We've made updates to the vx-underground APT collection:
- FontOnLake, linux malware
- APT InSideCopy
Samples and papers included.
Check it out here: https://vx-underground.org/apts
- FontOnLake, linux malware
- APT InSideCopy
Samples and papers included.
Check it out here: https://vx-underground.org/apts
We've updated the vx-underground malware source code repository. We have added Android.GhostBot. An Android spyware proof-of-concept capable of surveillance on the target, functionality similar to Pegasus
You can check it out here (under Android section): https://github.com/vxunderground/MalwareSourceCode
You can check it out here (under Android section): https://github.com/vxunderground/MalwareSourceCode
Grief ransomware group has ransomed the National Rifle Association (NRA).
Link: http://griefcameifmv4hfr3auozmovz5yi6m3h3dwbuqw7baomfxoxz4qteid.onion
Link: http://griefcameifmv4hfr3auozmovz5yi6m3h3dwbuqw7baomfxoxz4qteid.onion
👍1
We will be releasing the toolkit Conti ransomware group and Blackmatter ransomware group uses tomorrow on Twitter. However, to thank our supporters, and to thank individuals for following our Telegram we will be releasing a vx-underground Telegram exclusive.
Background information:
The files we have received were used noscripts by group TeamTNT in their Chimaera campaign. This campaign has been discussed multiple times by various security vendors and researchers.
1. TrendMicro discussed it here: https://www.trendmicro.com/en_us/research/21/c/teamtnt-continues-attack-on-the-cloud--targets-aws-credentials.html
2. PaloAlto Unit42 discussed it here: https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/
A security researcher on Twitter named r3dbU7z (https://twitter.com/r3dbU7z) tracked TeamTNT and uploaded a collection of TeamTNTs noscripts/toolkits onto VirusTotal. Threat Actors became aware of this, pulled the noscript compilation from a different location (we believe bazaar.abuse.ch), and have modified them for their personal usage and are being distributed to ransomware affiliates to aid to post-exploitation. The files we are sharing are NOT detected well on VirusTotal (they are bash noscripts, we are aware it is difficult to make YARA/SIGMA rules that cover them well).
The password: infected
Background information:
The files we have received were used noscripts by group TeamTNT in their Chimaera campaign. This campaign has been discussed multiple times by various security vendors and researchers.
1. TrendMicro discussed it here: https://www.trendmicro.com/en_us/research/21/c/teamtnt-continues-attack-on-the-cloud--targets-aws-credentials.html
2. PaloAlto Unit42 discussed it here: https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/
A security researcher on Twitter named r3dbU7z (https://twitter.com/r3dbU7z) tracked TeamTNT and uploaded a collection of TeamTNTs noscripts/toolkits onto VirusTotal. Threat Actors became aware of this, pulled the noscript compilation from a different location (we believe bazaar.abuse.ch), and have modified them for their personal usage and are being distributed to ransomware affiliates to aid to post-exploitation. The files we are sharing are NOT detected well on VirusTotal (they are bash noscripts, we are aware it is difficult to make YARA/SIGMA rules that cover them well).
The password: infected
❤1
We have archived the voicemail SunCrypt ransomware group left on a victim companies telephone.
You can listen to the voicemail here:
https://www.youtube.com/watch?v=htsSaPNgm8s
You can listen to the voicemail here:
https://www.youtube.com/watch?v=htsSaPNgm8s
YouTube
Suncrypt Ransomware leaves victim a message
No details are available on who the victim was. Audio released by Sophos.
Archived via vx-underground.org
Archived via vx-underground.org
InterviewWithKajit.pdf
5.5 MB
Notes from UG Vol. 1 has been released
We interviewed Kajit, a former REvil and DarkSide operator & the admin of the Ransomware Marketplace forum (RAMP)
In this interview we allowed members of our Discord to ask him anything
We interviewed Kajit, a former REvil and DarkSide operator & the admin of the Ransomware Marketplace forum (RAMP)
In this interview we allowed members of our Discord to ask him anything
We've updated the vx-underground APT sample collection:
- WinDealer
- SQUIRRELWAFFLE
- WsLink
Have a nice day.
https://vx-underground.org/apts
- WinDealer
- SQUIRRELWAFFLE
- WsLink
Have a nice day.
https://vx-underground.org/apts
ExMatter.rar
2.1 MB
Today Symantec released a paper on BlackMatters new exfiltration tool dubbed 'ExMatter'.
Samples attached:)
Samples attached:)
Morphisec announced a new ransomware variant written in GoLang dubbed 'Decaf ransomware'. More samples:)
MacOS.XLoader.rar
798.3 KB
Old samples - SentinelOne wrote a paper on MacOS.XLoader. Here are the samples:)
We've made an addition to the vx-underground WINAPI Tricks GitHub repository:
- Correct implementation of URLDownloadFileW using IBindStatusCallback callbacks to ensure remote file download was completed successfully
Check it out here: https://github.com/vxunderground/WinAPI-Tricks
- Correct implementation of URLDownloadFileW using IBindStatusCallback callbacks to ensure remote file download was completed successfully
Check it out here: https://github.com/vxunderground/WinAPI-Tricks