Clean documents are collected from various open sources. All the copyright rights belong the the authors of each document and file. You must not use the documents for their content but only as samples of particular file types.
Sunday, March 24, 2013
16,800 clean and 11,960 malicious files for signature testing and research.
Clean documents are collected from various open sources. All the copyright rights belong the the authors of each document and file. You must not use the documents for their content but only as samples of particular file types.
Posted by
Mila
at
2:02 AM
4
comments
Tags:
collection,
sandbox,
signature testing
Links to this post
Thursday, March 21, 2013
DarkSeoul - Jokra - MBR wiper samples
If all you needed for happiness is to destroy a few virtual machines, here are the samples for today's headline maker.
The malware overwrites master boot record (MBR) as described here:
* Trojan.Jokra - Symantec
* DarkSeoul: SophosLabs identifies malware used in South Korean internet attack
* South Korean Banks, Media Companies Targeted by Destructive Malware - McAfee
* South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack - Symantec.
The malware overwrites master boot record (MBR) as described here:
* Trojan.Jokra - Symantec
* DarkSeoul: SophosLabs identifies malware used in South Korean internet attack
* South Korean Banks, Media Companies Targeted by Destructive Malware - McAfee
* South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack - Symantec.
Sunday, March 3, 2013
Mandiant APT1 samples categorized by malware families
Update: May 19, 2018
APT 1 resources
Threat Actor aliases:
Comment Crew, Comment Panda, PLA Unit 61398, TG-8223, APT 1, BrownFox,Group 3,GIF89a, ShadyRAT, Shanghai Group, Byzantine Candor
http://apt.threattracking.com
These are the samples described in the Mandiant Report APT1, in the Indicators of Compromise (IOCs). Each file is named according to the malware family, so you can run your own detection and signature tools to see how your naming convention corresponds to the one used by Mandiant.
You can use these binaries to develop signatures, compare to your samples, or study the behavior and evolution of APT1.
I added Contagio samples in several families as well.
The list of binaries and their names, as well as malware families descriptions are provided below for your convenience.
APT 1 resources
Threat Actor aliases:
Comment Crew, Comment Panda, PLA Unit 61398, TG-8223, APT 1, BrownFox,Group 3,GIF89a, ShadyRAT, Shanghai Group, Byzantine Candor
http://apt.threattracking.com
- 2010_11_Fireeye_VinSelf - A new backdoor in town! « VinSelf - A new backdoor in town! _ FireEye Inc.pdf
- 2010_12_Guardian_WikiLeaks cables reveal fears over Chinese cyber warfare _ US news _ The Guardian.pdf
- 2011_08_Ira Winkler_ Shady Rat Case Shows Vendors As Big a Problem As APT Itself _ CIO.pdf
- 2011_08_Kaspersky's Thoughts on Operation Shady Rat _ Nota Bene_ Eugene Kaspersky's Official Blog.pdf
- 2011_10_SANS_detailed-analysis-advanced-persistent-threat-malware-33814.pdf
- 2011_Mcafee-operation-shady-rat1.pdf
- 2012_06_Bloomberg_Hackers Linked to China’s Army Seen From EU to D.C. - Bloomberg.pdf
- 2013_02_NYTimes_China’s Army Is Seen as Tied to Hacking Against U.S.pdf
- 2013_03_Fireeye_TABMSGSQL and 44 WEBC2-YAHOO_The Dingo and the Baby « The Dingo and the Baby _ FireEye Inc.pdf
- 2013_05_Fireeye_APT1 Three Months Later.pdf
- 2013_05_Mandiant-APT1_Exposing One of China’s Cyber Espionage Units.pdf
- 2014_05_Fireeye_The PLA and the 8_00am-5_00pm Work Day_ FireEye Confirms DOJ's Findings on APT1 Intrusion Activity « The PLA and the 8_00am-5_00pm Work Day_ FireEye Confirms DOJ's Findings on APT1 Intrusion Activity _ FireEye Inc.pdf
- 2014_06_Crowdstrike_Hat-tribution to PLA Unit 61486 ».pdf
- 2014_12_Vinself now with steganography - Airbus CyberSecurity.pdf
- 2016_BANGAT_malware-signatures_bangat.yara at master · citizenlab_malware-signatures.pdf
- GIF89a_Vinselfdecoder_malwaretracker.com_ Command and Control Decoder - Vinself Trojan.pdf
- PLA Unit 61398 _ Council on Foreign Relations Interactives.pdf
You can use these binaries to develop signatures, compare to your samples, or study the behavior and evolution of APT1.
