SlideShare a Scribd company logo
1 of 94
Download to read offline
Not for public distribution • Copyright 2018 Horangi Pte Ltd
03 NOV 2018
Horangi Pte Ltd
Not for public distribution • Copyright 2018 Horangi Pte Ltd
Horangi Pte Ltd
https://www.horangi.com
Horangi ~ !!!!!
POC2018
November 8-9, 2018 Seoul, Korea
Not for public distribution • Copyright 2018 Horangi Pte Ltd
08 NOV 2018
Horangi Pte Ltd
Not for public distribution • Copyright 2018 Horangi Pte Ltd
Horangi R&D
Let’s go OSINT using Deep Web.
3Not for public distribution • Copyright 2018 Horangi Pte Ltd
Tigers
Directing
Seunggi Jeong
Developing & Analyzing
Dasom Kim
Malware analysis
Sangsu Jeong
Contributor
Nikolay Akatyev
Jiyeon Kong
4Not for public distribution • Copyright 2018 Horangi Pte Ltd
1. Introduction
2. Motivation
3. Our tools
4. Research
5. Conclusion
Introduction.
01
6Not for public distribution • Copyright 2018 Horangi Pte Ltd
The deep web, invisible web,
or hidden web are parts of the
World Wide Web whose
contents are not indexed by
standard web search engines
for any reason. [1]
In Deep web, mainly sell
personal information, drug,
gun and products related to
malware.
What is
DeepWeb?
Surface Web
Deep Web
Dark Web
7Not for public distribution • Copyright 2018 Horangi Pte Ltd
Trip to world beard competition
ends in arrest for alleged dark web
drug dealer [2]
DarkWeb
Case
Investigators tracked the transaction
details of the Bitcoin Wallet account.
He then tracked his account on the
social network and compared the
dealers' text with his text.
According to the evidence presented in
the Florida courts, he found many
similarities between the two users,
including the use of the word "cheers",
frequent quotes, and occasional
French articles.
Motivation.
02
9Not for public distribution • Copyright 2018 Horangi Pte Ltd
Motivation
Discovered Malware forum on DeepWeb
Who’s next victims?
Who’s next attackers?
“ So how to collect the critical information? ”
10Not for public distribution • Copyright 2018 Horangi Pte Ltd
Focus on DeepWeb
Dark Web has useful data,
but the amount of data is less than that of deep web.
Deep Web
Dark Web
11Not for public distribution • Copyright 2018 Horangi Pte Ltd
Focus on Open Source
Word
- Slang
- Nickname
- Discord Id
- Etc
Sample hashes
Time stamp
- dateparser ( python module )
Bypass anti-bot
- cfscrape ( python module )
Open source to identify user
Peerlyst, DarkWeb research 101 [3]
What is ‘Nulled’ ?
DeepWeb“
”
13Not for public distribution • Copyright 2018 Horangi Pte Ltd
Why did we choose NULLED?
Famous forum on DeepWeb
It is a web that is usually difficult to discover, and is accessible
from a normal browser.
NULLED
Sinister
raidforum
HOT
14Not for public distribution • Copyright 2018 Horangi Pte Ltd
NULLED - Malware forum
Product & Information
Dumps ( Database, ID & Password )
Malware ( Ransomware … etc )
Leak ( 0-day, 1-day ... etc )
Cracked software ( MS office … etc )
15Not for public distribution • Copyright 2018 Horangi Pte Ltd
Payment
Unlimited access to some malware and hidden contents through pay to BTC or ETH.
NULLED - Malware forum
16Not for public distribution • Copyright 2018 Horangi Pte Ltd
Malicious Software section
RAT: Remote Access control Tool
20,365 / 120,962 [ 16% ]
Miner: silent cryptocurrency mining tool
3,206 / 120,962 [ 2% ]
Keylogger 5,742 / 120,962 [ 4% ]
Ransomware 1,281 / 120,962 [ 1% ]
Botnet 7,083 / 120,962 [ 5% ]
DDOS Tool 5,549 / 120,962 [ 4% ]
Other 77,736 / 120,962 [ 64% ]
number / 120,962 [ % ] > Based on our monitoring tool
NULLED - Leaks board
17Not for public distribution • Copyright 2018 Horangi Pte Ltd
VIP Leaks & VIP Dumps
Account: eBay, amazon, Netflix, Steam, Spotify, etc
Key: express vpn, MS office, malwarebytes, etc
Coupon: eBay, amazon, Netflix, etc
NULLED - Premium board
18Not for public distribution • Copyright 2018 Horangi Pte Ltd
Nulled’s characteristics
● Nulled uses the cloudflare
We need to bypass cloudflare ddos protect solution
● Nulled blocks the Users sending a lot of queries
We set the waiting times
( Tried the other way. But this way is the best way )
● Nulled opens the hidden contents for paid members
We need to buy the membership
NULLED - Malware forum
Our tools.
03
20Not for public distribution • Copyright 2018 Horangi Pte Ltd
Our tools
Web tag tracker
Web tag
tracker
21Not for public distribution • Copyright 2018 Horangi Pte Ltd
Our tools
Scanner ( real time )
● The notification of changed contents based on web tag
