Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 177

Source: contagio

Articles recieved 21/01/2023
Article: DDE Command Execution malware samples - published almost 7 years ago.
Content: Here are a few samples related to the recent DDE Command executionDDE Macro-less Command Execution Vulnerability Download. Email me if you need the password  (updated sample pack)ReferencesReading:10/18/2017 InQuest/yara-rules 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ra...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html 
🔥🔥
 
Published: 2017 10 18 06:24:00
Received: 2023 01 21 07:39:31
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)Download Email me if you need the password  Malware Inventory (work in progress)File informationPart one (full package)#File NameHash ValueF...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html 
🔥🔥
 
Published: 2018 03 20 13:23:00
Received: 2023 01 21 06:59:43
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) File informatio8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b8f1c51c4963c0bad6cf04444feb411d7 shellf321685342fa373c33eb9479176a086a1c56c90a1826a0aef3450809ffc01e5d52137157fdf019145d7f5...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html 
🔥🔥
 
Published: 2019 06 04 04:31:00
Received: 2023 01 21 06:59:43
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published about 5 years ago.
Content: Malware Must Die:  MMD-0064-2019 - Linux/AirDropBotMirai variant targeting Linksys E-series - Remote Code ExecutiontmUnblock.cgi Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress)HashesMD5SHA256SHA185a8aad8d938c44c3f3f51089a60ec161a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e372f0079bb42d5088...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html 
🔥🔥
 
Published: 2019 10 06 20:37:00
Received: 2023 01 21 06:59:43
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Amnesia / Radiation botnet samples Remote Code Execution in CCTV DVR (kerneronsec.com - 2016)2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload. Email me if you need the password (see in my profile) Malware Inventory (work in progress)Links updated: Jan 20, 2023 Hashe...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html 
🔥🔥
 
Published: 2019 10 06 21:16:00
Received: 2023 01 21 06:20:22
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download. Ema...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2023 01 21 06:20:21
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutionsAttackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.  Download. Email me if you need the password (se...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html 
🔥🔥
 
Published: 2019 12 02 04:46:00
Received: 2023 01 21 06:20:21
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1  (from Didier Stevens' post)Download 2  (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023References1.  2020-04-19 Did...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html 
🔥🔥
 
Published: 2020 04 19 15:27:00
Received: 2023 01 21 06:20:21
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download. Ema...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2023 01 21 05:59:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutionsAttackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.  Download. Email me if you need the password (se...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html 
🔥🔥
 
Published: 2019 12 02 04:46:00
Received: 2023 01 21 05:59:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post2. http://contagio.deependresearch.org/crime/kpotstealer(pr...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html 
🔥🔥
 
Published: 2020 04 19 15:27:00
Received: 2023 01 21 05:59:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile)           Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html 
🔥🔥
 
Published: 2020 12 14 14:47:00
Received: 2023 01 21 05:40:38
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download. Ema...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2023 01 21 03:20:05
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
07:39 DDE Command Execution malware samples
🔥🔥
06:59 Rootkit Umbreon / Umreon - x86, ARM samples
🔥🔥
06:59 HiddenWasp Linux malware backdoor samples
🔥🔥
06:59 Linux/AirDropBot samples
🔥🔥
06:20 Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples
🔥🔥
06:20 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
06:20 APT Calypso RAT, Flying Dutchman Samples
🔥🔥
06:20 KPOT info stealer samples
🔥🔥
05:59 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
05:59 APT Calypso RAT, Flying Dutchman Samples
🔥🔥
05:59 KPOT info stealer samples
🔥🔥
05:40 2020-12-13 SUNBURST SolarWinds Backdoor samples
🔥🔥
03:20 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
Articles recieved 20/01/2023
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)DownloadDownload Email me if you need the password  File informationPart one (full package)#File NameHash ValueFile Size (on Disk)Duplicate?...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html 
🔥🔥
 
