UTC: 2024-01-03 12:01
virtualex-itv/chocolatey-packages
This file is automatically generated by the update_all.ps1 script using the AU module.
Ignored | History | Force Test | [Releases](https:
UTC: 2024-01-03 12:01
virtualex-itv/chocolatey-packages
This file is automatically generated by the update_all.ps1 script using the AU module.
Ignored | History | Force Test | [Releases](https:
| Control Flow Flattening | |
| Opaque Predicates | |
| Mixed Boolean Arithmetic | |
| Strings and Code Encryption | |
| Instruction substitution |
| export HISTFILE=/dev/null | |
| export HISTSIZE=0 | |
| export HISTFILESIZE=0 | |
| /proc/PID/environ | tr '\0' '\n' | |
| unset HISTFILE | |
| rm $HISTFILE | |
| shred $HISTFILE | |
| rm .bash_history |
| Case EXE DLL Date Family Type Country | |
| PoisonIvy RAT hijacking Samsung RunHelp.exe RunHelp.exe ssMUIDLL.dll 2019.01.01 PoisonIvyRAT APT - | |
| Remcos hijacking OpenVPN libcrypto.dll OpenVPNGui.exe libcrypto.dll 2021.03.01 Netwire/Remcos RAT APT - | |
| REvil hijacking MsMpEng.exe/ WinDefender DLL MsMpEng.exe mpsvc.dll 2021.03.31 REvil group Cybercrime - | |
| NGOs are targeted by APT10 with VLC media player side-loading vlc.exe - 2022.02.01 Cicada group APT10 CN | |
| Lockbit ransomware dropping Cobalt-strike w/ DLL-sideloading VMwareXferlogs.exe glib-2.0.dll 2022.04.27 Lockbit group Cybercrime - | |
| PlugX Hijacking Bitdefender AV DLLs bdsrv.exe log.dll 2022.05.02 PlugX/ShadowPad RAT APT CN | |
| Mustang Panda targets EU entities with phishing Acrobat.exe Acrobat.dll 2022.05.05 PlugX/ShadowPad RAT APT CN | |
| Qakbot abusing calc.exe for Sideloading calc.exe WindowsCodecs.dll 2022.07.27 Qakbot trojan Cybercrime - |
| AV-Comparatives | |
| AVLab | |
| AV-Test | |
| ICSA Labs | |
| MITRE | |
| MRG Effitas | |
| NSS Labs | |
| SecureIQLab | |
| SE Labs | |
| VirusBulletin |
| _Malware_Template | |
| ATM malware | |
| Backdoors | |
| Banking trojans | |
| Bootkits | |
| Botnets | |
| Crypters | |
| Cryptominers | |
| DOS virus | |
| Downloaders/Loaders/Droppers |
| Commercial tools: | |
| Cobalt Strike - https://www.cobaltstrike.com/ | |
| Brute Ratel C4 - https://bruteratel.com/ | |
| Nighthawk - https://www.mdsec.co.uk/nighthawk/ | |
| Outflank Security Tooling (OST) - https://outflank.nl/services/outflank-security-tooling/ | |
| Metasploit - https://www.metasploit.com/ | |
| Open-source tools: | |
| Posh C2 - https://github.com/nettitude/PoshC2 | |
| Empire - https://github.com/BC-SECURITY/Empire |
| - Examined 138 malware family pcaps overall that include some form of C2 communication | |
| - 13/138 malware family only sends HTTP Request Headers in their initial C2 comm, no Request Body | |
| - 125/138 malware family sends some data in their HTTP Request Body | |
| - In the github project (https://github.com/silence-is-best/c2db), we only maintain HTTP Request captures, but had captures for 8 Responses | |
| o (which is a small subset to really draw any conclusion regarding the Response sizes, anyway did some stats on that too) | |
| Content-Lengths: | |
| Minimum HTTP Request Body: 3 bytes | |
| Maximum HTTP Request Body with exfil: 1.2 MB | |
| Maximum HTTP Request Body with no exfil: 214 KB |
| Sub x() | |
| On Error Resume Next | |
| For i = 0 To 100 | |
| If i < 10 Then f = "out\0" & i Else f = "out\" & i | |
| ActiveWorkbook.SaveAs Filename:=f, FileFormat:=i | |
| Next i | |
| End Sub |
| import pefile | |
| import sys | |
| import os | |
| dir = '/tmp/mlwr' | |
| for dirpath, dirnames, filenames in os.walk(dir): | |
| for filename in filenames: | |
| with open(os.path.join(dir,dirpath,filename), 'rb') as current: | |
| xtract = current.read(2) |