● the malware board on Deep Web
● the specific company information on Surface Web
● the Cryptocurrency wallet address on Dark Web
Analyzer
#Keyword: ID, Sample name, e-mail, etc
● The timeline
● The frequency information
● Comments count information
● The user activity information
● The most popular sample information
● The most active user name
Web tag
tracker
Let’s jump into Demo version
Our tools“
”
23Not for public distribution • Copyright 2018 Horangi Pte Ltd
Scanner
24Not for public distribution • Copyright 2018 Horangi Pte Ltd
Scanner
25Not for public distribution • Copyright 2018 Horangi Pte Ltd
Scanner
26Not for public distribution • Copyright 2018 Horangi Pte Ltd
Scanner
27Not for public distribution • Copyright 2018 Horangi Pte Ltd
Analyzer
KIBANA, https://www.elastic.co/products/kibana
How to tracking the specific user?
SCENARIO
”
“
29Not for public distribution • Copyright 2018 Horangi Pte Ltd
Specific user sharing the malicious
code related Discord.
And we need tracking his identify
information.
Timeline, activities, the most
popular sample, related user, etc.
Let’s start to tracking his identify
information using our tools.
30Not for public distribution • Copyright 2018 Horangi Pte Ltd
Let’s collect the open source
about ObbedCode
31Not for public distribution • Copyright 2018 Horangi Pte Ltd
Add a filter
Specific user id
32Not for public distribution • Copyright 2018 Horangi Pte Ltd
Start 2017.11
First activity at 2017.11
33Not for public distribution • Copyright 2018 Horangi Pte Ltd
The most popular sample is
Discord token stealer.
Discord Token Stealer is hotter than other sample
34Not for public distribution • Copyright 2018 Horangi Pte Ltd
The most popular sample is
Discord token stealer.
35Not for public distribution • Copyright 2018 Horangi Pte Ltd
The count & timeline
of Discord token stealer
36Not for public distribution • Copyright 2018 Horangi Pte Ltd
Our tools
2018.01 - 2018.10
Discord token
stealer
The amount of data
in the graph
is rapidly increasing.
37Not for public distribution • Copyright 2018 Horangi Pte Ltd
Most relevant users of
Discord token stealer
1. Felonious13Monk
2. Gayl0rd
3. RedPa456
4. TheBigGayThing
38Not for public distribution • Copyright 2018 Horangi Pte Ltd
39Not for public distribution • Copyright 2018 Horangi Pte Ltd
He start activity at 2017.11.
His the most popular sample is Discord token stealer.
Discord token stealer increase count on 2018.01 - 2018.10
1. Felonious13Monk wrote many comment on his post.
04
Research.
Deep analysis about ObbedCode
Research“
”
42Not for public distribution • Copyright 2018 Horangi Pte Ltd
1. Target
ObbedCode
2. Abstract
It is the user who showed the most number
of activities recently and showed a rapid change
in a short period.
This user mainly produces malware
related to discord and updates it frequently.
In addition, he share samples of cracked malware,
and he is actively releasing his Discord ID.
ObbedCode’s status
Overview
3. Sample List
● SkyWyder RAT
● DynAmite
● Discord token stealer
The samples of open source
Research“
”
44Not for public distribution • Copyright 2018 Horangi Pte Ltd
Resource
Sample Name MD5
SkyWyder RAT F1083F240EFC99D8C3DEEC8A1A062815
DynAmite FCF4F7FDCE4BC49F307E048B13936D1F
Discord token stealer 427B959EA59621459BA6BA8DA81953C6
45Not for public distribution • Copyright 2018 Horangi Pte Ltd
Sample list
Sample Name Virus Total Hybrid Analysis Malwares.com
SkyWyder RAT 5 / 54 No result No result
DynAmite 43 / 67 73 / 100 100 / 100
Discord token stealer 2 / 66 No result No result
Focus on “SkyWyder RAT ”
Research“
”
47Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
Open Source
Created
May 10 2016
url
[1] Hack tool stuff, SkyWyder RAT Cracked Full and Final Edition [HackToolStuff]
https://hacktoolstuff.blogspot.com/2016/10/skywyder-rat-cracked-full-and-final.html
[2] Reddit, Slithx-Team
https://www.reddit.com/user/Slithx-Team/
48Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
Overview - PE
Version:
● Visual Basic 6.0[Native]
Section:
● .text, .sedata, .idata, .rsrc
More
● BotKill, AVKiller, AntiVM,
Keylogger, Miner etc
49Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
What is your intention?
50Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
Not working
Trial or Error
51Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
Codejock.ocx
COMDLG32.ocx
MSCOMCTL.ocx
resourcehacker
52Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
53Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
available
FTP,SMTP
54Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
55Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
56Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
57Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
58Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
59Not for public distribution • Copyright 2018 Horangi Pte Ltd
SkyWyder RAT
Focus on “DynAmite ”
Research“
”
61Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Open Source
Created
DEC 09 2010
url
[1] aaa
62Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Overview - PE
Version:
● .Net (MPRESS)
Section:
● .text, .rsrc, .reloc
More
● Unprotect
● Entropy 91%
● LOC 6086
63Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Before After
64Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Let’s do deep analysis about this
● Abstracted Files
● The issue of http://darkerdyna.blogspot.com
● MS Office Macro
● CryptoLocker
65Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Abstract file
66Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Issue URL
67Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite Ms office macro
68Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
Detracted file
● .bat
● .zip
● .crt
● .xml
● .exe
69Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
70Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
71Not for public distribution • Copyright 2018 Horangi Pte Ltd
DynAmite
SSL
Focus on “Discord token stealer ”
Research“
”
73Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
Open Source
Created
APR 07 2018
url
[1] aaa
74Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
Overview - PE
Version:
● .NET
Section:
● .text, .rsrc, .reloc
More
● Send to Email
● Infected case
75Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
76Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
77Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
Possible to send Email
78Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
Possible to send Email
79Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
80Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
81Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
82Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
83Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
84Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
85Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
86Not for public distribution • Copyright 2018 Horangi Pte Ltd
Discord token stealer
Who is ObbedCode?
Research“
”
88Not for public distribution • Copyright 2018 Horangi Pte Ltd
Result
ObbedCode
Alone? Group?
89Not for public distribution • Copyright 2018 Horangi Pte Ltd
Result
Quick analysis of the forum is possible.
It is possible to check quickly user's sharing data that a specific.
In addition to data for specific users, overall monitoring is also
possible.
For example, monitoring for specific malware, monitoring for
malware uploaded on a specific date, monitoring for
Cryptocurrency wallet addresses that are open on the dark web,
and so on.
Conclusion.
05
What is next step?
Our future plan“
”
92Not for public distribution • Copyright 2018 Horangi Pte Ltd
Conclusion
Horangi OSINT Service
1. Support for Investigate specific target on Deep Web
• Keep collect the critical information from DeepWeb & SurfaceWeb
• Threat intelligence for find the next victims & the find next attackers
2. Expand the function of our tools
• More add the visualizing module
• Upgrade the bypass module for Deep Web
93Not for public distribution • Copyright 2018 Horangi Pte Ltd
Reference
[1] wikipedia, Deep Web https://en.wikipedia.org/wiki/Deep_web
[2] the guardian, Trip to world beard competition ends in arrest for alleged dark web drug dealer
https://www.theguardian.com/us-news/2017/sep/28/world-beard-moustache-competition-dru
g-dealer
[3] Peerlyst, DarkWeb research 101 - Dasom Kim
https://www.peerlyst.com/posts/darkweb-research-101-release-dasom-kim?trk=user_notificati
on#comment-okw5QwAfWcD4yhneL
[4] intsight, THE DARK SIDE OF ASIA: AN INSIDE LOOK INTO ASIA'S GROWING UNDERGROUND WORLD
https://www.intsights.com/dark-side-of-asia-research-report
[5] Recorded future, Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
https://www.blackhat.com/docs/eu-16/materials/eu-16-Ahlberg-Chasing-Foxes-By-The-Numbe
rs-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf
94
LET’S GO.

