dingusxmcgee

@dingusxmcgee@infosec.exchange
43 Followers
128 Following
320 Posts
Husband, Dad and Incident Responder.
Incident Response and Threat Detection at $company
Very Amateur Malware Analysis Blog:
https://blog.dingusxmcgee.com

🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware

https://www.gdatasoftware.com/blog/2025/08/38247-justaskjacky-ai-trojan-horse-comeback

#GDATA #GDATATechblog

JustAskJacky: AI brings back real trojan horse malware

Despite what some might make you believe, late Trojan Horses were a rare breed in the malware zoo. But thanks to AI and LLMs, they are back..

🦔 📹 New Video: There is more than Clean and Malicious

➡️ 7 file analysis verdicts and what they mean

#MalwareAnalysisForHedgehogs #Verdicts
https://www.youtube.com/watch?v=XwT23XVtAw0

Analysis Verdicts: There is more than Clean and Malicious

YouTube
@GossiTheDog absolutely incredible repertoire of films. You won’t be disappointed. Or maybe you will but that’s because you just don’t share his vision.
@chrissanders88 who/what created it? Is that expected or is there a potential issue with another account? Is there a change request that would explain it? Does it meet other admin naming/privilege assignment standards? Has it been used? Is it enabled? If yes and used, where was it used? If cannot confirm legitimate, are there other accounts that should also be in scope?
2025-07-20 - Install Linters, Get Malware - DevSecOps Speedrun Edition - Humpty's RE Blog

Recommend song to listen to while reading: If you find something off with what I say, please let me know. I'll gladly amend my content and credit you for the fix. Some thanks in alphabetical order

Humpty's RE Blog
@infoseclogger got lots of em by me every night this summer

During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit

This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands such as 'vssadmin list shadows', and may trigger alerts based on their use.

However, by leveraging the "Previous Versions" feature in Windows (see screenshot), attackers can select a snapshot, view its properties, and enter the '@ GMT' path directly in Explorer. This allows them to browse the snapshot's contents without needing to use the command line.

Because this technique doesn't rely on typical shadow copy commands, it may evade detection by your EDR or SIEM solution. You might want to test it in your environment to identify and close this potential detection gap 🦸‍♂️🦸‍♀️

Ever heard of shellbags? Like in the example here:
My Computer -> ? -> Users -> <compromised_used> -> ADRecon-Report-20250225235831

Shellbags are a subset of data found within UsrClass.dat and sometimes in the NTUSER.DAT hive. They are used by Windows to remember folder view settings for Explorer. Each time a user opens a folder, Windows stores metadata about how that folder was viewed, including its path, icon size, window position, and view mode (such as details or thumbnails). This applies to both local and external directories, including removable drives or network shares.

From a forensic standpoint, Shellbags are highly valuable. They can reveal folders that were accessed or created by the user, even if those folders or drives no longer exist.

Like in the example above, from a recent Incident Response case. We did not find evidence of execution from ADRecon; however, the shellbags clearly showed that the attacker browsed this folder; at the same time, the timestamp from the report file was generated, providing evidence that the tool had run, despite the absence of other evidence.

An artefact you don't want to miss in your investigation. 🕵

🦔 📹 Virut Part III: File infection analysis and bait file creation

#MalwareAnalysisForHedgehogs #Virut
https://www.youtube.com/watch?v=FcXPSpBh4ps

Malware Analysis - Virut's file infection, part 3

YouTube

Blog: "Supper is served"
Excellent analysis article of the backdoor Supper

https://c-b.io/2025-06-29+-+Supper+is+served

2025-06-29 - Supper is served - Humpty's RE Blog

2025-06-29 - Supper is served - Humpty's RE Blog