Published: 2018 03 20 13:23:00
Received: 2023 01 20 14:59:28
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1d73ac553d7...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html 
🔥🔥
 
Published: 2019 10 06 21:16:00
Received: 2023 01 20 06:19:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download     ...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2023 01 20 06:19:38
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.  Download. Email me if you need the password (s...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html 
🔥🔥
 
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:59:42
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: ShellShock payload sample Linux.Bashlet - published about 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...DownloadDownload. Email me if you need the passwordFile InformationFile: fu4k_2485040231A35B7A465361FAF92A512DSize: 152MD5: 2485040231A35B7A465...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html 
🔥🔥
 
Published: 2014 10 02 12:12:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published almost 10 years ago.
Content: PART IIWirelurker for Windows (WinLurker)Research: Palo Alto Claud Xiao: Wirelurker for WindowsSample credit: Claud XiaoPART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetectorSample credit: Claud XiaoDownloadDow...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html 
🔥🔥
 
Published: 2014 11 07 01:57:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published almost 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor NetworkDownloadDownload. Email me if you need the password (new link)File attributesSize: 219136MD5:  28F96A57FA5FF663926E9BAD51A1D0CBSize: 126464MD5:  C8EB6040FD02D77660D19057A38FF769Size: 316928MD5:  D1CE79089578DA2D41F1AD901F7B1014Virustotal infohttps://www.virustotal.com/en/file/366affd094cc63e2c19c...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html 
🔥🔥
 
Published: 2014 11 16 03:58:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published almost 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014.It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and insta...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html 
🔥🔥
 
Published: 2014 11 17 21:16:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published almost 10 years ago.
Content: Just some links for your enjoymentList of security conferences in 2014Video archives:AIDE (Appalachian Institute of Digital Evidence)201320122011Blackhat2012 or 2012 torrentBotconf2013BsidesBSides DC 2014BSides Chicago 2014BSides Nashville 2014BSides Augusta 2014BSides Huntsville 2014BSides Las Vegas 2014BSidesDE 2013BSidesLV 2013BSidesRI 2013Bsides Clevelan...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html 
🔥🔥
 
Published: 2015 01 05 04:11:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Collection of Pcap files from malware analysis - published over 9 years ago.
Content: Update: Feb 19. 2015We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You can see them in the PUBLIC folder. The credits go to the authors of the pcaps listed in ...
https://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html 
🔥🔥
 
Published: 2015 02 20 04:39:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published over 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it.Yes, I often obtain samples from various sources for my own research. I am sometimes too lazy/busy to post them but don't mind sharing.If you are looking for a particular sample, feel free to ask. I might have it.Send MD5 (several or few samples). I ca...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html 
🔥🔥
 
Published: 2015 03 09 01:08:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago.
Content: Update May 12, 2015Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table)Reference table : Exploit References 2014-2015Update March 20, 2015Added CVE-2015-0336------------------------Update February 19, 2015Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update January 24, 2015 http://www.kahusecurity.comA...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html 
🔥🔥
 
Published: 2015 05 12 04:30:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published about 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdfTL; DR2011- July 2015Aka  Sapotao and node69Group - Sandworm / Quedagh APTVectors - USB, exe as doc, xlsVictims - RU, BY, AM, GE Victims - MMM group, UA govtruecryptrussia.ru has been serving modified v...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html 
🔥🔥
 
Published: 2015 08 12 12:24:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published over 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and...
https://contagiodump.blogspot.com/2016/02/files-download-information.html 
🔥🔥
 
Published: 2016 02 23 20:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud XiaoSample credit: Claud XiaoFile informationd1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmge3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7bd3e44f20cf1f2c19 ...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html 
🔥🔥
 