I added Contagio samples in several families as well.
The list of binaries and their names, as well as malware families descriptions are provided below for your convenience.
Wednesday, February 20, 2013
Linux/CentOS SSHd Spam Exploit — libkeyutils.so.1.9 - sample
Here are the links:
Saturday, February 16, 2013
Jan 2013 Shylock (skype version) sample
In January 2013, Iurii Khvyl and Peter Kruse from CSIS posted analysis of Shylock variant capable of spreading through Skype.
You can read their research here Shylock calling Skype. The sample is below
Jan 2013 - Linux SSHDoor - sample
Just a few accumulated samples here found and shared by others. This one is for Linux SSHDoor malware, which can steal your SSH passwords. ESET covered that in detail in Linux/SSHDoor.A Backdoored SSH daemon that steals passwords ( 24 JAN 2013)
The related Linux.Chapro.A sample was posted earlier this year as well
Friday, February 15, 2013
Manipulating Memory for Fun and Profit by Frédéric Bourla - High-Tech Bridge
The presentation includes detailed memory forensics process using Volatility
by Frédéric BOURLA
Chief Security Specialist
Head of Ethical Hacking & Computer Forensics Departments
High-Tech Bridge SA
Table of Contents
0x00 - About me
0x01 - About this conference
0x02 - Memory introduction
0x03 - Memory manipulation from an offensive angle
0x04 - Memory manipulation from a defensive angle
0x05 - Conclusion
Download the full presentation in PDF
The text of the presentation (for Google search and to get an idea about the contents:)
Posted by
Mila
at
9:57 PM
0
comments
Tags:
High-Tech Bridge,
Memory Analysis,
Volatility
Links to this post
Sunday, February 10, 2013
Trojan 'Nap" aka Kelihos/Hlux status update by DeepEnd Research and samples
FireEye posted details about the sleep function found in Kelihos/Hlux (An encounter with Trojan Nap), which is interesting, and indeed is present in some of the samples we saw. The trojan, of course, has many more features, and most of them were documented in previous publications online. This post is a quick update on the state of Kelihos/Hlux botnet, along with the list of known fast flux domains (1500+) associated with with Kelihos distribution or Command&Control. (current > 2012). The current and most active name servers are pointing to the ns[1-6].boomsco.com, ns[1-6].larstor.com, and ns[1-6].zempakiv.ru which are also fast flux domains. The double fast flux nature of the botnet makes it very difficult to take down, and sinkholing is a temporary measure. Despite the two large attempts to take it down (Sep.2011 and Mar. 2012), the botnet is definitely on the rise again.
Please read the rest of our post here http://www.deependresearch.org/2013/02/trojan-nap-aka-kelihoshlux-feb-2013.html.
You can download the associated binaries (97 files) and pcap below.
Friday, January 18, 2013
Dec 2012 Batchwiper Samples
Update: Jan 18, 2013 - Here is a nice analysis BatchWiper Analysis by Emanuele De Lucia
The next time the virus will wake up is Jan 21, 2013. Time to grab it, read and play.
Several people asked for Batchwiper, so here are the samples.
From Maher - Iranian CERT:
The next time the virus will wake up is Jan 21, 2013. Time to grab it, read and play.
From Maher - Iranian CERT:
Latest investigation have been done by Maher center in cyber space identified a new targeted data wiping malware. Primitive analysis revealed that this malware wipes files on different drives in various predefined times. Despite its simplicity in design, the malware is efficient and can wipe disk partitions and user profile directories without being recognized by anti-virus software. However, it is not considered to be widely distributed. This targeted attack is simple in design and it is not any similarity to the other sophisticated targeted attacks. The identified components of this threat are listed in the following table:
Name
|
MD5
|
GrooveMonitor.exe [dropper]
|
f3dd76477e16e26571f8c64a7fd4a97b
|
juboot.exe
|
fa0b300e671f73b3b0f7f415ccbe9d41
|
jucheck.exe
|
c4cd216112cbc5b8c046934843c579f6
|
SLEEP.EXE
|
ea7ed6b50a9f7b31caeea372a327bd37
|
WmiPrv.exe
|
b7117b5d8281acd56648c9d08fadf630
|
Thursday, December 27, 2012
Dec. 2012 Skynet Tor botnet / Trojan.Tbot samples
Here are 7 binaries for Skynet Tor botnet aka Trojan.Tbot. Claudio's analysis is wonderfully detailed, I just added pcaps and a few words in the description
Read more here:
Rapid7. Claudio Guarnieri. Skynet, a Tor-powered botnet straight from Reddit
Wednesday, December 26, 2012
ZeroAccess / Sirefef Rootkit - 5 fresh samples
ZeroAccess rootkit is far from new and exciting but but this is a fresh lot with still active C2 servers.
