ExecuteMalware (@executemalware) 's Twitter Profile
ExecuteMalware

@executemalware

#malware hunter & analyst.
Opinions are my own.

ID: 743883460587167744

calendar_today17-06-2016 19:10:12

16,16K Tweet

26,26K Takipçi

191 Takip Edilen

JAMESWT (@jameswt_wt) 's Twitter Profile Photo

Related Pdf👇 "Comprovante-Mercado-Pago-26-05-2025-.pdf" ❇️Related #XWorm V5.2 ⛔️C2 158.69.41.]120:8000 Samples bazaar.abuse.ch/browse/tag/158… ✅AnyRun app.any.run/tasks/29f57a2f… 1/2 cc Dodo on Security 🇵🇸 🇺🇦 Germán Fernández ܛܔܔܔܛܔܛܔܛ Mikhail Kasimov Kelsey

Related Pdf👇
"Comprovante-Mercado-Pago-26-05-2025-.pdf"

❇️Related  #XWorm V5.2
⛔️C2 158.69.41.]120:8000 Samples 
bazaar.abuse.ch/browse/tag/158…

✅AnyRun
app.any.run/tasks/29f57a2f…
1/2
cc <a href="/dodo_sec/">Dodo on Security 🇵🇸 🇺🇦</a> <a href="/1ZRR4H/">Germán Fernández</a> <a href="/skocherhan/">ܛܔܔܔܛܔܛܔܛ</a> <a href="/500mk500/">Mikhail Kasimov</a> <a href="/k3dg3/">Kelsey</a>
Jammy (@jcarndt) 's Twitter Profile Photo

Anybody know if there is a name for this specific type of batch file obfuscation? Here is what it looks like before and after deobfuscation.

Anybody know if there is a name for this specific type of batch file obfuscation? Here is what it looks like before and after deobfuscation.
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

#Bumblebee from nir-soft[.]org (x.com/1ZRR4H/status/…). Botnet: grp0005 C2: 188.40.187.152 (although not flagged by any AV, the IP has been linked to Bumblebee campaigns since approximately April 2024). Bumblebee has been used in ransomware attacks. MalwareHunterTeam

#Bumblebee from nir-soft[.]org (x.com/1ZRR4H/status/…).
Botnet: grp0005
C2: 188.40.187.152 (although not flagged by any AV, the IP has been linked to Bumblebee campaigns since approximately April 2024).

Bumblebee has been used in ransomware attacks.

<a href="/malwrhunterteam/">MalwareHunterTeam</a>
Jammy (@jcarndt) 's Twitter Profile Photo

Introducing: BatVision, a tool to help deobfuscate batch files affected by BatCloak. Enjoy! github.com/jcarndt/BatVis…

Konstantin Nikolenko (@k_n1kolenko) 's Twitter Profile Photo

#AsyncRAT #ioc 45.80.158.24:4449 45.141.233.114:2006 98.84.132.102:4000 103.20.102.151:8848 185.49.126.59:5552 193.124.205.63:4449

Karsten Hahn (@struppigel) 's Twitter Profile Photo

Virut part II: process infection and NTDLL hooking 🦔📹 ➡️x64dbg scripting ➡️conditional breakpoints ➡️more import table resolving ➡️fixing control flow ➡️marking up hook code #MalwareAnalysisForHedgehogs #Virut youtube.com/watch?v=nuxnvj…

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes!

The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients. github.com/LaurieWired/Gh…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

Top 10 last week's threats by uploads 🌐 ⬇️ #Lumma 328 (730) ⬇️ #Asyncrat 309 (490) ⬇️ #Snake 225 (425) ⬆️ #Maze 225 (4) ⬆️ #Neconyd 224 (111) ⬇️ #Xworm 169 (430) ⬇️ #Agenttesla 165 (219) ⬇️ #Remcos 151 (488) ⬆️ #Zombie 133 (131) ⬇️ #Dcrat 129 (215) Track them all:

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 328 (730)
⬇️ #Asyncrat 309 (490)
⬇️ #Snake 225 (425)
⬆️ #Maze 225 (4)
⬆️ #Neconyd 224 (111)
⬇️ #Xworm 169 (430)
⬇️ #Agenttesla 165 (219)
⬇️ #Remcos 151 (488)
⬆️ #Zombie 133 (131)
⬇️ #Dcrat 129 (215)
Track them all:
Gi7w0rm (@gi7w0rm) 's Twitter Profile Photo

New Blogpost: #HuluCaptcha - An example of a FakeCaptcha framework. Started investigating this after a friend was compromised by it. Some interesting/unique techniques shown, plus analysis of the compromised server. Hope you enjoy the read! :) medium.com/@gi7w0rm/huluc…

New Blogpost: #HuluCaptcha - An example of a FakeCaptcha framework. 
Started investigating this after a friend was compromised by it. Some interesting/unique techniques shown, plus analysis of the compromised server. Hope you enjoy the read! :)
medium.com/@gi7w0rm/huluc…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

👾 #SVCStealer is an #infostealer written in C++ that emerged this January. It targets victims' credentials, credit card details, and crypto wallet data. 👨‍💻 Collect #IOCs & see analysis sessions: any.run/malware-trends…

👾 #SVCStealer is an #infostealer written in C++ that emerged this January.
 
It targets victims' credentials, credit card details, and crypto wallet data.
 
👨‍💻 Collect #IOCs &amp; see analysis sessions: any.run/malware-trends…
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲 (@netresec) 's Twitter Profile Photo

CapLoader 2.0 released today! 🔎 Identifies over 250 protocols in #PCAP 🎨 Define protocols from example traffic 🇶 Extracts JA3, JA4 and SNI from QUIC 💻 10x faster user interface netresec.com/?b=256dbbc

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔔 Just a reminder that the next live stream is this Thursday at 5pm CDT! Thomas Roccia will be joining to talk about two of his projects - NOVA and YARA Toolkit! youtube.com/live/UWsHJAWWD…

Malwarebytes (@malwarebytes) 's Twitter Profile Photo

Fake websites posing as the popular travel site are giving visitors something worse than a bad deal on a hotel stay. malwarebytes.com/blog/news/2025…