Elons (Proxima/Black Shadow related) ransomware attack via Oracle DBS External Jobs
https://labs.yarix.com/2025/09/elons-proxima-black-shadow-related-ransomware-attack-via-oracle-dbs-external-jobs/
@FUZZ0x
https://labs.yarix.com/2025/09/elons-proxima-black-shadow-related-ransomware-attack-via-oracle-dbs-external-jobs/
@FUZZ0x
YLabs
Elons (Proxima/Black Shadow related) ransomware attack via Oracle DBS External Jobs
Premise As Yarix’s Incident Response Team, our responsibilities are to manage critical issues related to cyber-attacks carried out by cybercriminals, intervening promptly in order to guarantee security to victim companies and to minimize latent risks, analyzing…
❤1
A Deep Dive into Reverse Engineering and Exploitation of Drones
https://cfp.recon.cx/media/2023/submissions/HLHH89/resources/REcon_online_slides_mLUVm2u.pdf
https://cfp.recon.cx/media/2023/submissions/HLHH89/resources/REcon_online_slides_mLUVm2u.pdf
❤1
dalvikus
A modern Android reverse engineering and modification toolkit built with Compose Multiplatform, available for windows, linux & mac.
https://github.com/loerting/dalvikus.git
A modern Android reverse engineering and modification toolkit built with Compose Multiplatform, available for windows, linux & mac.
https://github.com/loerting/dalvikus.git
GitHub
GitHub - loerting/dalvikus: Android reverse-engineering tool / smali editor
Android reverse-engineering tool / smali editor. Contribute to loerting/dalvikus development by creating an account on GitHub.
❤1
Hypervisors for Memory Introspection and Reverse Engineering
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
secret club
Hypervisors for Memory Introspection and Reverse Engineering
Introduction
❤1
تحلیل باج افزار Qilin که پس از افول یا اسکم شدن بعضی باج افزارهایی مثل LockBit و BlackCat و RansomHub در صدر بیشترین حملات اخیر هست
Qilin ransomware analysis, which is at the forefront of most recent attacks after the decline or shrink of some ransomware such as LockBit, Blackcat and RansomHub
https://www.sans.org/blog/evolution-qilin-raas
@Fuzz0x
Qilin ransomware analysis, which is at the forefront of most recent attacks after the decline or shrink of some ransomware such as LockBit, Blackcat and RansomHub
https://www.sans.org/blog/evolution-qilin-raas
@Fuzz0x
❤1
پیدا کردن شرط چک لایسنس یا رمز
چی کار میکنیم؟
میخوایم بخش هایی از برنامه که رمز لایسنس رو بررسی میکنن پیدا کنیم بفهمیم چه توابعی استفاده شده و دقیقا کجا برنامه تصمیم میگیره اجازه بده یا نده
نمونه برنامه ساده مثال برای تمرین C:
مرحله به مرحله:
فایل رو کامپایل کنید مثلا gcc test.c -o test.exe و یه نسخه کپی نگه دارید
با strings test.exe نگاه کنید ببینید رشتهها مثل Enter pass: Access granted کجا هستن اینا کمک میکنن موقعیت منطقی برنامه رو حدس بزنید
فایل رو توی IDA یا Ghidra باز کنید دنبال رشتههای بالا بگردید Search _ Strings و از اونجا به تابع مربوط برید معمولا رشتهها به راحتی به توابع استفاده شون لینک میشن
توی دیاسمبل دنبال strcmp یا strncmp یا هر تابع مقایسه رشتهای باشید نزدیک این فراخوانیها معمولا شرط تصمیمگیرنده cmp + jz / jne / je / jne هست
نقطهای که بعد از cmp یه JE یا JNE میبینید همونجا تصمیم گیرنده است اگه شرط برقرار باشه برنامه به شاخه موفقیت میره وگرنه پیام رد میشه
نکات:
دنبال cmp eax, 0
یا مقایسه بازگشتی strcmp(...) == 0 باشید
رشتهها بهترین نقطه شروع برای مسیردهی در باینری هستن
همه اینا استاتیکه هنوز برنامه رو اجرا نکردید
تمرین:
خودتون کد بالا رو کامپایل کنید و توی IDA/Ghidra مسیر از رشته _ تابع cmp _ jump رو دنبال کنید
Finding the license or password
Check condition
What are we doing?
We want to find the parts of the program that check the license password, understand what functions are used and where exactly the program decides to allow or deny
Simple program example for practice C :
Step by step :
Compile the file, e.g. gcc test.c -o test.exe and keep a copy
Look at strings test.exe and see where strings like Enter pass : Access granted are. These will help you guess the logical position of the program
Open the file in IDA or Ghidra and search for the above strings. Search Strings and from there go to the corresponding function. Usually strings are easily linked to the functions they use.
Look for strcmp or strncmp or any string comparison function in the disassembler. Near these calls there is usually a decision-maker condition
cmp + jz / jne / je / jne
The point where you see a JE or JNE after cmp is the decision-maker. If the condition is true, the program goes to the success branch, otherwise the message is rejected.
Tips :
Look for cmp eax, 0
or the recursive comparison strcmp(...) == 0
Strings are the best starting point for routing in binary
This is all static you haven't run the program yet
Exercise :
Compile the above code yourself and follow the path from string cmp function jump in IDA/Ghidra
@reverseengine
چی کار میکنیم؟
میخوایم بخش هایی از برنامه که رمز لایسنس رو بررسی میکنن پیدا کنیم بفهمیم چه توابعی استفاده شده و دقیقا کجا برنامه تصمیم میگیره اجازه بده یا نده
نمونه برنامه ساده مثال برای تمرین C:
#include <stdio.h>
#include <string.h>
int main() {
char buf[32];
printf("Enter pass: ");
scanf("%31s", buf);
if (strcmp(buf, "1234") == 0) {
printf("Access granted\n");
} else {
printf("Access denied\n");
}
return 0;
}
مرحله به مرحله:
فایل رو کامپایل کنید مثلا gcc test.c -o test.exe و یه نسخه کپی نگه دارید
با strings test.exe نگاه کنید ببینید رشتهها مثل Enter pass: Access granted کجا هستن اینا کمک میکنن موقعیت منطقی برنامه رو حدس بزنید
فایل رو توی IDA یا Ghidra باز کنید دنبال رشتههای بالا بگردید Search _ Strings و از اونجا به تابع مربوط برید معمولا رشتهها به راحتی به توابع استفاده شون لینک میشن
توی دیاسمبل دنبال strcmp یا strncmp یا هر تابع مقایسه رشتهای باشید نزدیک این فراخوانیها معمولا شرط تصمیمگیرنده cmp + jz / jne / je / jne هست
نقطهای که بعد از cmp یه JE یا JNE میبینید همونجا تصمیم گیرنده است اگه شرط برقرار باشه برنامه به شاخه موفقیت میره وگرنه پیام رد میشه
نکات:
دنبال cmp eax, 0
یا مقایسه بازگشتی strcmp(...) == 0 باشید
رشتهها بهترین نقطه شروع برای مسیردهی در باینری هستن
همه اینا استاتیکه هنوز برنامه رو اجرا نکردید
تمرین:
خودتون کد بالا رو کامپایل کنید و توی IDA/Ghidra مسیر از رشته _ تابع cmp _ jump رو دنبال کنید
Finding the license or password
Check condition
What are we doing?
We want to find the parts of the program that check the license password, understand what functions are used and where exactly the program decides to allow or deny
Simple program example for practice C :
#include <stdio.h>
#include <string.h>
int main() {
char buf[32];
printf("Enter pass: ");
scanf("%31s", buf);
if (strcmp(buf, "1234") == 0) {
printf("Access granted\n");
} else {
printf("Access denied\n");
}
return 0;
}
Step by step :
Compile the file, e.g. gcc test.c -o test.exe and keep a copy
Look at strings test.exe and see where strings like Enter pass : Access granted are. These will help you guess the logical position of the program
Open the file in IDA or Ghidra and search for the above strings. Search Strings and from there go to the corresponding function. Usually strings are easily linked to the functions they use.