Although the dropper is detected by at least half of AV engines, post infection detection is another story. I tried Kaspersky TDSS Killer, Avast Rootkit utility and RootRepeal without any success. I used Gmer and LordPE to carve out the hidden file from the memory. You can use Redline or Volatility too.
You can download 5 files below together with pcaps from one of the files and the file dumped from memory. It appears that free videos and apps names are used as the lure in this case.
Tuesday, December 25, 2012
Monday, December 24, 2012
Dec 2012 Linux.Chapro - trojan Apache iframer
Research: ESET Malicious Apache module used for content injection: Linux/Chapro.A
All the samples are below. I did not test it thus no pcaps this time.
------Linux/Chapro.A e022de72cce8129bd5ac8a0675996318
------Injected iframe 111e3e0bf96b6ebda0aeffdb444bcf8d
------Java exploit 2bd88b0f267e5aa5ec00d1452a63d9dc
------Zeus binary 3840a6506d9d5c2443687d1cf07e25d0
Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan
Holiday presents.
Research: Symantec. Trojan.Stabuniq Found on Financial Institution Servers
More research: Stabuniq in-Depth by Emanuele De Lucia
Here is a another minor news maker of 2012.
It is very well detected by most AV but if you want to play or make IDS or yara signatures, the pcap and the sample is below.
Sunday, December 23, 2012
Dec 2012 Dexter - POS Infostealer samples and information
I got 3 more "tester-type" samples and added them below - in addition to the well known 4 samples mentioned by Seculert.
You can read more about it here:
Seculert Dexter - Draining blood out of Point of Sales
TrendMicro Infostealer Dexter Targets Checkout Systems
Verizon: Dexter: More of the same, or hidden links?
Volatility labs Unpacking Dexter POS "Memory Dump Parsing" Malware
Trustwave labs: The Dexter Malware: Getting Your Hands Dirty
Symantec Infostealer.Dexter
Monday, December 17, 2012
Sample for Sanny / Win32.Daws in CVE-2012-0158 "ACEAN Regional Security Forum" targeting Russian companies
.png)
End of the year presents continue.
Here is an excellent analysis made by the Fireeye: To Russia with Targeted Attack. I am posting all the necessary details for this type of malware to be findable on Google plus the sample and pcap for signature development. Fireeye named it “Sanny” after one of the email addresses and many AV vendors called the dropper Win32.Daws.
Friday, December 7, 2012
Aug 2012 - Hikit APT rootkit sample
This is a sample of Hikit rootkit
Aug 2012
Related News and Analysis:
The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 1) - Mandiant
Aug 2012
Related News and Analysis:
The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 1) - Mandiant
Aug 2012 W32.Crisis and OSX.Crisis - JAR file Samples - APT
End of the year presents:
Malicious Java file containing W32.Crisis and OSX.Crisis
Related News and Analysis:
Aug 2012
Crisis for Windows Sneaks onto Virtual Machines - Symantec
New Apple Mac Trojan Called OSX/Crisis Discovered - Intego
Nov 2012 Worm Vobfus Samples
This is a sample of W32.Vobfus / Worm_Vobfus
Related News and Analysis:
Nov 2012
Trend Micro What’s the Fuss with WORM_VOBFUS?
Nov 2012 - Backdoor.W32.Makadocs Sample
End of the year presents:
These is a sample of W32.Makadocs
Related News and Analysis:
November 2012
Malware Targeting Windows 8 Uses Google Docs | Symantec
Backdoor.Makadocs | Symantec
Subscribe to:
Posts (Atom)

