7 links
tagged with all of: detection + malware
Click any tag below to further narrow down your results
Links
The DetectRaptor repository provides a collection of Velociraptor detection artifacts for easy public access and use. Users can import the VQL zip file into Velociraptor through the artifact exchange feature, which includes various detection methods for Windows, Linux, and macOS systems. Current artifacts cover a range of detection scenarios, including malware and system behavior analysis.
The article discusses an advanced technique for bypassing the Anti-Malware Scan Interface (AMSI) using RPC hijacking through the NdrClientCall3 function. By intercepting the scan requests at the RPC level, this method manipulates the data before it reaches antivirus engines, allowing malware to evade detection without modifying AMSI itself. This approach operates deeper than traditional bypass methods, making it more effective against both signature and behavior-based detection systems.
Call stacks enhance malware detection by providing detailed insights into who is executing specific activities on Windows systems. By utilizing execution tracing features and enriching call stack data, Elastic's approach improves the ability to identify and respond to malicious behavior more effectively. The article emphasizes the importance of accurately analyzing call stacks to expose the lies malware authors use to conceal their actions.
OUTLAW is a persistent coinminer malware that uses basic techniques like SSH brute-forcing and cron-based persistence to propagate itself across networks. By observing its behavior through a honeypot setup, researchers gained insights into its operational strategies, revealing a multi-stage infection process that leverages commodity tools and demonstrates how simple malware can remain effective in modern environments. The report outlines the attack chain and offers detection strategies based on the malware's predictable behaviors.
A Rust-based Linux kernel module for rootkit detection was developed during an internship at Thalium to enhance malware detection capabilities in various Linux environments. The article discusses the importance of detecting kernel rootkits and outlines the tools and techniques used for this purpose, including leveraging the Linux kernel's tracing APIs and the limitations of existing malware detection solutions.
SpyCloud research reveals that traditional endpoint detection and antivirus solutions fail to identify approximately two-thirds (66%) of malware infections. This significant shortcoming raises concerns about the effectiveness of current cybersecurity measures in protecting against sophisticated threats. The findings suggest a need for enhanced detection technologies to better combat malware risks.
BamboozlEDR is an Event Tracing for Windows (ETW) tool designed for generating realistic security events to test EDR detection capabilities and security monitoring solutions. It features a TUI interface, supports multiple Windows ETW providers, and includes advanced features such as event obfuscation to protect against static analysis. The tool is intended for research and testing purposes and requires user interaction to minimize misuse.