09/28

VirusTotal - File - 591c2cd3a9b902a182fbf05bf5423cae17e3e6874c0d2e09107e914d86f39780

https://www.virustotal.com/gui/file/591c2cd3a9b902a182fbf05bf5423cae17e3e6874c0d2e09107e914d86f39780
VirusTotal - File - 591c2cd3a9b902a182fbf05bf5423cae17e3e6874c0d2e09107e914d86f39780

The difference between signature-based and behavioural detections | S3cur3Th1sSh1t

https://s3cur3th1ssh1t.github.io/Signature_vs_Behaviour/
The difference between signature-based and behavioural detections | S3cur3Th1sSh1t

MalwareBazaar | SHA256 8b440ad96f7ed8319419fbae878d48db0ad81107ede8ef862f8f0dc65ea8b527

https://bazaar.abuse.ch/sample/8b440ad96f7ed8319419fbae878d48db0ad81107ede8ef862f8f0dc65ea8b527/
MalwareBazaar | SHA256 8b440ad96f7ed8319419fbae878d48db0ad81107ede8ef862f8f0dc65ea8b527

Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks

https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/
Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks

Qakbot/Qakbot_BB_28.09.2022.txt at main · pr0xylife/Qakbot · GitHub

https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_BB_28.09.2022.txt
Qakbot/Qakbot_BB_28.09.2022.txt at main · pr0xylife/Qakbot · GitHub

MalwareBazaar | SHA256 ac75ab4c3a8ee0979b4ea982b38ae9eea6c94ab8e3459705fe5529c3653a853f

https://bazaar.abuse.ch/sample/ac75ab4c3a8ee0979b4ea982b38ae9eea6c94ab8e3459705fe5529c3653a853f/
MalwareBazaar | SHA256 ac75ab4c3a8ee0979b4ea982b38ae9eea6c94ab8e3459705fe5529c3653a853f

MalwareBazaar | SHA256 466484398eb25d42b0e0b095f10590a566610447eb212d1dc7f7bd342e89fe5a (Quakbot)

https://bazaar.abuse.ch/sample/466484398eb25d42b0e0b095f10590a566610447eb212d1dc7f7bd342e89fe5a/
MalwareBazaar | SHA256 466484398eb25d42b0e0b095f10590a566610447eb212d1dc7f7bd342e89fe5a (Quakbot)

Qakbot/Qakbot_obama207_28.09.2022.txt at main · pr0xylife/Qakbot · GitHub

https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_obama207_28.09.2022.txt
Qakbot/Qakbot_obama207_28.09.2022.txt at main · pr0xylife/Qakbot · GitHub

MalwareBazaar | SHA256 8a4d0f98792dbd499c3cabe38360d6091559d779c01cd814c306584114b87034

https://bazaar.abuse.ch/sample/8a4d0f98792dbd499c3cabe38360d6091559d779c01cd814c306584114b87034/
MalwareBazaar | SHA256 8a4d0f98792dbd499c3cabe38360d6091559d779c01cd814c306584114b87034

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

https://thehackernews.com/2022/09/hackers-using-powerpoint-mouseover.html
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

Forensic artifacts in Office 365 and where to find them - Microsoft Tech Community

https://techcommunity.microsoft.com/t5/security-compliance-and-identity/forensic-artifacts-in-office-365-and-where-to-find-them/ba-p/3634865
Forensic artifacts in Office 365 and where to find them - Microsoft Tech Community

VT Collections: citius, altius, fortius - communiter ~ VirusTotal Blog

https://blog.virustotal.com/2022/09/vt-collections-citius-altius-fortius.html
VT Collections: citius, altius, fortius - communiter ~ VirusTotal Blog

RED TEAM Operator: Malware Development Advanced - Vol.1

http://institute.sektor7.net/rto-maldev-adv1
RED TEAM Operator: Malware Development Advanced - Vol.1

Constrained Language Mode Bypass When __PSLockDownPolicy Is Used - Black Hills Information Security

https://www.blackhillsinfosec.com/constrained-language-mode-bypass-when-pslockdownpolicy-is-used/
Constrained Language Mode Bypass When __PSLockDownPolicy Is Used - Black Hills Information Security

Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors - Securonix

https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors - Securonix

Threat Report: Illuminating Volume Shadow Deletion - VMware Security Blog - VMware

https://blogs.vmware.com/security/2022/09/threat-report-illuminating-volume-shadow-deletion.html
Threat Report: Illuminating Volume Shadow Deletion - VMware Security Blog - VMware