all InfoSec news
Reading Between the Lines of Code: Ziraat_Stealer
April 29, 2024, 2:20 p.m. | JustAnother-Engineer
InfoSec Write-ups - Medium infosecwriteups.com
Hello Everybody! Today i will be conducting an analysis of a .NET information stealer.
MD5 hash: DC4200AC514006F084EAD7F83B84C928
Virus Total Link: https://www.virustotal.com/gui/file/a850de0705c0f6095910aa1d5ed0e73a49581aa7427fcfaf2ff5144e93b047c1/community
Analysis
File version/name informationThe sample effectively disguises itself as a Data Recovery tool to bypass user detection. It is a 32-bit .NET binary, which allows for the conversion of the binary back to Intermediate Language (IL). This can be done using tools designed for such purposes, with DNSpy being a prime example.
Upon closer examination of the binary, …
More from infosecwriteups.com / InfoSec Write-ups - Medium
JNDI Injection — The Complete Story
1 day, 13 hours ago |
infosecwriteups.com
HacktheBox Starting Point: Explosion Walkthrough
3 days, 3 hours ago |
infosecwriteups.com
My LLM Bug Bounty Journey on Hugging Face Hub via Protect AI
3 days, 14 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Lead Security Architect
@ Fireblocks | Tel Aviv-Yafo, Tel Aviv District, Israel
Senior Software Development Engineer, AWS Security SecDevOps
@ Amazon.com | Courbevoie, Ile-de-France, FRA
Senior Professional Services Consultant XSIAM - Spain
@ Palo Alto Networks | Madrid, Spain