SquiblydooBlog Profile Banner
Squiblydoo Profile
Squiblydoo

@SquiblydooBlog

Followers
4K
Following
8K
Media
327
Statuses
1K

Malware Analysis Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0 Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9

Joined November 2020
Don't wanna be here? Send us removal request.
@SquiblydooBlog
Squiblydoo
4 years
Why, hello there, #solarmarker.
Tweet media one
6
18
113
@SquiblydooBlog
Squiblydoo
5 hours
Low detection #bumblebee .Distributed disguised as NetSetMan.msi . "LLC Onixgroup".--.I don't post every cert we report. But if you want to see what gets reported, use Cert Central or the Cert Central API. certcentral[.]org
0
0
3
@SquiblydooBlog
Squiblydoo
10 hours
Files on MB Didn't do any in the sandbox analysis. 🤔. AnyRun flags the file as sus due to the code-signing signature
Tweet media one
0
0
2
@SquiblydooBlog
Squiblydoo
10 hours
Pro tip:.If you receive a screen saver named "Coinbase_incident_report.scr"* you shouldn't run it. *file format SCR is identical to EXE.--.Disguised as PDF.Code-signed by "GeoTech-IT Oy". h/t @g0njxa .also uploaded to MB by @JAMESWT_WT ❤️.🔗🧵
Tweet media one
2
5
14
@SquiblydooBlog
Squiblydoo
1 day
Add to DB:.certCentral -s VT -# 8bfdd239da6948b4903a92287cd6e15f86d96187c36ed75e796d99adcc09f66f -p -t OdysseyStealer. -s specifies to use VT.-# passes a hash (Cert Central requires SHA256 right now).-p requires Cert Central API key.-t assigns malware name.
0
1
4
@SquiblydooBlog
Squiblydoo
1 day
Have you wanted to report signed Mac binaries like this one?.Now you can with certReport 3.3* (pip install certreport). You can also add them to the Cert Central DB with -p, and tag a malware family with -t. Easy. See thread for more detail. *VT API key required
Tweet media one
Tweet media two
Tweet media three
2
3
16
@SquiblydooBlog
Squiblydoo
1 day
Note: Some certificates have multiple entries because when they don't get revoked, they get resold. Cert Central exists to stop this problem. You can continue to help by reporting via Cert Central or using the certReport to report files! .
0
1
6
@SquiblydooBlog
Squiblydoo
1 day
1337 entries in Cert Central. This represents ~1300* unique code-signing certificates issued to cybercriminals for abuse; a lot of disrupted malware delivery; a lot of wasted money; and a lot of headaches for cybercriminals. Thank you all for your support. *see thread for note
Tweet media one
1
9
31
@SquiblydooBlog
Squiblydoo
5 days
Thats the way I like my libssl.dll: signed by a Indian company that makes nutrients for livestock "GAUAMRIT NUTRICARE PRIVATE LIMITED". MD5: ae0912ba4a5bff3f3543f5f393446adb. https://bazaar.abuse[.]ch/browse.php?search=serial_number:737c5c461d3864ac4f089e26.h/t @g0njxa
Tweet media one
3
3
21
@SquiblydooBlog
Squiblydoo
6 days
Fake DBeaver signed by "LLC Vtorsintez" 🇷🇺.MD5: 4fa9f678df14a33e2e5480d63604f811.(Too big for MalwareBazaar). https://tria[.]ge/250711-n4tsnst1fs/behavioral1. Anti-analysis: wmic memorychip get Capacity -> exits.h/t @g0njxa .@JAMESWT_WT
Tweet media one
2
6
17
@SquiblydooBlog
Squiblydoo
8 days
@g0njxa Triage report:
0
1
4
@SquiblydooBlog
Squiblydoo
8 days
Dear #Bumblebee malware dev, do you really need 199 dga domains?.--.Signed "LLC Invest Center". Appears to be delivered via ads for Advanced IP Scanner and ManageEngine-OpManager. https://bazaar.abuse[.]ch/browse.php?search=serial_number:073b9b32fe16b00a4268f97b. h/t @g0njxa
Tweet media one
Tweet media two
3
7
34
@SquiblydooBlog
Squiblydoo
9 days
More often than not, when I see a malware config extracted by VirusTotal, it is due to a config extractor in CAPE Sandbox. Thanks to all the folk who contribute.
@CapeSandbox
CAPE Sandbox
9 days
@SquiblydooBlog @JAMESWT_WT #Latrodectus config & payload extraction.
Tweet media one
Tweet media two
Tweet media three
1
0
24
@SquiblydooBlog
Squiblydoo
9 days
Low detection #Latrodectus .signed "LLC Jupiter". MD5: 2c2b6ab5549fe70cd9befe1ef5ac63a3.MB: https://bazaar.abuse[.]ch/browse/tag/LLC-Jupiter/. C2: gorahripliys[.]com, aliondrifdions[.]com.@JAMESWT_WT
Tweet media one
1
7
26
@SquiblydooBlog
Squiblydoo
10 days
Wondering if a code-signing certificate has been reported? See it in one of your favorite tools: Cert Central's blocklist is now appears in MalwareBazaar!. We've reported ~300 certs so far this year; it is on pace for a record. Keep an eye out and keep uploading. :)
Tweet media one
1
10
54
@SquiblydooBlog
Squiblydoo
15 days
RT @ExpelSecurity: ⚠️ New version of the malware disguised as PuTTy. The files are signed “Alternative Power Systems Solutions LLC”. Fake P….
0
8
0
@SquiblydooBlog
Squiblydoo
16 days
RT @1ZRR4H: ⚠️ "New" #CrazyEvil campaign 🇷🇺.Landing domain: rivatalk[.]com. As usual, there is a signed malware for Windows ("Heze Hongwei….
0
13
0
@SquiblydooBlog
Squiblydoo
18 days
Low detection pre-ransomware.Signed "TOLEDO SOFTWARE LLC". C2: 45.86.230.77, 185.208.158.119, 85.239.52.99. VT: 3d6da75764c043cd2ceb7b35028ec79b. https[:]//bazaar.abuse.ch/browse.php?search=serial_number:33000373da29c35a6ac0484d690000000373da
Tweet media one
0
4
26
@SquiblydooBlog
Squiblydoo
20 days
TribeWars scam signed "Al-Base Trading Corp.". Actors commonly abusing code-signing certificates targeting cryptowallets. Launches a CAPTCHA for anti-analysis by sandboxes.
Tweet media one
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
21 days
Nearly a year after @g0njxa and I exposed #CryptoLove (now defunct due to alleged exit scam), we are still tracking the launchers. Evidence suggests former CL members may have migrated to #FRIENDSCOMPANY and other groups. Help us protect the community - please report their
Tweet media one
Tweet media two
Tweet media three
2
6
13