YungBinary Profile
YungBinary

@YungBinary

Followers
618
Following
954
Media
53
Statuses
138

Malware Research @eSentire

Joined October 2016
Don't wanna be here? Send us removal request.
@YungBinary
YungBinary
2 days
New blog on #Sinobi ransomware! They used an MSP's compromised SonicWall SSL VPN creds for initial access. Decryption is impossible w/o the attacker's private key, unless of course you hooked CryptGenRandom😜.
Tweet media one
4
57
153
@YungBinary
YungBinary
7 days
Seeing a (potential new?) python-based backdoor we're tracking as #PyNightshade for the second time delivered via #ClickFix that uses sockets for C2. Supports several commands from C2, including: remote shell, uploading files from the victim host, and self-deletion. It uses RC4
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
39
164
@YungBinary
YungBinary
12 days
Dropping a new malware config parser for #Amadey!. Update your CAPEv2 parsers:. > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor'. Check it out here:.
Tweet media one
0
16
73
@YungBinary
YungBinary
18 days
Fun tip, if you find you're unable to retrieve a "fileless" stage in a malware chain, e.g. invoked .NET DLL stage, you can download memory dumps from VirusTotal, search through them for known strings or bytes that should be in the payload, open in hex editor, and find the
Tweet media one
Tweet media two
2
23
165
@YungBinary
YungBinary
23 days
Literally me after stepping outside for 5 minutes in this Vegas heat 🥵
Tweet media one
1
0
7
@YungBinary
YungBinary
24 days
Dropping a new tool to extract malware configurations from #MonsterV2 samples, enjoy! 🙂.
Tweet media one
2
6
52
@YungBinary
YungBinary
28 days
New blog is out on #InterlockGroup and has a wealth of TTPs for detection engineers, tools for security researchers, deobfuscated scripts, and a C2 simulation script for #InterlockRAT ! Screenshots below show the deobfuscated PHP-based backdoor and annotated communications of
Tweet media one
Tweet media two
1
27
82
@YungBinary
YungBinary
28 days
New blog is out on a python-based stealer we discovered being used by ShadowCoil (ex-RansomHub affiliate)! Included in the blog is a tool to unpack scripts automatically, screenshot below shows what one of these packed scripts look like.
Tweet media one
1
16
50
@YungBinary
YungBinary
1 month
Indicators of Compromise can be found here ->
Tweet card summary image
github.com
Contribute to eSentire/iocs development by creating an account on GitHub.
1
1
7
@YungBinary
YungBinary
1 month
Here's some hashes for those interested!. e5ce3951f82531943d68b4eb1a8e13c2.cfeffd65de53fcc69a7b98dec9e83d93.9c24b44d27161ad72a0931fa5057faf3.015338c3eaf42c0da81867df798173bd.1d490b4312d5624b98fc3bd76e444e1a.223e6354ed974886e4ea8ae7ae3da0db.8cfed2d9889352d1a14a4a17d8c3b753.
0
1
5
@YungBinary
YungBinary
1 month
#CyberStealer malware targets everything from crypto wallets to password managers. New malware analysis blog out now!.
Tweet media one
Tweet media two
3
28
88
@YungBinary
YungBinary
1 month
RT @p3bt3b: Just dropped a blog uncovering #GhostCrypt👻, a novel crypter powering the #PureRAT (successor of #PureHVNC). It uses #Process….
0
24
0
@YungBinary
YungBinary
1 month
Looks like #Interlock #Ransomware group has logic in their backend to detect sandboxes and virtual machines by sending data retrieved via the systeminfo command and matching strings, then they return a benign PowerShell command that downloads/executes a .NET SDK installer rather
Tweet media one
Tweet media two
0
6
28
@YungBinary
YungBinary
2 months
Introducing ThreadSlayer: a tool I created to securely prepare hacking forum thread content for internal sharing. It does this by parsing a PDF dump of the thread and sanitizing embedded URLs/redacting specified usernames, userIDs, etc.
Tweet media one
1
5
21
@YungBinary
YungBinary
2 months
Threat actors decompiled and recompiled SonicWall's .NET based NetExtender client to include a backdoor that harvests VPN credentials ->.
Tweet media one
0
14
61
@YungBinary
YungBinary
2 months
Updated #Lumma stealer C2 extractor! See
Tweet media one
0
27
99