@greenplan_it Profile picture

Greenplan

@greenplan_it

Malware Researcher and Threat Intelligence Analyst

Joined October 2023
Greenplan Reposted

1/X Here's some details on recent SOCGholish / FakeUpdates initial infections and the TDS (Keitaro?) that goes along with it. This loader uses compromised sites to display a fake "browser update" themed lure that, when clicked, downloads the malware.

Tweet Image 1

Emmenhtal Loader (PEAKLIGHT, MustardSandwich) is now "impersonating" Microsoft CertUtil app.any.run/tasks/37ea224d…

Tweet Image 1

Very great resource for those who track ClearFake/ClickFix!!

🔍 TDR investigated the emerging #ClickFix social engineering tactic, which several intrusion sets adopted in 2024 to distribute their malware. Our research provides a chronological overview of the observed ClickFix campaigns and their victimology. blog.sekoia.io/clickfix-tacti…

Tweet Image 1


Greenplan Reposted

New Blog: Deobfuscating BBTok loader, ConfuserEx variant with dnlib, Python and PowerShell by @marius_benthin and me #GDATATechblog #GDATA @GDATA #BBTok gdatasoftware.com/blog/2024/09/3…


Greenplan Reposted

We are now tracking 7 loader families across 68 active botnets. The most recent addition, not going to name fingers and point names but here is a hint: 🧹 📈Since May 2024 we have observed 21,256 payloads and 4,883 tasks🕵️‍♂️

Tweet Image 1

Greenplan Reposted

I have spent the last year building MalSearch the world's largest Malware Source Code Search Engine.🔥🔥 We are planning to add thousands of malware source code projects over the next couple months. Check it out: malsearch.com

Tweet Image 1

Greenplan Reposted

Unpacking SSLoad: A #Rust loader with diverse delivery methods, new elusive loaders, implementation of dead-drop sites, multiple string decryption, and anti-debugging techniques. Dive into our detailed analysis of its loaders and payloads: intezer.com/blog/research/…

Tweet Image 1
Tweet Image 2
Tweet Image 3

Greenplan Reposted

✍️My quick note about #DarkGate 📕How to extract AutoIt script and deobf to recover original code. 📕How to extract shellcode loader. 📕How to decrypt and extract the final #DarkGate payload. kienmanowar.wordpress.com/2024/06/06/qui…


Greenplan Reposted

As part of Operation Endgame we shared an initial one-off Special Report on IcedID/Latrodectus bot infections: shadowserver.org/what-we-do/net… Dashboard map view: dashboard.shadowserver.org/statistics/com… Details on Operation Endgame coordinated by @EC3Europol: europol.europa.eu/media-press/ne…

Tweet Image 1

Greenplan Reposted

Wrote a quick blog post to document the recent change of #Gootloader's C2. I also included a rough timeline of their infrastructure changes since November 2022. gootloader.wordpress.com/2024/05/30/goo…


Greenplan Reposted

Hunt APTs by their images & artifacts! New blog on tracking adversaries using delivery-stage intel by @Joseliyo_Jstnk: blog.virustotal.com/2024/05/tracki…

Tweet Image 1

Greenplan Reposted

🦔 📹 New Video: D3fack loader analysis ➡️ Inno Setup pascal script analysis ➡️ string deobfuscation with binary refinery ➡️ JPHP decompilation Sample was first described by @RussianPanda9xx youtube.com/watch?v=y09Zre… #MalwareAnalysisForHedgehogs #D3fackLoader


United States Trends
Loading...

Something went wrong.


Something went wrong.