struppigel Profile Banner
Karsten Hahn Profile
Karsten Hahn

@struppigel

Followers
25K
Following
24K
Media
2K
Statuses
9K

MalwareAnalysisForHedgehogs, Principal Malware Researcher at GDATA, he/him 🦔🌈🏳️‍⚧️

International
Joined May 2014
Don't wanna be here? Send us removal request.
@SquiblydooBlog
Squiblydoo
1 day
CertCentral is now TheCertGraveyard[.]org & CertGraveyard[.]org. The CertCentral API returns an error directing to use the new domains. Please give me a like or a share to get the word out. Also use the site to report and investigate certificates used to sign malware. :)
@SquiblydooBlog
Squiblydoo
3 days
I'm being required to give up the domain CertCentral[.]org; and the change has to happen by Monday. I'm noodling on alternative names. Keep an eye out for the change.
5
40
68
@struppigel
Karsten Hahn
2 days
I added a RenPy archive (.rpa, .rpi) extractor to my tools repo https://t.co/cTUNlHTGZp
0
2
23
@ThreatrayLabs
ThreatrayLabs
4 days
Last week, @SophosXOps reported a new packer/crypter called #Shanya (aka #ArmillariaLoader by @ciphertech). We hunted for this packer across our dataset and identified several early, previously unreported samples. The earliest sample observed in the wild dates back to December
1
9
36
@vxunderground
vx-underground
7 days
Giveaways coming up: - @struppigel sponsoring malware analysis course giveaways for "Malware analysis for hedgehogs" (x10) - @nikhil_mitt sponsoring CRTE(x3) and CARTP(x3) - @HCAdamSec sponsoring 2024, 2025, DEFCON Aerospace village badge and RADIO SAO. These sold out at
78
26
383
@struppigel
Karsten Hahn
10 days
Baoloader/TamperedChef paper by @SerkanSirmaci https://t.co/7fiO4VB7Vy
0
16
58
@synthient
Synthient
13 days
https://t.co/amWPj0XJnP A look into the internals behind a large-scale proxy operation, from the sourcing of IPs to the platform itself. How proxy providers utilize everything from TV boxes to free software for building out a pool of unique proxies.
Tweet card summary image
synthient.com
A look into the internals behind a large-scale proxy operation, from the sourcing of IPs to the platform itself. How proxy providers utilize everything from TV boxes to free software for building out...
6
21
140
@haider_kabibo
Haidar
15 days
Final part of the first wave of RPC is live, RPC part8. In this part, I explain how to use IDA to reverse RPC clients and servers, and I show the key structures and methods you need to extract all the important information during the reversing process. https://t.co/lgaE52Uc9P
Tweet card summary image
sud0ru.ghost.io
Welcome to the next part of the IPC series, and the final part of the first wave of RPC series. In this post, we will look at the tools you can use to reverse-engineer an RPC server. This part...
1
24
82
@struppigel
Karsten Hahn
15 days
0
0
5
@struppigel
Karsten Hahn
15 days
🦔📹 New Video: Modifying @vinopaljiri's string decrypter for a ConfuserEx2 variant ➡️ Defeating antis with Harmony hooks ➡️ AsmResolver ➡️ .NET string deobfuscation #MalwareAnalysisForHedgehogs https://t.co/G1mOunwcEq
2
36
99
@nextronresearch
Nextron Research ⚡️
17 days
We spotted a malicious #VSCode (@code) extension today in our artifact-scanning pipeline. It appeared under a name that tries to pass itself off as the popular Material Icon Theme. A new 5.29.1 version was pushed today (28.11., 11:34) and the update contains two Rust implants –
4
39
117
@struppigel
Karsten Hahn
17 days
Black Friday offers: ➡️60% off for 2 malware analysis courses (beginner & intermediate) ➡️Or 40% off for single course https://t.co/jGZOa9nEUV
Tweet card summary image
malwareanalysis-for-hedgehogs.learnworlds.com
2
20
86
@SquiblydooBlog
Squiblydoo
22 days
CertCentral is now categorizing malware and adding analyst notes. If these are available, you'll see a button to expand the entry. 600/1700 entries have notes so far and the rest will be updated. Type is available in the CSV export. Both fields are returned by API lookups. 1/2
1
14
57
@struppigel
Karsten Hahn
23 days
Lecture on Anti Tamper by Tim Blazytko
0
9
30
@ShadowOpCode
ShadowOpCode
26 days
🚨NEW python stealer🚨 🛸Drops .pyd in %APPDATA%\Local\Temp\_MEIxxxxx ⚠️Relaunch itself via CreateProcessW Exfil👇 browser cookies and password Discord Steam 📡send data via telegram bot C2: api[.telegram[.org/bot8484778379:AAG_EhhM1Ao139HBPfgfV0zVlMSi-2HfkCM/sendMessage bazaar👇
2
8
22
@luke92881
Luke Acha
25 days
Writeup of new PDF malware converter: https://t.co/XzSEinPcyt Persistence, remote code execution, browser hijack, obfuscation, and more. #YAPA #EvilAI @SquiblydooBlog @MalasadaTech808 @x3ph1 @SecurityAura
3
21
70
@struppigel
Karsten Hahn
26 days
Rhadamanthys loader deobfuscation https://t.co/rDvK0uqgiV
1
30
80
@struppigel
Karsten Hahn
26 days
Awesome interview and showcase with Tim Blazytko about obfuscation and deobfuscation. https://t.co/HWvIvtbA9a
0
9
58