More Related Content

Similar to POC 2018 - whatever talk_ Let's go OSINT using DeepWeb

OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
Crafting enhanced customer experience through chatbots, beacons and oracle jet
Crafting enhanced customer experience through chatbots, beacons and oracle jetCrafting enhanced customer experience through chatbots, beacons and oracle jet
Crafting enhanced customer experience through chatbots, beacons and oracle jetRohit Dhamija
 
The Art of Deploying Artifacts to Production With Confidence
The Art of Deploying Artifacts to Production With ConfidenceThe Art of Deploying Artifacts to Production With Confidence
The Art of Deploying Artifacts to Production With ConfidenceLeon Stigter
 
It is easy contributing to open source - JCON 2020
It is easy contributing to open source - JCON 2020It is easy contributing to open source - JCON 2020
It is easy contributing to open source - JCON 2020César Hernández
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
 
Its easy! contributing to open source - Devnexus 2020
Its easy! contributing to open source - Devnexus 2020Its easy! contributing to open source - Devnexus 2020
Its easy! contributing to open source - Devnexus 2020César Hernández
 
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化オラクルエンジニア通信
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibilitydianadvo
 
Cryptosherlock oneledger research
Cryptosherlock oneledger researchCryptosherlock oneledger research
Cryptosherlock oneledger researchstsoien
 
PFHub: Phase Field Community Hub
PFHub: Phase Field Community HubPFHub: Phase Field Community Hub
PFHub: Phase Field Community HubDaniel Wheeler
 
From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...Jen-Chieh Ko
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Priyanka Aash
 
Best Practices in Starting an Open Source Project for Companies
Best Practices in Starting an Open Source Project for CompaniesBest Practices in Starting an Open Source Project for Companies
Best Practices in Starting an Open Source Project for CompaniesAll Things Open
 
Knime customer intelligence on social media odsc london
Knime customer intelligence on social media odsc london   Knime customer intelligence on social media odsc london
Knime customer intelligence on social media odsc london Jessica Willis
 
Knime customer intelligence on social edia
Knime customer intelligence on social ediaKnime customer intelligence on social edia
Knime customer intelligence on social ediaSheamus McGovern
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Greg Wartes, MCP
 
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...Codemotion
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsSBWebinars
 
Blockchain workshop IBM CODE Day - Montevideo
Blockchain workshop IBM CODE Day - MontevideoBlockchain workshop IBM CODE Day - Montevideo
Blockchain workshop IBM CODE Day - MontevideoHorea Porutiu
 

Similar to POC 2018 - whatever talk_ Let's go OSINT using DeepWeb (20)

OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Crafting enhanced customer experience through chatbots, beacons and oracle jet
Crafting enhanced customer experience through chatbots, beacons and oracle jetCrafting enhanced customer experience through chatbots, beacons and oracle jet
Crafting enhanced customer experience through chatbots, beacons and oracle jet
 
The Art of Deploying Artifacts to Production With Confidence
The Art of Deploying Artifacts to Production With ConfidenceThe Art of Deploying Artifacts to Production With Confidence
The Art of Deploying Artifacts to Production With Confidence
 