Published: 2016 03 06 23:39:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published about 8 years ago.
Content: Bitcoin mining malware for Linux servers - samplesResearch: Dr. Web. Linux.LadySample Credit:  Tim StrazzereMD5 list:0DE8BCA756744F7F2BDB732E3267C3F455952F4F41A184503C467141B6171BA786AC68E5B09D1C4B157193BB6CB34007E2CACA9626ED93C3D137FDF494FDAE7CE9423E072AD5A31A80A31FC1F525D614Download. Email me if you need the password....
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html 
🔥🔥
 
Published: 2016 08 17 04:06:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published about 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-prettyec5d4f90c91273b3794814be...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html 
🔥🔥
 
Published: 2016 08 24 04:18:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published over 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malwar...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html 
🔥🔥
 
Published: 2017 02 21 02:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published over 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research)Analysis of Trump's secret server story......
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html 
🔥🔥
 
Published: 2017 03 20 04:28:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published over 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&CK)Please see the first post here: Russian APT -...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html 
🔥🔥
 
Published: 2017 03 31 06:02:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DDE Command Execution malware samples - published almost 7 years ago.
Content: Here are a few samples related to the recent DDE Command executionReading:10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moments/918126999738175489 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ransomware Targeting Poland10/16/2017 https://twitter.com/noottra...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html 
🔥🔥
 
Published: 2017 10 18 06:24:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)DownloadDownload Email me if you need the password  File informationPart one (full package)#File NameHash ValueFile Size (on Disk)Duplicate?...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html 
🔥🔥
 
Published: 2018 03 20 13:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Here are Hidden Wasp Linux backdoor samples. Enjoy Reference Intezer HiddenWasp Malware Stings Targeted Linux Systems  DownloadDownload. Email me if you need the password (see in my profile) File informatio8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b8f1c51c4963c0bad6cf04444feb411d7 shellf321685342fa373c33eb9479176a086a1c56c90a1826a0aef345...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html 
🔥🔥
 
Published: 2019 06 04 04:31:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published about 5 years ago.
Content: Reference Malware Must Die:  MMD-0064-2019 - Linux/AirDropBotMirai variant targeting Linksys E-series - Remote Code ExecutiontmUnblock.cgi Download             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA185a8aad8d938c44c3f3f51089a60ec161a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e372f0079b...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html 
🔥🔥
 
Published: 2019 10 06 20:37:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Reference Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html 
🔥🔥
 
Published: 2019 10 06 21:16:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: Reference2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Down...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: Reference2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.Download             Other malwareDownlo...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html 
🔥🔥
 
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post2. http://contagio.deependresearch.org/crime/kpotstealer(pr...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html 
🔥🔥
 
Published: 2020 04 19 15:27:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorDownload dlls. Email me if you need the password (see in my profile)Download Coreinstaller.msi - trojaned installer sample ReferenceI am sure you all saw the news. Links updated: Jan 19, 20232020-12-13 MicrosoftCustomer Gu...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html 
🔥🔥
 
Published: 2020 12 14 14:47:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published over 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesReferences1.  2020-04-19 Didier Stevens posted analysis of KPOT infostealer on the Infosec Handlers Diary blog "KPOT Analysis: Obtaining the Decrypted KPOT EXE"These are samples to follow his analysis routine.2. 2019-...
http://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html 
🔥🔥
 
Published: 2020 04 19 15:27:00
Received: 2023 01 20 04:19:21
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content:  ReferenceI am sure you all saw the news. Links updated: Jan 19, 20232020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor2020-12-13 MicrosoftCustomer Guidance on Recent Nation-State Cyber Attacks Well, here are the Sunburst binaries. Here is a Sunburst malware analysis walk-...
http://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html 
🔥🔥
 
