lade...
random avatar

thehellu - Network

Posts Subscribe

For incident responders investigating Shadowpad cases, remember to retrieve the volume serial number where #Shadowpad was deployed. The...

https://infosec.exchange/@thehel...

For incident responders investigating Shadowpad cases, remember to retrieve the volume serial number where was deployed. The first time the malware is run, it will delete the encoded payload file (<random name>.tmp), and encrypt it in the Windows registry using the volume serial number. Those can also be found in LNK and Prefetch files in case you don't have live access to the host anymore.
You can then use the VolumeID tool from Sysinternals to change the volume serial number of your virtual machine
learn.microsoft.com/en-us/sysi

20.2.2025 10:06For incident responders investigating Shadowpad cases, remember to retrieve the volume serial number where #Shadowpad was deployed. The...
https://infosec.exchange/@thehel...

We released a report on an updated version of #Shadowpad including anti-debugging features and new configuration structure, that in some...

https://infosec.exchange/@thehel...

We released a report on an updated version of including anti-debugging features and new configuration structure, that in some cases deploy a custom ransomware family. We have mainly seen the manufacturing industry being targeted in Europe and Asia trendmicro.com/fr_fr/research/

Orange Cyberdefense saw the same threat and named the ransomware "NailaoLocker" orangecyberdefense.com/global/ They share interesting thoughts on the motivations of the ransomware deployment, although they don't have the final answer. We also saw no financial gain for the threat actor

20.2.2025 10:03We released a report on an updated version of #Shadowpad including anti-debugging features and new configuration structure, that in some...
https://infosec.exchange/@thehel...

Intelligence Online links the MOONSHINE framework that we discussed in our Earth Minotaur report...

https://infosec.exchange/@thehel...

Intelligence Online links the MOONSHINE framework that we discussed in our Earth Minotaur report (trendmicro.com/en_us/research/) to a Chinese company intelligenceonline.com/surveil (article is free but needs registration to access it). Happy new year UPSEC ! 😘

29.1.2025 10:11Intelligence Online links the MOONSHINE framework that we discussed in our Earth Minotaur report...
https://infosec.exchange/@thehel...

Our latest report on a CN #APT targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time...

https://infosec.exchange/@thehel...

Our latest report on a CN targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time we realized it is likely related to the recent I-Soon company leaks. It discusses their TTPs and provides lots of IOCs trendmicro.com/en_us/research/
Targets are spread among 5 continents, although some countries are targeted more heavily: one country had 11 of its government entities compromised. Previous victims are used to compromise new ones by abusing their infrastructure to send spear-phishing emails or host malware.
Their favorite malware toolkit are Reshell, a basic .NET backdoor, and Xdealer, also named Dinodas RAT, two custom malwares. They also use the infamous , and . Many of their offensive and post-exploitation tools are retrieved from public sources.

18.3.2024 10:16Our latest report on a CN #APT targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time...
https://infosec.exchange/@thehel...

Virus Bulletin released my talk on a #Shadowpad sample delivered by a Pakistan governmental application named eOffice. It contains an...

https://infosec.exchange/@thehel...

Virus Bulletin released my talk on a sample delivered by a Pakistan governmental application named eOffice. It contains an analysis of the modified MSI installer, some tricks to pivot on old and new Shadowpad samples, an overview of the campaign, and attribution discussion youtube.com/watch?v=i52MH-YFEeo
The slides virusbulletin.com/uploads/pdf/ and paper virusbulletin.com/uploads/pdf/ are also available. In addition to what we published in July in our blog, the paper details our failed attempts to attribute this attack based on custom malware families and their links to other advanced threat actors

9.11.2023 15:12Virus Bulletin released my talk on a #Shadowpad sample delivered by a Pakistan governmental application named eOffice. It contains an...
https://infosec.exchange/@thehel...

We found a possible supply chain attack on eOffice application developed by Pakistan government. It delivers #Shadowpad with an updated...

https://infosec.exchange/@thehel...

We found a possible supply chain attack on eOffice application developed by Pakistan government. It delivers with an updated obfuscation and encryption scheme. The threat actor carefully chose the C&C to blend in legitimate network traffic trendmicro.com/en_us/research/
It is possible that the MSI installer could have been modified and then redistributed. However, as it was not publicly available at the time of the incident (September 2022), that would imply that the threat actor retrieved it from a PK gov entity before weaponizing it.

