際際滷

際際滷Share a Scribd company logo
MARIONMARSCHALEK@PINKFLAWDMARION@CYPHORT.COMBCC0 7607 2FFA BCA8 9048 D648 D169 73AF F372 F2CA
Welcome to the keynote circuit I thought thats where old people like me go to die? ;) 
-Halvar Flake, Oct.14 2014
www.desktopextreme.com
http://www.mirror.co.uk/ OFFENDERS
http://www.moviepilot.comDEFENDERS
http://www.screenrant.com/ SOPHISTICATEDWEAPONRY
http://www.fanpop.com/ SOPHISTICATEDWEAPONRY WITH SUPERPOWERS
http://tasteofawesome.com
YOUDONTSEEYOURADVERSARYYOUDONTKNOWWHOSEDEATHSTARITISTHEREONYOURMACHINEYOUPROBABLYWONTEVENFINDTHEDEATHSTARONYOURMACHINE 
http://glee.wikia.com
INTELLECTUALPROPERTYBEINGSTOLENPOLITICALOPPONENTSPUTTOJAILINTERNETCOMMUNICATIONBEINGBLOCKEDVENDORFINDINGANEWEXPLOITSAMETIME, HACKERWRITES5 MORECONTROLOFMEDIAENTERPRISESLOOSINGCUSTOMERDATANATIONSTATESSPYINGONTHEIRCITIZENSNATIONSTATESBEINGHACKEDLITTLEPAULLOOSINGHISHOMEWORK
FAIRYTALE 
http://www.playbuzz.com/
SUSPECT #1 
FILESIZE:192512COMPILETIME: 2010:05:06 
C&C: CALLIENTEFEVER.INFOHTTP ACCEPT-LANGUAGE: FR
SUSPECT #1DYNAMICAPI LOADINGBYNAMEHASH
PING EXEC HTTPFASPFLOODTCPFLOODWEBFLOODPOSTFLOODATCLEAR STATISTICSKILLSET UPLOAD UPDATE PLUGIN SUSPECT #1 FLOODING ALL THE THINGS
SUSPECT #1
OMG!!
SUSPECTS #[2-4] 
FILESIZE: 184320 
CODESIZE: 139264 
COMPILETIME: 2010:02:16 18:05:54+01:00 
FILESIZE: 184320 
CODESIZE: 139264 
COMPILETIME: 2010:03:11 17:55:03+01:00 
FILESIZE: 792064 
CODESIZE: 583680 
COMPILETIME: 2011:10:2520:28:39+01:00
SUSPECT #4 
FILESIZE: 792064 
COMPILETIME: 2011:10:2520:28:39+01:00API NAMEHASHINGKEYAB34CD77HHTTP://1.9.32.11/BUNNY/TEST.PHP?REC=NVISTAANTI-ANALYSIS| THREADS& FILES| CPU DATA| C&C COMMANDS| LUA
Not funny.
AV PRODUCTENUMERATIONFIREWALLPRODUCTENUMERATIONSANDBOXCHECK"KLAVME", "MYAPP", "TESTAPP", "AFYJEVMV.EXE, TIMINGCONDITIONSUSPECT #4SELECT * FROM ANTIVIRUSPRODUCTSELECT * FROM FIREWALLPRODUCT
SUSPECT #4Big BossWorker2Worker1Worker0Worker3MainThreadPerfMon 
CommandParsing 
ScriptExecution 
Manage 
Worker 
ThreadsFileMan/Inet
CONFIGSTOREDINHKLMSOFTWAREMICROSOFTIPSECHTTP://LE-PROGRES.NET/IMAGES/PHP/TEST.PHP?REC=11206-01HTTP://GHATREH.COM/SKINS/PHP/TEST.PHP?REC=11206-01HTTP://WWW.USTHB-DZ.ORG/INCLUDES/PHP/TEST.PHP?REC=11206-01SUSPECT #4