Published: 2020 12 14 14:47:00
Received: 2023 01 20 03:59:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
14:59 Rootkit Umbreon / Umreon - x86, ARM samples
🔥🔥
06:19 Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples
🔥🔥
06:19 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
05:59 APT Calypso RAT, Flying Dutchman Samples
🔥🔥
05:39 ShellShock payload sample Linux.Bashlet
🔥🔥
05:39 Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples
🔥🔥
05:39 OnionDuke samples
🔥🔥
05:39 AlienSpy Java RAT samples and traffic information
🔥🔥
05:39 Video archives of security conferences and workshops
🔥🔥
05:39 Collection of Pcap files from malware analysis
🔥🔥
05:39 Ask and you shall receive
🔥🔥
05:39 An Overview of Exploit Packs (Update 25) May 2015
🔥🔥
05:39 Potao Express samples
🔥🔥
05:39 Files download information
🔥🔥
05:39 Ransomware.OSX.KeRanger samples
🔥🔥
05:39 "i am lady" Linux.Lady trojan samples
🔥🔥
05:39 Linux.Agent malware sample - data stealer
🔥🔥
05:39 Part I. Russian APT - APT28 collection of samples including OSX XAgent
🔥🔥
05:39 DeepEnd Research: Analysis of Trump's secret server story
🔥🔥
05:39 Part II. APT29 Russian APT including Fancy Bear
🔥🔥
05:39 DDE Command Execution malware samples
🔥🔥
05:39 Rootkit Umbreon / Umreon - x86, ARM samples
🔥🔥
05:39 HiddenWasp Linux malware backdoor samples
🔥🔥
05:39 Linux/AirDropBot samples
🔥🔥
05:39 Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples
🔥🔥
05:39 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
05:39 APT Calypso RAT, Flying Dutchman Samples
🔥🔥
05:39 KPOT info stealer samples
🔥🔥
05:39 2020-12-13 SUNBURST SolarWinds Backdoor samples
🔥🔥
04:19 KPOT info stealer samples
🔥🔥
03:59 2020-12-13 SUNBURST SolarWinds Backdoor samples
🔥🔥
Articles recieved 04/07/2022
Article: CZ Solution Ltd. signed samples of Xtreme Rat, Zeus, Spy-Net, Gh0st, BozokRAT and other - published about 10 years ago.
Content: Here are all samples (+ more) mentioned in this post by Fireeye : The Little Signature That Could: The Curious Case of CZ Solution"All files are digitally signed with a "CZ Solutions" certificate making it easy to create a Yara or ClamAV signature. A few Zeus samples seem to be still beaconing. Most are sinkholed.The certificate is now revoked by VeriSign.En...
http://contagiodump.blogspot.com/2014/07/cz-solution-ltd-signed-samples-of.html 
🔥🔥
 
Published: 2014 07 21 04:57:00
Received: 2022 07 04 22:08:53
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
22:08 CZ Solution Ltd. signed samples of Xtreme Rat, Zeus, Spy-Net, Gh0st, BozokRAT and other
🔥🔥
Articles recieved 06/06/2021
Article: ShellShock payload sample Linux.Bashlet - published about 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...DownloadDownload. Email me if you need the passwordFile InformationFile: fu4k_2485040231A35B7A465361FAF92A512DSize: 152MD5: 2485040231A35B7A465...
http://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html 
🔥🔥
 
Published: 2014 10 02 12:12:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published almost 10 years ago.
Content: PART IIWirelurker for Windows (WinLurker)Research: Palo Alto Claud Xiao: Wirelurker for WindowsSample credit: Claud XiaoPART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetectorSample credit: Claud XiaoDownloadDow...
http://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html 
🔥🔥
 
Published: 2014 11 07 01:57:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published almost 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor NetworkDownloadDownload. Email me if you need the password (new link)File attributesSize: 219136MD5:  28F96A57FA5FF663926E9BAD51A1D0CBSize: 126464MD5:  C8EB6040FD02D77660D19057A38FF769Size: 316928MD5:  D1CE79089578DA2D41F1AD901F7B1014Virustotal infohttps://www.virustotal.com/en/file/366affd094cc63e2c19c...
http://contagiodump.blogspot.com/2014/11/onionduke-samples.html 
🔥🔥
 
Published: 2014 11 16 03:58:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published almost 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014.It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and insta...
http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html 
🔥🔥
 
