Matt Green
@mgreen27.bsky.social
π€ 195
π₯ 323
π 26
Velociraptor@Rapid7.
#DFIR
,
#CTI
and research.
https://mgreen27.github.io
For anyone interested in Velociraptor hunting - just added a refactored Windows.Detection.Webhistory into DetectRaptor π This is useful for hunting across browser artefacts - covers Chrome, Edge and Firefox LINK:
github.com/mgreen27/Det...
#DFIR
7 months ago
0
2
0
Just added LolRMM project to DetectRaptor for Velociraptor. Expanded to look at installed applications, dns and running applications (process name and original/internal name of binaries on disk).
github.com/mgreen27/Det...
#dfir
9 months ago
0
5
0
This
#100daysofyara
shows but bad rules can be good when used correctly :) Im using it for targeted live strings extraction in Velociraptor and some cool workflow to drive things like building yara rules. The screenshot shows VQL to dynamically generate a yara rule to preferred string size.
9 months ago
1
1
0
Todays
#100daysofyara
rule targets the CISA report for this Contec CMS8000 backdoor Rule:
github.com/mgreen27/100...
10 months ago
0
2
1
#100daysofyara
todays rule hits on a suspicious LNK executing mshta.exe using yara-x format.
github.com/mgreen27/100...
10 months ago
0
4
1
Messing with a couple of anomaly rules for
#100daysofyara
1. Packer related API strings and no import Rule:
github.com/mgreen27/100...
2. Downloader related API strings and no import Rule:
github.com/mgreen27/100...
10 months ago
0
5
2
reposted by
Matt Green
10 months ago
In case if you wonder what broke
#ProcessHollowing
on Windows 11 24H2, I have something for you:
hshrzd.wordpress.com/2025/01/27/p...
loading . . .
Process Hollowing on Windows 11 24H2
Process Hollowing (a.k.a. RunPE) is probably the oldest, and the most popular process impersonation technique (it allows to run a malicious executable under the cover of a benign process). It is usβ¦
https://hshrzd.wordpress.com/2025/01/27/process-hollowing-on-windows-11-24h2/
0
58
39
#100daysofyara
todays rule finds kimsuky MSC payloads by unique Icon Index. In a previous rule I detected on a binary representation of pdf and was interested to understand how this may be generated.
10 months ago
0
4
1
#100daysofyara
hunting inspired from a sample share from VT 1. Microsoft Teams without a MS cert 2. Detect cert metadata
github.com/mgreen27/100...
3. Anomaly detection for PE files with large difference between physical and virtual size of a section
github.com/mgreen27/100...
10 months ago
1
8
3
reposted by
Matt Green
Jamie Levy π¦
about 1 year ago
π‘Interested in
#memoryforensics
? Follow β
@volexity.com
β
@volatilityfoundation.org
β
@attrc.bsky.social
β
@rmettig.bsky.social
β
@nolaforensix.bsky.social
β‘οΈ more to come!
1
53
23
#100daysofyara
todays rule is detecting patched clr.dll in memory AmsiScanBuffer bypass. My @velocidex Windows.System.VAD artifact can be used to target clr.dll mapped sections for an easy detection. Rule:
github.com/mgreen27/100...
VQL:
github.com/mgreen27/100...
10 months ago
0
6
5
Todays
#100daysofyara
rule looks for a PE file with an unusual debug info type. Yara doesnt directly expose these debug structures so had to search for the RSDS header and find type field by offset.
github.com/mgreen27/100...
10 months ago
0
4
2
This
#100daysofyara
rule looks for a PE with .reloc section and no relocation.
github.com/mgreen27/100...
10 months ago
0
3
1
This
#100daysofyara
rule looking for a PE with unusual NumberofRVAandSizes attribute
github.com/mgreen27/100...
11 months ago
0
2
2
#100daysofyara
MSC files appear to store their icons inside a BinaryStorage field. Todays rule hits on a suspicious PDF icon. Rule:
github.com/mgreen27/100...
11 months ago
0
3
2
#100daysofyara
This rule detects PE files with SUBSYSTEM_WINDOWS_GUI and no Window API function import. Rule:
github.com/mgreen27/100...
11 months ago
0
3
2
#100daysofyara
more yara-x > Dumping a RedCurl malware pe I saw Rich Header and thought I would give it a try. Rule:
github.com/mgreen27/100...
11 months ago
0
3
2
#100daysofyara
sometimes simple rules work really well! In an IR last week, we discovered and stopped an in progress exfil. This process rule detects the in memory renamed rclone - should be cross platform. Rule:
github.com/mgreen27/100...
11 months ago
0
2
1
#100daysofyara
continuing the LNK language theme. Todays rule hits ExtraData ConsoleDataBlock targeting less known Face Name field. In the example rule Iβm targeting the Korean font gulimche - ive added a few other system fonts for reference. Rule:
github.com/mgreen27/100...
11 months ago
0
4
0
#100daysofyara
todays post is generic and looking at LNK files. Finding samples with specific attributes that may not be parsed (or dumped by yara-x) can be difficult. This rule finds LNK files with the rare in field CodePage language setting. Rules:
github.com/mgreen27/100...
11 months ago
1
10
3
#100daysofyara
todays post I do a simple search for payload and QEMU local dll files observed both in the zip and imports of the QEMU executable. I initially tried to do a fancy for loop looking at zip attributes but performance was terrible so simple strings wins the day!
github.com/mgreen27/100...
11 months ago
0
2
2
crossposting here
#100daysofyara
continuing to explore yara-x today I tried to detect a renamed QEMU exe using pe attributes and a dynamic variable.
11 months ago
1
7
3
reposted by
Matt Green
Metasploit
about 1 year ago
Roses are red, the sky is blue β This week's
#Metasploit
wrap-up has Windows secrets dump improvements (and a JetBrains TeamCity login scanner, too!) We're bad at poetry but good at shells. Check out the latest.
www.rapid7.com/blog/post/20...
loading . . .
Metasploit Weekly Wrap-Up 11/22/2024 | Rapid7 Blog
https://www.rapid7.com/blog/post/2024/11/22/metasploit-weekly-wrap-up-11-22-2024/
0
11
7
you reached the end!!
feeds!
log in