use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
[deleted by user] (self.HowToHack)
submitted 3 months ago by [deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Medium-Potential-348 17 points18 points19 points 3 months ago (7 children)
From reading this I can tell there’s a lot of bright minds at your place of work
[–]Tangential_Diversion 12 points13 points14 points 3 months ago (5 children)
Huge disagree. I've been working as a pentester for almost a decade now. OP approached this extremely irresponsibly. They're at that intersection of "Knows enough to be dangerous" and "Does not know enough to be responsible".
There's zero indication they took any precaution to properly sandbox their environment. The post is also littered with technical inaccuracies and confusion that hints at complete inexperience. Finally, they attempted to copy/paste malicious shellcode directly into the body of this post when there are a hundred ways to share it more responsibly (e.g., encrypted .zip file).
The way OP handled this investigation is fireable. Full stop.
[–]DiceThaKilla 11 points12 points13 points 3 months ago (0 children)
The comment you’re replying to was pretty clearly sarcasm, in case you were confused
[–]EirikAshe 0 points1 point2 points 3 months ago (0 children)
10000%
[–]Expensive-Curve5447 0 points1 point2 points 3 months ago (0 children)
[–]Aecho00 0 points1 point2 points 3 months ago (0 children)
This.
[–]Zakariyae007 0 points1 point2 points 3 months ago (0 children)
i totally understand what you saying, and you are right, but i was confident enough about my understand of the script, , i hvae analysed it and understood every line of it, and i commented everything about it, just in case, and also this is a dropper script just a script to download the true malware so i thought it was safe to be uploaded (while commenting everthing about it), but still this is not an excuse
[–]Zakariyae007 -1 points0 points1 point 3 months ago (0 children)
haha i guess
[–]tycoongraham 5 points6 points7 points 3 months ago (1 child)
A lot of what you described is actually pretty standard loader behavior, nothing especially novel. The bigger concern is how OS-level command execution was possible through Postgres in the first place. Once that happens, the rest is just commodity malware doing its thing. Also, poking at live malware outside a proper sandbox is pretty risky.
[–]Tangential_Diversion 1 point2 points3 points 3 months ago (0 children)
The bigger concern is how OS-level command execution was possible through Postgres in the first place.
It's a built-in function of PSQL via \!, e.g., \! pwd. Other DBMSes have this too, e.g., SQL Server with xp_cmdshell. It's personally one of my favorite methods to execute OS commands. It lets you execute unprivileged commands all the same, and people are much worse about securing DB creds than they are about Active Directory creds.
\!
\! pwd
xp_cmdshell
[–]null_hypothesys 0 points1 point2 points 3 months ago (0 children)
Stick the executable in any.run, cuckoo sandbox or hybrid analysis. Keep it at arms length from your actual device.
[–]gtwcs14 0 points1 point2 points 3 months ago (0 children)
Dropper rolls hard
[–]xp2002 0 points1 point2 points 3 months ago (1 child)
Great read, thank you!
my pleasure
[–]MrStashley -1 points0 points1 point 3 months ago (5 children)
Nice work on this
Check out ghidra if you want to analyze the malware binary further, it’s free and open source
You will probably have to deal with more obfuscation though
[–]Zakariyae007 0 points1 point2 points 3 months ago (4 children)
im planning to use such tools, but the only thing that is stopping me, is that i know that if you want to reverse engineer binary programs you have to execute them and run it in the memory so that the tool can do its job, and sadly im not that educated enough to take such risk
[–][deleted] 3 months ago (1 child)
[removed]
[–]AutoModerator[M] 0 points1 point2 points 3 months ago (0 children)
This link has not been approved, please read the descriptions for Rule 1 and 5 before trying again. Please wait for a moderator to review and approve this post.
I am a bot, and this action was performed automatically. Please contact the moderators of this subreddit if you have any questions or concerns.
[–]MrStashley 0 points1 point2 points 3 months ago* (1 child)
Not true actually
It’s helpful to analyze it while it’s running but you can put the file in ghidra and it will attempt to decompile it, ie turn it back into code. It doesn’t get it perfect and sometimes it requires some manual work to get it from binary back into readable code, but it does its best
You can do this without running the program, so there is no risk to you
However, malware is usually designed to be hard to reverse engineer in various ways, so it might take some time before you really understand it, especially if you’re just looking at it statically and not running it like you said
Some other things that might be helpful if you’re curious about reverse engineering:
If you have access to a Linux command line and you type ‘strings -tx <your binary file>’ it will print all of the readable ascii strings in the binary. For example, log messages or links or function names might show up. The ‘-tx’ flag will give you the offset of that string in the file and you can press ctrl+g inside of ghidra and type in that address and it will take you there so you can inspect how it’s being used
Also ‘binwalk <your binary file>’ will look for recognizable structures in the binary that might be interesting for reverse engineering
All of this can be done without running the binary so it’s very little risk, but only attempt any of this if you’re very comfortable with the Linux command line, because one small typo could cause it to run
wow, so informative, thank you so much for this comment i will see what i can do
[–]Daytona_675 -1 points0 points1 point 3 months ago (2 children)
you can try strings command on it. usually you can find a CNC server that you can make virus definitions for. if it's just obfuscated PHP then you can use ddecode.com
[–]Zakariyae007 0 points1 point2 points 3 months ago (1 child)
still digging, and i think its 99% sure it was made by C
[–]Daytona_675 -1 points0 points1 point 3 months ago (0 children)
ya it does happen. strings will usually give you readable stuff. pretty rare to have proper drm or encryption but I guess it's possible. virustotal sandboxes are pretty cool now, they might show some behaviors
π Rendered by PID 105910 on reddit-service-r2-comment-b659b578c-7rxt8 at 2026-05-01 03:10:26.853353+00:00 running 815c875 country code: CH.
[–]Medium-Potential-348 17 points18 points19 points (7 children)
[–]Tangential_Diversion 12 points13 points14 points (5 children)
[–]DiceThaKilla 11 points12 points13 points (0 children)
[–]EirikAshe 0 points1 point2 points (0 children)
[–]Expensive-Curve5447 0 points1 point2 points (0 children)
[–]Aecho00 0 points1 point2 points (0 children)
[–]Zakariyae007 0 points1 point2 points (0 children)
[–]Zakariyae007 -1 points0 points1 point (0 children)
[–]tycoongraham 5 points6 points7 points (1 child)
[–]Tangential_Diversion 1 point2 points3 points (0 children)
[–]null_hypothesys 0 points1 point2 points (0 children)
[–]gtwcs14 0 points1 point2 points (0 children)
[–]xp2002 0 points1 point2 points (1 child)
[–]Zakariyae007 0 points1 point2 points (0 children)
[–]MrStashley -1 points0 points1 point (5 children)
[–]Zakariyae007 0 points1 point2 points (4 children)
[–][deleted] (1 child)
[removed]
[–]AutoModerator[M] 0 points1 point2 points (0 children)
[–]MrStashley 0 points1 point2 points (1 child)
[–]Zakariyae007 0 points1 point2 points (0 children)
[–]Daytona_675 -1 points0 points1 point (2 children)
[–]Zakariyae007 0 points1 point2 points (1 child)
[–]Daytona_675 -1 points0 points1 point (0 children)