It is easy contributing to open source - JCON 2020
It is easy contributing to open source - JCON 2020It is easy contributing to open source - JCON 2020
It is easy contributing to open source - JCON 2020
 
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
 
Its easy! contributing to open source - Devnexus 2020
Its easy! contributing to open source - Devnexus 2020Its easy! contributing to open source - Devnexus 2020
Its easy! contributing to open source - Devnexus 2020
 
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
[Oracle Innovation Summit Tokyo 2018] インダストリアルIoTの今、そしてこれからの進化
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Cryptosherlock oneledger research
Cryptosherlock oneledger researchCryptosherlock oneledger research
Cryptosherlock oneledger research
 
PFHub: Phase Field Community Hub
PFHub: Phase Field Community HubPFHub: Phase Field Community Hub
PFHub: Phase Field Community Hub
 
From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...
 
Let's talk FOSS!
Let's talk FOSS!Let's talk FOSS!
Let's talk FOSS!
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
 
Best Practices in Starting an Open Source Project for Companies
Best Practices in Starting an Open Source Project for CompaniesBest Practices in Starting an Open Source Project for Companies
Best Practices in Starting an Open Source Project for Companies
 
Knime customer intelligence on social media odsc london
Knime customer intelligence on social media odsc london   Knime customer intelligence on social media odsc london
Knime customer intelligence on social media odsc london
 
Knime customer intelligence on social edia
Knime customer intelligence on social ediaKnime customer intelligence on social edia
Knime customer intelligence on social edia
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...
Why I've to waste my time on cryptography? - Andrea Pompili - Codemotion Rome...
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Blockchain workshop IBM CODE Day - Montevideo
Blockchain workshop IBM CODE Day - MontevideoBlockchain workshop IBM CODE Day - Montevideo
Blockchain workshop IBM CODE Day - Montevideo
 

Recently uploaded

ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...
ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...
ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...Amara arora$V15
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样jk0tkvfv
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证zifhagzkk
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives23050636
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRajesh Mondal
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATIONLakpaYanziSherpa
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Introduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxIntroduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxAniqa Zai
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Voces Mineras
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesBoston Institute of Analytics
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxronsairoathenadugay
 
DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1sinhaabhiyanshu
 
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSDBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSSnehalVinod
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格q6pzkpark
 

Recently uploaded (20)

Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted KitAbortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
 
ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...
ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...
ℂall Girls In Navi Mumbai Hire Me Neha 9910780858 Top Class ℂall Girl Serviℂe...
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Introduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxIntroduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptx
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Abortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotecAbortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotec
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1DAA Assignment Solution.pdf is the best1
DAA Assignment Solution.pdf is the best1
 
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get CytotecAbortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
Abortion pills in Doha {{ QATAR }} +966572737505) Get Cytotec
 
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSDBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 

