r3c0nst Profile Banner
Frank Boldewin Profile
Frank Boldewin

@r3c0nst

Followers
5K
Following
1K
Media
125
Statuses
1K

Reverser, Malware Researcher, Threat Intelligence dude, focused on hunting APTs targeting the financial industry. https://t.co/lLGcnbam8y

Germany
Joined January 2015
Don't wanna be here? Send us removal request.
@r3c0nst
Frank Boldewin
7 years
Slides from my V00d00 talk -> Operation FastCash - Hidden Cobra's AIX PowerPC malware dissected #Malware #DFIR #Hacking #APT38 #Lazarus #ATM
Tweet media one
5
92
163
@r3c0nst
Frank Boldewin
2 months
The repo contains challenges for the labs in the course AI Red Teaming in Practice taught at BH 2024 teaching adversarial ML and Responsible AI failures, enabling a holistic approach to identifying potential issues before an AI system is deployed. 😎.
Tweet card summary image
github.com
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure. - microsoft/AI-Red-Teaming-Playground-Labs
0
1
7
@r3c0nst
Frank Boldewin
5 months
Safe Wallet & Mandiant report on #Bybit hack. Good read!.
@safe
Safe.eth
5 months
0
0
1
@r3c0nst
Frank Boldewin
5 months
RT @zachxbt: Lazarus Group just connected the Bybit hack to the Phemex hack directly on-chain commingling funds from the intial theft addre….
0
2K
0
@r3c0nst
Frank Boldewin
5 months
RT @PixOnChain: This is Lazarus. They just stole $1.46 billion from Bybit. And they didn’t break the code — they broke the people. Here’s u….
0
5K
0
@r3c0nst
Frank Boldewin
5 months
RT @ESETresearch: #ESETresearch has released DelphiHelper, a plugin for #IDAPro that aids in analyzing Delphi binaries. Check it out on ESE….
0
81
0
@r3c0nst
Frank Boldewin
2 years
Slides, code and #YARA rules from the workshop I recently teached internally covering various aspects including C and Python API usage, tips & tricks when developing rules and 5 challenges and its solutions. Thanks @wxs for reviewing the slides. #DFIR.
Tweet media one
3
144
338
@r3c0nst
Frank Boldewin
2 years
Linpmem - physical memory acquisition tool for Linux Good job by Viviane Zwanger. #Forensics #DFIR
Tweet media one
0
16
16
@r3c0nst
Frank Boldewin
2 years
Ever tried to reverse #NIM #Malware ? More fun, less pain with the new #IDAPro plugin from my buddy Holger Unterbrink.
Tweet media one
3
19
70
@r3c0nst
Frank Boldewin
3 years
=> „BugChecker is a SoftICE-like kernel and user mode debugger, supporting Windows versions from XP to 11, both x86 and x64)“ #SoftIce #Debugging #Oldschool
Tweet media one
7
95
256
@r3c0nst
Frank Boldewin
3 years
(7/7) Bonus => Decrypting+Dumping the 2nd stage binary. Set Breakpoint on the VirtualAlloc function as shown in the screenshot, click "Continue", at Breakpoint select "Array" + right click-> Save. Now proceed to the dumped 2nd stage of this malware ;)
Tweet media one
0
0
9
@r3c0nst
Frank Boldewin
3 years
(6/7) Continue until Breakpoint reached. Then step via F11 and reach the desired malicious dll method.
1
0
4
@r3c0nst
Frank Boldewin
3 years
(5/7) Search Assemblies (CTRL+Shift+K ) => UnsafeInvokeInternal (double click to jump to this function. Set breakpoint on "return RuntimeMethodHandle.InvokeMethod(. "
Tweet media one
1
0
7
@r3c0nst
Frank Boldewin
3 years
(4/7) Select "Debug->Start Debugging", enter arguments as shown in screenshot and select "Entry Point" at "Break at"
Tweet media one
1
1
7
@r3c0nst
Frank Boldewin
3 years
(3/7) Namespace "Congratulations" - Class "tunnel" - Method of interest "atlanta"
Tweet media one
1
0
5
@r3c0nst
Frank Boldewin
3 years
(2/7) First find a suitable .net dll loader, e.g. SharpDllLoader or RunDotNetDll (find them on Github) and load the malicious .net dll into DNSPY to find the desired method to inspect and its arguments to reach it.
1
0
8
@r3c0nst
Frank Boldewin
3 years
(1/7) How to debug a malicious .net dll using #DNSPY.Recently I got asked if it is possible to debug a malicious .net dll using DNSPY. Afaik there is no integrated debugger function for it, so here is my indirect approach. As an example I use the dll shown in the screenshot below
Tweet media one
3
96
291
@r3c0nst
Frank Boldewin
3 years
#Nighthawk C2 framework #YARA rule.#DFIR.
1
31
81
@r3c0nst
Frank Boldewin
3 years
#IDAPro v8.0 is out with lots of new features, e.g. IDA Teams, a new decompiler for ARC, better firmware analysis and comes with nicely enhanced #Golang support. Bye bye Python2.
Tweet media one
2
60
254
@r3c0nst
Frank Boldewin
3 years
Slides from my @a41con talk are available now, at least a slightly stripped community version. This was by far the most interesting #ATM #Blackboxing investigation for me. #YARA rule -> #malware #DFIR
Tweet media one
5
46
94