linenoise-phrack71-2024

0001-01-01

Linenoise

by Phrack Staff

Phrack Magazine Issue 71, article 3

https://phrack.org/issues/71/3.html

Notes
Practical tips and thoughts to improve your malware stealthiness and increase dwell time
LOLBAS
ShellExecute InstallScreensaver API
fake entry point trick
Mocoh Polymorphic Engine
TTPs
evasion tactics
malware scene evolution
dwell time
FUDness - Fully UnDetectable
Windows Messaging System
port knocking
the devil is in the details
avoid patterns, reinvent the weheel
Windows Crypto API
false assumption: ransomware will use Crypto API
code reuse as attribution
staged vs non-staged malware
relays + multi-protocol command and control
NetFlow
metadata
IP flow tuple
force analysts to consider all protocols
C2 infrastructure obfuscation
port knocking + raw sockets = stealth bind
FASM syntax
TTL
ioctlsocket API
SIO_RCVALL
sniffing
reverse shell
packet
netstat
System Informer
TCPview
WireShark
DLP
WinPcap
WIndows Messaging System persistence
WM_SYSCOMMAND
SC_MONITORPOWER
wParam
HWND_BROADCAST
RunOnce key
BSOD
WM_QUERYENDSESSION
WM_ENDSESSION
MessageBoxA
CreateWindowEx
ExitProcess
GetMessage/SendMessage
RegCreateKeyExA
DefWindowProc
GetModuleFileName
RegCloseKey
PostQuitMessages
“Forbes - Why the Dwell Time of Cyberattacks Has Not Changed”
Microsoft 2021 - System shutdown messages
Microsoft 2021 - Cryptography functions
RFC 3954 - NetFlow Version 9
Bugs in Evolution Software Building Access Control Software
Building Access Control
CTF
add a user to the system
get a user’s card data
PoC
Python requests
BeautifulSoup
argparse
re
evildaemond
Evolution Software
The Weaponization of Automation by Xenon Hexaflouride
AI
automation
righteous hacks
ML
expert systems
runbooks
mechanical turks
buzzword
AI poisoning
swatting
phreaking
Halo teabagging
Brian Krebs
SWAT
false positive
VirusTotal
signature-based detection
URL reputation - often done anonymously or by IT staff
low-hanging fruit
public databases
business application
low-prevalence files
dropper
Epic Medical Software
Kaspersky attacks
.rsrc section
DMCA
Automated Copyright Enforcement
YouTube ContentID
Sony BMG
The Orchard
Propellerheads - History Repeating
Riding with the Chollimas
Mauro Eldrich
Quetzal Team
Argentina
Uruguay
Bitso
web3
APT
Fancy Lazarus
Ransom DDoS
Lazarus
Labyrinth CHollima, Velvet Chollima
Qianlima/Senrima
North Korean Chollima Movement
CrowdStrike
DarkSeol
Sony and Bangaladesh Bank hack
Ronin, Horizon bridges
WannaCry
GMT
EDR
CTI
OSINT
Juan Brodersen
QR code
CrowdStrike Falcon
QRLog
base64 - QUIET_ZONE_DATA
.java file extension
UAC bypass
0-day
VirusTotal
random string
carelessness with maldev
Maximiliano Firtman
AlienVault OTX
GitHub
LetsEnrypt
VPS
Log4j
Jokerspy
Cobalt Strike
Twitter
IoC
Tox
attribution
Telegram
SSH brute forcing
TA
honeypot
snitches get stitches
DPRK RGB
threat intelligence
attacker infrastructure
IP address
AWS
corporate espionage
AstraZeneca
Daily NK
WMD
cyberwarfare
People’s Armed Forces
Kim Jong-Un
HC3
CISA
Sigal Mandelker
malware campaign
OPSEC failure
home directory and folders as attribution
The Hacker News
SentinelOne
SC Magazine
Master of Puppes - turning AV sandboxes into a botnet
Grzegorz Tworek
“static analysis is losing value as the man method of knowing what happens in the infected system”
“virtual machines are cheaper, more reliable, easier to orchestrate”
Internet
DNS
NTP
HTTP
EXE file
malware detonation, sandbox
PE file
dumpbin.exe
DLL
Antivirus
imphash
.rdata, .rsrc. .data sections
C
source code
ifdef, define macros
preprocessor
SNMP
Bcrypt
compile malware every time it is downloaded
BCryptSecretAgreement
red herring
Visual Studio
Tiny C Compiler
Fabrice Bellard
CGI
Microsoft IIS
parent-child
_wsystem()
C2 communication
User-Agent
D-1521 computer
ISAPI
libtcc.dll
tcc.exe
compiler optimization
WAF
WAN
bandwidth
reverse proxy
load balancer
Terms of Service (TOS)
Google - Tracking Malware Import Hashing
Ciphers by Ritter Randc.html
TrollAV
Learning an ISA by force of will
iximeow
whitequark
instruction set, instruction
firmware
Robert Xiao
Dragon CTF
“resize the window until it looks right” trick fr looking at raw data
processor
ARM
8080/6502
xxd, vim
head
opcode, operand
function prologue, function epilogue
control flow
ALU
register
xor instruction
calling convention
binja
https://github.com/whitequark/binja-averna
https://github.com/prehistoricman/AV7300
Averna processors
disassembler
yaxpeax-averna

Links to this note