Published: 2014 11 17 21:16:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published almost 10 years ago.
Content: Just some links for your enjoymentList of security conferences in 2014Video archives:AIDE (Appalachian Institute of Digital Evidence)201320122011Blackhat2012 or 2012 torrentBotconf2013BsidesBSides DC 2014BSides Chicago 2014BSides Nashville 2014BSides Augusta 2014BSides Huntsville 2014BSides Las Vegas 2014BSidesDE 2013BSidesLV 2013BSidesRI 2013Bsides Clevelan...
http://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html 
🔥🔥
 
Published: 2015 01 05 04:11:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Equation samples - from the Kaspersky Report and additional - published over 9 years ago.
Content: Here are a few samples from the report by Kaspersky Lab "Equation: The Death Star of Malware Galaxy" and additional samples of the same family. The full list is belowDownload all the samples listed below. Email me if you need the password (New link)List of filesFiles from the report:File NameMD5Size_SD_IP_CF.dll_03718676311DE33DD0B8F4F18CFFD48803718676311de3...
http://contagiodump.blogspot.com/2015/02/equation-samples-from-kaspersky-report.html 
🔥🔥
 
Published: 2015 02 17 06:22:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Collection of Pcap files from malware analysis - published over 9 years ago.
Content: Update: Feb 19. 2015We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You can see them in the PUBLIC folder. The credits go to the authors of the pcaps listed in ...
http://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html 
🔥🔥
 
Published: 2015 02 20 04:39:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published over 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it.Yes, I often obtain samples from various sources for my own research. I am sometimes too lazy/busy to post them but don't mind sharing.If you are looking for a particular sample, feel free to ask. I might have it.Send MD5 (several or few samples). I ca...
http://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html 
🔥🔥
 
Published: 2015 03 09 01:08:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago.
Content: Update May 12, 2015Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table)Reference table : Exploit References 2014-2015Update March 20, 2015Added CVE-2015-0336------------------------Update February 19, 2015Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update January 24, 2015 http://www.kahusecurity.comA...
http://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html 
🔥🔥
 
Published: 2015 05 12 04:30:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published about 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdfTL; DR2011- July 2015Aka  Sapotao and node69Group - Sandworm / Quedagh APTVectors - USB, exe as doc, xlsVictims - RU, BY, AM, GE Victims - MMM group, UA govtruecryptrussia.ru has been serving modified v...
http://contagiodump.blogspot.com/2015/08/potao-express-samples.html 
🔥🔥
 
Published: 2015 08 12 12:24:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published over 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and...
http://contagiodump.blogspot.com/2016/02/files-download-information.html 
🔥🔥
 
Published: 2016 02 23 20:48:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud XiaoSample credit: Claud XiaoFile informationd1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmge3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7bd3e44f20cf1f2c19 ...
http://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html 
🔥🔥
 
Published: 2016 03 06 23:39:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published about 8 years ago.
Content: Bitcoin mining malware for Linux servers - samplesResearch: Dr. Web. Linux.LadySample Credit:  Tim StrazzereMD5 list:0DE8BCA756744F7F2BDB732E3267C3F455952F4F41A184503C467141B6171BA786AC68E5B09D1C4B157193BB6CB34007E2CACA9626ED93C3D137FDF494FDAE7CE9423E072AD5A31A80A31FC1F525D614Download. Email me if you need the password....
http://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html 
🔥🔥
 
Published: 2016 08 17 04:06:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published about 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-prettyec5d4f90c91273b3794814be...
http://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html 
🔥🔥
 
Published: 2016 08 24 04:18:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published over 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malwar...
http://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html 
🔥🔥
 
Published: 2017 02 21 02:23:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published over 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research)Analysis of Trump's secret server story......
http://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html 
🔥🔥
 
Published: 2017 03 20 04:28:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published over 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&CK)Please see the first post here: Russian APT -...
http://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html 
🔥🔥
 
