's Avatar

@qutluch.bsky.social

When these frail shadows we inhabit now have quit the stage, we'll meet and raise a glass again together in Valhalla.

165 Followers  |  821 Following  |  21 Posts  |  Joined: 07.02.2024  |  1.7732

Latest posts by qutluch.bsky.social on Bluesky

Preview
The Gist: Age Verification is an Epic fail From the 21st July 2025, Ireland’s regulator will be enforcing age checks at the door for social media sites in the EU. This is the Gist.

New Gist: Age Verification is an Epic fail

On Bluesky's introduction of age verification, selling us to the Fortnite guys, and how the arrogance of Ireland's regulator has seen it deliver the very outcomes it once called "bonkers".

www.thegist.ie/the-gist-age...

13.07.2025 13:19 β€” πŸ‘ 119    πŸ” 80    πŸ’¬ 5    πŸ“Œ 20

This entire thread is head shot nerd sniping, Greg. I'll brb. Need more time to reply. Keep UNCs. Keep APTs or named actors. There's valid uses but I have strong feelings for how they're used & how people merge groups and/or attribute into a group to say it's them rather than admit it's similar.

22.05.2025 04:23 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

We're guilty of it too. It happens. Keeping up to date with the code families &automating the plugin extraction is a full time job. The automation is important but lowering the bar & time required to do the RE to identity plugins & capability is great. Nino's work helped crush that analysis time.

29.01.2025 14:28 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It's always bothered me when I read a report saying "It was <pluggable code family PLUGDOOR>" but not always listing the minimum set of plugins (features) a sample was shipped with. Even if it supports loading further modules, clients should be informed of the minimum a threat actor had to hand.

29.01.2025 13:55 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Thanks. I've spent a lot of time working on pluggable code families like this & SOGU (PlugX). Ultimately the obfuscation defeated me. Nino did such an amazing job. I spent last year working a lot on making sure we can easily identify or at least extract and analyse plugins shipped with pplug.

29.01.2025 13:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
FreeBSD support Β· Issue #385 Β· actions/runner Describe the enhancement Support building the runner on FreeBSD Additional information I think FreeBSD has all the libraries that the runner needs. And while the dotnet-sdk isn't availble from Micr...

@github.com With regards actions could you please review this issue regarding #FreeBSD support. Maybe now that @netflix.com is reporting an impact to them you'll take it seriously. github.com/actions/runn...

23.01.2025 13:35 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Reverse Engineering Survey My name is Max 'Libra' Kersten and I'm a malware analyst. This survey will collect the answers you provide without the need for any personal information. The goal of this survey is to get a better und...

My reverse engineering workflows survey is still ongoing! In less than 3 minutes, you can fill it in and help out: docs.google.com/forms/d/e/1F...

16.01.2025 12:29 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image 14.01.2025 14:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image Post image Post image

Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies.

They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe.

08.01.2025 16:25 β€” πŸ‘ 51    πŸ” 26    πŸ’¬ 1    πŸ“Œ 8
Post image Post image

#100DaysofYara Day 5

My first ELF binary:

github.com/augustvansic...

I also learned how to use x64dbg to attach to a process and follow the kernel32.dll WriteProcessMemory stack call to find where the EDR DLL gets a handle on the process.

05.01.2025 17:00 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
100-Days-of-YARA-2025/Day5.yara at main Β· RustyNoob-619/100-Days-of-YARA-2025 100 Days of YARA is a challenge to write a YARA rule every day for 100 days - RustyNoob-619/100-Days-of-YARA-2025

x: @RustyNoob619

#100DaysofYARA Day 5

Added a couple of new YARA rules for TTPs 🐧

First is to detect embedded Windows PE payloads in a file as Base 64 encoding

Second is to spot modification of memory protect flags which is typically used for code injection/unpacking

github.com/RustyNoob-61...

05.01.2025 18:21 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

crossposting here #100daysofyara continuing to explore yara-x today I tried to detect a renamed QEMU exe using pe attributes and a dynamic variable.

05.01.2025 11:43 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Malware Analysis - Writing Code Signatures
YouTube video by MalwareAnalysisForHedgehogs Malware Analysis - Writing Code Signatures

πŸ¦” πŸ“Ή Video: Learn how to write code based signatures
➑️ using privateloader as example
➑️ what to detect
➑️ where to set wildcards
➑️ how to test your rule on unpac me
www.youtube.com/watch?v=oxC9...
#MalwareAnalysisForHedgehogs #privateloader

07.12.2024 07:05 β€” πŸ‘ 9    πŸ” 7    πŸ’¬ 1    πŸ“Œ 1
Preview
Exploring VenomRAT Metadata and Encryption with YARA - #100DaysOfYara It’s that time of year again - 100 Days of YARA! In this post I want to walk through how I use YARA to document malware analysis findings. YARA has loads of different use cases:

New blog post for #100DaysofYARA , in this one I look at a VenomRAT sample and create rules based on PE metadata and an encryption salt value.
forensicitguy.github.io/exploring-ve...
#malware

03.01.2025 02:28 β€” πŸ‘ 13    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

#100DaysofYARA we're brute forcing Steve's prompt with regular expressions :P

github.com/100DaysofYAR...

