Blog

DarkGate Malware: Understanding Delivery and Infection Vectors

Overview In 2018, security researcher Adi Zeligson discovered the DarkGate malware spreading through fake video torrent files. Though weaponization, delivery, and exploitation changes frequently, installation has remained fairly the same. A Microsoft Software Installer (MSI) file or Visual Basic Script (VBS) will instantiate an AutoIT script and AutoIT interpreter. The AutoIT script then allocates memory…

VirtualBox VM Memory Dump: Easy Step-by-Step Tutorial

(This Walk-through was performed using Windows 10 and Oracle® VM VirtualBox 7.0.18) I recently finished a research project that involved acquiring virtual memory dumps to use with the memory analysis tool Volatility. This prompted me to learn how to perform a memory dump of a VirtualBox VM which wasn’t as straight forward as I’d hoped.…

Dead In The Water: A Deep Dive Into KillDisk

Overview KillDisk made its entry onto the world stage as a component of the BlackEnergy trojan; most notable for its attacks on the Ukrainian energy sector between 2014 and 2015. What KillDisk lacks in speed it makes up for in effectiveness; earning the reputation as one of the most destructive wipers in existence. The name…

Advanced Persistent Thievery of APT38

APT38 shows an expert proficiency in technological skills, conducting cross-platform campaigns and crafting malware payloads designed for use in a variety of environments. These efforts are executed in tandem with massive reconnaissance campaigns, suggesting the group has access to a significant amount of human and technological resources.

Cutting Through The Fog Of Cyberwar: A Deep Dive Into TA402

Assigning a national identity to a threat actor is difficult, and for the private security industry, the practice is questionable. This is especially true when forensic evidence is elusive. But, there is more to attribution than enabling a proportionate political response. This is likely where the true motives behind any hastily made attribution can be…

Cracking CopperStealer

One of the greatest perks of my current job is the freedom to investigate any security topic of my choosing. This means that falling down the rabbit hole of threat intel is a common occurrence. The LNKR incident was my gateway into digital forensics, however this has uncovered a connection to another instance of malware…

The LNKR Incident

The LNKR trojan is an infected browser extension that monitors the web pages visited by the user, looking for pages with administrative privileges such as blog sites or web-based virtual learning environments. When a user with admin privileges posts to the page, the extension will include a stored cross-site scripting attack and injects malicious JavaScript…

An Introduction:

When I set out to start this blog I did so at the encouragement of my mentor… It was his advice that I find a greater value in my education beyond my simple learning experience and use this to give back to the industry.

About D33P_DIV3R

As the subtitle states, this blog is about threat analysis, malware research, and penetration testing. It’s also about my journey into the world of cybersecurity and personal growth.


Follow My Blog

Get new content delivered directly to your inbox.