POC 2018 - whatever talk_ Let's go OSINT using DeepWeb

  • 1. Not for public distribution • Copyright 2018 Horangi Pte Ltd 03 NOV 2018 Horangi Pte Ltd Not for public distribution • Copyright 2018 Horangi Pte Ltd Horangi Pte Ltd https://www.horangi.com Horangi ~ !!!!! POC2018 November 8-9, 2018 Seoul, Korea
  • 2. Not for public distribution • Copyright 2018 Horangi Pte Ltd 08 NOV 2018 Horangi Pte Ltd Not for public distribution • Copyright 2018 Horangi Pte Ltd Horangi R&D Let’s go OSINT using Deep Web.
  • 3. 3Not for public distribution • Copyright 2018 Horangi Pte Ltd Tigers Directing Seunggi Jeong Developing & Analyzing Dasom Kim Malware analysis Sangsu Jeong Contributor Nikolay Akatyev Jiyeon Kong
  • 4. 4Not for public distribution • Copyright 2018 Horangi Pte Ltd 1. Introduction 2. Motivation 3. Our tools 4. Research 5. Conclusion
  • 6. 6Not for public distribution • Copyright 2018 Horangi Pte Ltd The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search engines for any reason. [1] In Deep web, mainly sell personal information, drug, gun and products related to malware. What is DeepWeb? Surface Web Deep Web Dark Web
  • 7. 7Not for public distribution • Copyright 2018 Horangi Pte Ltd Trip to world beard competition ends in arrest for alleged dark web drug dealer [2] DarkWeb Case Investigators tracked the transaction details of the Bitcoin Wallet account. He then tracked his account on the social network and compared the dealers' text with his text. According to the evidence presented in the Florida courts, he found many similarities between the two users, including the use of the word "cheers", frequent quotes, and occasional French articles.
  • 9. 9Not for public distribution • Copyright 2018 Horangi Pte Ltd Motivation Discovered Malware forum on DeepWeb Who’s next victims? Who’s next attackers? “ So how to collect the critical information? ”
  • 10. 10Not for public distribution • Copyright 2018 Horangi Pte Ltd Focus on DeepWeb Dark Web has useful data, but the amount of data is less than that of deep web. Deep Web Dark Web
  • 11. 11Not for public distribution • Copyright 2018 Horangi Pte Ltd Focus on Open Source Word - Slang - Nickname - Discord Id - Etc Sample hashes Time stamp - dateparser ( python module ) Bypass anti-bot - cfscrape ( python module ) Open source to identify user Peerlyst, DarkWeb research 101 [3]
  • 12. What is ‘Nulled’ ? DeepWeb“ ”
  • 13. 13Not for public distribution • Copyright 2018 Horangi Pte Ltd Why did we choose NULLED? Famous forum on DeepWeb It is a web that is usually difficult to discover, and is accessible from a normal browser. NULLED Sinister raidforum HOT
  • 14. 14Not for public distribution • Copyright 2018 Horangi Pte Ltd NULLED - Malware forum Product & Information Dumps ( Database, ID & Password ) Malware ( Ransomware … etc ) Leak ( 0-day, 1-day ... etc ) Cracked software ( MS office … etc )
  • 15. 15Not for public distribution • Copyright 2018 Horangi Pte Ltd Payment Unlimited access to some malware and hidden contents through pay to BTC or ETH. NULLED - Malware forum
  • 16. 16Not for public distribution • Copyright 2018 Horangi Pte Ltd Malicious Software section RAT: Remote Access control Tool 20,365 / 120,962 [ 16% ] Miner: silent cryptocurrency mining tool 3,206 / 120,962 [ 2% ] Keylogger 5,742 / 120,962 [ 4% ] Ransomware 1,281 / 120,962 [ 1% ] Botnet 7,083 / 120,962 [ 5% ] DDOS Tool 5,549 / 120,962 [ 4% ] Other 77,736 / 120,962 [ 64% ] number / 120,962 [ % ] > Based on our monitoring tool NULLED - Leaks board
  • 17. 17Not for public distribution • Copyright 2018 Horangi Pte Ltd VIP Leaks & VIP Dumps Account: eBay, amazon, Netflix, Steam, Spotify, etc Key: express vpn, MS office, malwarebytes, etc Coupon: eBay, amazon, Netflix, etc NULLED - Premium board
  • 18. 18Not for public distribution • Copyright 2018 Horangi Pte Ltd Nulled’s characteristics ● Nulled uses the cloudflare We need to bypass cloudflare ddos protect solution ● Nulled blocks the Users sending a lot of queries We set the waiting times ( Tried the other way. But this way is the best way ) ● Nulled opens the hidden contents for paid members We need to buy the membership NULLED - Malware forum
  • 20. 20Not for public distribution • Copyright 2018 Horangi Pte Ltd Our tools Web tag tracker Web tag tracker
  • 21. 21Not for public distribution • Copyright 2018 Horangi Pte Ltd Our tools Scanner ( real time ) ● The notification of changed contents based on web tag ● the malware board on Deep Web ● the specific company information on Surface Web ● the Cryptocurrency wallet address on Dark Web Analyzer #Keyword: ID, Sample name, e-mail, etc ● The timeline ● The frequency information ● Comments count information ● The user activity information ● The most popular sample information ● The most active user name Web tag tracker
  • 22. Let’s jump into Demo version Our tools“ ”
  • 23. 23Not for public distribution • Copyright 2018 Horangi Pte Ltd Scanner
  • 24. 24Not for public distribution • Copyright 2018 Horangi Pte Ltd Scanner
  • 25. 25Not for public distribution • Copyright 2018 Horangi Pte Ltd Scanner
  • 26. 26Not for public distribution • Copyright 2018 Horangi Pte Ltd Scanner
  • 27. 27Not for public distribution • Copyright 2018 Horangi Pte Ltd Analyzer KIBANA, https://www.elastic.co/products/kibana
  • 28. How to tracking the specific user? SCENARIO ” “
  • 29. 29Not for public distribution • Copyright 2018 Horangi Pte Ltd Specific user sharing the malicious code related Discord. And we need tracking his identify information. Timeline, activities, the most popular sample, related user, etc. Let’s start to tracking his identify information using our tools.
  • 30. 30Not for public distribution • Copyright 2018 Horangi Pte Ltd Let’s collect the open source about ObbedCode
  • 31. 31Not for public distribution • Copyright 2018 Horangi Pte Ltd Add a filter Specific user id
  • 32. 32Not for public distribution • Copyright 2018 Horangi Pte Ltd Start 2017.11 First activity at 2017.11
  • 33. 33Not for public distribution • Copyright 2018 Horangi Pte Ltd The most popular sample is Discord token stealer. Discord Token Stealer is hotter than other sample
  • 34. 34Not for public distribution • Copyright 2018 Horangi Pte Ltd The most popular sample is Discord token stealer.
  • 35. 35Not for public distribution • Copyright 2018 Horangi Pte Ltd The count & timeline of Discord token stealer
  • 36. 36Not for public distribution • Copyright 2018 Horangi Pte Ltd Our tools 2018.01 - 2018.10 Discord token stealer The amount of data in the graph is rapidly increasing.
  • 37. 37Not for public distribution • Copyright 2018 Horangi Pte Ltd Most relevant users of Discord token stealer 1. Felonious13Monk 2. Gayl0rd 3. RedPa456 4. TheBigGayThing
  • 38. 38Not for public distribution • Copyright 2018 Horangi Pte Ltd
  • 39. 39Not for public distribution • Copyright 2018 Horangi Pte Ltd He start activity at 2017.11. His the most popular sample is Discord token stealer. Discord token stealer increase count on 2018.01 - 2018.10 1. Felonious13Monk wrote many comment on his post.
  • 41. Deep analysis about ObbedCode Research“ ”
  • 42. 42Not for public distribution • Copyright 2018 Horangi Pte Ltd 1. Target ObbedCode 2. Abstract It is the user who showed the most number of activities recently and showed a rapid change in a short period. This user mainly produces malware related to discord and updates it frequently. In addition, he share samples of cracked malware, and he is actively releasing his Discord ID. ObbedCode’s status Overview 3. Sample List ● SkyWyder RAT ● DynAmite ● Discord token stealer
  • 43. The samples of open source Research“ ”
  • 44. 44Not for public distribution • Copyright 2018 Horangi Pte Ltd Resource Sample Name MD5 SkyWyder RAT F1083F240EFC99D8C3DEEC8A1A062815 DynAmite FCF4F7FDCE4BC49F307E048B13936D1F Discord token stealer 427B959EA59621459BA6BA8DA81953C6
  • 45. 45Not for public distribution • Copyright 2018 Horangi Pte Ltd Sample list Sample Name Virus Total Hybrid Analysis Malwares.com SkyWyder RAT 5 / 54 No result No result DynAmite 43 / 67 73 / 100 100 / 100 Discord token stealer 2 / 66 No result No result
  • 46. Focus on “SkyWyder RAT ” Research“ ”
  • 47. 47Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT Open Source Created May 10 2016 url [1] Hack tool stuff, SkyWyder RAT Cracked Full and Final Edition [HackToolStuff] https://hacktoolstuff.blogspot.com/2016/10/skywyder-rat-cracked-full-and-final.html [2] Reddit, Slithx-Team https://www.reddit.com/user/Slithx-Team/
  • 48. 48Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT Overview - PE Version: ● Visual Basic 6.0[Native] Section: ● .text, .sedata, .idata, .rsrc More ● BotKill, AVKiller, AntiVM, Keylogger, Miner etc
  • 49. 49Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT What is your intention?
  • 50. 50Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT Not working Trial or Error
  • 51. 51Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT Codejock.ocx COMDLG32.ocx MSCOMCTL.ocx resourcehacker
  • 52. 52Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 53. 53Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT available FTP,SMTP
  • 54. 54Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 55. 55Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 56. 56Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 57. 57Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 58. 58Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 59. 59Not for public distribution • Copyright 2018 Horangi Pte Ltd SkyWyder RAT
  • 60. Focus on “DynAmite ” Research“ ”
  • 61. 61Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Open Source Created DEC 09 2010 url [1] aaa
  • 62. 62Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Overview - PE Version: ● .Net (MPRESS) Section: ● .text, .rsrc, .reloc More ● Unprotect ● Entropy 91% ● LOC 6086
  • 63. 63Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Before After
  • 64. 64Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Let’s do deep analysis about this ● Abstracted Files ● The issue of http://darkerdyna.blogspot.com ● MS Office Macro ● CryptoLocker
  • 65. 65Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Abstract file
  • 66. 66Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Issue URL
  • 67. 67Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Ms office macro
  • 68. 68Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite Detracted file ● .bat ● .zip ● .crt ● .xml ● .exe
  • 69. 69Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite
  • 70. 70Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite
  • 71. 71Not for public distribution • Copyright 2018 Horangi Pte Ltd DynAmite SSL
  • 72. Focus on “Discord token stealer ” Research“ ”
  • 73. 73Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer Open Source Created APR 07 2018 url [1] aaa
  • 74. 74Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer Overview - PE Version: ● .NET Section: ● .text, .rsrc, .reloc More ● Send to Email ● Infected case
  • 75. 75Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 76. 76Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 77. 77Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer Possible to send Email
  • 78. 78Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer Possible to send Email
  • 79. 79Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 80. 80Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 81. 81Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 82. 82Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 83. 83Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 84. 84Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 85. 85Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 86. 86Not for public distribution • Copyright 2018 Horangi Pte Ltd Discord token stealer
  • 88. 88Not for public distribution • Copyright 2018 Horangi Pte Ltd Result ObbedCode Alone? Group?
  • 89. 89Not for public distribution • Copyright 2018 Horangi Pte Ltd Result Quick analysis of the forum is possible. It is possible to check quickly user's sharing data that a specific. In addition to data for specific users, overall monitoring is also possible. For example, monitoring for specific malware, monitoring for malware uploaded on a specific date, monitoring for Cryptocurrency wallet addresses that are open on the dark web, and so on.
  • 91. What is next step? Our future plan“ ”
  • 92. 92Not for public distribution • Copyright 2018 Horangi Pte Ltd Conclusion Horangi OSINT Service 1. Support for Investigate specific target on Deep Web • Keep collect the critical information from DeepWeb & SurfaceWeb • Threat intelligence for find the next victims & the find next attackers 2. Expand the function of our tools • More add the visualizing module • Upgrade the bypass module for Deep Web
  • 93. 93Not for public distribution • Copyright 2018 Horangi Pte Ltd Reference [1] wikipedia, Deep Web https://en.wikipedia.org/wiki/Deep_web [2] the guardian, Trip to world beard competition ends in arrest for alleged dark web drug dealer https://www.theguardian.com/us-news/2017/sep/28/world-beard-moustache-competition-dru g-dealer [3] Peerlyst, DarkWeb research 101 - Dasom Kim https://www.peerlyst.com/posts/darkweb-research-101-release-dasom-kim?trk=user_notificati on#comment-okw5QwAfWcD4yhneL [4] intsight, THE DARK SIDE OF ASIA: AN INSIDE LOOK INTO ASIA'S GROWING UNDERGROUND WORLD https://www.intsights.com/dark-side-of-asia-research-report [5] Recorded future, Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums https://www.blackhat.com/docs/eu-16/materials/eu-16-Ahlberg-Chasing-Foxes-By-The-Numbe rs-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf