Cyber security

USB flows In The Great River – IDA FLIRT Signature And IOC

IDA Pro FLIRT signature for FlowCloud RAT component, “fcClientDll and Indicators mentioned in my presentation “USB flows in the Great River”.

In the realm of cybersecurity, the unassuming USB drive can be a Trojan horse. Dive into the world of USB-based threats as we explore the creation of IDA Pro FLIRT signatures for the elusive FlowCloud RAT component.

Discover how open-source libraries and IOCs play a crucial role in deciphering this covert menace.

Join us on a journey through ‘USB Flows in the Great River’ to unlock the secrets of threat analysis and mitigation.

You can check the presentation at Virus Bulletin 2023 website.

  • fcClientDll.sig
    • This signature was created from the idb file which identifies fcClinetDll functions (I added prefix “fcClient_”) and open source libraries (Protocol Buffers, Boost C++, ZThread, SQLite).
    • For more information about FLIRT
  • flowcloud_ioc_2023.csv
    • FlowCloud IOCs mentioned in the presentation.
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 weeks ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 month ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 month ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 month ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 month ago