Bex (@4n6bexaminer) 's Twitter Profile
Bex

@4n6bexaminer

Digital Forensics | Incident Response | Threat Hunting | @CuratedIntel Member. Thoughts are my own.

ID: 1245841316287672321

linkhttps://au.linkedin.com/in/bex-nitert calendar_today02-04-2020 22:32:23

1,1K Tweet

1,1K Followers

785 Following

Bex (@4n6bexaminer) 's Twitter Profile Photo

Really great technical write up on the #macos #stealer malware I found ~2wks ago. Even without much free time to analyse I could see it was different from other common infostealers and thought it was worth sharing so awesome peeps like L0Psec could deep dive. Thx for the credit

Bex (@4n6bexaminer) 's Twitter Profile Photo

Was slightly triggered that most Poseidon Stealer related things have been associated with Mythic Poseidon (the first option) on Threatfox abuse.ch 😅 can we just go back to thinking it's an AMOS variant? 😂

Was slightly triggered that most Poseidon Stealer related things have been associated with Mythic Poseidon (the first option) on Threatfox <a href="/abuse_ch/">abuse.ch</a> 😅 can we just go back to thinking it's an AMOS variant? 😂
Bex (@4n6bexaminer) 's Twitter Profile Photo

#AtomicStealer has implemented a basic check for the user "run" to prevent analysis in Recorded Future / Hatching triage 🤣 When executing as "run", rather than the password prompt, you are greeted with an endearing message from the devs "idi nahui dolbaeb."

Bex (@4n6bexaminer) 's Twitter Profile Photo

Just a little bit over a year since the arrests associated with bulletproftlink (BPL). Shame it didn't result in any charges. This visualisation is of bitcoin transaction activity assoc. with wallet addresses I attributed to BPL with a high level of confidence. Not exhaustive.