As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Brian Maloney
Your AV is Trying to Tell You Something: VBN’s Part 1 - Doug Metz at Baker Street Forensics
CSIRT-Collect - Flynn Weeks at ‘The What2Log Blog’
EventRecordID: A Hidden XML Tag - Gabriele Zambelli at ‘Forense nella Nebbia’
Building a Linux profile for Volatility 2 and 3 - Kyle Song
Blog #25: Importance of Drive Trim in Forensic Imager part 1. [KR] - Marko Rogge
Forensik Guide Digitale Ermittlungen - Mr. Hobbits
Quick tip: GIMP Recent Files Artifact - Nasreddine Bencherchali
Forensics Artifacts — Parsing Symantec EDR “localdatastore” LevelDB Files - Said Eid at Open Source DFIR
What I wish someone had told me when I started learning about File System Forensics - Oxygen Forensics
Take It One Step Further with App Activity Analysis - Daniel Wesemann at SANS Internet Storm Center
Forensicating Azure VMs, (Thu, Feb 25th) - Mitch Impey at Security Distractions
Forensic Ramblings - Warlock
Exploring the Hive- Deep inside the Windows Registry. pt 2 - Zach Stanford
Windows User Access Logs (UAL)
THREAT INTELLIGENCE/HUNTING
- Hannah Cartier at Active Countermeasures
Malware of the Day – Indicators of Compromise: Lateral Movement and Backup C2 - Adam at Hexacorn
- Sheldon Sides and Gagan Prakash at AWS Security
Analyze and understand IAM role usage with Amazon Detective - Azure Sentinel
- Brian Henneberry at Blumira
Anatomy of the SolarWinds Attack: Five Types of Malware - Brad Duncan at Malware Traffic Analysis
- Oliver Rochford at Brim Security’s Knowledge Funnel
Visualizing Network Cyber Attacks with Suricata and Zeek using Brim and NetworkX - Check Point Research
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day - CrowdStrike
- CyberArk
The Anatomy of the SolarWinds Attack Chain - Cysiv
- Max Heinemeyer at Darktrace
LockBit ransomware analysis: Rapid detonation using a single compromised credential - DomainTools
- Dragos
- Jack Crook at ‘DFIR and Threat Hunting’
More Behavioral Hunting and Insider Data Theft - Ken Sajo at JPCERT/CC
Emotet Disruption and Outreach to Affected Users - Katie Nickels at ‘Katie’s Five Cents’
A Cyber Threat Intelligence Self-Study Plan: Part 1 - Gijs Hollestelle at Falcon Force
FalconFriday — Recognizing Beaconing Traffic— 0xFF0D - Proofpoint
TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations - Red Alert
Monthly Threat Actor Group Intelligence Report, December 2020 - Vyacheslav Kopeytsev and Seongsu Park at Securelist
Lazarus targets defense industry with ThreatNeedle - Cisco
- Tim Schulz at Scythe
SCYTHE Presents: #ThreatThursday – menuPass - Kevin Haubris at TrustedSec
COFFLoader: Building your own in memory loader or how to run BOFs - Sudeep Singh and Sahil Antil at ZScaler
Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures
UPCOMING EVENTS
- AceLab
he ACE Lab Online Technology Conference on Data Recovery & Digital Forensics 2021 - Andrea Lazzarotto
Webinar su RecuperaBit e l’analisi forense di NTFS — 3 marzo 2021 - Belkasoft
BelkaDay Europe conference: the CTF competition - Cellebrite
- CyberWatch
Diana Initiative CFP Now Open! It’s YOUR year! - Magnet Forensics
Easy Early Case Assessment Tool with Magnet IGNITE - Sophos
Become a Sophos EDR-certified admin
PRESENTATIONS/PODCASTS
- Cache Up with Jessica Hyde
Magnet Forensics Presents: Cache Up – Ep.39 – Eric Katz - Kevin Ripa at SANS
- AceLab
A Video from the ACE Lab Webinar on Flash Data Recovery for Beginners - Archan Choudhury at BlackPerl
INCIDENT RESPONSE TRAINING FREE || Incident Response Process || Day 2 - Black Hat
- Black Hills Information Security
- Breaking Badness
76. Hardware…Software…There’s a Hack for Everything - Bret Witt
SOC101 EventID: 59 (Phishing Mail Detected) [Feb. 14, 2021, 3 a.m.] - Cellebrite
- Time conversions in Cellebrite Physical Analyzer.
- Policing 2025: Where is Policing Headed?
- Policing 2025: Is Your Organization Digital Intelligence Ready?