Look for strcmp or strncmp or any string comparison function in the disassembler. Near these calls there is usually a decision-maker condition
cmp + jz / jne / je / jne
The point where you see a JE or JNE after cmp is the decision-maker. If the condition is true, the program goes to the success branch, otherwise the message is rejected.
Tips :
Look for cmp eax, 0
or the recursive comparison strcmp(...) == 0
Strings are the best starting point for routing in binary
This is all static you haven't run the program yet
Exercise :
Compile the above code yourself and follow the path from string cmp function jump in IDA/Ghidra
@reverseengine
❤2👏1
Automated AI Malware Reverse Engineering with MCPs for IDA and Ghidra
https://x.com/i/status/1907453048491802830
https://x.com/i/status/1907453048491802830
X (formerly Twitter)
herrcore (@herrcore) on X
Automated AI Malware Reverse Engineering with MCPs for IDA and Ghidra
Full VIBE RE livestream 🏝️
Full VIBE RE livestream 🏝️
❤1
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess
https://github.com/SaadAhla/dark-kill
@reverseengine
https://github.com/SaadAhla/dark-kill
@reverseengine
GitHub
GitHub - SaadAhla/dark-kill: A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power…
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess. - GitHub ...
❤1
Reversing Firmware Encryption with IDA Pro Hanwha WiseNet Security Camera
https://www.youtube.com/watch?v=WP7kIfmVFpY
https://www.youtube.com/watch?v=WP7kIfmVFpY
YouTube
Reversing Firmware Encryption with IDA Pro - Hanwha WiseNet Security Camera
Thanks to Hex-Rays for collaborating on this video: Where Reverse Engineering Meets Precision
Hex-Rays Discount Code: MATT50
To activate your 50% product discount, click "Get a quote" in the web shop (under "Order & Pay), or email sales@hex-rays.com. Make…
Hex-Rays Discount Code: MATT50
To activate your 50% product discount, click "Get a quote" in the web shop (under "Order & Pay), or email sales@hex-rays.com. Make…
❤1
بخش اول بافر اورفلو
تا حالا فکر کردید یک ورودی ساده چطور میتونه یک برنامه رو از کار بندازه
هدف آشنایی با مفهوم بافر و اورفلو هست
تئوری ساده استک و بافر:
بافر یعنی محلی در حافظه که برای نگهداری داده ها مثل رشته ها یا آرایه ها اختصاص داده میشه اگر ورودی بیشتر از فضای اختصاص یافته باشه داده های مجاور بازنویسی میشن
در برنامه های ساده معمولا بافر روی استک قرار می گیرد و کنار اون آدرس بازگشت تابع و متغیرهای دیگر قرار دارن وقتی بافر بازنویسی میشه ممکنه آدرس بازگشت تغییر کنه یا برنامه کرش کنه
مثال بدون جزئیات exploit:
تصور کنید تابعی هست که یک آرایه شونزده بایتی داره و کاربر به جای شونزده بایت شصت و چهار بایت می فرسته بخشی از حافظه که بیرون از آرایه است بازنویسی میشه و باعث رفتار غیرمنتظره میشه این رفتار ممکنه تنها کرش باشه یا در شرایط خاص بتونه باعث اجرای کد بشه
Part 1 Buffer Overflow
Have you ever wondered how a simple input can crash a program ?
The goal is to familiarize yourself with the concept of buffer and overflow
Simple theory of stack and buffer :
A buffer is a place in memory that is allocated to store data such as strings or arrays. If the input exceeds the allocated space, the adjacent data is overwritten.
In simple programs, the buffer is usually placed on the stack, and next to it are the function's return address and other variables. When the buffer is overwritten, the return address may change or the program may crash.
Example without exploit details :
Imagine a function that has a sixteen-byte array and the user sends sixty-four bytes instead of sixteen bytes. A part of the memory that is outside the array is overwritten, causing unexpected behavior. This behavior may only be a crash, or in special circumstances, it may cause code execution.
