B3rt0
@rpsanch
#Cyber hunter with my navigation on and trying to find my next thrill (views expressed are my own) #threatintel #OSINT #malware #infosec #phishing
ID: 3448979902
26-08-2015 17:01:24
3,3K Tweet
914 Followers
1,1K Following
Appears to be #agenttesla distribution through mal_docx and template injection and EQNED.exe vul #CVE-2017-11882. Same smtp exfil domain found by enjoying being dumb PI992020.docx 2522dfe82c933dc4b88ec021a4dad080 us2.smtp.mailhostbox[.]com JAMESWT_MHT Joakim Kennedy
Possible new #mustangpanda or #reddelta #APT activity. Possibly related to the campaign against Vatican Hash : cc233b9f02903b91d57ff3b6625c6719 Name: Catholic Bishops call for urgent Cameroon peace talks.exe Arkbird Florian Roth ⚡️ RedDrip Team Shadow Chaser Group Gage
C2: http://103.85.24[.]158/hk097.dat Payload : #PlugX James Dodge This Security Security Doggo
#REvil/#Sodinokibi moved to #golang for their #ransomware...? 6eb69acd2ac82be838c8b3d8910b0d70 CC: MalwareHunterTeam Michael Gillespie JAMESWT_MHT Vitali Kremez
#RobbinHood #golang #ransomware: 3ad2dfa916d473848df470bdd0b18968 VT: 7/72 "pdb": C:/Users/User/go/src/Robbinhood7 CC: Vitali Kremez, Michael Gillespie, MalwareHunterTeam, JAMESWT_MHT
DocuSign-themed #malxls delivering #ursnif / #gozi #malware h113198x9.xlsm bd8e543c53506ca06c085efdb937854a http://premiumstatics[.]co/con3cti0n.dll con3cti0n.dll c8392d93a1f064a53abb61887cad409b JAMESWT_MHT #ThreatIntel #ThreatHunting
#APT #sidewinder gearing up for their campaign with newly registered domains. gov-pbs[.]net gov-nadra[.]net gov-af[.]net gov-crt[.]net gov-pmo[.]net. Registered on Late December. Shadow Chaser Group Arkbird @Rmy James markus neis
Possible #Bahamut #APT campaign IOCs. docx dropping rtf containing sct file that modifies tmp file to drop VB exe. one domain reported on previously by BlackBerry thanks to Yury Polozov @t0001100000 d2hvYW1p pastebin.com/9U57CHZn ᴘᴀʀᴛʜɪ Arkbird ςεяβεяμs - мαℓωαяε яεsεαяςнεя
#PrimitiveBear #Gamaredon group campaign IOCs. Timely mal docx files with template injection TTPs Thanks to Yury Polozov and @t0001100000 IOCs - pastebin.com/JmksCTch Arkbird Mikhail Kasimov /Pistus.exe Jazi Shadow Chaser Group JAMESWT_MHT ςεяβεяμs - мαℓωαяε яεsεαяςнεя Joakim Kennedy
Looks like #PrimitiveBear #Gamaredon using remote template injection протокол макарони.docx 0db02addc704c71e0260a1132697208c http://83.166.246[.]59/SGZ2/sought.dot 83.166.246.59 ᴘᴀʀᴛʜɪ ςεяβεяμs - мαℓωαяε яεsεαяςнεя Jazi JAMESWT_MHT
Spotlight on Joakim Kennedy and his talk: The Dark Side of Go: A 2020 Go Malware Round-Up youtu.be/rcsWz-gT0sI #gopherconEU #golang