#SHELLTER

I missed this one because of ~~beer~~ summer holidays.
Anyway, if you want to see how a Shellter protected binary looks like:

elastic.co/security-labs/takin

#malware #reverseengineering #shellter

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-07-09

Happy Wednesday everyone!

Elastic Security Labs researchers found a bunch of infostealers being spread by adversaries. In the past we have seen other tools like Brute Ratel and CobaltStrike but this time they decided to use a cracked version of #SHELLTER, another offensive security tool (OST). There are TONS of technical details about the tools they used during the investigation into the tool and what artifacts they found. Interestingly they are also releasing a "dynamic unpacker for binaries protected by SHELLTER. This tool leverages a combination of dynamic and static analysis techniques to automatically extract multiple payload stages from a SHELLTER-protected binary." Thought that was a pretty cool add!

Take a read and get all the important details! Enjoy and Happy Hunting!

Taking SHELLTER: a commercial evasion framework abused in- the- wild
elastic.co/security-labs/takin

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst