Thanks to Lodrina for her work on the Threat Hunting and Malware Analysis sections.
As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Belkasoft
Whitepaper: Tracking Potentially Malicious Files with Evidence of Execution Esing Belkasoft Evidence Center - Elcomsoft
Unlocking BitLocker Volumes by Booting from a USB Drive - Forensic8or
- Kinga Kieczkowska
AirDrop Forensics 2 - Maxim Suhanov
Storage Reserve blocks some tools from thoroughly wiping unallocated space - Oxygen Forensics
Revolutionary changes in Android logical extraction - Peter Stewart
DFA/CCSC Spring 2020 CTF – Wireshark – shell.pcapng Write-up
THREAT INTELLIGENCE/HUNTING
- 360 Total Security Blog
XMRig variant mining Trojan rampantly doing evil - AbdulRhman Alfaifi at U0041
Impacket Remote Execution Tools – atexec.py - Andrew Skatoff at ‘DFIR TNT’
Detecting RunDLL32 ATT&CK Techniques - Anomali
Weekly Threat Briefing: Backdoors, Magecart, Spearphishing, Ransomware and More - Awake Security
SaaS Security Begins In the Browser: Why The Largest Chrome-Based Surveillance Campaign Undermines That - Bitdefender Labs
StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure - Bromium
Aggah Campaign’s Latest Tactics: Victimology, PowerPoint Dropper and Cryptocurrency Stealer - Check Point Research
- Chris Long
- Ben Reardon at Corelight
Ripple20 Zeek package open sourced - covert.io
Mining DNS MX Records for Fun and Profit - Crypsis Group
Novel O365 Application Breach: Would You Click on My Little Quarantine? - Cyber Polygon
Threat Hunting in action - DannyDodds
Reverse Shells – simple - Elastic
- Fox-IT
A Second Look at CVE-2019-19781 (Citrix NetScaler / ADC) - Frikkylikeme
Indicators and webhooks with TheHive, Cortex and MISP — Open Source SOAR part 4 - Intezer
Get Access to our Weekly Linux Threat Feed - Jorge Orchilles at Scythe
- Kaspersky Lab
The hunt for Office 365 accounts - Mercury ISS
Part 2: A weekend dive into the attack - Palo Alto Networks
How to Start Threat Hunting - ReversingLabs Blog
Level up your YARA game - SpecterOps
- Trustwave SpiderLabs
UPCOMING WEBINARS/CONFERENCES
- Cellebrite
- Elan at DFIR Diva
DFIR Related Events for Beginners – July 2020 - F-Secure
Attack Detection Fundamentals - Magnet Forensics
- X1
Discover the New Expanded Features of X1 Social Discovery
PRESENTATIONS/PODCASTS
- Alexis Brignoni
- Jessica Hyde at Magnet Forensics
Magnet Forensics Presents: Cache Up Ep.5 – David Cowen - Kevin Ripa at SANS
- Adam Mashinchi
Quickstart Guide to MITRE ATT&CK™ - Cellebrite
- Cyber June’Gle Virtual Summit
Cyber June’Gle Virtual Summit - CySecK
Webinar on “Introduction to MITRE ATT&CK framework” – Samgacchadhwam Series webinar 14 - Detections Podcast
Season 2 Episode 8: Building Certifications with Joshua Beaman - Digital Forensic Survival Podcast
DFSP # 228 – Psychology of Reporting - Down the Security Rabbithole Podcast
DtSR Episode 401 – Vyrus Lessons in Red to Blue - Jason Nickola at ‘Trust Me I’m Certified’
Turning adversity into altruism with Chris Sanders - John Hubbard at ‘The Blueprint podcast’
Privacy Laws: The Future Driver of Cyber Security - Magnet Forensics
The Magnet Team Shares a Few Comments from Our Customers - MSAB
- Pass the SALT Conference
Pass the SALT Conference - Rasta Mouse
- Recon InfoSec
- SANS Institute
- This Month in 4n6
This Month In 4n6 – June – 2020
MALWARE
- Active Countermeasures
Malware of the Day – PittyTiger - Andrea Fortuna at ‘So Long, and Thanks for All the Fish’
Wietze Beukema: almost 300 Windows 10 executables are vulnerable to DLL hijacking - Deep Instinct Blog
- Brad Duncan at Malware Traffic Analysis
- Click All the Things!
