vx-underground – Telegram
vx-underground
45.8K subscribers
3.93K photos
418 videos
83 files
1.43K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
"If I ran Silk Road, I wouldn't have been caught"
🤣311😁35💯18😎8🤓5🤔4🔥32❤‍🔥2
Hello,

We fixed it in prod (we're not cowards)

Thanks,
🥰72🤣3913🔥9👏6😱1😢1🎉1🤝1
Experimenting with a (maybe new?) string obfuscation technique that uses C floating-point numbers fractionals.

The idea is you'd create a dynamically allocated array of FLOATs. Each ordinal in the array would store 2 ASCII encoded characters in the FLOATs fractional.

As an example, to store the string "LOCALAPPDATA" you'd allocate a FLOAT array. The data would look like:

0.76007900 (L, O)
1.67006500 (C, A)
2.76006500 (L, A)
4.80008000 (P, P)
5.68006500 (D, A)
6.84006500 (T, A)
7.00000000 (NULL)

tl;dr unnecessarily convoluted crap
🤔89👏25🤓22😁11🤣8👍5🥰41🔥1🫡1
We'll see some cool proof-of-concept, or someone happy to share something they learned (even if it's well known by others), and the comments we see people leave are so rude.

Like, damn bro, just fuckin' be happy for someone that they're learning, or growing, and sharing ideas
👍60💯3524😢4
vx-underground
We'll see some cool proof-of-concept, or someone happy to share something they learned (even if it's well known by others), and the comments we see people leave are so rude. Like, damn bro, just fuckin' be happy for someone that they're learning, or growing…
Even if it is a well-known idea, or the code is rewritten in a different programming language — whatever happened to just coding for fun?

pic related:
❤‍🔥6621🎉7👍6🤩3😢2🔥1
2025-01-22.txt
18.6 KB
Updates to vx-underground (too many to list on Telegram)
44🤓19🤔8🔥5😁5👍3🤯1😱1💯1🤝1🫡1
Once someone gets into malware they transform into 1 of these 4 types.
🤣18028💯19👍8🔥5🤔4😎4🤓3😢2🎉1
Hello,

We have another mistake in our code. QA is for cowards. We'll fix it soon.

Thanks,
🫡76🎉6🤣5👍43😁2😢1
Cybersecurity X account compromised
🤣126🔥9😁72👍2😎2👏1🤓1
covid19 and vxug were both created in 2019
🥰98🤯2418🔥5🤔5👍2💯2😢1
Media is too big
VIEW IN TELEGRAM
If you're going to compromise a Twitter account to push your cryptocurrency drainer — you DON'T need to spam it every 45 seconds.

Holy Christ, we get it, you're trying to drain crypto-wallets. Could you make it ANY more obvious?
🤣178🤓15😁5👍4😢31
Media is too big
VIEW IN TELEGRAM
May 22, 1995 — Is a P.C. A Personal Computer, or Pain and Confusion? Reed Galin reports.
😁50🤣26❤‍🔥7🤯5😢4🥰1
According to Twitter statistics, 10% of our audience are female.

That is higher than what we would have guessed. Shout-out to the 34,000 ladies who follow us.

Also shoutout to the 2% of our audience who is age 65+ (you're either lying, or an OG).
🤓126🤣5726❤‍🔥18🫡14🥰12🔥4🤔3😁1😢1
me when my therapist asks what I do in free time
😁121🤣4811🤓7👍4😢2❤‍🔥1
Astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics in Massachusetts discovered a new comet — 2018 CN41

They later reversed the definition when, upon inspection, they discovered the "comet" was actually a 2018 Tesla Roadster
🤣67🤔10🥰5😢5
Hello,

We've fixed the site. New papers coming soon.

We're still migrating like, 13tb of malware from our virus exchange, or something, have to check.

We're really behind schedule, but we're getting there.

Thanks,
- smelly smellington
40🫡11🤓5😢1
Here is something many of you don't know.

In the late 90's the founders of VirusTotal were friends with people from a malware development group (and zine) named '29a Labs'. The current CEO of VirusTotal, Bernardo Quintero, even attended the first 29a Labs meetup in Madrid, Spain. Additionally, during the time Mr. Quintero was a writer for a computer magazine and did an interview with the founder of the 29a Labs. It was released in PC Actual February, 1998.

29a Labs was decades ahead of their time — they released proof-of-concepts, papers, and thoughts and opinions on things. The founders were based out of Spain but had contributors from across the globe. Although, it should probably be noted the definition of malware we are applying to 29a Labs does not necessarily reflect malware we see it today. The 90's malware was primarily infectors, mutation engines, and code capable of self-propagation (worms). It wouldn't be until 2004-ish many of these groups began truly weaponizing their proof-of-concepts (such as the first ideas of ransomware appeared).

29a Labs was (at the time) very much 'black balled' from the cybersecurity scene as VXers were seen as monsters and criminals. Ironically, while 'non-nerds' called hackers monsters and criminals, the 'monsters and criminals' hackers labeled the VXers the real 'monsters and criminals'. This is partially why so many malware people adapted the satanic-esque appearance. The name in of itself, 29a, is 666 in hex.

tl;dr malware nerds demonized by hackers who were demonized by non-nerds

Please note on image 3 Mr. Sandman is discussing using GetModuleHandle and GetProcAddress to dynamically import functionality from Kernel32. In 29a Labs Volume II, 29a Labs would discuss parsing the Export Address Table, something which is still used today. This technique is 27 years old.
🤯5929🔥16👍9😢2🎉1🤣1