dingusxmcgee

49 Followers
131 Following
332 Posts
Husband, Dad and Incident Responder.
Incident Response and Threat Detection at $company
Very Amateur Malware Analysis Blog:
https://blog.dingusxmcgee.com
@t nice bro nice
@cxiao jd Vance: “u up?”

Recently joined a cool IR/Threat Intel focused community on discord and the creator just built an awesome blog platform built on github for sharing articles on malware analysis/reverser engineering/incident response.

You can post directly to the blog itself, or link your external blog and it looks and functions really well!

Check it out at https://irchaos.club !

Incident Response Chaos Club

Incident Response Chaos Club - embracing the chaos of cybersecurity through DFIR, incident response, and security research.

Incident Response Chaos Club

🦀 I'm excited to announce that I am starting a training firm, @decoderloop, focused on providing Rust Reverse Engineering training! https://decoderloop.com/

The tools, techniques, and resources that reverse engineers have were built for the era of C. Meanwhile, malware authors and software developers alike are rapidly switching to modern programming languages such as Rust. Decoder Loop is here to fill the knowledge gap and level the playing field, for reverse engineers facing modern binaries.

We hope to come to a conference near you, next year. If you'd like to stay notified on upcoming trainings: follow us at @decoderloop, or sign up on our mailing list at https://decoderloop.com/contact/#training-signup-form

I'll also be at @ringzer0 COUNTERMEASURE on November 7 in Ottawa, Canada, giving a Rust RE focused workshop! Come say hi if you're there, and let's chat Rust RE!

#ReverseEngineering #MalwareAnalysis #rust #rustlang #infosec #training #cybersecurity

Decoder Loop | Reverse Engineering Training

Decoder Loop | Reverse Engineering Training

The amazing @cxiao is offering training at https://decoderloop.com for
#Rust #Malware #ReverseEngineering 😱
Her insight is absolutely priceless, she's taught me all I know about this. If you are organizing an event: This is the state-of-the-art training you are looking for.
Decoder Loop | Reverse Engineering Training

Decoder Loop | Reverse Engineering Training

In a recent IR case I had to review Dameware Remote Everywhere Logs, and, being a lover of RMM logs far and wide, I like to try and glean as much from them as possible. I was disappointed when I could not find any overview of these logs on the interwebs, so I decided to write a reference with as much detail as I could from my own testing.

Please let me know if you have anything I should add or anything is incorrect!

Hope this can be useful to you in the future 🙂

https://blog.dingusxmcgee.com/blog/2025/10/13/Dameware-Remote-Everywhere-Log-Reference.html

Dameware Remote Everywhere Log Reference

An important part of an incident response investigation is reviewing logs, whether that be from disparate, disconnected systems, or in a central SIEM, log review is critical to understanding system and user activity as well as gauging risk and impact. In this post, we’re going to look at Dameware Remote Everywhere logs.

Malware Analysis with Dingus
@nopatience @cR0w dinner tonight is RCE, and for desert? RCE. Hope you’re hungry!

@cR0w pushed out a quick and dirty overview of what I found in the contents of the malicious template files, followed by a backdoor for additional execution.

https://blog.dingusxmcgee.com/blog/2025/10/06/Its-Java-All-The-Way-Down.html

It’s Java All The Way Down​

On October 5, 2025, Oracle posted about a freshly exploited CVE, Oracle E-Business Suite CVE-2025-61882. Link. Let’s take a peek in this quick and dirty blog post.

Malware Analysis with Dingus

Quick and dirty blog post on observed malicious java code as a result of exploitation of recent Oracle CVEs.

Please let me know if I goofed anything up, not a Java expert for sure :D

https://blog.dingusxmcgee.com/blog/2025/10/06/Its-Java-All-The-Way-Down.html

It’s Java All The Way Down​

On October 5, 2025, Oracle posted about a freshly exploited CVE, Oracle E-Business Suite CVE-2025-61882. Link. Let’s take a peek in this quick and dirty blog post.

Malware Analysis with Dingus
Backdoor in "AppSuite PDF Editor": A Detailed Technical Analysis

Some threat actors are bold enough to submit their own malware as false positive to antivirus companies and demand removal of the detection. This is exactly what happened with AppSuite PDF Editor.