Published: 2017 03 31 06:02:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DDE Command Execution malware samples - published almost 7 years ago.
Content: Here are a few samples related to the recent DDE Command executionReading:10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moments/918126999738175489 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ransomware Targeting Poland10/16/2017 https://twitter.com/noottra...
http://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html 
🔥🔥
 
Published: 2017 10 18 06:24:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)DownloadDownload Email me if you need the password  File informationPart one (full package)#File NameHash ValueFile Size (on Disk)Duplicate?...
http://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html 
🔥🔥
 
Published: 2018 03 20 13:23:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Here are Hidden Wasp Linux backdoor samples. Enjoy Reference Intezer HiddenWasp Malware Stings Targeted Linux Systems  DownloadDownload. Email me if you need the password (see in my profile) File informatio8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b8f1c51c4963c0bad6cf04444feb411d7 shellf321685342fa373c33eb9479176a086a1c56c90a1826a0aef345...
http://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html 
🔥🔥
 
Published: 2019 06 04 04:31:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published about 5 years ago.
Content: Reference Malware Must Die:  MMD-0064-2019 - Linux/AirDropBotMirai variant targeting Linksys E-series - Remote Code ExecutiontmUnblock.cgi Download             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA185a8aad8d938c44c3f3f51089a60ec161a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e372f0079b...
http://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html 
🔥🔥
 
Published: 2019 10 06 20:37:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago.
Content: Reference Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1...
http://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html 
🔥🔥
 
Published: 2019 10 06 21:16:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published about 5 years ago.
Content: Reference2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Down...
http://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html 
🔥🔥
 
Published: 2019 10 07 03:48:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published almost 5 years ago.
Content: Reference2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.Download             Other malwareDownlo...
http://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html 
🔥🔥
 
Published: 2019 12 02 04:46:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago.
Content:  ReferenceI am sure you all saw the news.2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor2020-12-13 MicrosoftCustomer Guidance on Recent Nation-State Cyber Attacks Well, here are the Sunburst binaries. Here is a Sunburst malware analysis walk-through video by Colin Hardy...
http://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html 
🔥🔥
 
Published: 2020 12 14 14:47:00
Received: 2021 06 06 09:04:40
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
09:04 ShellShock payload sample Linux.Bashlet
🔥🔥
09:04 Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples
🔥🔥
09:04 OnionDuke samples
🔥🔥
09:04 AlienSpy Java RAT samples and traffic information
🔥🔥
09:04 Video archives of security conferences and workshops
🔥🔥
09:04 Equation samples - from the Kaspersky Report and additional
🔥🔥
09:04 Collection of Pcap files from malware analysis
🔥🔥
09:04 Ask and you shall receive
🔥🔥
09:04 An Overview of Exploit Packs (Update 25) May 2015
🔥🔥
09:04 Potao Express samples
🔥🔥
09:04 Files download information
🔥🔥
09:04 Ransomware.OSX.KeRanger samples
🔥🔥
09:04 "i am lady" Linux.Lady trojan samples
🔥🔥
09:04 Linux.Agent malware sample - data stealer
🔥🔥
09:04 Part I. Russian APT - APT28 collection of samples including OSX XAgent
🔥🔥
09:04 DeepEnd Research: Analysis of Trump's secret server story
🔥🔥
09:04 Part II. APT29 Russian APT including Fancy Bear
🔥🔥
09:04 DDE Command Execution malware samples
🔥🔥
09:04 Rootkit Umbreon / Umreon - x86, ARM samples
🔥🔥
09:04 HiddenWasp Linux malware backdoor samples
🔥🔥
09:04 Linux/AirDropBot samples
🔥🔥
09:04 Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples
🔥🔥
09:04 Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples)
🔥🔥
09:04 APT Calypso RAT, Flying Dutchman Samples
🔥🔥
09:04 2020-12-13 SUNBURST SolarWinds Backdoor samples
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 177
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor