ULTRAFRAUD (@ultrafraud) 's Twitter Profile
ULTRAFRAUD

@ultrafraud

Underground bon vivant hunting for #malware

ID: 1519011129896411136

calendar_today26-04-2022 17:51:15

217 Tweet

1,1K Takipçi

30 Takip Edilen

ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Unclassified malware disguised as WinSCP distributed via Dropbox. No VT detection RN 💀 /easywinscp.xyz ↪️ /winscphub.com C2 178.236.247[.102 🇷🇺 510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f

Unclassified malware disguised as <a href="/WinSCP/">WinSCP</a> distributed via <a href="/Dropbox/">Dropbox</a>. No VT detection RN 💀
/easywinscp.xyz
↪️ /winscphub.com
C2 178.236.247[.102 🇷🇺
510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

Watch out for this #DarkGate campaign, quite possibly through Malvertising and using signed MSI files with very low (or zero) detection. #SIGNED "PFO GROUP LLC" Other sites on 154.56.47.156: https://openvpnhub[.]com/ https://angryipscanner[.]net/ https://www.putty-ssh[.]com/

Watch out for this #DarkGate campaign, quite possibly through Malvertising and using signed MSI files with very low (or zero) detection.

#SIGNED "PFO GROUP LLC"

Other sites on 154.56.47.156:

https://openvpnhub[.]com/
https://angryipscanner[.]net/
https://www.putty-ssh[.]com/
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

There are those who look for MATLAB malware and those who instead are spreading midi cyber weapons. Dunno.. aw. much respect fo' free malware ❤️

There are those who look for MATLAB malware and those who instead are spreading midi cyber weapons.
Dunno.. aw. much respect fo' free malware ❤️
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Recently I've been finding several suspicious samples communicating with C2 via MeshAgent 👀 Take this #opendir for example: /2.155.18[.40:9000 C2 /serrapirate2121.duckdns.org joesandbox.com/analysis/12686…

Recently I've been finding several suspicious samples communicating with C2 via MeshAgent 👀
Take this #opendir for example:
/2.155.18[.40:9000
C2 /serrapirate2121.duckdns.org
joesandbox.com/analysis/12686…
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Active #Doenerium stealer dressed up as AnyDesk Software 🏴‍☠️ /anydesks.co/en/downloads/AnyDesk.exe 229037ea33eb267cc08621c8967ab4022f811461f716592ae95be23a8191bfe6 C2 /doenerium.kqnfkpoccicxiudstqonfotuwsrhuxkwhqjjfsbjhonoubrccy.nl

Active #Doenerium stealer dressed up as <a href="/anydesk/">AnyDesk Software</a> 🏴‍☠️

/anydesks.co/en/downloads/AnyDesk.exe
229037ea33eb267cc08621c8967ab4022f811461f716592ae95be23a8191bfe6

C2 /doenerium.kqnfkpoccicxiudstqonfotuwsrhuxkwhqjjfsbjhonoubrccy.nl
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Interesting #Malware #opendir 👁️ "\Uranium-235\meltdown.exe" \Uranium-235\nuclear.aul" /46.151.24.25:8000 DDR /alaneade.com C2 /87.251.67[.84/13224453 Mailcow instance /46.151.24.25:8080

Interesting #Malware #opendir 👁️
"\Uranium-235\meltdown.exe" \Uranium-235\nuclear.aul"
/46.151.24.25:8000
DDR /alaneade.com
C2 /87.251.67[.84/13224453
Mailcow instance /46.151.24.25:8080
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Interesting #opendir at /89.23.98[.143:8000👁️ #Raccoon stealer sample 🦠 Nice UA 🙃 C2 /5.42.64[.45:80 cbf9b27a8f0e0694c727f4365776b745 In all likelihood a miner 🪙 Dropper /89.23.98[.143:30020/receive 04a526f66fc4459a0ace9ec403c750ca

Interesting #opendir at /89.23.98[.143:8000👁️

#Raccoon stealer sample 🦠 Nice UA 🙃
C2 /5.42.64[.45:80
cbf9b27a8f0e0694c727f4365776b745

In all likelihood a miner 🪙
Dropper /89.23.98[.143:30020/receive
04a526f66fc4459a0ace9ec403c750ca
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Same #Smokeloader C2 still active ☢️ Working #opendir at /109.186.217[.138 with several samples 💀 tria.ge/231213-x4pcmaa…

Same #Smokeloader C2 still active ☢️
Working #opendir at /109.186.217[.138 with several samples 💀
tria.ge/231213-x4pcmaa…
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

LOLBin Atera agent dressed as Adobe Acrobat Reader installer targeting Brasil 🇧🇷 /acrobat-download.pages.dev (auto DL) 7c166c4e8e31346574caf94a1eb609c1 virustotal.com/gui/file/19e6b…

LOLBin <a href="/AteraCloud/">Atera</a> agent dressed as <a href="/Adobe/">Adobe</a> Acrobat Reader installer targeting Brasil 🇧🇷
/acrobat-download.pages.dev (auto DL)
7c166c4e8e31346574caf94a1eb609c1
virustotal.com/gui/file/19e6b…
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

Interesting loader disguised as CreateStudio Pro, dropping an obfuscated Python payload via PythonAnywhere 🐳 /download-createstudioo.com /kingkh.pythonanywhere.com ↪️/kingkh.pythonanywhere.com/SRC/test.zip

Interesting loader disguised as CreateStudio Pro, dropping an obfuscated Python payload via <a href="/pythonanywhere/">PythonAnywhere</a> 🐳
/download-createstudioo.com
/kingkh.pythonanywhere.com
↪️/kingkh.pythonanywhere.com/SRC/test.zip
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

您的浏览器版本过低,请升级浏览器版本 Signed #AsyncRAT stealer dressed as Chrome targeting chinese users 💀 Low detection rate 🦠 /download-updata.com C2 /s2.download-updata.com tria.ge/240323-vjw6mac…

您的浏览器版本过低,请升级浏览器版本
Signed #AsyncRAT stealer dressed as <a href="/googlechrome/">Chrome</a> targeting chinese users 💀 Low detection rate 🦠
/download-updata.com
C2 /s2.download-updata.com
tria.ge/240323-vjw6mac…
Yashraj Solanki (@rustynoob619) 's Twitter Profile Photo

#100DaysofYARA Day83: Suspicious files attempting to impersonate Google Update Utilities github.com/RustyNoob-619/… Thanks to ULTRAFRAUD for sharing the signed malware sample which allowed me to build this YARA

#100DaysofYARA Day83: Suspicious files attempting to impersonate Google Update Utilities 

github.com/RustyNoob-619/…

Thanks to <a href="/ULTRAFRAUD/">ULTRAFRAUD</a> for sharing the signed malware sample which allowed me to build this YARA
ULTRAFRAUD (@ultrafraud) 's Twitter Profile Photo

#QuasarRAT C2 🦠 212.192.31[.211 tria.ge/240406-m76qzag… Sample (no longer available) spread by 37.1.200[.46:8081 #opendir 🎰

#QuasarRAT C2 🦠
212.192.31[.211
tria.ge/240406-m76qzag…
Sample (no longer available) spread by 37.1.200[.46:8081 #opendir 🎰