03.01.2025 15:12 β€” πŸ‘ 14    πŸ” 2    πŸ’¬ 3    πŸ“Œ 0
Post image Post image Post image

#100DaysOfYara Day 3

Thought this was an meterpreter implant but I compared it to an implant I made; much more functionality for the ITW sample. Rule = unique win32 api calls, IP’s, imports.

03.01.2025 15:11 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

#100daysofyara I like taking the approach of having multiple YARA rules to detect the same thing from different perspectives, like these rules for Cronos Crypter. One looks for just strings, another a string + encryption salt, 3rd for assembly name

02.01.2025 04:30 β€” πŸ‘ 8    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

#100DaysofYARA day 2 - one cluster in my portfolio, TA427 really likes to use password-protected ZIP files with an MSC file as the only embedded file (used to use .VBS files)

lets look for ZIPs that match those features!

github.com/100DaysofYAR...

02.01.2025 13:44 β€” πŸ‘ 10    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image Post image

#100DaysOfYara Day 2:

LBB.exe, Lockbit 4 PE

github.com/augustvansic...

02.01.2025 15:00 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
a man is standing in a store with his arms outstretched and says `` who 's comin ' with me ? `` ALT: a man is standing in a store with his arms outstretched and says `` who 's comin ' with me ? ``
02.01.2025 18:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
a man with a beard is making a funny face with his eyes closed and says `` click '' . ALT: a man with a beard is making a funny face with his eyes closed and says `` click '' .

Configured my neovim conform.nvim to run "yr fmt" on save. Looking forward to "yr lint" and hoping someday for a yara-x LSP.

01.01.2025 21:23 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I'm on the same page though. That's why I have tried a few options and always come back to an rcs. I've even worked on deduplication methods but it's not worth it. I have what works for me but experimenting is worth while and fun.

01.01.2025 18:59 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Game of Trees the main Game of Trees page

www.gameoftrees.org

01.01.2025 18:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Here she is during Christmas after a hard night drinking imperial stout & reviewing yara rules.

01.01.2025 18:46 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Gitea self-hosted at home right now. I guess my playing with a new service was more a yara-x Golang bindings project than anything else. Probably won't be useful to anyone else. I write plenty of rules at homes & my dog reviews them all. She says they're all quality.

01.01.2025 18:43 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Also not sure what platform I'll post on. Shitter, BSky, Mastodon or if I'll just PR on GitHub. I was also working on a new service at home for storing my rules. I tried synapse for rule management but in the end I prefer something standalone / decoupled from everything else.

01.01.2025 18:30 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Gonna take a hangover day & start #100DaysOfYara late. Couldn't keep up last year & I'll see how it goes this year. I don't have the creativity of @greg-l.bsky.social Might do some scripting & play more with yara-x like @stvemillertime.bsky.social I have a half written gRPC service for file scanning

01.01.2025 18:24 β€” πŸ‘ 9    πŸ” 1    πŸ’¬ 2    πŸ“Œ 0
Post image Post image Post image

Ok day 1 of #100DaysofYara:

I assigned some strings based on the less common lines from the Lockbit 4 loader that would likely be common in malicious code and not typically in normal admin, as well as a hex string for the PE itself

01.01.2025 17:19 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Post image Post image

#100DaysofYARA day 1 - the Amos stealer is regularly evolving and updating its obfuscation techniques

You know what isn't changing?

the dylibs it depends on and the entitlements it requests from the OS. Combined, they give us excellent signal

github.com/100DaysofYAR...

01.01.2025 16:36 β€” πŸ‘ 16    πŸ” 5    πŸ’¬ 2    πŸ“Œ 0

#100DaysofYARA 2025 edition begins tomorrow!

Any #CTI or #detectionengineering folks looking for a self-paced challenge to start the year with a laid back & fun community? Look no further!

The challenge is simple - write a YARA rule every day for 100 days

31.12.2024 18:47 β€” πŸ‘ 21    πŸ” 9    πŸ’¬ 1    πŸ“Œ 0

@qutluch is following 20 prominent accounts