P0C Profile
P0C

@FlxP0C

Followers
154
Following
330
Media
0
Statuses
215

IT Security | Reverse Engineering | Malware | Former member of @FluxFingers | Team Lead in R&D at @GDataSoftwareAG at day | Malware Reversing at night

/dev/random
Joined May 2010
Don't wanna be here? Send us removal request.
@gdata_adan
G DATA Advanced Analytics GmbH
4 years
We have reason to assume with high confidence that #Emotet is active again and currently distributed via #Trickbot
4
119
179
@lazy_daemon
Robert Giczewski
5 years
Check out my latest blog post on having fun with a #ursnif vbs dropper. some funny anti-sandbox tricks inside.. https://t.co/RhqfEzkzAe @JAMESWT_MHT @hasherezade @VK_Intel @tbarabosch
malware.love
malware.love
1
13
25
@piq9117
piq and 69 others
5 years
Don't forget! When you get into your new job, rebase-squash the codebase into 1 commit with the message "Legacy code"
55
774
5K
@Jackson_T
Jackson T.
5 years
Want to see what EDR sensors see when you practice attacks and develop bypasses, without tipping off defenders? I'm starting a new series on reversing and evading EDRs, with a paper on how to divert telemetry to private infrastructure. Check it out! https://t.co/i7zy1xbNPh
6
176
425
@0xrepnz
Ori Damari
6 years
Windows APC internals Series: In this post I explain about KiUserApcDispatcher, Wow64 internals, The Wow64 APC, APC Injection from a 64 bit process to Wow64 and backwards and more! In the next post we'll finally talk about Kernel APC! Stay tuned 😺 https://t.co/kEAKZYN3tc
5
210
463
@bogdanvennyk
Bogdan Vennyk 🇺🇦
6 years
I just published How to avoid falling down the rabbit hole while analyzing malware
link.medium.com
In this article I would like to take a step back and get a bird’s eye view on the malware analysis process..
3
126
327
@FlxP0C
P0C
6 years
The Dnschess challenge was quite nice. But now my brain is fried and I need a break #flareon6
0
0
0
@devonzuegel
Devon ☀️
7 years
"We build our computer systems the way we build our cities: over time, without a plan, on top of ruins." — Ellen Ullman
25
818
3K
@jaydinbas
Johann Aydinbas
7 years
The FormBook malware has a creative approach to hiding encrypted strings - it stores them in gibberish code as operands and retrieves them using a small disassembly engine. Wrote a short post about it here: https://t.co/ey1UVxX1Vq
2
22
48
@felixw3000
Felix
7 years
🔥 New blog: Hancitor's packer demystified 🔥: https://t.co/horTtcf02M | 📖 step-by-step unpacking guide | 🧐 insight into a packer which has been used by many malware families | 🙏 h/t for sharing samples & writeups: @James_inthe_box @0verfl0w_ @VK_Intel @malware_traffic
7
116
239
@ItsReallyNick
Nick Carr
7 years
We found the full CARBANAK source code & previously unseen plugins. Our #FLARE team spent 500 hours analyzing the 100,000+ lines of code. @mykill & @jtbennettjr just dropped day 1 of their 4-part blog series: https://t.co/0DULpYoDzq Source code linked in blog. #CarbanakWeek 🦈💳
15
430
768
@raashidbhatt
Raashid Bhat
7 years
Dissecting Emotet’s network communication protocol ~ https://t.co/drLKvCOkSE #Emotet
0
50
84
@foxit
Fox-IT
7 years
We just released mkYARA: a tool to generate YARA rules based on executable code, wildcarding variable values such as stack offsets, memory addresses etc. https://t.co/9XwAVIuDCu
3
225
452
@FlxP0C
P0C
7 years
Using IDA Python to analyze Trickbot: How to deal with encrypted strings and an IAT created during runtime in IDA Python. My latest piece on
0
2
3
@ynvb
Yaniv Balmas
7 years
#KARTA - A new, super cool, #ida plugin we just released. A modular framework for identifying and matching open source library symbols within large binaries. kudos to @EyalItkin for creating it (!) Check it out.
Tweet card summary image
github.com
Karta - source code assisted fast binary matching plugin for IDA - CheckPointSW/Karta
3
25
71
@Blackmond_
Evilcry_
7 years
A tutorial walking through the process of devirtualising programmes protected by VMProtect 3
0
57
96
@peppermalware
J.A.R.V.I.S
7 years
Analysis of BlackMoon (Banking Trojan)'s Evolution, And The Possibility of a Latest Version Under Development https://t.co/KSe8Wykrmq #MALWARE #BLACKMOON #KRBANKER #BINDIFF
0
12
10
@0verfl0w_
0verfl0w
7 years
I've finally got around to completing my first post on reversing #ISFB, specifically, unpacking and analyzing the first stage loader (executable): https://t.co/IMYXRcG4UZ As always, all samples mentioned have been uploaded to @virusbay_io
6
129
255
@marc_etienne_
Marc-Etienne M.Léveillé
7 years
Two popular games and one gaming plaform application were found having a similar backdoor planted by a group that compromised the asian developpers. Our analysis:
welivesecurity.com
Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software
0
14
16