21.7.2023 10:16We found a possible supply chain attack on eOffice application developed by Pakistan government. It delivers #Shadowpad with an updated...
https://infosec.exchange/@thehel...

The slides https://botconf.eu/wp-content/uploads/2023/04/2023_5856_LUNGHI.pdf and video https://youtube.com/watch?v=713CsmcNE3o of my...

https://infosec.exchange/@thehel...

The slides botconf.eu/wp-content/uploads/ and video youtube.com/watch?v=713CsmcNE3o of my talk about TTPs are online. I discuss recent infection vectors (including a supply chain attack), the evolution of their malware toolkit and targeting, and explain how we attributed these campaigns to threat actor

2.5.2023 12:40The slides https://botconf.eu/wp-content/uploads/2023/04/2023_5856_LUNGHI.pdf and video https://youtube.com/watch?v=713CsmcNE3o of my...
https://infosec.exchange/@thehel...

My latest #APT research on #IronTiger (#APT27/#EmissaryPanda/#LuckyMouse) is out ! It includes analysis of a new version of SysUpdate ported...

https://infosec.exchange/@thehel...

My latest research on (/#EmissaryPanda/#LuckyMouse) is out ! It includes analysis of a new version of SysUpdate ported to Linux, a new communication protocol through DNS TXT requests, a VMProtect certificate compromise, and probable infection vector trendmicro.com/en_us/research/

1.3.2023 09:35My latest #APT research on #IronTiger (#APT27/#EmissaryPanda/#LuckyMouse) is out ! It includes analysis of a new version of SysUpdate ported...
https://infosec.exchange/@thehel...

Here we go again, someone uploading old APT samples to VT with different submitter IDs, changing the entry point with garbage content, thus...

https://infosec.exchange/@thehel...

Here we go again, someone uploading old APT samples to VT with different submitter IDs, changing the entry point with garbage content, thus generating a new hash. The files embed MS certificates, yet the signature is invalid. A quick script to filter these gist.github.com/thehellu/f4f7e
I have seen two certificates being used (again, thousands of files as you can see): virustotal.com/gui/search/sign virustotal.com/gui/search/sign
The script defines a time interval, and ignores the files that are signed by those certificates and that are valid, such as virustotal.com/gui/search/sign
Third time this year I see this kind of behavior... Probably the same person behind this "experiment", files being uploaded from US through the web GUI, with no name (appears as "file" in the Telemetry tab). If you want to see yourself, this is a threat actor's hash virustotal.com/gui/file/ef51b0, and this is a modified hash virustotal.com/gui/file/a3db5b

7.12.2022 13:19Here we go again, someone uploading old APT samples to VT with different submitter IDs, changing the entry point with garbage content, thus...
https://infosec.exchange/@thehel...

I created a quick n' dirty python3 script using vt-py (https://virustotal.github.io/vt-py/howtoinstall.html) that takes a hash and VT...

https://infosec.exchange/@thehel...

I created a quick n' dirty python3 script using vt-py (virustotal.github.io/vt-py/how) that takes a hash and VT API key as input, and checks whether the file has been uploaded between 2022-11-21 and 2022-11-25 and contains the calc.exe icon or the .benignb section gist.github.com/thehellu/f2fe4
Feel free to use it to triage your samples

25.11.2022 11:28I created a quick n' dirty python3 script using vt-py (https://virustotal.github.io/vt-py/howtoinstall.html) that takes a hash and VT...
https://infosec.exchange/@thehel...

For 2 days, someone has been uploading known #APT samples in PE format to #VirusTotal, with minor changes inside them. The VT submitter...

https://infosec.exchange/@thehel...

