@seanmw Profile picture

sean

@seanmw

UnpacMe | OALABS | Security Researcher

Joined May 2008
Similar User
herrcore photo

@herrcore

x64dbg photo

@x64dbg

UNPACME photo

@unpacme

Karsten Hahn photo

@struppigel

Duncan Ogilvie 🍍 photo

@mrexodia

Silas Cutler (p1nk) photo

@silascutler

REhints photo

@REhints

Malpedia photo

@malpedia

Chuong Dong photo

@cPeterr

Myrtus photo

@Myrtus0x0

Igor Kuznetsov photo

@2igosha

ANY.RUN photo

@anyrun_app

sysopfb photo

@sysopfb

MalShare photo

@mal_share

Paul Melson photo

@pmelson

sean Reposted

Here is a clip of me from earlier this year predicting that LLMs wouldn’t take any infosec jobs. I was wrong🧵


sean Reposted

AI-Powered Threat Reporting and Analysis... ATIP It's live now, check it out 🤖 blog.unpac.me/2024/11/25/ati…


sean Reposted

We're doing a Black Friday week sale and providing 15% off our Premium course bundle. With this you'll get access to both of our Introduction to Malware Binary Triage courses (IDA and Binary Ninja) and Premium benefits! Ends December 1. More details here: training.invokere.com/pricing

Tweet Image 1

sean Reposted

1/2 Payload statistics from October 2024 📊 We observed 373 tasks distributed by threat actors across the tracked botnets. This resulted in 4510 unique payloads. Top families: 1. #StealC 2. #Lumma 3. #Amadey 4. #VidarStealer 5. #SmokeLoader Unpacking & detection: @unpacme

Tweet Image 1

sean Reposted

HashDB Release 1.10.0 Now with support for IDA 9, and continued backwards compatibility all the way back to IDA 7.5 🙌 thanks to @plebourhis for the help!! github.com/OALabs/hashdb-…


Imagine no zoom meetings 📈

Imagine how much innovation could be unlocked if there was a nice JS SDK that allowed a HTML Canvas element to join a zoom meeting or Google meet.



This is one of the reasons we started classifying legacy samples as #Zombieware. We've observed that many high volume feeds used by both researchers and academics contain a large % of legacy malware samples. We found it difficult to properly prioritize analysis of samples,…

I have looked at 2024 malware research papers in academia and found that none of them used today's relevant malware. Families they used were old worms and viruses that had been relevant decades ago and nowadays only thrive on sandbox systems.

Tweet Image 1
Tweet Image 2
Tweet Image 3


sean Reposted

Payload statistics from September 2024 📊 We observed 752 tasks distributed by threat actors across the tracked botnets. This resulted in 3841 unique payloads. Top families: 1. #StealC 2. #Amadey 3. #SmokeLoader 4. #VidarStealer 5. #Tofsee Unpacking and detection: @unpacme

Tweet Image 1

Damn...those new HexRay prices 📈😬


sean Reposted

🦺We’re seeing some processing issues that may impact overall analysis time. We’re looking into it and expect to have it resolved shortly.


sean Reposted

Last minute change in the schedule of BruCON 0x10. I will be presenting a workshop about LLVM for Reverse Engineers (introduction) brucon0x10.sched.com/event/60c6e638… @brucon


sean Reposted

Vibes

Tweet Image 1

sean Reposted

#BruCON0x10 training has been launched !


sean Reposted

Is this a new stealer technique or just something flying under the radar 🤔 - Open browser in kiosk mode (no escape) - Force user to enter Google creds - Steal them from the browser! cc @unpacme @LIA_Intel research.openanalysis.net/credflusher/ki…


sean Reposted

UNPACME 8.5.0 is live! ⚡️ MalwareID - a blazing-fast mode for quickly identifying and extracting malware configurations. 🔎 New Pivots and Improved Search 💾 Updated DiE Interface & Rules 🚀 Yara Hunt Improvements blog.unpac.me/2024/09/08/mal…


sean Reposted

Got a bit motivated by @herrcore stream to write another #Zharkbot Yara rule that hopefully works on new builds 😁 Hunt results from @unpacme : unpac.me/yara/hunt/resu… Rule reference: github.com/RussianPanda95…

Tweet Image 1

Notes are live, vod will be up by the weekend! research.openanalysis.net/zharkbot/triag…



sean Reposted

New #TinyTracer (2.8) is out: github.com/hasherezade/ti… - including some new AntiVm/AntiDebug bypasses, and other useful features 😊

Tweet Image 1

sean Reposted

New blog entry: C++ Unwind Metadata: A Hidden Reverse Engineering Bonanza msreverseengineering.com/blog/2024/8/20…

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.