LUA ThreadCmd ParsingExecute CommandStart LUA ThreadSUSPECT #4 
Advanced 
Command 
and Script 
Parsing
SUSPECT #4 
Advanced 
Command 
and Script 
Parsing4 WORKERTHREADSEXECUTINGLUA SCRIPTSLUA 5.1 + C/INVOKECODECALLBACKFROMLUA TOC++
SUSPECT #4GETCONFIGFTPPUTFTPGETSENDFILEGETFILEUNINSTALLRESTARTHEARERRESTARTCLEANHEARERCRONTASKACRONTASKRCRONTASKLMAXPOSTDATASETURLSTOPSETCPULIMITTIMEOUTWAITFORUPDATEDIETIME
Vulnerability Summary 
for CVE-2011-4369 
Original release date: 12/16/2011 
Last revised: 01/29/2013 
Source: US-CERT/NIST 
http://blog.9bplus.com/analyzing-cve-2011-4369-part-one/
SUSPECT #5 
FILESIZE: 966144 
CODESIZE: 128512 
COMPILETIME: 2011:10:2519:28:00+01:00 
DROPPERFORSUSPECT#4 
SAMEC&CSASSUSPECT#4
ACRORD32INFO.EXE 
Location 
Remote Host 
Port Number 
Oakville, Canada 
69.90.160.65 
80 
Montr辿al,Canada 
70.38.107.13 
80 
Montr辿al,Canada 
70.38.12.10 
80 
http://www.threatexpert.com/report.aspx?md5=c40e3ee23cf95d992b7cd0b7c01b8599SUSPECT #5
SRSLY?
http://bunny-shooter-best-free-game.en.softonic.com/ 
v 2.3.2
DROPSPAYLOADIN%WINDIR%MSAPPSNETMGR.EXESTORESCONFIGURATIONINREGISTRYCREATESENTRYINHKLM..CURRENTVERSIONRUNFORNETMGR.EXEREACHESOUTTOREMOTESERVERSSUSPECT #5
SWISS CHEESE ATTRIBUTIONPROJECTNAMEDBUNNY, VERSION2.3.2DDOS BOTNETOPERATORSACCEPT-LANGUAGE: FRC&C SERVERSHOSTEDINCANADAC&C DOMAINSRESEMBLEFRENCH/IRANIANWEBSITESAUTHORNOENGLISHNATIVE-SPEAKER... LUA? MUSTBEFLAME
Wars not make 
one great.
https://whispersystems.org/
http://www.theverge.com
SUBGRAPH OS 
https://subgraph.com/
TS/NOFORN
HTTP://WWW.WOODMANN.COM/COLLABORATIVE/TOOLS/INDEX.PHP/CATEGORY:RCE_TOOLSHTTP://WWW.WOODMANN.COM/COLLABORATIVE/KNOWLEDGE/INDEX.PHP/CATEGORY:RCE_KNOWLEDGE
Viperis a binary management and analysis frameworkdedicated to malware and exploit researchers. 
http://viper.li/
ACKNOWLEDGEMENTSMR. WHITE, MR. ORANGE, MR. BLONDE& MR. PINKMORGANMARQUIS-BOIREINBARRAZNICOLASBRULEZ@EMERGENCYKITTENS
Thank you! 
Marion Marschalek 
@pinkflawd 
marion@cyphort.com 
http://karmadecay.com/
ANALYZE IT2A64D331964DBDEC8141F16585F392BA40E0F0681C79D70AC0329E68A94294CB8132EE00F64856CF10930FD72505CEBEE8A333A726481A72B267EC6109939B0D3BBB59AFDF9BDA4FFDC644D9D51C53E7C40E3EE23CF95D992B7CD0B7C01B8599
Ad

