vx-underground – Telegram
vx-underground
45.7K subscribers
3.92K photos
416 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
The United States government is offering a reward up to $10,000,000 for information on DarkSide ransomware group and/or affiliates.
Conti ransomware group has released a statement and apologized to "members of Saudi Arabia, UAE, and Qatar families ... to His Royal Highness Prince Mohammed bin Salman and any other members of the Royal Families"

We have archived it here: https://pastebin.com/eeLNnAG0
The long-term goal of vx-underground is to develop:

- Reliable front-end, doesnt concede dark art aesthetic, easy to navigate, works on mobile devices
- Ability for individual sample retrievable
- Enhanced papers library

Ideally completion date is sometime 2023.
In 1996 a virus writer, suspected to be from either France or the United Kingdom, released the Tentacle virus. Tentacle II was the first virus to use EPO (Entry-Point Obscuring) infection for Windows 3.x systems.

This was the icon associated with the binary.
New video added to our YouTube archives:

Iranian news reports the Tehran subway disruption. Iranian authorities attributed the issue to 'overcrowding' and unidentified 'computer problem'.

This follows the cyber attack against Iranian gas stations.
https://www.youtube.com/watch?v=Vejsd_wYcO0
We've updated the vx-underground APT collection:

-Zebra2104 samples
-Godzilla webshell, NGLite Trojan
-New TA2722 samples

https://vx-underground.org/apts

* Unable to locate KdcSponge samples
REvil domain is back online with a message.

"They are not the masters they think they are"
"We have the skills and experience"
"Do you want to be with the most qualified or losers?"

*site CSS and PNG indicates this is a defacement
Total malware samples in the vx-underground malware collection: 6,121,742

Goal: 26,000,000
We have re-indexed the Conti ransomware group content leak.

-"Crack 2019"
-"Metasploit US/RU"
-"Network Pentesting"
-"Cobalt Strike"
-"Powershell for Pentesters"
and more...

You can check it out here: https://vx-underground.org/archive
This media is not supported in your browser
VIEW IN TELEGRAM
Leaked footage of the GRU (Главное Разведывательное Управление) successfully backtracking an attackers IP address using IPCONFIG and Windows XP.

Yes, it is the Internet Café.
🤣3
We've added a new proof-of-concept to the vx-underground paper collection: Keylogging using NtUserGetRawInputData by smelly__vx


-Resolves NTDLL / WIN32U APIs on load
-Function hashing
-Random string generation
-No outbound connectivity

https://github.com/vxunderground/VXUG-Papers/blob/main/NtUserGetRawInputDataKeylogger.cpp
We've renamed the WINAPI-Tricks GitHub repository to VX-API.

Adds:
-Templates, demonstrating various entry points and using a custom entry point on Windows in C/C++
-STDIO directory is now StringsAndData. New functions have been added.

More to come...
https://github.com/vxunderground/VX-API
We've added a new paper to the vx-underground paper collection: "Protecting your malware with BlockDLL.B" by smelly__vx


This is an pseudo-functionless adaptation of _xpn_'s "Protecting Your Malware with blockdlls and ACG"

You can check it out here: https://github.com/vxunderground/VXUG-Papers/blob/main/BlockDlls.b.cpp
I apologize - we are behind schedule on APT additions. Lots of stuff happening behind the scenes.

Paper + samples:

2021.11.10(1) - Lazarus Nukesped
2021.11.17 - Alert (AA21-321A) Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
👍1