Dee (@viriback) 's Twitter Profile
Dee

@viriback

#Malware C2 hunter #infosec passionate. Tweets are my own.

ID: 3101795085

linkhttps://viriback.com calendar_today21-03-2015 13:41:00

1,1K Tweet

9,9K Followers

1,1K Following

Germán Fernández (@1zrr4h) 's Twitter Profile Photo

🚩 Website impersonating AnyDesk on anydeske[.]icu, downloads a .NET loader which then launches a stealer, both unknown to me 🤔 Nexts stages: - https://pastebin[.]com/raw/YwvHhwUk - https://pastebin[.]com/raw/WrgrtxSu - http://45.145.7[.]134/hook/upgrade.php -

🚩 Website impersonating AnyDesk on anydeske[.]icu, downloads a .NET loader which then launches a stealer, both unknown to me 🤔

Nexts stages:
- https://pastebin[.]com/raw/YwvHhwUk
- https://pastebin[.]com/raw/WrgrtxSu
- http://45.145.7[.]134/hook/upgrade.php
-
NexusFuzzy 💩 (@nexusfuzzy) 's Twitter Profile Photo

I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…

I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…
Censys (@censysio) 's Twitter Profile Photo

🔍We looked at the C2 server associated with the #Flodrix #botnet and used an internet-exposed RPC service to uncover a world-readable NFS mount and 745 compromised hosts! 👀 hubs.ly/Q03sTqVc0 #CVE20253248 #Malware #InfoSec #Cybersecurity #CyberAttack #exploit

🔍We looked at the C2 server associated with the #Flodrix #botnet and used an internet-exposed RPC service to uncover a world-readable NFS mount and 745 compromised hosts!

👀 hubs.ly/Q03sTqVc0 

#CVE20253248 #Malware #InfoSec #Cybersecurity #CyberAttack #exploit
Xanderux (@xanderuxsf5) 's Twitter Profile Photo

AIRAVAT RAT web panel url : https://rat.riyajchowdhury[.]xyz/ Not detected on VirusTotal more AIRAVAT RAT web panels detected by #C2Watcher on github.com/Xanderux/C2wat…

AIRAVAT RAT web panel      

url : https://rat.riyajchowdhury[.]xyz/

Not detected on <a href="/virustotal/">VirusTotal</a>

more AIRAVAT RAT web panels detected by #C2Watcher on github.com/Xanderux/C2wat…
Dee (@viriback) 's Twitter Profile Photo

#Matanbuchus 3.0 C2 Panel ? #malware 5.252.155[.81/auth/login/ 193.105.134[.245/auth/login/ 179.60.149[.213/auth/login/ 185.39.19[.164/auth/login/

#Matanbuchus 3.0 C2 Panel ?

#malware

5.252.155[.81/auth/login/
193.105.134[.245/auth/login/
179.60.149[.213/auth/login/
185.39.19[.164/auth/login/
Merl (@merlax_) 's Twitter Profile Photo

#Opendir 🇧🇷 Relacionado a investigación de Padawan Expone: - Credenciales - user+pass(cifrada) - Sites - Headers / Tokens de sesión + 12000 jsons + 1800 txt Dee Panels: hxxps://servidor2025.com/control/admin2/ hxxps://servidor2025.com/gpt.php

#Opendir 🇧🇷
Relacionado a investigación de <a href="/johnk3r/">Padawan</a> 
Expone:
- Credenciales - user+pass(cifrada)
- Sites
- Headers / Tokens de sesión
+ 12000 jsons
+ 1800 txt

<a href="/ViriBack/">Dee</a> 
Panels:
hxxps://servidor2025.com/control/admin2/
hxxps://servidor2025.com/gpt.php
abuse.ch (@abuse_ch) 's Twitter Profile Photo

SalatStealer (aka WEB_RAT) is on the rise 📈, heavily dropped by Amadey 📥 Malware sample: 📄bazaar.abuse.ch/sample/8b94f5f… Admin Panel: 📡https://salat .cn/login/ (Cloudflare 🇺🇸) Gihub repository ➡️"importantfiles": 🗜️github.com/webr-at/import…

SalatStealer (aka WEB_RAT)  is on the rise 📈, heavily dropped by Amadey  📥

Malware sample:
📄bazaar.abuse.ch/sample/8b94f5f…

Admin Panel:
📡https://salat .cn/login/ (Cloudflare 🇺🇸)

Gihub repository ➡️"importantfiles":
🗜️github.com/webr-at/import…
ET Labs (@et_labs) 's Twitter Profile Photo

ANY.RUN Dee 3 SIDs into #ETOpen, thanks Dee ! 2063946 - ET MALWARE Win32/TinyLoader CnC Activity (POST) 2063947 - ET MALWARE TinyLoader CnC Response M1 2063948 - ET MALWARE TinyLoader CnC Response M2