- $1.5B Hack of Bybit Might Be the Largest Crypto Heist Ever
- Amazon is selling the M4 Mac Mini at an all-time low price (and I don't expect it to last)
- How new Facebook policies incentivize spreading misinformation
- Is your live TV streaming service still worth it? I review the options for every budget
- 見逃せない!パブリッククラウドの思わぬ落とし穴
Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websites
Finally, we will analyze the two threads. The C&C communication thread regularly makes a GET request to <C&C domain>/<C&C path>?id=<9digit number>&stat=<environment hash>. The environment hash is computed as an MD5 hash of string created by concatenating the following five values: Value 1 = to_uppercase(crc32(HKEY_LOCAL_MACHINESOFTWAREMicrosoftCryptographyMachineGuid))Value 2 = to_uppercase(crc32(HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionProductName))Value 3 = to_uppercase(crc32(user name))Value 4 = to_uppercase(crc32(computer name))Value 5 = concatenate Value1 Value2 Value3 Value4 It might receive a response in the following format: !lexec;<url to download>restartdelproc…
Read More