Re: Coderman's taobios-v2.tar.bz2
... here's some fun for you: https://peertech.org/files/taobios-v2.tar.bz2 $ sha256sum taobios-v2.tar.bz2 0ba12b0ecf89d109301b619cbc8275e5cd78b6fefd3724fba0b6952186e37779 ... Does anyone has it? --- I may have a copy somewhere. The server where it was hosted is dead, Jim.
On Tue, Jan 08, 2019 at 11:53:54PM +0000, coderman wrote:
...
here's some fun for you: https://peertech.org/files/taobios-v2.tar.bz2 $ sha256sum taobios-v2.tar.bz2 0ba12b0ecf89d109301b619cbc8275e5cd78b6fefd3724fba0b6952186e37779 ...
Does anyone has it?
---
I may have a copy somewhere. The server where it was hosted is dead, Jim.
It's dead Jim, but not as we know it, not as we know it. The Firm - Star Trekkin' https://www.youtube.com/watch?v=FCARADb9asE ~11MiB And ... there's ... Marxists on the street today, street today, street today, Marxist fascists Soros paid, meme them all away. HEY :D Meme's, punk but not as we know them, not as we know them, Melting snowflakes all night long, future for muh children. Deep ... stating, circling the drain, protecting criminals, target you and I. Pizza-gating, blackmailing power plays, Glorifying war and demonising Love! There's ... triggers on the Net today, Net today, Net today, Triggers melt snowflakes away, enlightened 'man' we may! Auschwitz falsies seen by all, seen by all, seen by all, Hebrew banking 'slavin all, Guilting the White race. Freedom, memeing. Confronting evil all, never hide or shirk, always do muh work! Memeing, winning, everybody banning, Yellow vests sustaining, deep state on tha RUN! YO! Memes create our future yo! future Yo! Future YO! Memes' Arch-Angel's gift to all, claiming back our land. [Not sure where I first heard this lame arse attempt to riff "Star Trekkin" - clearly a total amateur needin a kick up dey front hole.] Ho, muh Grits! You punk da musak? Much work to be done... Someone say "yo"?? How lame is that?!!!@#@!#!!!
http://ooz54wtg6y72a7rrymgsw5625sjy7ewgc5s32m2wchxkyos4lixpjjid.onion/taobio... some things to note about the samples: - the L1 image uses BIOS recovery to trigger actual exploit payload on unaddressable storage; that is to say it does not store the loader / malware directly on SPI flash memory. NSA has been adept at avoiding trivial detection via this route for a long time... - the L2 image is a configuration permanent denial of service. this is designed to disrupt target activities, rather than perform any traditional exploitation or exfiltration. with an impossible boot configuration, the system appears "dead". these techniques are the opposite of the Sednit approach where the malware resides as an UEFI module with malicious code stored on SPI flash memory. this makes it easy to detect (if you happen to catch it! :) as per the talk linked originally https://media.ccc.de/v/35c3-9561-first_sednit_uefi_rootkit_unveiled best regards,
participants (2)
-
coderman
-
Zenaan Harkness