🧠 Formbook Daily Report

➑️ Trend: stable (9%)
πŸ“Š 8 new samples
🌐 55 C2 servers

Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/formbook/reports/2026-04-07

#CyberSecurity #MalwareAnalysis #SOC

Formbook Report - 8 New Samples (Apr 2026) | Yazoul Malware Tracker

8 new Formbook samples detected. Trend: stable (9%). Includes IOCs, hashes, C2 servers, and detection rates from MalwareBazaar.

Yazoul Security

https://archive.org/details/500ms-supply-chain-verification-toolkit

The name references Andres Freund's 500ms SSH delay that uncovered the
XZ backdoor.

The core finding: JsonSchema.Net.dll shipped in Microsoft's
DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
release. It has a PE timestamp of year 2095. And it's signed by
Microsoft's HSM.

You can verify this on your own Windows 11 machine without downloading
anything from me:

Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"

Compare with NuGet official: https://www.nuget.org/packages/JsonSchema.Net/7.2.3

The toolkit also includes anomalies in Google's cloudcode_cli (104K
internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).

πŸ” 500ms β€” Supply chain anomalies in Windows 11 default binaries

JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
β†’ Hash β‰  any official NuGet release
β†’ PE timestamp: year 2095
β†’ Signed by Microsoft HSM post-modification

Verify on YOUR OWN Windows 11 (no download needed):
Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
Compare: nuget.org/packages/JsonSchema.Net/7.2.3

#infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics

500ms β€” Supply Chain Verification Toolkit : Anonymous Security Researcher : Free Download, Borrow, and Streaming : Internet Archive

500ms β€” Supply Chain Compromise Verification ToolkitNamed after Andres Freund's 500ms that uncovered the XZ backdoor.Three binaries from a standard Windows...

Internet Archive

🧠 AsyncRAT Daily Report

⬇️ Trend: declining (62%)
πŸ“Š 3 new samples
🌐 100 C2 servers

Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/async-rat/reports/2026-04-06

#CyberSecurity #MalwareAnalysis #SOC

AsyncRAT Report - 3 New Samples (Apr 2026) | Yazoul Malware Tracker

3 new AsyncRAT samples detected. Trend: declining (62%). Includes IOCs, hashes, C2 servers, and detection rates from MalwareBazaar.

Yazoul Security

🧠 QuasarRAT Daily Report

⬇️ Trend: declining (46%)
πŸ“Š 5 new samples
🌐 0 C2 servers

Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/quasar-rat/reports/2026-04-04

#CyberSecurity #MalwareAnalysis #SOC

QuasarRAT Report - 5 New Samples (Apr 2026) | Yazoul Malware Tracker

5 new QuasarRAT samples detected. Trend: declining (46%). Includes IOCs, hashes, C2 servers, and detection rates from MalwareBazaar.

Yazoul Security

🧠 Agent Tesla Daily Report

⬇️ Trend: declining (54%)
πŸ“Š 10 new samples
🌐 0 C2 servers

Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/agent-tesla/reports/2026-04-04

#CyberSecurity #MalwareAnalysis #SOC

Agent Tesla Report - 10 New Samples (Apr 2026) | Yazoul Malware Tracker

10 new Agent Tesla samples detected. Trend: declining (54%). Includes IOCs, hashes, C2 servers, and detection rates from MalwareBazaar.

Yazoul Security

🧠 Vidar Daily Report

⬇️ Trend: declining (39%)
πŸ“Š 19 new samples
🌐 100 C2 servers

Full analysis, IOCs, and hashes:
https://www.yazoul.net/malware/vidar/reports/2026-04-03

#CyberSecurity #MalwareAnalysis #SOC

Vidar Report - 19 New Samples (Apr 2026) | Yazoul Malware Tracker

19 new Vidar samples detected. Trend: declining (39%). Includes IOCs, hashes, C2 servers, and detection rates from MalwareBazaar.

Yazoul Security

FLARE Learning Hub

Free hub with reverse engineering, malware analysis, labs, and debugging modules for hands-on Windows x64 training.

https://github.com/mandiant/flare-learning-hub

#ReverseEngineering #MalwareAnalysis

GitHub - mandiant/flare-learning-hub: Free educational content on reverse engineering and malware analysis from the FLARE team

Free educational content on reverse engineering and malware analysis from the FLARE team - mandiant/flare-learning-hub

GitHub

BSides Luxembourg talk announcement!

🐧🚨 𝗑𝗒𝗧 𝗦𝗒 𝗛𝗔π—₯π— π—Ÿπ—˜π—¦π—¦: π—§π—›π—˜ π—›π—œπ——π——π—˜π—‘ π—ͺ𝗒π—₯π—Ÿπ—— 𝗒𝗙 π—Ÿπ—œπ—‘π—¨π—« π—£π—”π—–π—žπ—˜π—₯𝗦 𝗔𝗑𝗗 π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ π—–π—›π—”π—Ÿπ—Ÿπ—˜π—‘π—šπ—˜π—¦ - π— π—”π—¦π—¦π—œπ— π—’ π—•π—˜π—₯π—§π—’π—–π—–π—›π—œ πŸ›‘οΈπŸ”

Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation, then run it straight from memory to dodge detection. This talk dives into the β€œhARMless” ARM64 packer, showing off tricks like layered encryption and direct syscalls, while exposing a harsh truth: many defenses on Linux barely see it coming.

Massimo Bertocchi https://pretalx.com/bsidesluxembourg-2026/speaker/SU38N8/ Massimo Bertocchi is a ZΓΌrich-based Threat Hunter and Detection Engineer with dual Master’s degrees from KTH Royal Institute of Technology and Aalto University, recognized for his award-winning research uncovering covert C2 channels in Microsoft Teams that enable high-speed data exfiltration and expose critical gaps in enterprise security monitoring.

πŸ“… Conference dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CyberSecurity #ThreatHunting #MalwareAnalysis #CloudSecurity #DetectionEngineering

Tried to book a bar. Ended up reverse engineering a malware campaign instead.

A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:

XOR-obfuscated script
Payload delivery
RedCap infostealer analysis
REMnux, Ghidra & Hybrid Analysis

Also watched the infrastructure get taken down mid-write-up.

First time doing any RE

https://blog.michaelrbparker.com/post/17

(Still haven't booked that drink.)

#CyberSecurity #MalwareAnalysis #ThreatAnalysis

Tried to buy a pint, Finding a Trojan: My First Malware Analysis

This story all started with me and some mates wanting to get a drink in one of those cool, trendy hipster places you see online (I promise I'm only 20

Tea's Blog

πŸš€ Just released smali-lsp!

A Language Server for Smali with:
β€’ Goto definition
β€’ Cross-references
β€’ Symbols & hover
β€’ Works with any IDE (minimal setup)

Also includes an MCP server β†’ plug into AI agents for faster APK analysis πŸ€–

πŸ”— https://github.com/Surendrajat/smali-lsp

#AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik

GitHub - Surendrajat/smali-lsp: Smali language LSP and MCP server

Smali language LSP and MCP server. Contribute to Surendrajat/smali-lsp development by creating an account on GitHub.

GitHub