic toil while reverse engineering malware, which explores three open-source tools that harness LLMs to supercharge malware triage, reverse engineering, and threat artifact extraction. Whether you're in IR, threat hunting, or detection engineering, this talk will show you how AI can help extract answers faster from binary hell. 🚀🔍 #BSides #BSidesBoulder #IncidentResponse #CyberSecurity #MalwareAnalysis #ReverseEngineering #LLM4Sec #BlueTeamPower

Check out our full schedule at bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: eventbrite.com/e/bsides-boulde

🧬 SmokeLoader evades detection by manually loading a clean copy of ntdll.dll, completely bypassing user-mode hooks placed by EDRs and debuggers.

This article breaks down how the malware sidesteps common monitoring techniques — a must-read for analysts tracking stealthy loader behavior.

🔗 malwareandstuff.com/examining-

Malware and Stuff · Examining Smokeloader’s Anti Hooking techniqueHooking is a technique to intercept function calls/messages or events passed between software, or in this case malware. The technique can be used for malicious, as well as defensive cases. Rootkits…

🕵️‍♂️ Ever wonder how cybercriminals weaponize PDFs? 💥

Check out Filipi Pires' #BSidesBoulder25 talk, "Structural Insights: PDF Analysis for Detecting and Defending Against Threats"! In his session, he’ll explore the structure of PDFs and how malicious payload can be hidden within them, provide guidance on identifying how Indicators of Attack (IOAs) found within them, and show you how to outsmart common obfuscation routines found in them. Come for the malware, stay for the live demos and defense tips! 📄 #CyberSecurity #PDFThreats #MalwareAnalysis #BSides #BSidesBoulder

Check out our full schedule at bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: eventbrite.com/e/bsides-boulde

bsidesboulder.orgSchedule Schedule is subject to change

🖥️ A new Windows-based Remote Access Trojan (RAT) has been exposed — and it’s unusually stealthy.

👉 It corrupts critical DOS + PE headers, making it difficult to analyze or reconstruct.
👉 It embeds inside dllhost.exe, communicates via encrypted C2, and runs multi-threaded client sessions.
👉 Researchers at Fortinet had to replicate the compromised system’s environment to finally analyze it.

🚨 This attack highlights how adversaries are evolving to evade both detection and reverse engineering.
⚠️ Organizations should ensure endpoint monitoring can catch process anomalies — not just file signatures.

#CyberSecurity 🛡️ #MalwareAnalysis 🔍 #WindowsSecurity 💻 #ThreatIntel 🌐
thehackernews.com/2025/05/new-

The Hacker NewsNew Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE HeadersMalware with corrupted DOS and PE headers evades detection for weeks, decrypts TLS-based C2 and enables full attacker control.

🔥 Hot off the presses!

DomainTools Investigations shares that a spoofed antivirus download page is delivering VenomRAT, StormKitty, and SilentTrinity—a powerful combo for credential theft, persistence, and long-term access.

🔎 We traced the infrastructure, payloads, and attacker tactics.

Full breakdown: dti.domaintools.com/venomrat/?