dingusxmcgee

@dingusxmcgee@infosec.exchange
49 Followers
131 Following
331 Posts
Husband, Dad and Incident Responder.
Incident Response and Threat Detection at $company
Very Amateur Malware Analysis Blog:
https://blog.dingusxmcgee.com

Recently joined a cool IR/Threat Intel focused community on discord and the creator just built an awesome blog platform built on github for sharing articles on malware analysis/reverser engineering/incident response.

You can post directly to the blog itself, or link your external blog and it looks and functions really well!

Check it out at https://irchaos.club !

Incident Response Chaos Club

Incident Response Chaos Club - embracing the chaos of cybersecurity through DFIR, incident response, and security research.

Incident Response Chaos Club

🦀 I'm excited to announce that I am starting a training firm, @decoderloop, focused on providing Rust Reverse Engineering training! https://decoderloop.com/

The tools, techniques, and resources that reverse engineers have were built for the era of C. Meanwhile, malware authors and software developers alike are rapidly switching to modern programming languages such as Rust. Decoder Loop is here to fill the knowledge gap and level the playing field, for reverse engineers facing modern binaries.

We hope to come to a conference near you, next year. If you'd like to stay notified on upcoming trainings: follow us at @decoderloop, or sign up on our mailing list at https://decoderloop.com/contact/#training-signup-form

I'll also be at @ringzer0 COUNTERMEASURE on November 7 in Ottawa, Canada, giving a Rust RE focused workshop! Come say hi if you're there, and let's chat Rust RE!

#ReverseEngineering #MalwareAnalysis #rust #rustlang #infosec #training #cybersecurity

Decoder Loop | Reverse Engineering Training

Decoder Loop | Reverse Engineering Training

The amazing @cxiao is offering training at https://decoderloop.com for
#Rust #Malware #ReverseEngineering 😱
Her insight is absolutely priceless, she's taught me all I know about this. If you are organizing an event: This is the state-of-the-art training you are looking for.
Decoder Loop | Reverse Engineering Training

Decoder Loop | Reverse Engineering Training

In a recent IR case I had to review Dameware Remote Everywhere Logs, and, being a lover of RMM logs far and wide, I like to try and glean as much from them as possible. I was disappointed when I could not find any overview of these logs on the interwebs, so I decided to write a reference with as much detail as I could from my own testing.

Please let me know if you have anything I should add or anything is incorrect!

Hope this can be useful to you in the future 🙂

https://blog.dingusxmcgee.com/blog/2025/10/13/Dameware-Remote-Everywhere-Log-Reference.html

Dameware Remote Everywhere Log Reference

An important part of an incident response investigation is reviewing logs, whether that be from disparate, disconnected systems, or in a central SIEM, log review is critical to understanding system and user activity as well as gauging risk and impact. In this post, we’re going to look at Dameware Remote Everywhere logs.

Malware Analysis with Dingus

Quick and dirty blog post on observed malicious java code as a result of exploitation of recent Oracle CVEs.

Please let me know if I goofed anything up, not a Java expert for sure :D

https://blog.dingusxmcgee.com/blog/2025/10/06/Its-Java-All-The-Way-Down.html

It’s Java All The Way Down​

On October 5, 2025, Oracle posted about a freshly exploited CVE, Oracle E-Business Suite CVE-2025-61882. Link. Let’s take a peek in this quick and dirty blog post.

Malware Analysis with Dingus
Backdoor in "AppSuite PDF Editor": A Detailed Technical Analysis

Some threat actors are bold enough to submit their own malware as false positive to antivirus companies and demand removal of the detection. This is exactly what happened with AppSuite PDF Editor.

🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware

https://www.gdatasoftware.com/blog/2025/08/38247-justaskjacky-ai-trojan-horse-comeback

#GDATA #GDATATechblog

JustAskJacky: AI brings back real trojan horse malware

Despite what some might make you believe, late Trojan Horses were a rare breed in the malware zoo. But thanks to AI and LLMs, they are back..

🦔 📹 New Video: There is more than Clean and Malicious

➡️ 7 file analysis verdicts and what they mean

#MalwareAnalysisForHedgehogs #Verdicts
https://www.youtube.com/watch?v=XwT23XVtAw0

Analysis Verdicts: There is more than Clean and Malicious

YouTube
2025-07-20 - Install Linters, Get Malware - DevSecOps Speedrun Edition - Humpty's RE Blog

Recommend song to listen to while reading: If you find something off with what I say, please let me know. I'll gladly amend my content and credit you for the fix. Some thanks in alphabetical order

Humpty's RE Blog

During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit

This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands such as 'vssadmin list shadows', and may trigger alerts based on their use.

However, by leveraging the "Previous Versions" feature in Windows (see screenshot), attackers can select a snapshot, view its properties, and enter the '@ GMT' path directly in Explorer. This allows them to browse the snapshot's contents without needing to use the command line.

Because this technique doesn't rely on typical shadow copy commands, it may evade detection by your EDR or SIEM solution. You might want to test it in your environment to identify and close this potential detection gap 🦸‍♂️🦸‍♀️