This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
61110bea272972903985d5d5e452802c DSZOPSDISK/Resources/Df/Uploads/i386-winnt/DoubleFeatureDll.dll.unfinalized | |
0d81f9972863c6d8c90100a73b0600ab DSZOPSDISK/Resources/DmGz/Uploads/i386/winnt/ntfltmgr.sys | |
e14ab6e6ae835792979ff50e647b89c8 DSZOPSDISK/Resources/DSky/Uploads/i386/winnt/tdi6.sys | |
997ba8c988340a1c644cf9a5f67e4177 DSZOPSDISK/Resources/Ep/Plugins/Files/DuplicateToken_Implant.dll | |
425fb612ba62fc1ecad9fb24d10f9bfa DSZOPSDISK/Resources/Ep/Plugins/Files/EventLogEdit_Implant.dll | |
c11142caa3013f852ccb698cc6008b51 DSZOPSDISK/Resources/Ep/Plugins/Files/GetAdmin_Implant.dll | |
bdd2b462e050ef2fa7778526ea4a2a58 DSZOPSDISK/Resources/Ep/Plugins/Files/kill_Implant.dll | |
199796e3f413074d5fdef7fe8334eccf DSZOPSDISK/Resources/Ep/Plugins/Files/LSADUMP_Implant.dll | |
cf5b0d82d39669f584258389f4307b82 DSZOPSDISK/Resources/Ep/Plugins/Files/modifyAudit_Implant.dll | |
8187650eb74ccb3f0fb647335fd54d30 DSZOPSDISK/Resources/Ep/Plugins/Files/modifyAuthentication_Implant.dll |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# http://slatestarcodex.com/2014/11/12/how-to-use-23andme-irresponsibly/ | |
$indexSNPName = 0 | |
$indexSNPValue = 3 | |
$fileName = "genome_Peter_Parker_Full_20170130051759.txt" | |
Write-Host " --- " | |
$rs909525 = gci $fileName | Select-String 'rs909525\t' | |
$rs909525 = $rs909525.Line.Split("`t") | |
Write-Host "[+]"$rs909525[$indexSNPName] "(Warrior Gene): ("$rs909525[$indexSNPValue]")" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//------------------------------------------------ | |
//--- 010 Editor v7.0 Binary Template | |
// | |
// File: | |
// Authors: | |
// Version: | |
// Purpose: | |
// Category: | |
// File Mask: | |
// ID Bytes: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dir . | Foreach-Object{ | |
$file = $_ | |
$hash = Get-FileHash $file -Algorithm MD5 | |
$fileinfo = Get-Item $file | |
New-Object -TypeName PSObject -Property @{ | |
VersionInfo = $fileinfo.VersionInfo | |
LastWriteTime = $fileinfo.LastWriteTime | |
Length = $fileinfo.Length | |
Algorithm = $hash.Algorithm |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
PS E:\ioc> dir . | Foreach-Object{ | |
>> $file = $_ | |
>> $hash = Get-FileHash $file -Algorithm MD5 | |
>> $fileinfo = Get-Item $file | |
>> | |
>> New-Object -TypeName PSObject -Property @{ | |
>> LastWriteTime = $fileinfo.LastWriteTime | |
>> Length = $fileinfo.Length | |
>> Algorithm = $hash.Algorithm | |
>> MD5 = $hash.Hash |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
# 010 Template for t.wnry | |
typedef struct { | |
char Signature[8]; // WANACRY! | |
uint32 Part1Size; // Always 0x100 | |
char DataPart1[Part1Size]; | |
uint32 Part2Signature; | |
uint64 Part2Size; | |
char DataPart2[Part2Size]; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <stdio.h> | |
#include <stdlib.h> | |
// | |
// The mysterious command (0x2E214B44) results in the first 10 sectors being wiped out.Or if the original replaceBootSectors() function fails. | |
// | |
// 0x2E214B44 ??? => Mysterious process. Name very close to AVP.exe | |
// Source of below hashes: https://www.carbonblack.com/2017/06/28/carbon-black-threat-research-technical-analysis-petya-notpetya-ransomware/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Decompiled with JetBrains decompiler | |
// Type: Installer.Install | |
// Assembly: Installer, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null | |
// MVID: 1DF6A781-016A-4A47-9C62-874A888EB357 | |
// Assembly location: | |
using \u0004; | |
using \u0006; | |
using Microsoft.Win32; | |
using System; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
## A good excuse to learn LINQ in WinDbg. | |
## Author: Matt Suiche (@msuiche) - 18-Jan-2019 | |
## | |
## References: | |
## Extracting Forensic Script Content from PowerShell Process Dumps (Lee Holmes) - 17 Jan 2019 | |
## http://www.leeholmes.com/blog/2019/01/17/extracting-forensic-script-content-from-powershell-process-dumps/ | |
## Extracting Activity History from PowerShell Process Dumps (Lee Holmes) - 4 Jan 2019 | |
## https://www.leeholmes.com/blog/2019/01/04/extracting-activity-history-from-powershell-process-dumps/ | |
## |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// https://twitter.com/msuiche | |
int threadMain() | |
{ | |
unsigned int i; // edi@1 | |
_DWORD *v1; // eax@2 | |
void *v2; // esi@7 | |
char v4; // [sp+13h] [bp-2Dh]@0 | |
char v5; // [sp+14h] [bp-2Ch]@1 | |
void *Memory; // [sp+18h] [bp-28h]@1 |
OlderNewer