Max 'Libra' Kersten

156 Followers
41 Following
19 Posts
Malware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.
Websitehttps://maxkersten.nl/
Twitterhttps://twitter.com/Libranalysis
Trellix researcher Max Kersten (@libra) shares a tried and tested method for dealing with thousands of unknown functions in a given file to significantly decrease the time spent on analysis while improving accuracy. https://www.trellix.com/blogs/research/no-symbols-no-problem/
My most recent blog for Trellix, written with Alexandre Mundo and @leanvel, covers the Rhysida ransomware's inner details, along with an anonimised incident response case: https://www.trellix.com/en-us/about/newsroom/stories/research/rhysida-ransomware.html
Rhysida Ransomware

New ransomware victims are made every day by ransom gangs with a variety of ransomware malware families, one of which is the Rhysida ransomware family. Within this blog, an anonymised version of an attack by the Rhysida ransom operators is examined, along with a technical deep dive into the ransomware itself. The main purpose of this blog is to raise the bar for defenders by detailing the malware operator’s techniques. By sharing factual observations, along with our additional insights, regardless of the security products in use, one can improve their security posture. Although the steps an actor takes might occur in a short time span, one can create additional and granular detection rules for the steps listed in this blog.

Trellix's Pham Duy Phuc, Max Kersten (@libra) & Tomer Shloman present a technical analysis of the ransomware & TTPs used by the Dark Power ransomware gang. https://www.trellix.com/en-us/about/newsroom/stories/research/shining-light-on-dark-power.html
Shining Light on Dark Power: Yet Another Ransomware Gang

Another day, another ransomware gang. The Dark Power ransomware gang is new on the block, and is trying to make a name for itself. This blog dives into the specifics of the ransomware used by the gang, as well as some information regarding their victim naming and shaming website, filled with non-paying victims and stolen data.

Ever wondered how API hashing in malware works, how to deal with it with as little as possible? In my latest addition to my Binary Analysis Course, I've written extensively about this: https://maxkersten.nl/binary-analysis-course/malware-snippets/plugxs-api-hashing/

This blog refers to @herrcore's HashDB, for which a pull-request is pending with the given PlugX hashing algorithm. Thank you for creating and maintaining such a platform!

API Hashing – Max Kersten

The detailed #Botconf2023 schedule is now available on the conference website:
https://www.botconf.eu/botconf-2023/botconf-2023-schedule/
Botconf 2023 Schedule

Botconf 2023 Schedule

Botconf 2023

As part of a new chapter of my Binary Analysis Course, snippets from malware samples are examined in great detail, all in my signature step-by-step analysis method. This article goes into great detail with regards to the self deletion of a sample, and how the malware avoids deleting a file that is in-use: https://maxkersten.nl/binary-analysis-course/malware-snippets/self-deletion/

#malware #cti #blueteam #analysis

I'm absolutely blown away by the quality of @botconf CFP submissions.
It's going to be another amazing edition!

The #Botconf2023 programme committee is busy reviewing this year's submissions... Plenty ! Thanks to all authors !

We plan on advising authors on January 15th and will start publishing the programme as soon as each of the accepted talks accept.

The registrations for this year should open about the same day. Please except a slight increase in tariffs for your participation fees as our costs have increased this year, like everyone's.

In Kaspersky's recent post about Ghidra (more here: https://securelist.com/how-to-train-your-ghidra/108272/) Function ID databases for VS2013 and Delphi were included, although it seems like this has been missed by many, so here is a friendly reminder.

The direct URL to the FIDBs: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/12/fidbs_typeinfo.7z

How to train your Ghidra

Brief introduction to setting up Ghidra, and then configuring it with a familiar UI and shortcuts, so that you would not need to re-learn all the key sequences you have got used to over the years.

Kaspersky
BlackHat Europe, along with the @toolswatch Arsenal, has concluded for a few weeks already by now, but my blog about my time at the event is now live! You can find it here: https://maxkersten.nl/2022/12/22/my-impression-of-blackhat-europe-2022/
My impression of BlackHat Europe 2022 – Max Kersten