vx-underground – Telegram
vx-underground
45.6K subscribers
3.92K photos
415 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
We've updated the vx-underground APT collection.

Due to the volume of APT papers and samples being released we are unable to list everything being added. There have been 105 APT papers released in 80 days.

Recent additions can be viewed here: https://vx-underground.org/apts.html#2022
🔥2👍1
We've got more malware available for bulk download.

*Don't ask the password
*All files named using the Kaspersky naming convention
*8,500,000+ samples present

Have a nice day

Download: https://samples.vx-underground.org/samples/Blocks/
🔥2
CaddyWiper, the destructive malware which previously targeted Ukrainian organizations, used "DsRoleGetPrimaryDomainInformation" to determine if the device it is running on is the Domain Controller.

Other malware families using this technique:
-TrickBot
-Maze ransomware
🔥3
We have the Conti ransomware source code (version 3). This includes a compiled locker and decryptor. We have archived it.

You can download it here: https://share.vx-underground.org
3👍1
Proofpoint released a paper on a malware campaign "Serpant Backdoor". This campaign targeted the French government as well as French Real Estate & Construction companies.

It also utilized steganography, an image from Dora the Explorer

Download: https://samples.vx-underground.org/APTs/2022/2022.03.21/
3
We have over 11,000,000 unique malware samples available for bulk download.

* Named using Kaspersky naming convention

Download available here: https://samples.vx-underground.org/samples/Blocks/
🔥3👍1
We've added a new paper to the vx-underground Windows paper collection

"Azure Outlook Command & Control that uses Microsoft Graph API for C2 communications & data exfiltration" by 0xBoku & C5pider

Check it out here: https://www.vx-underground.org/windows.html#scab
😱3👍2🔥2
"Operation Dragon Castling", which has been targeting companies in South East Asia, has a stage 2 loader named CoreX. CoreX uses the same SYSCALL sorting method created by the folks over at MDSecLabs

Paper API Unhooking via SYSCALL sorting: https://papers.vx-underground.org/papers/VXUG/Mirrors/BypassingUserModeHooksandDirectInvocationofSystemCallsforRedTeams.pdf

Paper on OPERATION DRAGON CASTLING: https://decoded.avast.io/luigicamastra/operation-dragon-castling-apt-group-targeting-betting-companies/
🔥3
Yesterday AhnLabs reported APT activity targeting South Korean users using one of the oldest tricks in the book: they send a malicious .CHM file masquerading as a legitimate CHM file.

*Malicious .CHMs appeared approx. in 1997
*Malicious .DOCX/XLS appeared approx. in 1999
🔥7👍1😱1
We have made an additional 2,400,000+ malware samples available for bulk download.

Total available for bulk download: approx. 15,000,000

Have a nice day.

Download: https://samples.vx-underground.org/samples/Blocks/
👍13🔥7🎉1
We have enabled reactions.
🔥8717💩16🎉12👏8👎2😁2🤔2🤯2🤬1😢1
We've updated the vx-underground Malware Defense paper collection: "Anti-UPX Unpacking Technique" by Shusei Tomonaga

Have a nice day.

Check it out here: https://vx-underground.org/av.html
6🔥4👍1👏1
This media is not supported in your browser
VIEW IN TELEGRAM
As ransomware groups, such as Lockbit, ALPHV, and HIVE, continue to ramp up operations it is important we review how these groups operate.
😁31🔥63👍3🤮2😱1🤩1💩1
We have made an additional 2,200,000+ malware samples available for bulk download.

Total available for bulk download: approx. 17,000,000

Download: https://samples.vx-underground.org/samples/Blocks/
👍6
Lockbit ransomware group has placed a $1,000,000 bounty on their own head. They state they will give $1,000,000 to any FBI agent who can locate them.
🤔6😁2🤬1
The developers behind Raccoon Stealer have announced they're temporarily shutting down operations.

They cite the invasion of Ukraine as the reason why they're shutting down. They state key team members are "no longer with us".
😢2👍1