Null Pwner (@nullpwner) 's Twitter Profile
Null Pwner

@nullpwner

Turning random hashes into aha-moments. Coffee fueled. Views mine.

ID: 114604009

linkhttp://badbyte.io calendar_today16-02-2010 00:54:47

51 Tweet

124 Takipรงi

679 Takip Edilen

Null Pwner (@nullpwner) 's Twitter Profile Photo

All owned by rly for VVS Stealer vvs[.]cymru (reg April 2025) delfiauto[.]ltd (reg Dec 2024) www.delfiautos[[.]]lt (reg Dec 2024) lote45[.]onedriver[.]com[.]br (reg Aug 2024) tupy[.]onedriver[.]com[.]br solarbr.onedriver[.]com[.]br 504e1c93[.]host.njalla[.]net (hosting

Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ New Odyssey Stealer C2 Panel ๐ŸŽฏ hxxp://5.199.166[.]102/login This is the third C2 spin-up in a matter of days. Favicon: 9108dde25ad958b27f6a97d644775dee #Threathunting #Odyssey #Stealer #ThreatIntel MalwareHunterTeam Dee Who said what? RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ Mikhail Kasimov

๐Ÿšจ New Odyssey Stealer C2 Panel

๐ŸŽฏ hxxp://5.199.166[.]102/login

This is the third C2 spin-up in a matter of days.

Favicon: 9108dde25ad958b27f6a97d644775dee

#Threathunting #Odyssey #Stealer #ThreatIntel 

<a href="/malwrhunterteam/">MalwareHunterTeam</a> <a href="/ViriBack/">Dee</a> <a href="/g0njxa/">Who said what?</a> <a href="/RussianPanda9xx/">RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ</a> <a href="/500mk500/">Mikhail Kasimov</a>
Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ More VektorX C2 Panel ๐ŸŽฏhxxp://92.119.114[.]111:5173/auth/login - AS211381 ๐ŸŽฏ 91.211.249[.]147 ๐ŸŽฏ 62.233.53[.]22 ๐ŸงฌHash: e9c154045c3e12a1a16617e0eaede551 @onyphe.io PD for the dev: Work on your logo tracing skills bro, they are therrible ๐Ÿ˜‚ (/assets/fncVEJjF.png)

๐Ÿšจ More VektorX C2 Panel  

๐ŸŽฏhxxp://92.119.114[.]111:5173/auth/login - AS211381
๐ŸŽฏ  91.211.249[.]147
๐ŸŽฏ 62.233.53[.]22

๐ŸงฌHash: e9c154045c3e12a1a16617e0eaede551 <a href="/onyphe/">@onyphe.io</a> 

PD for the dev: Work on your logo tracing skills bro, they are therrible ๐Ÿ˜‚ (/assets/fncVEJjF.png)
Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ ClickFix Delivering XWorm ๐ŸŽฏ hxxps://lbkequityexchange[.]com/i.cmd ๐ŸŽฏ hxxps://lbkequityexchange[.]com/EQTRN.exe ๐ŸŽฏ Prob C2: winservicesconsole[.]duckdns.]org - 45.154.98[.]252 ASN 210558 ๐Ÿ’ป Fake CAPTCHA โ†’ Runs PS script โ†’ Downloads i.cmd โ†’ Deploys XWorm while mimicking a

Bert-Jan ๐Ÿ›ก๏ธ (@bertjancyber) 's Twitter Profile Photo

NEW BLOG: Investigating ClickFix Incidents ClickFix/Fake Captcha has emerged as a popular technique to deliver malware to users. This blog discusses the first stages of a ClickFix investigation to determine the impact on your organisation. kqlquery.com/posts/investigโ€ฆ

Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ Same Threat Actor is now delivering Windows Payload through the ~2800 compromised sites using ClickFix It dinamycally changes depending on platform (user-agent) Mac/Win 1: https://e.overallwobbly[.]ru/au1 (Dropper1: era-stau1.a) โ†’ PowerShell โ†’ Stage 1 Script (AutoIT) 2:

๐Ÿšจ Same Threat Actor is now delivering Windows Payload through the ~2800 compromised sites using ClickFix

It dinamycally changes depending on platform (user-agent) Mac/Win

1: https://e.overallwobbly[.]ru/au1 (Dropper1: era-stau1.a) โ†’ PowerShell โ†’ Stage 1 Script (AutoIT)

2:
Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ Clickfix - Binance Phishing delivering VIDAR ๐ŸŽฏ 193.24.123[.]165 ๐ŸŽฏ traderai[.]name C2: t[.]me/m00f3r, steamcommunity[.]com/profiles/76561199851454339 (couple more IPs in the title). VT: c3ac276122e6af6459eda55251a70ebf8bb091a620314f18ada33a6259fe10b1 MalwareHunterTeam

๐Ÿšจ Clickfix - Binance Phishing  delivering VIDAR

๐ŸŽฏ 193.24.123[.]165
๐ŸŽฏ traderai[.]name 

C2: t[.]me/m00f3r, steamcommunity[.]com/profiles/76561199851454339 (couple more IPs in the title).

VT: c3ac276122e6af6459eda55251a70ebf8bb091a620314f18ada33a6259fe10b1

<a href="/malwrhunterteam/">MalwareHunterTeam</a>
Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿšจ Introducing Mave Stealer C2 Panel: ๐ŸŽฏ web.mavedashboard[.]lol ๐ŸŽฏ31.57.156[.]135 (AS210538) ๐Ÿงฌea8aebfaedd0d287ac10c39a5a3c4de6 @onyphe.io Mave Stealer appears to have been launched on Apr 25. [@]squ4ts๐Ÿ€<๐Ÿˆ :) Any samples? MalwareHunterTeam Dee Who said what? RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ

๐Ÿšจ Introducing Mave Stealer C2 Panel:

๐ŸŽฏ web.mavedashboard[.]lol
๐ŸŽฏ31.57.156[.]135 (AS210538)
๐Ÿงฌea8aebfaedd0d287ac10c39a5a3c4de6 <a href="/onyphe/">@onyphe.io</a> 

Mave Stealer appears to have been launched on Apr 25.

[@]squ4ts๐Ÿ€&lt;๐Ÿˆ :)

Any samples?
<a href="/malwrhunterteam/">MalwareHunterTeam</a> <a href="/ViriBack/">Dee</a> <a href="/g0njxa/">Who said what?</a> <a href="/RussianPanda9xx/">RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ</a>
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has partnered with others across industry and international law enforcement and facilitated a disruption of Lumma infrastructure and the marketplaces in which the stealer malware was sold to other cybercriminals. msft.it/6011Sd2zc

Null Pwner (@nullpwner) 's Twitter Profile Photo

๐Ÿ‘€ Interesting coordinated release from multiple agencies (NCSC, NSA, BSI, etc) about Russian GRU Unit 26165. Worth a read. nsa.gov/Press-Room/Preโ€ฆ