ge0lev (@ge0lev) 's Twitter Profile
ge0lev

@ge0lev

Threat Hunting | Malware Analysis

ID: 1015190309859446785

calendar_today06-07-2018 11:06:46

34 Tweet

322 Followers

361 Following

Matthew (@embee_research) 's Twitter Profile Photo

Practical Examples of URL Hunting Queries🔥 A series of practical URL hunting queries with examples, queries and links to follow along. (Covering Lumma, StealC, Amadey and more!) embeeresearch.io/practical-exam…

WatchingRac (@racwatchin8872) 's Twitter Profile Photo

#AsyncRat #Malware 💣holder-apartments-face-matthew[.]trycloudflare[.]com/uline/Nr-2005-028763-2024-PDF[.]lnk💣 lnk->vbs->bat (checks if Avast exists) -> zip -> python scripts (injects shellcode) -> AsyncRat app.any.run/tasks/0a336523… app.any.run/tasks/13911dd7…

#AsyncRat #Malware
💣holder-apartments-face-matthew[.]trycloudflare[.]com/uline/Nr-2005-028763-2024-PDF[.]lnk💣
lnk->vbs->bat (checks if Avast exists) -> zip -> python scripts (injects shellcode) -> AsyncRat
app.any.run/tasks/0a336523…
app.any.run/tasks/13911dd7…
Validin (@validinllc) 's Twitter Profile Photo

🚨 New Blog: "Analyzing #Tycoon2FA Infra with Validin" Discover how WatchingRac expanded a phishing analysis into ~2k confirmed Storm-1747 domains using Validin's powerful threat-hunting tools. A must-read for analysts hunting advanced phishing kits! validin.com/blog/tycoon_2f…

WatchingRac (@racwatchin8872) 's Twitter Profile Photo

#Tycoon #Phishing Got more domains with the help of Who said what? 571 domains linked to Tycoon. Here’s a list of domains+subdomains+full path, hosting Outlook/Gmail phishing pages: pastebin.com/jp0uTrK4 A few of them are waiting for API renew (TA's didn't pay the bill 😂)

Fox_threatintel (@banthisguy9349) 's Twitter Profile Photo

8af777d0f92cef2d9040a634527c3753669235589c23129f09855ad0ebe10c6f GoogleUpdateSetup.exe Guys. 'googleupdatesetup.exe' has been spread by a actor that uses Snakekeylogger. I suspect this certificate to be abused. Tag Cert Abuse Specialist into this post please.

8af777d0f92cef2d9040a634527c3753669235589c23129f09855ad0ebe10c6f

GoogleUpdateSetup.exe

Guys. 'googleupdatesetup.exe' has been spread by a actor that uses Snakekeylogger. I suspect this certificate to be abused. 

Tag Cert Abuse Specialist into this post please.
WatchingRac (@racwatchin8872) 's Twitter Profile Photo

#Github #Malware #Lumma 💣Campaign Using SolaraExecutor-V3 to infect victims with Lumma Stealer: Github -> Exe with Powershell Code -> Pastebin -> Github -> Lumma Stealer pastebin.com/1KvNgjk3

#Github #Malware #Lumma
💣Campaign Using SolaraExecutor-V3 to infect victims with Lumma Stealer:

Github -> Exe with Powershell Code -> Pastebin -> Github -> Lumma Stealer

pastebin.com/1KvNgjk3