vx-underground – Telegram
vx-underground
45.3K subscribers
3.9K photos
412 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
Log4J Malware.7z
6.1 MB
Malware using LOG4J exploit:)
Log4J Malware.7z
13 MB
Even more malware using LOG4J exploit:)
👍1
Log4J Malware.7z
36.4 MB
Per request, even MORE LOG4J samples:)
Updates to vx-underground:

APT collection:
2021.11.10/Void Balaur
2021.12.06/Nobelium
2021.12.07/FIN13

Malware collection:
Cuba Ransomware
Diavol Ransomware
Log4J Malware
Owowa
Quantum Ransomware
Tor2Mine

Check it out here: http://vx-underground.org
👍1
"Espionage Campaign Targets Telecoms Organizations across Middle East and Asia" :) Samples + Paper
We've made large updates to the VXUG APT collection

2021.11.24/APT-38
2021.12.07/TeamTNT
2021.12.08/ShadowPad
2021.12.13/APT-C-61
2021.12.13/Kimsuky
2021.12.14/DarkWatchman
2021.12.14/DoNot
2021.12.15/APT31
2021.12.15/Jolly Jellyfish

Check it out here: https://vx-underground.org
We've updated the VXUG Malware sample collection:

- GoLang-based Log4J malware
- BlackCat Ransomware (ALPHV), Rust-based and uses LLVM for obfuscation
- Yanluowang Ransomware, ransomware that is signed....

Check it out here: https://vx-underground.org
👍1
A Security researcher has identified the first Log4J worm. It is a self-propagating Mirai bot. We have aggregated the sample.

You can download the Log4J Mirai worm here: https://vx-underground.org
2022.01.121.7z
1.7 MB
2022.01.12/Iranian intel cyber suite of malware uses open source tools (MuddyWater)
2022.01.12_Samples.7z
7.8 MB
2022.01.12/OceanLotus (APT32) hackers turn to web archive files to deploy backdoors
We've added a new paper to the VXUG AV paper collection: "In-Depth Analysis of Ransom Note Files" by Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi

Analysis of ransomware notes & proposed prototype of identifying Threat Actors by their ransom notes

https://vx-underground.org/av.html
👎2👍1
BlackBerry ThreatVector team identified a new ransomware variant dubbed "LokiLocker".

You can download LokiLocker ransomware samples here:

https://samples.vx-underground.org/samples/Families/LokiLockerRansomware/
2
We've updated the vx-underground APT collection.

Due to the volume of APT papers and samples being released we are unable to list everything being added. There have been 105 APT papers released in 80 days.

Recent additions can be viewed here: https://vx-underground.org/apts.html#2022
🔥2👍1
We've got more malware available for bulk download.

*Don't ask the password
*All files named using the Kaspersky naming convention
*8,500,000+ samples present

Have a nice day

Download: https://samples.vx-underground.org/samples/Blocks/
🔥2
CaddyWiper, the destructive malware which previously targeted Ukrainian organizations, used "DsRoleGetPrimaryDomainInformation" to determine if the device it is running on is the Domain Controller.

Other malware families using this technique:
-TrickBot
-Maze ransomware
🔥3