๐ง Agent Tesla Daily Report
โฌ๏ธ Trend: declining (21%)
๐ 9 new samples
๐ 0 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/agent-tesla/reports/2026-04-08
๐ง Agent Tesla Daily Report
โฌ๏ธ Trend: declining (21%)
๐ 9 new samples
๐ 0 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/agent-tesla/reports/2026-04-08
๐ง Formbook Daily Report
โก๏ธ Trend: stable (9%)
๐ 8 new samples
๐ 55 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/formbook/reports/2026-04-07
https://archive.org/details/500ms-supply-chain-verification-toolkit
The name references Andres Freund's 500ms SSH delay that uncovered the
XZ backdoor.
The core finding: JsonSchema.Net.dll shipped in Microsoft's
DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
release. It has a PE timestamp of year 2095. And it's signed by
Microsoft's HSM.
You can verify this on your own Windows 11 machine without downloading
anything from me:
Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"
Compare with NuGet official: https://www.nuget.org/packages/JsonSchema.Net/7.2.3
The toolkit also includes anomalies in Google's cloudcode_cli (104K
internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).
๐ 500ms โ Supply chain anomalies in Windows 11 default binaries
JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
โ Hash โ any official NuGet release
โ PE timestamp: year 2095
โ Signed by Microsoft HSM post-modification
Verify on YOUR OWN Windows 11 (no download needed):
Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
Compare: nuget.org/packages/JsonSchema.Net/7.2.3
#infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics

500ms โ Supply Chain Compromise Verification ToolkitNamed after Andres Freund's 500ms that uncovered the XZ backdoor.Three binaries from a standard Windows...
๐ง AsyncRAT Daily Report
โฌ๏ธ Trend: declining (62%)
๐ 3 new samples
๐ 100 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/async-rat/reports/2026-04-06
๐ง QuasarRAT Daily Report
โฌ๏ธ Trend: declining (46%)
๐ 5 new samples
๐ 0 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/quasar-rat/reports/2026-04-04
๐ง Agent Tesla Daily Report
โฌ๏ธ Trend: declining (54%)
๐ 10 new samples
๐ 0 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/agent-tesla/reports/2026-04-04
๐ง Vidar Daily Report
โฌ๏ธ Trend: declining (39%)
๐ 19 new samples
๐ 100 C2 servers
Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/vidar/reports/2026-04-03
FLARE Learning Hub
Free hub with reverse engineering, malware analysis, labs, and debugging modules for hands-on Windows x64 training.
BSides Luxembourg talk announcement!
๐ง๐จ ๐ก๐ข๐ง ๐ฆ๐ข ๐๐๐ฅ๐ ๐๐๐ฆ๐ฆ: ๐ง๐๐ ๐๐๐๐๐๐ก ๐ช๐ข๐ฅ๐๐ ๐ข๐ ๐๐๐ก๐จ๐ซ ๐ฃ๐๐๐๐๐ฅ๐ฆ ๐๐ก๐ ๐๐๐ง๐๐๐ง๐๐ข๐ก ๐๐๐๐๐๐๐ก๐๐๐ฆ - ๐ ๐๐ฆ๐ฆ๐๐ ๐ข ๐๐๐ฅ๐ง๐ข๐๐๐๐ ๐ก๏ธ๐
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation, then run it straight from memory to dodge detection. This talk dives into the โhARMlessโ ARM64 packer, showing off tricks like layered encryption and direct syscalls, while exposing a harsh truth: many defenses on Linux barely see it coming.
Massimo Bertocchi https://pretalx.com/bsidesluxembourg-2026/speaker/SU38N8/ Massimo Bertocchi is a Zรผrich-based Threat Hunter and Detection Engineer with dual Masterโs degrees from KTH Royal Institute of Technology and Aalto University, recognized for his award-winning research uncovering covert C2 channels in Microsoft Teams that enable high-speed data exfiltration and expose critical gaps in enterprise security monitoring.
๐
Conference dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CyberSecurity #ThreatHunting #MalwareAnalysis #CloudSecurity #DetectionEngineering
Tried to book a bar. Ended up reverse engineering a malware campaign instead.
A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:
XOR-obfuscated script
Payload delivery
RedCap infostealer analysis
REMnux, Ghidra & Hybrid Analysis
Also watched the infrastructure get taken down mid-write-up.
First time doing any RE
https://blog.michaelrbparker.com/post/17
(Still haven't booked that drink.)