@JackLy09280371 Profile picture

Chí Thành 🇻🇳

@JackLy09280371

Try to learn about Malware Analysis, Reverse Engineering

Similar User
Huong Lan photo

@huongntl31

Akai 🇻🇳 photo

@KMA_Akai

Eric Hoang photo

@erichoang851

Harry Ha photo

@cookiehanhoan

Trung Le (con cá nhỏ) photo

@c0nc4nh0

wildcat photo

@tacbliw

Nguyễn Đình Biển photo

@biennd279

HuyNguyen photo

@n1c3gu7

🥚Sam Nguyen🥚 photo

@xamvi_

hades photo

@h4d3s101

Reisen_1943 photo

@1943Reisen

Chí Thành 🇻🇳 Reposted

.@TrendMicro kudos to the team that put this together. 180+ page report - Exploring forensic evidence and detection methods for remote monitoring and management (RMM) tooling. Also including common sync tools used in incidents. jsac.jpcert.or.jp/archive/2023/p… #DFIR #RMM

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Chí Thành 🇻🇳 Reposted

Malware: #Rhadamanthys & #XMRig found on @YouTube 🎥 🔗 Malicious software distribution: youtube.com/@Download-Link… 🖥️C2: 185.221.196[.81/api/endpoint.php 🐍 Hydra Panel: 185.221.196[.81/login.php 🔍 Analysis: tria.ge/231122-n8f3dac… 📊🔬

Tweet Image 1

I had a great time to learn how to deploy and use Timesketch. Honestly, I am parsing Windows event logs by Hayabusa and importing them to Timesketch. Unfortunately, the graph plugins do not work. I decided to customize the plugin to work. github.com/n0bit4lsm3/Tim…


Chí Thành 🇻🇳 Reposted

Happy to share the release of my latest plugin for IDA Pro 🎉 - a tool for demangling Rust & Normalizing function names to make Reversing easier. github.com/timetravelthre…


Chí Thành 🇻🇳 Reposted

📭We've added a PoC exploit msg file for CVE-2023-23397 here (UNC path is localhost!): delivr.to/payloads?id=49… 🔍 There's also a yara rule in our detections repo that identifies the PidLidReminderFileParameter set in a msg Appointment file: github.com/delivr-to/dete…

Tweet Image 1
Tweet Image 2

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

Tweet Image 1


Chí Thành 🇻🇳 Reposted

A powerful and open-source toolkit for hackers and security automation github.com/We5ter/Scanner…

Tweet Image 1

Chí Thành 🇻🇳 Reposted

I created a repository containing samples of code that explain the basic implementation of COM objects. If you have any feedback, please let me know. #cpp #windows #lowlevel github.com/0xMegaByte/COM…


Chí Thành 🇻🇳 Reposted

How to analyse malicious MSI files E.g. this Magniber MSI virustotal.com/gui/file/fd597… It consists mostly of zeroes. 1. step: Unpack with 7zip. Among the unpacked files is a x64 DLL named "djrbwtwujn" But how is this DLL called?

Tweet Image 1

Chí Thành 🇻🇳 Reposted

🐞 Malware Development for Dummies In the age of EDR, red team operators cannot get away with using pre-compiled payloads anymore. As such, malware Slides: github.com/chvancooten/ma… Exercises: github.com/chvancooten/ma… #maldev #csharp #nim


Chí Thành 🇻🇳 Reposted

1\ #ThreatHunting: How to detect Linux anti-forensics log tampering Attackers can alter the utmp, wtmp, btmp files to hide malicious logon attempts by: > Zeroing entries out in hex > Overwriting the files with a malicious copy BLOG POST BELOW 👇 UwU inversecos.com/2022/06/detect…

Tweet Image 1
Tweet Image 2

Chí Thành 🇻🇳 Reposted

mitmhttp and mitmpcap tools to make capturing #malware TLS secrets and pcaps using #mitmproxy a breeze! gist.github.com/c3rb3ru5d3d53c… gist.github.com/c3rb3ru5d3d53c… Updated #KVM #Malware #Lab Guide: c3rb3ru5d3d53c.github.io/docs/kvm-malwa… TY to @reecdeep for the request Enjoy! 😇

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Ultimate #Malware #Analysis #KVM Guide ✅ PFSense Router ✅ Remnux VM as Gateway ✅ Windows Dynamic Analysis VM ✅ Spice Agent and Guest Tools ✅ Anonymous VPN Networking ✅ List Malware Analysis Tools (my top picks) c3rb3ru5d3d53c.github.io/docs/kvm-malwa…

Tweet Image 1


Chí Thành 🇻🇳 Reposted

ProcEnvInjection - Remote code injection by abusing process environment strings in CreateProcess. Another method of injecting code into a remote process without using WriteProcessMemory. 🙂 x86matthew.com/view_post?id=p…


Chí Thành 🇻🇳 Reposted

unlicense - A dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x. Version 0.2.0 has been released. It adds support for DLL unpacking, .NET assembly unpacking (EXE only) and fixes a bug with some 2.x-packed EXEs. github.com/ergrelet/unlic…

Tweet Image 1

Chí Thành 🇻🇳 Reposted

I was playing around with @_JohnHammond fantastic POC for msdt/Follina on an endpoint with an EDR installed to see what's up and it pointed me towards this Registry key. I was not aware of it, but it seems to logs connections that are made by Office. General #DFIR Tip?

Tweet Image 1
Tweet Image 2

Chí Thành 🇻🇳 Reposted

Process_Overwriting - Yet Another Variant Of Process Hollowing dlvr.it/SRG5tv #Process #Process_Overwriting #Windows

Tweet Image 1

Chí Thành 🇻🇳 Reposted

1\ #ThreatHunting: How to detect fileless Linux malware Look for processes in /proc/<PID>/exe where the path shows "(deleted)" Here are two examples👇 1. BPFDoor deleted binary 2. An attacker abusing memfd_create() to exec their malware in RAM w/o dropping files to disk.

Tweet Image 1
Tweet Image 2

Chí Thành 🇻🇳 Reposted

⚠️New blog post: The Lotus Panda is awake, again. Analysis of its last strike. #APT #malware #cybersecurity cluster25.io/2022/04/29/lot…


Chí Thành 🇻🇳 Reposted

Email header analysis for SOC Analysts

Tweet Image 1

Chí Thành 🇻🇳 Reposted

Analyzing a Stealer MSI using msitools, by @ForensicITGuy #DFIR forensicitguy.github.io/analyzing-stea…


Chí Thành 🇻🇳 Reposted

Emotet Loader Technical Analysis nikpx.github.io/malware/analys…


Loading...

Something went wrong.


Something went wrong.