- Policing 2025: Importance of Training
- Policing 2025: Importance of a Digital Intelligence Strategy
- Policing 2025: Top Challenges for Law Enforcement Agencies
- Policing 2025: Collaboration Across Agencies
- Policing 2025: Envisioning a New Framework for Digital Investigations – the full version
- Gallery View in Cellebrite Physical Analyzer
- Cisco’s Talos
Talos Takes Ep. #42: Seriously folks, save your logs - Didier Stevens
oledump and YARA DDE Rules - Digital Forensic Survival Podcast
DFSP # 262 – Security Theatre - Gerald Auger at Simply Cyber
Cybersecurity’s Dirty Little Secret (How to handle it) - Lee Reiber’s Forensic Happy Hour
Oxygen Forensics Episode 204 - Life has no CTRL ALT DEL with Heather Mahalik
- Magnet Forensics
- SANS
- Pivoting from Art to Science | SANS CTI Summit 2021
- Analyzing Chinese Information Operations with Threat Intelligence | SANS CTI Summit 2021
- Encuentros de dia cero: Relatos desde la trinchera
- Collections and Elections: How The New York Times built an intel collections program in 2020
- ICS Hot Take: Oldsmar, FL Water Facility Event
- Riding the WAVE to Better Collaboration and Security | SANS CTI Summit 2021
- Part 4: Rekt Casino Hack – Pulling It All Together
- Shannon Brazil
Check out @4n6lady’s Tweet - The Digital Forensics Files Podcast
Former FBI Digital Forensics Trainer, Nelson Eby of Open Text Joins Tyler Hatch - Ronnie Watson at Watson Infosec
Channel Update | WatsonInfoSec
MALWARE
- 0xthreatintel
- 360 Total Security
- Anity at Blackorbird
Analysis report on the attack activities of the “Baby Elephant” organization against Pakistani defense manufacturers - Anh Ho at Avast Threat Labs
MassLogger v3: a .NET stealer with serious obfuscation - Patrick Schläpfer at HP
Hancitor Infection Chain Analysis: An Examination of its Unpacking Routine and Execution Techniques - CISA
- MAR-10322463-7.v1 – AppleJeus: Ants2Whale
- MAR-10322463-3.v1 – AppleJeus: Union Crypto
- MAR-10322463-4.v1 – AppleJeus: Kupay Wallet
- MAR-10322463-5.v1 – AppleJeus: CoinGoTrade
- MAR-10322463-2.v1 – AppleJeus: JMT Trading
- MAR-10322463-6.v1 – AppleJeus: Dorusio
- MAR-10322463-1.v1 – AppleJeus: Celas Trade Pro
- MAR-10318845-1.v1 – SUNBURST
- MAR-10320115-1.v1 – TEARDROP
- MAR-10319053-1.v1 – Supernova
- MAR-10325064-1.v1 – Accellion FTA
- Colin Hardy
Remcos Config – Using RC4 to Get Command & Control from CyberChef - Cyber_00011011
A Malware Firehose - Fire Eye Threat Research
- Igor Skochinsky at Hex Rays
Igor’s tip of the week #28: Functions list - InQuest
Cracking Password Protected Payloads - Intezer
- John Hammond
- Malwarebytes Labs
- Alexandre Mundo, Thibault Seret, Thomas Roccia, John Fokker and Valentine Mairet at McAfee Labs
Babuk Ransomware - McHugh Security
- Patrick Wardle at Objective-See
Arm’d & Dangerous - SANS Internet Storm Center
- DDE and oledump, (Sun, Feb 21st)
- Unprotecting Malicious Documents For Inspection, (Mon, Feb 22nd)
- Qakbot in a response to Full Disclosure post, (Tue, Feb 23rd)
- Malspam pushes GuLoader for Remcos RAT, (Wed, Feb 24th)
- So where did those Satori attacks come from?, (Thu, Feb 25th)
- Pretending to be an Outlook Version Update, (Fri, Feb 26th)
- Phil Stokes at SentinelOne
5 Things You Need to Know About Silver Sparrow - Janus Agcaoili and Byron Gelera at Trend Micro
An Analysis of the Nefilim Ransomware - Virus Bulletin
New article: Decompiling Excel Formula (XF) 4.0 malware - Yoroi
Yes, Cyber Adversaries are still using Formbook in 2021
MISCELLANEOUS
- Andrew Rathbun at AboutDFIR
AboutDFIR Content Update 2/21/2021 - Yulia Samoteykina at Atola
Imaging 15+ TB/hour with Atola TaskForce - Belkasoft
Belkasoft X review by Francois H. Putter (Deep Truth) - Cellebrite
Axon to Integrate Video Evidence Platform With Cellebrite - CrowdStrike
University Recruiter Julie Slater on how to make entry-level hiring more equitable - Didier Stevens
re-search.py And Custom Validations - Rodrigo Sagastegui at DME Forensics
DVR Examiner Install blocked by Windows Defender - Forensic Focus
- Christa Miller at Forensic Horizons
The Third Party Doctrine Is Under Scrutiny. Will It Hold Up? - Griffeye
How can we support the mental health of CSA investigators? - Yuta Fuchikami at JPCERT/CC
Japan Security Analyst Conference 2021 -2nd Track- - Patrick J. Siewert at ‘Pro Digital Forensic Consulting’
Keys To Success in Digital Forensics: Incident Response vs. Litigation Support - SANS
Instructor Spotlight: Jonathan Kirby - Teri Radichel
Cybersecurity Book Review: The Cuckoo’s Egg - The Leahy Center for Digital Forensics & Cybersecurity
SOFTWARE UPDATES
- CyberChef
v9.27.5 - Didier Stevens
Update: re-search.py Version 0.0.16 - Eric Zimmerman
ChangeLog - ExifTool
ExifTool 12.21 - Foxton Forensics
Browser History Viewer — Version History - Magnet Forensics
Get More Insight with New and Updated Artifacts in Magnet AXIOM and AXIOM Cyber 4.10 - Philippe Paquet
pe2json - Chris Hoff at ReversingLabs
A1000 Version 6.0 - Timesketch
20210224 - Xways
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!