TeamTNT Targeting AWS, Alibaba Logo

TeamTNT Targeting AWS, Alibaba

0
Free
Visit Website

TeamTNT is actively modifying its scripts after they were made public by security researchers. These scripts primarily target Amazon Web Services, but can also run in on-premise, container, or other forms of Linux instances. The group's payloads include credential stealers, cryptocurrency miners, persistence and lateral movement. TeamTNT scripts are also capable of disabling cloud security tools, such as Alibaba's aegis cloud security agent. The malware author modified these tools after they became aware that security researchers published the earlier version of the script. This intelligence is based on information provided by an intelligence partner.

FEATURES

ALTERNATIVES

Yara mode for GNU Emacs to edit Yara related files

A detailed analysis of malicious packages and how they work

Java decompiler for modern Java features up to Java 14.

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

Multi-cloud antivirus scanning API with CLAMAV and YARA support for AWS S3, Azure Blob Storage, and GCP Cloud Storage.

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

Automate the process of writing YARA rules based on executable code within malware.

PINNED