@_t_tani Profile picture

t-tani

@_t_tani

Research Engineer/Malware Analyst/Forensic Investigator/ Speaker at CODE BLUE, BSidesLV, BlackHat USA Arsenal, PHDays and, Virus Bulletin, Botconf

Similar User
_roku_ photo

@00001B1A

ハマショー2 photo

@hamasho_2

tadmaddad photo

@tadmaddad

soji256 photo

@soji256

Shusei Tomonaga photo

@shu_tom

Yusuke Karasawa/ 唐沢勇輔 photo

@tsukarata

anemone_fish photo

@anemone_fish

抹茶シェイク photo

@matcha_shake

dsasaki photo

@dsasaki5

にほんももんが photo

@nhnmomonga

にのせき photo

@ninoseki

kasasagi09 photo

@kasasagi_ta

解析mob photo

@chayakonanaika

やまざきkei5 photo

@ymzkei5

tachi4439 photo

@tachi4439

t-tani Reposted

Our malware detection tool YAMA, which can scan memory based on your own YARA rule, is now available! Don't miss out on JPCERT/CC's presentation about the tool at #BlackHatUSA Arsenal at 10am on 9 Aug. ^MT blogs.jpcert.or.jp/en/2023/08/yam… github.com/JPCERTCC/YAMA


t-tani Reposted

2023年1月25-26日(水、木)にJSAC2023を開催します。そして、本日からCFP・CFWの募集を開始しました。今回から発表未経験者枠やLIGHTNING TALK枠を新設しております。みなさまのご応募お待ちしております。^AS #JSAC2023 jsac.jpcert.or.jp


t-tani Reposted

Here's our YARA rule to detect APT10, APT29, BlackTech, Darkhotel, DragonOK, Lazarus, Tick and others. github.com/JPCERTCC/jpcer…


t-tani Reposted

Today I've launched malapi.io. I've been analyzing malware source code that utilizes WinAPIs and have been categorizing them. Please feel free to contribute as I know the current list is not exhaustive.


t-tani Reposted

New release: #TinyTracer (2.0) - allows to trace also indirect calls to local functions: github.com/hasherezade/ti…

Tweet Image 1

t-tani Reposted

Our preprint is available here: phanivadrevu.com/files/papers/p… Please reach out with any questions. Also, do attend our presentation which is scheduled for Track-1 on August 13th (Friday) at 11:15 PDT.


t-tani Reposted

Analyzing Malicious Documents Cheat Sheet has been updated to include new tools and techniques: zeltser.com/analyzing-mali…


t-tani Reposted

IDAPython script deobfuscating ADVobfuscator strings, applied to a TrickBoot sample github.com/TakahiroHaruya… We may not be able to reuse it for a different sample that was compiled with a different compiler or with different flags but I think the same approach can be applied.


t-tani Reposted

NSRLJP_202104 released. It’s been 2 years since I updated last time :) kazamiya.net/en/NSRLJP #DFIR


t-tani Reposted

Tenet is an #IDAPro plugin for exploring execution traces. The goal of this plugin is to provide more natural, human controls for navigating execution traces against a given binary. Check it out: blog.ret2.io/2021/04/20/ten… #reverseengineering #idapython


t-tani Reposted

国内で発生した攻撃グループLazarusによる攻撃で使用されたマルウェア、ツールについてまとめました。IoC情報も記載していますので、ご活用ください。^ST blogs.jpcert.or.jp/ja/2021/03/Laz…


t-tani Reposted

I am pleased to announce the release of DFIR-O365RC: A #PowerShell module to help the #DFIR analyst collect logs for #Office365 investigations. github.com/ANSSI-FR/DFIR-…

Tweet Image 1

t-tani Reposted

#JSAC2021 の全講演動画をYouTubeにアップロードしました。ご参加いただけなかった皆様、ぜひご覧ください。 ^ST youtube.com/playlist?list=…


t-tani Reposted

非公開にして、EmoCheck v2.0のソースコードを公開しました。 ^ST github.com/JPCERTCC/EmoCh…


t-tani Reposted

I've updated the #YARA performance guidelines with input from Arnim Rupp Guidelines github.com/Neo23x0/YARA-P… We've been working on Panopticon, a YARA performance measurement tool & Arnim improved the guide according to new findings github.com/Neo23x0/panopt…

Tweet Image 1

t-tani Reposted

domain-fronted Cobalt Strike team servers since 2020/02 (MS Azure and Fastly) github.com/carbonblack/ac… I hope they will block it


t-tani Reposted

New release: #pe_to_shellcode (#pe2shc) - added DCP support: now the generated shellcode can be injected into a processes with DCP ( "Dynamic Code Prohibited" ) enabled github.com/hasherezade/pe…

Tweet Image 1

t-tani Reposted

"Knock, knock, Neo. - Active C2 Discovery Using Protocol Emulation" #JSAC2021 slides jsac.jpcert.or.jp/archive/2021/p… Cobalt Strike team servers with leaked/cracked IDs (over 3,200, 51% of the total) github.com/carbonblack/ac…


t-tani Reposted

Bye-bye botnets👋 Huge global operation brings down the world's most dangerous malware. Investigators have taken control of the Emotet botnet, the most resilient malware in the wild. Get the full story: europol.europa.eu/newsroom/news/…

Tweet Image 1

t-tani Reposted

EmoCheck v2.0をリリースしました。新しいバージョンでは、2020年12月以降に登場した新しいEmotetも検知できるように対応しています。 github.com/JPCERTCC/EmoCh…


Loading...

Something went wrong.


Something went wrong.