vx-underground – Telegram
vx-underground
45.7K subscribers
3.92K photos
416 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
"Who is 29a labs?"
🤔32😢16🤣5🫡53
In the spirit of Halloween we will share something with you that is truly terrifying.

*Yes, this is real game made by EA
🤯89🤣65😁7🔥5😱32👏1🤔1
We keep getting pinged. Yes, Boeing has been removed from Lockbit ransomware groups website.

Lockbit administrative staff informed us they removed Boeing because negotiations have begun.

We don't know anything else. It is Halloween. Cya nerds tomorrow. We're busy.
😁71👍14🥰9🎉8😎32🤣1
Yesterday ALPHV ransomware group listed Advarra, a clinical research technology company

Advarra told ALPHV quote "We do not pay digital terrorists". Additionally, ALPHV tried contacting one of their executives via text message. She told ALPHV "go fuk yourself"

😂😂😂😂😂
🤣212😎34👍12🔥84🫡3😱1
This media is not supported in your browser
VIEW IN TELEGRAM
This one simple trick will land you a job anywhere
🤣202🔥28👏10😁7👍54💯3❤‍🔥1
> "DONT DO THIS!!! THIS IS A FELONY!!!"

No shit, Sherlock. It's satire
😁69🤣24🤓13👍5😱2😢21🤔1
We are behind schedule on almost all of our tasks. 1/2 of our staff is sick.

Seasonal changes are illegal and for nerds
😢71🤣14❤‍🔥5🙏5
We've updated the vx-underground malware sample collection

- MedusaLocker
- XLoader
- SystemBC
- MinodoLoader
- ShellBot
- Moqhao
- XMRig
- PlayRansomware
- MoneyRansomware
- PrivateLoader
- AridGopher
- Micropsoa
- IcedId
and more...

Check it out here: vx-underground.org/
👍20🤓14❤‍🔥5🎉2
52,807 new malware samples queued for upload in our VXDB and the vx-underground website.

*Reminder our VXDB allows you to search through our malware collection and download for free 🫡

https://virus.exchange
🔥33🫡15❤‍🔥9👍4👏1
Google is introducing more new TLDs =D

.ing and .meme

New phishing links inbound!
🤣113🔥174😱4😢4🤓3🤔2❤‍🔥1
He's not wrong
🤣110💯95😁5🔥1🤓1
Alternatives to 'whoami.exe'.

COM interface ideas:
- IADsADSystemInfo
- IADsWinNTSystemInfo
- IADsComputer
- WMI COM provider to query 'whoami.exe'

IADsADSystemInfo, IADsWinNTSystemInfo, and IADsComputer are all fundamentally similar in calling syntax and are pretty copy-pasta ish. Windows SDK is kind of a pain though, the GUIDs weren't located easily, so they needed to be manually defined.
Example: https://pastebin.com/raw/S32nYDAp

Advapi32 functionality:
- Advapi32!LookupAccountSidW
- Advapi32!LsaLookupSids

LookupAccountSidW is an internal wrapper that calls LsaOpenPolicy, LsaLookupSids, and subsequently LsaFreeMemory. LsaFreeMemory is a wrapper to RtlFreeHeap.
Example: https://pastebin.com/raw/zJVShnay

Other possibilities:

- NpGetUserName - gets the username from a named pipe. Requires spawning a secondary thread, creating a named pipe, connecting to it, impersonating it, ... it is a long story =D

- Offlinesame.dll - Offline sam has a lot of functionality for enumerating users and domains on the machine. This is undocumented and requires a little more work. However, it has been demonstrated loosely by 0gtweet
Example: https://github.com/gtworek/PSBits/blob/master/OfflineSAM/OfflineAddAdmin.c

tl;dr can't stop thinking about whoami.exe :(
🤣51👍11🤓74😎3🔥1
🤣227😁14❤‍🔥10🫡5😢43💯2👍1😱1🙏1
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.

This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.

https://pastebin.com/raw/ZsReS7k4
👍25😢9🤔53🔥3🎉2
An image illustrating the current CloudFlare status

https://www.cloudflarestatus.com/
🤣99👍8🔥8😱3😢2
We've updated the vx-underground Windows malware paper collection

- 2023-07-29 - Lord Of The Ring0 - Part 5 Sarumans Manipulation
- 2023-08-13 - LAPS 2.0 Internals
- 2023-08-29 - DevTunnels for C2
- 2023-09-06 - How to Troll an AV
🔥30
Forgot to link to the website, but whatever. If you don't know the website by now you've got some sort of cognitive damage.

Going back to bed. If you need anything... don't need anything
🤣44👍17😁5🫡4😢3🙏1
This media is not supported in your browser
VIEW IN TELEGRAM
Insider Threats come in many shapes and sizes and are a major hurdle to any organization.
😁65🤣435🤔4🤓4👍2