Using Bitwise NOT operations to obfuscate commands in PowerShell

May 24, 2024

Bitwise NOT commands are often used in PowerShell malware samples to obfuscate commands. A bitwise NOT operation flips all the bits in a given byte sequence. There are many ways…

๐Ÿ“Œ
read more

Relearning C Part 1 – Windows TCP Server

October 22, 2024

Recently, I was inspired to dive back into C, this time with a Windows focus. I’ve had previous experience with the basics in college, but I spent all that time…

๐Ÿ“Œ
read more

PE Files and How to Create a PowerShell PE File Parser

July 11, 2024

This is taken from my project Invoke-PEAnalysis. PE File Types To begin with, Portable Executable (PE) is the name given to executable images developed for the Windows operating system. Most…

๐Ÿ“Œ
read more

The Problem with PowerShell Logging Bypasses

June 24, 2024

Before we start talking about logging bypasses and why they generally suck at bypassing logs, I’ll provide a little context on PowerShell logging and ScriptBlocks. PowerShell ScriptBlocks are collections of…

๐Ÿ“Œ
read more

I-S00N leaks

February 19, 2024

Several days ago, a Github profile allegedly containing leaked documents on the Chinese government’s cyber offensive capabilities was posted. This repository contains multiple chat logs, call records, various images, and…

๐Ÿ“Œ
read more

The Evolution and Analysis of SolarMarker Project Announcement

February 14, 2024

SolarMarker is one of the more common Infostealers out there. Every analyst is probably tired of seeing users clicking SEO-poisoned links and downloading some variation of Totally-Not-Malware-PDF.exe. Originally observed in…

๐Ÿ“Œ
read more

GuLoader Analysis

December 15, 2023

This week I was browsing MalwareBazaar for interesting samples and came across a GuLoader VBS upload. I’m still pretty new to malware analysis and I haven’t done anything with VBS…

๐Ÿ“Œ
read more

Gravwell search API PowerShell Module

December 7, 2023

This quick and easy PowerShell module was designed to facilitate search queries between a Gravwell search API endpoint and a local client. It supports pre-configured JSON profiles for running repeated…

๐Ÿ“Œ
read more

Playing around with Solarmarker/Jupyter InfoStealer

December 3, 2023

Jupyter InfoStealer is fairly common these days. We certainly see a lot of users downloading it in various forms. It’s typically spread through Search Engine Optimization (SEO) poisoning, convincing users…

๐Ÿ“Œ
read more

Honeypot Statistics Week 2 & 3

December 2, 2023

This is a compilation of the last two weeks of traffic analysis. As always, this is a low-interaction honeypot that deploys FTP, SSH, Telnet, HTTP, HTTPS, IMAP, and VNC honeypots….

๐Ÿ“Œ
read more