Thomas Roccia 🤘 Profile picture
Nov 6 13 tweets 9 min read
🧵Thread: 10 underestimated resources about malware techniques.

This is a list of various resources to learn more about malware techniques, how to analyse them and how to improve your detection! 🤓 #infosec #malware #threatintel #malwareanalysis #cybersecurity
#1: The Unprotect Project

Of course, I couldn't start this thread without talking about this project we started in 2015. Unprotect Project is a database about Malware Evasion techniques with code snippets and detection rules. cf: @DarkCoderSc

🌐unprotect.it
#2: The LolBas project

Living off the land refers to the use of dual-use tools, which are either already installed in the victims' environment, or are admin, forensic or system tools used maliciously.

🌐lolbas-project.github.io
#3: HijackLibs

DLL hijacking is a common technique used by malware. This project provides a list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables can be searched via this website. cf: @Wietze

🌐hijacklibs.net
#4: MalApi

Malware relies on Windows API to perform action in the infected system. MalAPI keeps a list of API used by malware. cf: @mrd0x

🌐malapi.io
#5: Living Off Trusted Sites

Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. cf: @mrd0x

🌐lots-project.com
#6: Malware Persistence

Malware uses persistence mechanisms to survive reboot. This list keeps track of resources related to malware persistence techniques.

🌐github.com/Karneades/awes…
#7: Malware Privilege Escalation

Privilege escalation is often used by malware to gain more access in an infected machine. This list keeps track of privilege escalation resources. cf: @m0nadlabs

🌐github.com/m0nad/awesome-…
#8: Malware Event ID

During execution malware will leave track on the system that can be retrieve in Windows events. This list keeps tracks of resources related to Event ID analysis. cf: @stuhlonsky

🌐github.com/stuhli/awesome…
#9: ORKL

This is a search engine dedicated to threat intelligence reports. You can use it to browse knowledge about attackers, tools, and tactics. cf: @orkleu

🌐orkl.eu
#10: Vx-Underground Malware Techniques Papers

This is a collection of whitepapers classified by techniques. cf: @vxunderground

🌐vx-underground.org/windows.html
#10 +1: The Malware Museum

This is a fun website that contains malware that were distributed between 1980 and 1990. cf: @mikko

🌐archive.org/details/malwar…
That's it! If you like this thread, you can share it, like it and get the list here👇

github.com/fr0gger/Awesom…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Thomas Roccia 🤘

Thomas Roccia 🤘 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @fr0gger_

Apr 20
Visualizing #cybersecurity concepts can be a great way to learn more about specific tools, methodologies, and techniques! Here is a thread that shows 6 useful infographics on threat intelligence and related topics!🧵👇#infosec #threatintel

1⃣ - Practical Threat Intel
2⃣ - Tactics, Techniques and Procedures is an important concept to understand when you are working on threat intelligence to understand the capabilities of threat actors! 🤓 #Infosec #ttp
3⃣ - Mitre ATT&CK Matrix is became one of the references to classify and categorize attackers' TTPs! ☠️ #cybersecurity
Read 8 tweets
Dec 20, 2020
The #sunburst case is interesting and demonstrates how threat actors can rely on evasion techniques or defense evasion to spy on or make damage. #UnprotectProject Thread 👇
First of all, the use of the supply chain attack made the attack super stealthy and difficult to detect. This is another red flag to increase and improve trust with partners and suppliers, although it is difficult to resolve.
#Sunburst uses the TrackProcesses() function to verify blacklisted processes and services. If an item in the blacklist is found, the loop is terminated.
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(