Advertisement · 728 × 90

Posts by Squiblydoo

Use CertGraveyard.org to get a list of hashes for the 69 ZhongStealer hashes.

When we come to understand how they are obtaining the certificates, we'll share here.

Until then, we'll continue working with the CA to mitigate the harm.
7/7

1 day ago 0 0 0 0
Preview
Remnux_Reports/Zhong-Stealer-APT-Q-27/4d8c02745ed4c2bcd9bdb425d5763ebd1e6da459c1877fe9d0005e477622aa6a_photo0418699.com_analysis_report.md at main · Squiblydoo/Remnux_Reports This repository is for reports generated by Claude and the Remnux MCP. - Squiblydoo/Remnux_Reports

If you want a more in-depth analysis and indicators, Claude and I have been cooking:

First stage analysis: github.com/Squiblydo...

Second stage: github.com/Squiblydo...

We have a directory of other Zhong Stealer analysis, tools, WIP bot emulator: github.com/Squiblydo...
6/7

1 day ago 0 0 1 0
Post image Post image

One recent first stage was signed "Xiamen Xianghe Information Technology Co., Ltd."

The second stage consists of the following:
NvBackend.exe used the leaked 2018 Nvidia cert.
detoured.dll was the Lenovo signed binary.
NvBackend.log is a shellcode loader
5/7

1 day ago 0 0 1 0
Post image

The name Zhong Stealer seems to be a misnomer. Based on my analysis, it seems to be a RAT.

They send a fake image/screenshot in a phishing email.
When ran by a user, it displays a JPEG of an error, and pulls down the second stage from a CDN like AWS.
4/7

1 day ago 0 0 1 0
Post image

These certificates are unlike the other 2,100 we've tracked.

They are new certificates issued to existing customers and only used to sign malware. To be clear, they aren't supply chain poisoning.

We've seen 12 issued like this, 69 for this same malware: Zhong Stealer
3/7

1 day ago 0 0 1 0

First things:
Each of these were mitigated.

The issuing Cert Authorities were quick to act when notified.

No, I don't understand how these are getting issued and abused. GoldenEyeDog seems to have unrestrained ability to create them.

There may be unknown ones.
2/7

1 day ago 0 0 1 0
Post image Post image Post image Post image

What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common?

EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)!

Thanks @malwrhunterteam and @g0njxa for your contributions
1/7

1 day ago 4 2 1 0
Post image Post image

VirusTotal's maximum size is 650MB; potential victims can't upload it there.

The certificate has been reported and revoked.
A subcomponent of the file was uploaded to VirusTotal: b531ee0e453c6a514daa09a4e7d6e8fae8f433269afba59035d84e68a5ff42a2.

MB: bazaar.abuse.ch/samp...
2/2

2 days ago 1 0 0 0
Post image Post image

AnchorWallet[.]org is fake. The real place to download the wallet is Greymass[.]com.

If you download the Windows app from the fake, you get a 680MB remote access tool signed by PIXEL PLAY PRIVATE LIMITED. Not an app signed by Greymass.

h/t @malwrhunterteam
1/2

2 days ago 1 0 1 0
Post image Post image Post image

There is garbage text and then some Python.
Highlight the base64. Right-click -> Transform. Cyberchef like interface; base64 decode, change text encoding.

"Open in New file" lets us open it in a separate analysis. Theres our C2: fillenmore[.]com
bazaar.abuse.ch/samp...
3/3

4 days ago 0 0 0 0
Advertisement
Post image Post image

Opening it up in malcat, we can see it identified the compressed Nullsoft Installer bits (Image 1).

Double clicking unpacks it. We then have new files to look at. A few are .txt files, we can doubleclick to open them. This first one actually happens to be what we want.

2/3

4 days ago 0 0 1 0
Post image Post image

FUD CastleLoader signed "INFOTECK SOLUTIONS PRIVATE LIMITED"

The 40MB exe makes it hard for detection engines to see the 1 important line of python it will execute. Short #malcat investigation though.

62a6e64a7233f4a756d01c54840ff703a620a416929d57eebc0bdac3b9ed2019
1/3

4 days ago 0 0 1 0

When I clicked on the "Bluesky Issues" trending link earlier today, every account in the first few scrolldowns was reposting the exact same text blaming the problem on AI. Each account was clearly inauthentic and was advertising video game material in its profile.

5 days ago 2 2 1 0

The full report can be found here and is well worth the read. research.cert.orange...
2/2

6 days ago 0 0 0 0
Post image Post image Post image

Orange Cyberdefence recently published their research on SmokedHam. We're glad to see Cert Graveyard and the code-signing certs mentioned.

