CapeSandbox Profile Banner
CAPE Sandbox Profile
CAPE Sandbox

@CapeSandbox

Followers
4K
Following
202
Media
252
Statuses
794

Payloads or it didn't happen. https://t.co/rAVsWT6dcl

Joined April 2017
Don't wanna be here? Send us removal request.
@CapeSandbox
CAPE Sandbox
14 days
New cmd.exe batch deobfuscation capability integrated in CAPE! FindFixAndRun hook😎 For example: https://t.co/CVPEHqPZil Thanks KingKDot https://t.co/LMMszQipLp🙏 and KillerInstinct for the integration!
Tweet media one
1
1
11
@CapeSandbox
CAPE Sandbox
24 days
Tweet media one
@YungBinary
YungBinary
25 days
Dropping a new malware config parser for #Amadey! Update your CAPEv2 parsers: > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor' Check it out here: https://t.co/tITnKwycLH
Tweet media one
0
6
25
@CapeSandbox
CAPE Sandbox
2 months
SLOW#TEMPEST #CobaltStrike config & payload extraction https://t.co/qCLSgiNUTD
Tweet media one
Tweet media two
Tweet media three
@virusbtn
Virus Bulletin
2 months
Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques. https://t.co/Pz2a298Rbp
Tweet media one
7
0
3
@CapeSandbox
CAPE Sandbox
2 months
#Lumma config & payload extraction https://t.co/NHwp8Tb3Wb Thanks @YungBinary
Tweet media one
Tweet media two
@YungBinary
YungBinary
2 months
Updated #Lumma stealer C2 extractor! See https://t.co/4aQECC62RO
Tweet media one
3
11
49
@CapeSandbox
CAPE Sandbox
3 months
#Amatera payload extraction & direct syscall capture https://t.co/zzX2gPZuTi
Tweet media one
Tweet media two
Tweet media three
@CyberRaiju
Jai Minton
3 months
New Octowave Loader sample > Amatera Stealer. 0 VT. Proofpoint rules detect the traffic. My Yara rule detects the installer. Adobe printer driver sideloads tbb.dll, tbb.dll loads app-2.3.dll which gets stego from blood.wav, uses zxing.presentation.dll. https://t.co/ITPIw1UKah
Tweet media one
Tweet media two
4
5
17
@CapeSandbox
CAPE Sandbox
5 months
It's back 🎉
7
2
17
@abuse_ch
abuse.ch
5 months
We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedicated group of volunteers. After almost a year of downtime, we are extremely happy that we were able to help CAPE get back online again! 🥳 👉
Tweet media one
1
45
142
@marsomx_
Simplicio Sam L.
9 months
[1/n] In the hope that it might be useful to someone, I am happy to share with the community my basic (and cheap) implementation of a @CapeSandbox in physical machine config, integrating Elastic Stack and Elastic agents, Suricata, Aurora-Lite agent and Sysmon. #malwareanalysis
Tweet media one
2
44
160
@CapeSandbox
CAPE Sandbox
11 months
#Lumma config & payload extraction
Tweet media one
Tweet media two
Tweet media three
@g0njxa
Who said what?
11 months
It is really interesting to find anti-VM techniques being used by threat actors in the wild. This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos. In this case, this was enough to make @anyrun_app to fail based on Screen Resolution
Tweet media one
Tweet media two
Tweet media three
0
12
39
@CapeSandbox
CAPE Sandbox
11 months
More #BruteRatel...
Tweet media one
Tweet media two
Tweet media three
@Max_Mal_
Max_Malyutin
11 months
#BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨 [+] JS T1059.007 [+] Msiexec T1218.007 TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62 Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi
Tweet media one
Tweet media two
Tweet media three
0
3
15
@CapeSandbox
CAPE Sandbox
1 year
#BruteRatel config & payload extraction, syscall capture #BRC4
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@Cryptolaemus1
Cryptolaemus
1 year
#Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll 18.09.2024 👇 wscript.exe Document-21-29-08.js msiexec.exe /V MSI152A.tmp /DontWait rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram (1/3) 👇 IOC's https://t.co/n6EQNtxxiB
Tweet media one
1
24
71
@CapeSandbox
CAPE Sandbox
1 year
BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
Tweet media one
Tweet media two
Tweet media three
0
21
88
@CapeSandbox
CAPE Sandbox
1 year
Apologies to users of https://t.co/u1Db15pUAo - unfortunately the server was water damaged in a data centre flood☹️ We appreciate your patience and understanding while we work on recovery🙏 Stay tuned for updates!
6
1
29
@CapeSandbox
CAPE Sandbox
2 years
capa v7.0 dynamic output now fully integrated in CAPE Sandbox 🎉 For example: https://t.co/KfzJ9YnkFX
Tweet media one
7
4
37
@D00m3dR4v3n
@doomedraven.bsky.social 🇺🇦
2 years
Dynamic #capa: Exploring Executable Run-Time Behavior with the @CapeSandbox
Tweet card summary image
cloud.google.com
0
7
22
@InvokeReversing
Invoke RE
2 years
We've uploaded our lecture on Automating Malware Triage from our Introduction to Malware Binary Triage course. Huge shout out to @unpacme @anyrun_app @malpedia @abuse_ch @cybercentre_ca @CapeSandbox @hatching_io @R3MRUM for the amazing projects mentioned
0
13
35
@D00m3dR4v3n
@doomedraven.bsky.social 🇺🇦
2 years
So far #CAPEsandbox on #GCP = <3
1
1
7
@D00m3dR4v3n
@doomedraven.bsky.social 🇺🇦
2 years
Tweet media one
1
3
17
@ka1do9
Nikhil Hegde
2 years
Lightweight blog alert! This post goes over fast Bumblebee unpacking and configuration extraction. I've come across posts where authors do the unpacking manually. I use @CapeSandbox. Don't sleep on CAPEv2! https://t.co/iJEGXLBbbx
nikhilh-20.github.io
M&M: Malware and Musings
1
4
12
@CapeSandbox
CAPE Sandbox
2 years
#Vidar config extraction now in CAPE! Thanks to @AnFam17 🙏 For example: https://t.co/eDI8OjMtLZ
Tweet media one
Tweet media two
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
1/ You might have noticed that my area of interest is specifically stealers and RATs 😅 Wrote the configuration extractor for #Vidar stealer https://t.co/GA6bVlStHl
Tweet media one
18
14
52