@ak100117 Profile picture

ak1001

@ak100117

Malware Analyst | Reverse Engineer | Security Research https://t.co/Kq7TRiAQM0

Joined February 2021
Similar User
CyberSpooon photo

@CyberSpooon

SC photo

@infinitywarrio7

liquidmvmt photo

@Iiquidmvmt

Ali Aqeel photo

@aaqeel87

niko34🌟 photo

@okinom

outhex photo

@outhex2

ak1001 Reposted

🚨 Cybercriminals exploit Spotify for #malware distribution. 🎵 Why? Spotify has a strong reputation and its pages are easily indexed by search engines, making it an effective platform to promote malicious links.

Tweet Image 1

ak1001 Reposted

This is probably the simplest case where we see "JUMPOUT" statements, and the solution for such a case is really easy. #ida #reversing

Tweet Image 1

ak1001 Reposted

🚨 @UHC is hiring a Senior Malware Analyst! 🚨 If analyzing malware is your mission, apply now: careers.unitedhealthgroup.com/job/20783386/s… This is a remote role, but candidates must be located in the U.S. Not for you? Please retweet – this might be the opportunity one of your followers has been…

Tweet Image 1

ak1001 Reposted

#Hunting Malware Samples Starting from one domain Relations 🔅virustotal.com/gui/domain/pub… 🔱Related Samples Collection bazaar.abuse.ch/browse/tag/pub… 🔆Related Urls urlhaus.abuse.ch/browse/tag/pub…

Tweet Image 1
Tweet Image 2
Tweet Image 3

ak1001 Reposted

Huge thanks to @vinopaljiri for his ConfuserEx2 deobfuscation tools—worked flawlessly on a recent sample! 🔥 Check out his detailed walkthrough: youtu.be/y_ma9cLFdmY?si… and the tools: github.com/Dump-GUY/Confu…


ak1001 Reposted

I created a new repo where I will be uploading fully annotated IDBs of interesting samples that I analyzed, check out my fully annotated IDB for APT41 StealthVector. github.com/Blu3Eye/Malwar…


ak1001 Reposted

We have uploaded the workshop materials from our REcon 2024 workshop on Automating Malware Deobfuscation with Binary Ninja. The slides, workshop manual and code can be found here: cfp.recon.cx/recon2024/talk… thank you again to all those who attended!


ak1001 Reposted

Initial Sample Traneasy 易翻译助手 3.2.3f.msc MD5 271dea4d0bdfa80e4ad01257508571cc ❇️AnyRun #SilverFox app.any.run/tasks/f9aff535… Samples bazaar.abuse.ch/browse/tag/118…

Tweet Image 1
Tweet Image 2
Tweet Image 3

ak1001 Reposted

Something a bit different for you all this time round, as we ask is the CCP the biggest APT? intrusiontruth.wordpress.com/2024/08/07/is-…


ak1001 Reposted

The eighth article (62 pages) of Malware Analysis Series (MAS) is available on: exploitreversing.com/2024/08/07/mal… I am actively writing the following articles: 01. ER_03 (Hyper-V) 02. ER_04 (MacOS/iOS) My focus is on writing articles in the Exploiting Reversing series (ERs), which is a…

Tweet Image 1

ak1001 Reposted

#Lumma Stealer has now opened a "Log Market" where Lumma operators (with an storefront code) can sell its own logs directly from their panel. Purchase is made through crypto deposits in BTC or ETH addresses. Currently there's ~5700 logs at sale from unkown vendors

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

ak1001 Reposted

Styx Stealer 7ef60ef8045c6bb90eaaf66e2c1c4954 #StyxStealer #Stealer #IOC

Tweet Image 1
Tweet Image 2
Tweet Image 3

ak1001 Reposted

#MustangPanda is abusing Azure for distributing #PlugX🤔 CC: @MsftSecIntel virustotal.com/gui/file/ca0df…

Tweet Image 1

ak1001 Reposted

🚨 New blog! We just published research on an APT41 campaign targeting a Taiwanese government-affiliated research institute. Great team work with @joeychennogg @_vventura!! #Shadowpad #CobaltStrike #APT41 blog.talosintelligence.com/chinese-hackin…


ak1001 Reposted

Published detection for CVE-2024-38112, which involves a .url shortcut containing mhtml and !x-usc, allowing websites to be opened with Internet Explorer.

Tweet Image 1

ak1001 Reposted

We've uploaded the x86 Assembly Primer lecture from the Introduction to Malware Binary Triage course. This provides an overview of the x86 assembly language, memory structures and calling conventions. Enjoy! youtu.be/dunhGOubqKc


ak1001 Reposted

⚠ As expected, the incident with #CrowdStrike has been exploited to distribute malware. 🎯 In our example, an archive containing #Hijackloader, which delivers #Remcos to the infected system, is downloaded into the system under the guise of a #hotfix. 💢 The name of the ZIP…

Tweet Image 1
Tweet Image 2

ak1001 Reposted

"Adobe-PDF-Viewer.js": 307d1fc0c524e69ce8c8fe8aa41d0b5d314fd9553f0138fdf370efacaa2e0c67 From: https://ainvestinternational[.]com/wp/Adobe-PDF-Viewer.js

Tweet Image 1

ak1001 Reposted

I've published my analysis of #StrelaStealer. Victims include those who utilize Thunderbird or Outlook 2016 email clients. This analysis delves into how StrelaStealer operates, including how the malware decrypts Outlook 2016 passwords. link.medium.com/sNnMKxy4hLb


United States Trends
Loading...

Something went wrong.


Something went wrong.