While CertGraveyard tracks the campaigns, we can't investigate them to their full depth (due to capacity), so this is great to see.
1/2

6 days ago 1 0 1 0
Post image Post image

I don't know how to feel about this domain: maybedontbanplease[.]com

What to do? Chat, can you help me out?

(CastleLoader
4ba0d3ae41a0ae3143e8c2c3307c24b0d548593f97c79a30c0387b3d62504c31 signed "SERPENTINE SOLAR LIMITED"
NSIS -> Python execution -> loads remote resource)

1 week ago 1 0 0 0
Post image Post image

These are just a small subset of what we track. Over time, we've tracked 91 certificates we associate with Golden eye dog; signing both Zhong Stealer and ValleyRAT.

You can get the whole list of certs from CertGraveyard's lookup page.
4/4

1 week ago 0 0 0 0

These are the signer's we've reported in April:
Xiamen Liuyong Information Technology Co., Ltd.
Xiamen Dahonghuo Technology Co., Ltd.
Beijing 263 Enterprise Correspondence Co., Ltd.
MobSoft Co., Ltd
深圳市优品投资顾问有限公司
Brunner Informatik AG
3/4

1 week ago 0 0 1 0
Advertisement
Post image Post image

The main malware we're seeing via CertGraveyard is tracked as Zhong Stealer.
They host the 2nd stage on legitimate CDN, one of the files they host is a picture of a 505 error this is used as a decoy.
2/4

1 week ago 0 0 1 0
Post image

Golden Eye Dog (APT-Q-27) seems to have come back from break.
We've seen 6 unique EV code-signing certs for campaigns in April already.

All of these get reported and all get revoked.
More about them in the thread.

h/t @g0njxa, @malwrhunterteam
1/4

1 week ago 0 0 1 0

Special thanks @abuse_ch for making MalwareBazaar available, so that we can easily find signed malware.

Thank you official partners for your support and tools:
@unpacme
Malcat dev
@magicswordio
3/3

2 weeks ago 2 0 0 0
Preview
The CertGraveyard Learn about the role of the Cert Graveyard in tracking, reporting, and preventing malware that leverage Extended Validation code-signing certificates.

This post gives a broad overview of the CertGraveyard's mission and the tools the tools we use, how you can get involved, and how you can leverage our data for your own cyber defense:
squiblydoo.blog/2026...
2/3

2 weeks ago 1 0 1 0

The CertGraveyard was created in 2025, but never received a proper introduction.

We track abused code-signing certificates.
When I created the site, we had 600 entries and now we have 2,250.

See the blogpost below for a full overview.
1/3

2 weeks ago 6 4 1 0
Post image Post image

The history of BumbleBee's relationship with certificates can be viewed a few ways with CertGraveyard. You can review via a table, a graph, or download the whole database to transform the data yourself.
4/4

2 weeks ago 3 1 0 0

This was a great example of why CertGraveyard exists: we were able to document and observe the pattern, allowing us to report the certificate, causing Windows to not trust it as soon as the campaign started.

We're always looking for more people to get involved. Interested?
3/4

2 weeks ago 0 0 1 0
Advertisement

If you missed it, NovaViewer was previously signed by "Xiamen Xisu Technology Co., Ltd.". The cert was then used to sign BumbleBee, disguised as "Azure-CLI.msi".

The latest BumbleBee was disguised as an NX Witness installer:
6d6a861c133ff3e1aa09c8744de52413
2/4

2 weeks ago 0 0 1 0
Post image

We saw NovaViewer being signed with a new EV certificate "Xiamen Duohanbeiwei Network Co., Ltd". This certificate was reported and revoked before the certificate was used in a BumbleBee campaign.

6d6a861c133ff3e1aa09c8744de52413

Special thanks to @luke92881 and @g0njxa
1/4

2 weeks ago 1 0 1 0
Preview
Why ICE Is Allowed to Impersonate Law Enforcement “There's no accountability,” one expert tells WIRED of ICE’s ability to lie to the public. "The consequence of this is that it’s going to be a systemic harm across all law enforcement.”

NEW: Yes, ICE can lie to you and to other law enforcement—and they've been doing it for decades. @telliotter.bsky.social reports: www.wired.com/story/why-ic...

3 weeks ago 165 55 5 3
Post image

Our database is one of the blocklists used by MagicSword.

Files with certificates issued to cybercriminals are actually stopped from impacting systems: whether the cert provider revokes the certificate or not.
6/6

3 weeks ago 0 0 0 0
Preview
MagicSword | Prevent Modern Cyber Attacks Stop malware-free attacks with agentless, AI-driven application control. Block what's abused, allow what your business needs.

My database is at CertGraveyard .org . We document these to keep a public record and to use it for cyber defense.

To that end we've also partnered with MagicSword (www.magicsword.io/pl... ); their tool uses our database.
5/6

3 weeks ago 0 0 1 0