Recommended

La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren't
pinkflawd
The A and the P of the T
The A and the P of the T
pinkflawd
How would you find what you can't see?
How would you find what you can't see?
pinkflawd
Big Game Hunting - Peculiarities In Nation State Malware Research
Big Game Hunting - Peculiarities In Nation State Malware Research
pinkflawd
Catch Me If You Can
Catch Me If You Can
pinkflawd
Shooting
Shooting
pinkflawd
Malware Most Wanted: Evil Bunny
Malware Most Wanted: Evil Bunny
Cyphort
Zeus' Not Dead Yet
Zeus' Not Dead Yet
pinkflawd
News bytes Oct-2011
News bytes Oct-2011
Ashwin Patil, GCIH, GCIA, GCFE
News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Ramece Cave
ECrime presentation - A few bits about malware
ECrime presentation - A few bits about malware
Michael Hendrickx
Next Generation Firewalls
Next Generation Firewalls
The eCore Group
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
Days of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, Incidents
Anton Chuvakin
Modern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a Fox
C4Media
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
Dan Houser
Firewalls (Distributed computing)
Firewalls (Distributed computing)
Sri Prasanna
Web Hacking
Web Hacking
Information Technology
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
News bytes Sept-2011
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
Advanced Malware Analysis
Advanced Malware Analysis
Prathan Phongthiproek
AtlSecCon 2016
AtlSecCon 2016
Earl Carter
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
WhiskeyNeon
Cyber Espionage Against Georgia (Georbot)
Cyber Espionage Against Georgia (Georbot)
DataExchangeAgency
G3t R00t at IUT
G3t R00t at IUT
Nahidul Kibria
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam

More Related Content

Similar to TS/NOFORN (20)

News bytes Oct-2011
News bytes Oct-2011
Ashwin Patil, GCIH, GCIA, GCFE
News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Ramece Cave
ECrime presentation - A few bits about malware
ECrime presentation - A few bits about malware
Michael Hendrickx
Next Generation Firewalls
Next Generation Firewalls
The eCore Group
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
Days of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, Incidents
Anton Chuvakin
Modern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a Fox
C4Media
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
Dan Houser
Firewalls (Distributed computing)
Firewalls (Distributed computing)
Sri Prasanna
Web Hacking
Web Hacking
Information Technology
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
News bytes Sept-2011
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
Advanced Malware Analysis
Advanced Malware Analysis
Prathan Phongthiproek
AtlSecCon 2016
AtlSecCon 2016
Earl Carter
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
WhiskeyNeon
Cyber Espionage Against Georgia (Georbot)
Cyber Espionage Against Georgia (Georbot)
DataExchangeAgency
G3t R00t at IUT
G3t R00t at IUT
Nahidul Kibria
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Ramece Cave
ECrime presentation - A few bits about malware
ECrime presentation - A few bits about malware
Michael Hendrickx
Next Generation Firewalls
Next Generation Firewalls
The eCore Group
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
Days of the Honeynet: Attacks, Tools, Incidents
Days of the Honeynet: Attacks, Tools, Incidents
Anton Chuvakin
Modern Web Security, Lazy but Mindful Like a Fox
Modern Web Security, Lazy but Mindful Like a Fox
C4Media
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
Dan Houser
Firewalls (Distributed computing)
Firewalls (Distributed computing)
Sri Prasanna
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Linuxmalaysia Malaysia
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
Abhishek Kumar
AtlSecCon 2016
AtlSecCon 2016
Earl Carter
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
WhiskeyNeon
Cyber Espionage Against Georgia (Georbot)
Cyber Espionage Against Georgia (Georbot)
DataExchangeAgency
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council

Recently uploaded (20)

20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Jo達o Esperancinha
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
ketan09101
Solar thermal Flat plate and concentrating collectors .pptx
Solar thermal Flat plate and concentrating collectors .pptx
jdaniabraham1
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
Cadastral Maps
Cadastral Maps
Google
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
nnnnnnnnnnnn7777777777777777777777777777777.pptx
nnnnnnnnnnnn7777777777777777777777777777777.pptx
gayathri venkataramani
20CE404-Soil Mechanics - 際際滷 Share PPT
20CE404-Soil Mechanics - 際際滷 Share PPT
saravananr808639
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Jo達o Esperancinha
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
(Continuous Integration and Continuous Deployment/Delivery) is a fundamental ...
ketan09101
Solar thermal Flat plate and concentrating collectors .pptx
Solar thermal Flat plate and concentrating collectors .pptx
jdaniabraham1
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
International Journal of Advanced Information Technology (IJAIT)
International Journal of Advanced Information Technology (IJAIT)
ijait
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
Cadastral Maps
Cadastral Maps
Google
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
nnnnnnnnnnnn7777777777777777777777777777777.pptx
nnnnnnnnnnnn7777777777777777777777777777777.pptx
gayathri venkataramani
Ad

TS/NOFORN