Botconf presentation or article

Warp’s Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium

Warp’s Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium Botconf 2024 Wednesday2024-04-24 | 17:05 – 17:45 Sathwik Ram Prakki 🗣 | Rayapati Lakshmi Prasanna Sai The surge in cybercrime ecosystems and underground forums has led to a substantial increase in stealer malware variants, facilitated by Malware-as-a-Service (MaaS) platforms addressing specific needs and vulnerabilities. This […]

Warp’s Enigma: Unraveling a Sophisticated Golang Malware Ecosystem that drops modified Stealerium Read More »

I’m a Bad Noodle!: An Analysis of Noodle RAT Shared among China-nexus Groups

I’m a Bad Noodle!: An Analysis of Noodle RAT Shared among China-nexus Groups Botconf 2024 Wednesday2024-04-24 | 17:50 – 18:30 Hiroaki Hara 🗣 While investigating several incidents, we encountered the undocumented Linux-based backdoor, we dubbed “Noodle RAT”. This backdoor shares some part of code with “Rekoobe”, which is a Linux-based backdoor widely used by multiple

I’m a Bad Noodle!: An Analysis of Noodle RAT Shared among China-nexus Groups Read More »

WS2 – Teams is for C2: Building and Reversing a Teams RAT (5h)

WS2 – Teams is for C2: Building and Reversing a Teams RAT (5h) Botconf 2024 Tuesday2024-04-23 | 13:00 – 18:30 Randy Pargman 🗣 | Kyle Cucci 🗣 This workshop consists of two parts: First, we will build a Remote Access Tool with indirect syscalls, shellcode running and COFF running capabilities, and other common features that uses Microsoft

WS2 – Teams is for C2: Building and Reversing a Teams RAT (5h) Read More »

WS1 – Writing Configuration Extractors Navigating Challenges in Extracting Malware Artifacts (3h)

WS1 – Writing Configuration Extractors Navigating Challenges in Extracting Malware Artifacts (3h) Botconf 2024 Tuesday2024-04-23 | 14:00 – 17:30 Souhail Hammou 🗣 | Miroslav Stampar 🗣 As reverse engineers, a significant part of our daily work involves writing and maintaining artifact extractors for multiple malware families, ranging from stealers and RATs to loaders and banking trojans. Our

WS1 – Writing Configuration Extractors Navigating Challenges in Extracting Malware Artifacts (3h) Read More »

Scroll to Top