CapeSandbox Profile Banner
CAPE Sandbox Profile
CAPE Sandbox

@CapeSandbox

Followers
4K
Following
200
Media
244
Statuses
779

Payloads or it didn't happen. https://t.co/rAVsWT6dcl

Joined April 2017
Don't wanna be here? Send us removal request.
@CapeSandbox
CAPE Sandbox
11 minutes
#Lumma config & payload extraction. Thanks @YungBinary
Tweet media one
Tweet media two
@YungBinary
YungBinary
21 hours
Updated #Lumma stealer C2 extractor! See
Tweet media one
0
0
1
@CapeSandbox
CAPE Sandbox
13 days
#Amatera payload extraction & direct syscall capture.
Tweet media one
Tweet media two
Tweet media three
@CyberRaiju
Jai Minton
14 days
New Octowave Loader sample > Amatera Stealer. 0 VT. Proofpoint rules detect the traffic. My Yara rule detects the installer. Adobe printer driver sideloads tbb.dll, tbb.dll loads app-2.3.dll which gets stego from blood.wav, uses zxing.presentation.dll.
Tweet media one
Tweet media two
4
5
16
@CapeSandbox
CAPE Sandbox
3 months
It's back 🎉.
7
2
17
@CapeSandbox
CAPE Sandbox
3 months
RT @abuse_ch: We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedi….
0
45
0
@CapeSandbox
CAPE Sandbox
7 months
RT @marsomx_: [1/n] In the hope that it might be useful to someone, I am happy to share with the community my basic (and cheap) implementat….
0
44
0
@CapeSandbox
CAPE Sandbox
9 months
#Lumma config & payload extraction
Tweet media one
Tweet media two
Tweet media three
@g0njxa
Who said what?
9 months
It is really interesting to find anti-VM techniques being used by threat actors in the wild. This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos. In this case, this was enough to make @anyrun_app to fail based on Screen Resolution
Tweet media one
Tweet media two
Tweet media three
0
12
39
@CapeSandbox
CAPE Sandbox
9 months
More #BruteRatel.
Tweet media one
Tweet media two
Tweet media three
@Max_Mal_
Max_Malyutin
9 months
#BruteRatel #Latrodectus A New JS Nasty Obfuscation #TTPs & #IOCs - Multi-Line Comments🚨. [+] JS T1059.007.[+] Msiexec T1218.007. TA abuses multi-line (/* ,*/) comments to hide malcode and bypass detections - VT detections 20/62. Distro MSI IP: tp://95.164.17[.]212/BEST[.]msi
Tweet media one
Tweet media two
Tweet media three
0
3
15
@CapeSandbox
CAPE Sandbox
10 months
#BruteRatel config & payload extraction, syscall capture #BRC4
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@Cryptolaemus1
Cryptolaemus
10 months
#Latrodectus - #BruteRatel - .pdf > url > .js > .msi > .dll. 18.09.2024 👇. wscript.exe Document-21-29-08.js. msiexec.exe /V. MSI152A.tmp /DontWait. rundll32.exe C:\Users\Admin\AppData\Roaming\x64_stealth.dll, clBuildProgram. (1/3) 👇. IOC's.
Tweet media one
1
24
71
@CapeSandbox
CAPE Sandbox
1 year
BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
Tweet media one
Tweet media two
Tweet media three
0
21
88
@CapeSandbox
CAPE Sandbox
1 year
Apologies to users of - unfortunately the server was water damaged in a data centre flood☹️. We appreciate your patience and understanding while we work on recovery🙏 Stay tuned for updates!.
6
1
27
@CapeSandbox
CAPE Sandbox
1 year
capa v7.0 dynamic output now fully integrated in CAPE Sandbox 🎉. For example:
Tweet media one
7
4
37
@CapeSandbox
CAPE Sandbox
1 year
RT @D00m3dR4v3n: Dynamic #capa: Exploring Executable Run-Time Behavior with the @CapeSandbox
0
8
0
@CapeSandbox
CAPE Sandbox
1 year
RT @InvokeReversing: We've uploaded our lecture on Automating Malware Triage from our Introduction to Malware Binary Triage course. Huge sh….
0
13
0
@CapeSandbox
CAPE Sandbox
2 years
RT @D00m3dR4v3n: So far #CAPEsandbox on #GCP = <3.
0
1
0
@CapeSandbox
CAPE Sandbox
2 years
Tweet media one
0
3
0
@CapeSandbox
CAPE Sandbox
2 years
RT @ka1do9: Lightweight blog alert!. This post goes over fast Bumblebee unpacking and configuration extraction. I've come across posts wher….
0
4
0
@CapeSandbox
CAPE Sandbox
2 years
#Vidar config extraction now in CAPE!. Thanks to @AnFam17 🙏. For example:
Tweet media one
Tweet media two
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
1/ You might have noticed that my area of interest is specifically stealers and RATs 😅.Wrote the configuration extractor for #Vidar stealer
Tweet media one
18
14
52
@CapeSandbox
CAPE Sandbox
2 years
#RedLine config extraction now in CAPE. For example: A huge thank you to @Gi7w0rm 🙏❤️
Tweet media one
@Gi7w0rm
Gi7w0rm
2 years
Proud to have my old #RedLine #Stealer config extractor featured in @CapeSandbox. A pleasure to collaborate :). Actually a deserved shoutout again to @huettenhain who taught me how to do it using byte-patterns ❤️.
1
3
22
@CapeSandbox
CAPE Sandbox
2 years
RT @node5: Do you love making detection things? Do you hate bad guys? I might have just the job you are looking for. Apply to join me, @swi….
0
7
0
@CapeSandbox
CAPE Sandbox
3 years
#Nighthawk config extraction by @ka1do9 🙏.
Tweet media one
@ka1do9
Nikhil Hegde
3 years
First open-source contribution! #Nighthawk DLL configuration parser in @CapeSandbox :
0
5
13