@reverseengine
❤2
Reversing the TNT team macOS crack library
https://reverse.put.as/2025/03/13/cracking-the-crackers/
@reverseengine
https://reverse.put.as/2025/03/13/cracking-the-crackers/
@reverseengine
Reverse Engineering
Cracking the Crackers
A few weeks ago, Copycat sent me an email asking if I knew anything about the TNT warez group macOS cracks. They were worried that the cracks could be used to leverage malware since TNT is (?) Russia based. Cyber war is real and this could be an interesting…
❤1
Bringing Metal to a crypto backdoor fight! Exploiting the GPU and the 90s crypto wars to crack the APT Down code signing keys
https://reverse.put.as/2025/08/24/rc4bruteforce/
@reverseengine
https://reverse.put.as/2025/08/24/rc4bruteforce/
@reverseengine
Reverse Engineering
Bringing Metal to a crypto backdoor fight! Exploiting the GPU and the 90s crypto wars to crack the APT Down code signing keys
The APT Down leak contained four code signing certificates and the passphrase only for the most recent one. Since the passphrase was found on the usual rockyou.txt wordlist, I was curious to see if the remaining three could be cracked using the same wordlist.…
🔥3❤1
ANALYZING WINPMEM DRIVER VULNERABILITIES
https://static.ernw.de/whitepaper/ERNW_White_Paper_73-Analyzing_WinpMem_Driver_Vulnerabilities_1.0_signed.pdf
@reverseengine
https://static.ernw.de/whitepaper/ERNW_White_Paper_73-Analyzing_WinpMem_Driver_Vulnerabilities_1.0_signed.pdf
@reverseengine
❤1
Deciphering Ransomware in Virtual Machines
UEFI Reverse Engineering, Vulnerability Discovery, and Exploit Development: Part 0
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader
Identifying Human-operated Ransomware through Windows Event Logs
APT-C-00 (OceanLotus) Dual Loader and Homologous VMP Loader
poc for CVE-2024-45383
Collection of Docker honeypot logs from 2021 - 2024
@reverseengine
UEFI Reverse Engineering, Vulnerability Discovery, and Exploit Development: Part 0
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader
Identifying Human-operated Ransomware through Windows Event Logs
APT-C-00 (OceanLotus) Dual Loader and Homologous VMP Loader
poc for CVE-2024-45383
Collection of Docker honeypot logs from 2021 - 2024
@reverseengine
❤1
Malware Analysis
1Datzbro RAT:
https://www.threatfabric.com/blogs/datzbro-rat-hiding-behind-senior-travel-scams
2 Detecting DLL hijacking with ML: real-world cases
https://securelist.com/detecting-dll-hijacking-with-machine-learning-in-kaspersky-siem/117567
3 Mustang Panda Publoader:
https://0x0d4y.blog/mustang-panda-employ-publoader-through-claimloader-yes-another-dll-side-loading-technique-delivery-via-phishing
4 FunkSec’s FunkLocker:
How AI Is Powering the Next Wave of Ransomware
https://any.run/cybersecurity-blog/funklocker-malware-analysis
5 Zoom and WebSocket Credential Theft:
https://blog.himanshuanand.com/2025/10/look-mom-hr-application-look-mom-no-job
@reverseengine
1Datzbro RAT:
https://www.threatfabric.com/blogs/datzbro-rat-hiding-behind-senior-travel-scams
2 Detecting DLL hijacking with ML: real-world cases
https://securelist.com/detecting-dll-hijacking-with-machine-learning-in-kaspersky-siem/117567
3 Mustang Panda Publoader:
https://0x0d4y.blog/mustang-panda-employ-publoader-through-claimloader-yes-another-dll-side-loading-technique-delivery-via-phishing
4 FunkSec’s FunkLocker:
How AI Is Powering the Next Wave of Ransomware
https://any.run/cybersecurity-blog/funklocker-malware-analysis
5 Zoom and WebSocket Credential Theft:
https://blog.himanshuanand.com/2025/10/look-mom-hr-application-look-mom-no-job
@reverseengine
ThreatFabric
Datzbro: RAT Hiding Behind Senior Travel Scams
In this research article by ThreatFabric, we expose Datzbro: a new RAT that hides behind senior travel scams.
❤1