Simple Malware Creation for AV Testing

Location

Note the new location at OpenWorks.

For parking and how to find us: https://joinopenworks.com/guest-access#after-hours

About the Presentation

This presentation covers how to create a simulation of the LockBit 3.0 ransomware using known indicators of compromise (IoCs). The non-malicious simulation is designed to trigger detections by Endpoint Detection and Response (EDR) and Antivirus (AV) systems, providing a practical exercise to enhance purple teaming skills. The simulation includes a simple Python-based listening server for command and control (C2) and a simulated malware component developed in Nim.

Projects

During this time anyone in attendance is free to share an update on a project or hobby they are working on.

CTF Planning

There will be a time to collaborate for those involved in planning capture the flag (CTF) events for up-coming conferences.