cybersecurity, malware, threat-hunting Peter Girnus cybersecurity, malware, threat-hunting Peter Girnus

Footsteps of WMIGhost - Advanced Malware Continues to Abuse Windows Management Instrumentation (WMI)

While threat hunting a JavaScript file was discovered resembling components of WMIGhost, known as Wimmie/Syndicasec and frequently attributed to the Thrip APT group. This Malware, designed for Microsoft Windows, leverages the Microsoft Windows Management Instrumentation (WMI) to extract information about the infected host then sending WMI data to the attacker's command-and-control (C2) server.

Read More
cybersecurity, malware, threat-hunting Peter Girnus cybersecurity, malware, threat-hunting Peter Girnus

Exploring Ransomware Samples Written As Windows Batch File / HTA Hybrids

A Ransomware attack is an attack deployed by malware that weaponizes encryption to encrypt a victim's files and other data to prevent the victim from accessing their data. At the same time, the ransomware operators demand, through a ransom note, something of value (often money or cryptocurrency, such as Bitcoin) for the key to decrypt the files. Ransomware attacks are a common problem for businesses and individuals worldwide as malicious actors use ransomware infections to profit by holding data hostage. In a recent study, 73% of organizations were hit by ransomware, with a third saying they were hit more than once. Ransomware variants and the threat actors who deploy them continue to affect the largest companies worldwide, such as the ransomware attack on MGM by the ALPHV/BlackCat ransomware group. The most sophisticated ransomware attacks involve complex attack chains with the following:  social engineering attacks, phishing emails, malware/viruses, and zero-day and/or n-day exploits. 

Read More
rust, threat-hunting, malware Peter Girnus rust, threat-hunting, malware Peter Girnus

Scanning Files With Regular Expressions (RegEx) In Rust

This article shows you how to easily scan the contents of files using Regular Expressions (RegEx) using the Rust language. Rust implements a regular expression engine similar to many other regex engines such as Perl Compatible Regular Expressions (PCRE) and ECMAScript but lacks features such as look-arounds and backreferences. You can visit the source code of the regex crate by visiting the Rust implementation of regular expressions on GitHub.

Read More
how-to, rust, malware, threat-hunting Peter Girnus how-to, rust, malware, threat-hunting Peter Girnus

How To Compile YARA Rules & Scan With Files Rust

In this how-to I will show you how to easily compile yara rules and scan files using Rust. While VirusTotal does not have an official Rust implementation there is an experimental project hosted on GitHub. In this how-to we will use he yara-rust crate which provides the bindings around yara inspired by the popular yara-python library maintained by VirusTotal. Using this step-by-step guide we will install the yara-rust crate, compile a yara rule file as well as a yara rule string, and finally we will scan a file using yara-rust.

Read More

How to Install the YARA Malware Analysis Tool On Windows

YARA is an indispensable tool designed to identify malware, malicious, and suspicious elements based on defined patterns. YARA rules are text-based patterns that describe characteristics of files, such as specific byte sequences, strings, regular expressions, and more. In this comprehensive guide, we will delve into the step-by-step process of installing YARA on the Windows operating system. By the end of this tutorial, you'll have a clear understanding of how to harness YARA's capabilities to create custom rules, scan files and directories, and fortify your system's defenses against potential cyber threats.

Read More
threat-hunting, malware, cybersecurity Peter Girnus threat-hunting, malware, cybersecurity Peter Girnus

Exploring Defense Evasion through Reflective Code Loading (T1620)

Reflective Code Loading, identified as T1620 within the MITRE ATT&CK matrix continues to be a prevalent defense evasion technique frequently encountered during routine threat hunting activities. It notably attains popularity in the context of loading .NET assemblies within the Windows operating system. This technique can be employed by threat actors to load numerous amounts of malicious software including, malware, ransomware, and exploits against known software vulnerabilities.

Read More