For 2 days, someone has been uploading known samples in PE format to , with minor changes inside them. The VT submitter changes frequently, the file hash is different, but most of the metadata is similar, leading to hundreds of Livehunt notifications 😢
I did a quick analysis, and found some info you might use to quickly triage those useless files and not waste time analyzing them:
Most of those executables have the legitimate Calc.exe icon, which means they all embed the same resource ! The following VT search query returns almost 10K files embedding that resource: virustotal.com/gui/search/reso
The same can be achieved using the main_icon_md5 VT modifier virustotal.com/gui/search/main
Some of the uploaded files did not embed this resource. I noticed they had a section named ".benignb", you can find them here: virustotal.com/gui/search/sect
Note that all of the files (with the icon or with the section) are uploaded with the name "file" in the Telemetry tab
I did not check the differences between former and modified files, but if this is the work of some researcher, I wish he/she will publish the results, in order to justify the wasted time for all the others 😅 I bet it is the same person that appended a Microsoft certificate to thousands of samples in September 🤓

24.11.2022 14:16For 2 days, someone has been uploading known #APT samples in PE format to #VirusTotal, with minor changes inside them. The VT submitter...
https://infosec.exchange/@thehel...

If you are like me and used Twitter to monitor specific keywords with Tweetdeck, just to find out there is no such thing as general keyword...

https://infosec.exchange/@thehel...

If you are like me and used Twitter to monitor specific keywords with Tweetdeck, just to find out there is no such thing as general keyword search in here, don't /ragequit yet.
AFAIK, you cannot search for a keyword on random users unless you favorited/boosted or have been mentioned in them. Which means you already read them and know about their existence in the first place, which is good for bookmarking, but useless for discovering relevant toots from random users.
However, there is a nice feature in the web advanced view (which you can enable in the "Appearance" preferences):
You get a 3 columns' view, one for notifications, one for your regular timeline, and the last one with the content of your choice: either federated timeline, local timeline, your DMs, etc ...
That's a nice first step, but there is still a lot of space wasted if you have a big screen and resolution.
Here comes the trick I just learned: if you search for a hashtag (let's say, ), you get some hashtags results. By clicking on the one you're interested in, it becomes the content of the 3rd column we mentioned before.
Then, if you click on the top-right icon, a "Pin" feature appears. A final click, and tadaaaa, now you have a 4th and permanent column with a hashtag you are interested in !
You can reproduce the same for any hashtag you want and finally have a reason to buy one of those giant screens :)

It does not match the Twitter keyword feature, but it's still nice. It also means that, as a toot writer, it is important to use relevant hashtags.

10.11.2022 16:33If you are like me and used Twitter to monitor specific keywords with Tweetdeck, just to find out there is no such thing as general keyword...
https://infosec.exchange/@thehel...

#introduction I have been working on targeted attacks for a long time now, first as an incident responder, and now doing threat intelligence...

https://infosec.exchange/@thehel...

I have been working on targeted attacks for a long time now, first as an incident responder, and now doing threat intelligence at Trend Micro.
I usually focus for a while on a threat actor, and when I feel I know enough, publish something about it. The fun part is that very often, while investigating a threat actor, you end up finding stuff on another one, which you can add to your TODO list once the current investigation is completed :)
BTW, this is a good reason to be careful with the attribution out there, infrastructure overlap and tool sharing are common stuff nowadays.

Some of my previous work on groups:

:
trendmicro.com/en_us/research/
:
trendmicro.com/fr_fr/research/
trendmicro.com/en_us/research/
/#Bahamut:
trendmicro.com/en_us/research/
A bit of all previous actors:
first.org/resources/papers/tal

:
trendmicro.com/en_us/research/
documents.trendmicro.com/asset

Maybe APT37 (unconfirmed):
trendmicro.com/en_us/research/

/#Tonto:
vb2020.vblocalhost.com/uploads
Operation DRBControl:
trendmicro.com/vinfo/us/securi
:
trendmicro.com/en_us/research/
trendmicro.com/vinfo/us/securi
/#EarthSmilodon:
trendmicro.com/en_no/research/
trendmicro.com/en_us/research/

10.11.2022 16:02#introduction I have been working on targeted attacks for a long time now, first as an incident responder, and now doing threat intelligence...
https://infosec.exchange/@thehel...
Subscribe
To add news/posts to your profile here, you must add a link to a RSS-Feed to your webfinger. One example how you can do this is to join Fediverse City.
         
Webfan Website Badge
Nutzungsbedingungen   Datenschutzerklärung  Impressum
Webfan | @Web pages | Fediverse Members