AgentTesla: .rtf and Equation Editor - Cofense
- Colin Hardy on YouTube (20mins)
HTML Deobfuscation – Analysing HTML Guard Protected Code - CrowdStrike
- Cybereason
- Darktrace Blog
Mirai malware infects CCTV camera - Fortinet
- F-secure Attack Detection Fundamentals series
- Attack Detection Fundamentals: Initial Access – Lab #1
- Attack Detection Fundamentals: Initial Access – Lab #2
- Attack Detection Fundamentals: Initial Access – Lab #3
- Attack Detection Fundamentals: Initial Access – Lab #4
- Attack Detection Fundamentals: Code Execution and Persistence – Lab #1
- Attack Detection Fundamentals: Code Execution and Persistence – Lab #2
- G Data Security
Ransomware tries to worm - Graham Cluley
Websites of eight US cities poisoned by malware skimming the credit card details of residents - InfoSec Topics
Analysis and Deobfuscation of Malicious VBScript URSnif Dropper - Journey Notes
Magecart is back: Don’t let digital skimmers ruin your COVID recovery plans - Luca Nagy at SophosLabs
Glupteba: Hidden Malware Delivery in Plain Sight - Malwarebytes Labs
New Mac ransomware spreading through piracy - oR10n Labs
Reverse Engineering the Mustang Panda PlugX RAT – Extracting the Config - Patrick Wardle at Objective-See
OSX.EvilQuest Uncovered - SANS Internet Storm Centre Handler Diaries
- Video: YARA’s BASE64 Strings, (Sat, Jun 27th)
- tcp-honeypot.py Logstash Parser & Dashboard Update, (Sun, Jun 28th)
- Sysmon and Alternate Data Streams, (Mon, Jun 29th)
- Elastalert with Sigma, (Wed, Jul 1st)
- Setting up the Dshield honeypot and tcp-honeypot.py, (Wed, Jul 1st)
- Happy FouRth of July from the Internet Storm Center, (Sat, Jul 4th)
- Secureworks
Preparing for Post-Intrusion Ransomware - Cisco Talos
- Securityinbits
Interesting tactic by Ratty & Adwind for distribution of JAR appended to signed MSI - SentinelLabs
- TrendMicro
US Local Government Services Targeted by New Magecart Credit Card Skimming Attack - Trustwave SpiderLabs
- VMware Carbon Black
- WeLiveSecurity
- Yoroi
Campagna di Attacco “Agenzia Entrate” - Zero2Automated Blog
De-crypting a TrickBot Crypter - 0day in {REA_TEAM}
Quick analysis note about GuLoader (or CloudEyE) - ZScaler
CyberGate RAT and RedLine Stealer Delivered in Ongoing AutoIt Malware Campaigns - Coronavirus and remote workforce threats
MISCELLANEOUS
- Alexis Brignoni at ‘Initialization Vectors’
DFIR Python Study Group Syllabus - Andrew Rathbun at AboutDFIR
AboutDFIR RSS Starter Pack v2 released! - Yaniv Shasha at Azure Sentinel
Sending enriched Azure Sentinel alerts to 3rd party SIEM and Ticketing Systems - Belkasoft
Lifting USB Restricted Mode is Supported - Blue Team Blog
Incident Response – What, Why (And How To Learn It For Free!) - Cellebrite
- Craig Wilson at Digital Detective
Find Panel Syntax - Elcomsoft
ElcomSoft Certified: Digital Forensics Trainings and Trainer Certification Programs - Eric Conrad
Check out @eric_conrad’s tweet - Forensic Focus
- Foxton
Cyber Challenge Walkthrough – Apr 2020 - Shusei Tomonaga at JPCERT/CC
Migrate Volatility Plugins 2 to 3 - Lenny Zeltser
How You Can Write Better Threat Reports - Magnet Forensics
- MikeCyberSec
Automating PCAP Parsing with Linux CLI, Bash & Security Onion - Richard Frawley at ADF
What is Computer Triage? Computer Forensics Field Triage Process Model - Ryan Campbell at ‘Security Soup’
- SANS
Becoming an All-Around Defender: Beware of Flying Baby Syndrome - Santosh Khadsare
- Threat Intelligence Academy
Check out @AcademyThreat’s tweet - Tyler Hudak at TrustedSec
Are You Looking for Ants or Termites? - Steve Watson at VTO Labs
Data Recovered from Phone Submerged in Water for 5 YEARS
SOFTWARE UPDATES
- Plaso
Plaso 20200630 released - Cellebrite
Performance updates to Cellebrite Physical Analyzer 7.35 - Debernal
Fvol - Didier Stevens
Update: base64dump.py Version 0.0.12 - Elcomsoft
Elcomsoft System Recovery adds BitLocker support - Eric Zimmerman
ChangeLog - F-Response
F-Response v 8.0.1.62 Released - GetData
29 June 2020 – 5.2.2.9662 - Mount Image Pro
29 Jun 2020 – v7.1.2.1885 - Grzegorz Tworek
DecodeRDPCache - iNPUT-ACE
iNPUT-ACE Version 2.6 - Magnet Forensics
Updates in Magnet AXIOM 4.2 Include Support for AFF4, Skype Warrant Returns, and WhatsApp - Manabu Niseki
EML Analyzer - Microsoft
Windows File Recovery - Microsoft Threat Intelligence Center
msticpy — 0.6.0/1 Release - MSAB
New release: XRY 9.1, XAMN 5.1 and XEC Export 6.0.1 - Ryan Benson at dfir.blog
Unfurl CLI version (and now on PyPI) - Saleh Bin Muhaysin
CB_TaskManager - Xways
And that’s all for the week! If you think we’ve missed something, or want us to cover something specifically hit us up through the contact page or on the social pipes!