239 Followers
342 Following
283 Posts
Malware analysis (mostly SolarMarker)
In depth analysis at: Squiblydoo.Blog
Creator of bloated malware handling tool "Debloat": https://github.com/Squiblydoo/debloat

CryptoCharger/CryptoVisa reaches out to 666777228[.]com which has been used by other payloads too.

Notably Signer:"TRUST & SIGN POLAND SP Z O O"
045f583cb7f46ae38ea65fc25d4c7678f306a589ab599dda7d9da404ee91d2f9 which we reported in March 2026.

3/3

In November "Soft Insanity Oy" received a code-signing certificate from Certum and GoGetSSL.
The Certum cert signed CastleLoader, but what about the GoGetSSL?

"CryptoChanger.exe" / "node.exe" a54f626f130c36709857215122d6ceb16e5fab7047316afc31a83dfa620cf292

2/3

FUD #CastleLoader being distributed via malvertizing.
785ba9c42deca8cfc69f1aafb371802782d01bc8156a67c5c0d412c5fb3b4e33

C2: astroflightvision[.]com

The signer, "Soft Insanity Oy" led us to find other FUD malware from November.
1/3

Relatedly, I added functionality to PKILab to extract and highlight the Authenticode Publisher for Windows Hardware drivers. I had hardly noticed these details before, so I'm glad PKILab can make it easy to find.
3/3

We see so many abused certificates, that we can't dig deep. If ya'll ever want to get in on the front lines of it, be sure to join the Debloat Discord where we monitor and chat about abused certificates.

2/3

The RansomISAC published regarding "Zhengzhou 403 Network Technology Co., Ltd.", a cert we reported in 2025 after it was used to sign CobaltStrike. Their investigation seemed like a wild adventure, check it out.
https://ransom-isac.org/blog/dragonbreath-dragon-in-the-kernel/
1/3
DragonBreath: Dragon in the Kernel

A 0-day BYOVD vulnerability in dragoncore_k.sys signed by Zhengzhou 403 Network Technology, with shell company analysis, Dragon Breath APT-Q-27 attribution, and an APT31 / Wuhan Xiaoruizhi personnel nexus.

Ransom-ISAC
Update to pkilab.certgraveyard.org
- I originally hadn't planned for the analysis reports to be sharable, but it turned out people liked sharing them. They are now permanent.
- Added P7X support, which was omitted by accident

We didn't know how an actor was using EV Certificates issued to Lenovo and others.

We now do.

From DigiCert's incident report:
"the threat actor used a compromised analyst endpoint to access DigiCert's internal support portal. The threat actor used a limited function within the customer-support portal which allows authenticated DigiCert support analysts to access customer accounts from the customer's perspective to facilitate support tasks. The threat actor was able to use this function to access initialization codes for orders that were approved but pending delivery for EV Code Signing certificate orders across a finite set of customer accounts."

"Possession of the initialization code, combined with an approved order, is functionally sufficient to generate and retrieve the corresponding certificate."

The full report can be found here and explains the incident in great detail: https://bugzilla.mozilla.org/show_bug.cgi?id=2033170

The report mentions "Where we got lucky: A community member involved in security research reported the evolving pattern of misused certificates and engaged in dialogue with our support team. Without that report, the undetected compromise of ENDPOINT2 and the associated mis-issuance might have remained undiscovered for a longer period."

Special thanks goes to the regular contributors to the Cert Graveyard.

Also special thanks to DigiCert: this report has a high level of transparency, which is warranted, and also well executed.

2033170 - DigiCert: Misissued code signing certificates

ASSIGNED (dcbugzillaresponse) in CA Program - CA Certificate Compliance. Last updated 2026-05-03.

The lab is openly accessible here: pkilab.certgraveyard.org

I'd love to get your feedback or hear if you have any problems. :)

Certificates are extracted client-side, allowing you to parse certs from 900MB+ size files.
2/2

CertGraveyard's PKI Lab is available now.

Want to better understand code-signing certificates? The site allows you to extract and view certificates.
The Cert Inspection tool parses out all of the bits and flags anomalies.
1/2