hazmalware (@hazmalware) 's Twitter Profile
hazmalware

@hazmalware

threat research and malware analysis

ID: 4302640359

linkhttp://hazmalware.wordpress.com calendar_today28-11-2015 02:54:11

2,2K Tweet

6,6K Takipçi

150 Takip Edilen

Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2021-04-06: 🕶️🆕Introducing #Hancitor Loader aka "#MASSLOADER" Internal Project Name⚙️ 📧Spam: DocuSign Theme➡️Google Doc 🤔Filling in King #Emotet Loader King Void in 2021 Fueling High-Value Target Ransomware? ↘️Still largely same (➕ new "&EXT=" URI) vkremez.com/2018/11/lets-l…

2021-04-06: 🕶️🆕Introducing #Hancitor Loader aka "#MASSLOADER" Internal Project Name⚙️

📧Spam: DocuSign Theme➡️Google Doc

🤔Filling in King #Emotet Loader King Void in 2021 Fueling High-Value Target Ransomware?

↘️Still largely same (➕ new "&EXT=" URI)
vkremez.com/2018/11/lets-l…
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

🔥#Clop Ransomware (CryptoMix) Linked Operation Takedown: From unknown ransomware, only MalwareHunterTeam and I tracked early in 2019 as a signed malware - turned to be multimillion operation with ... Tesla car & lavish lifestyle github.com/k-vitali/crypt… youtube.com/watch?v=PqGaZg…

Drunk Binary (@drunkbinary) 's Twitter Profile Photo

Correction on sample: This is not an APT28 sample. Apologies This was written by a dev at Meresburg University. There is also several ransomware samples written by them on VT as well. APT28/FANCY BEAR Zekapab CSharp Implant bc388933d56e7a7d3e2b6c97c5819539 virustotal.com/gui/file/c25e5…

hasherezade (@hasherezade) 's Twitter Profile Photo

New releases: #PESieve/#HollowsHunter 0.3.0: github.com/hasherezade/pe… & github.com/hasherezade/ho… - among the new features: i.e. the support for the scan on inaccessible pages

abuse.ch (@abuse_ch) 's Twitter Profile Photo

QakBot + FeodoTracker = 💥 Feodo Tracker is now tracking #QakBot botnet C2s 🥳 👉 feodotracker.abuse.ch/browse/qakbot/ If you are already using Feodo Tracker's blocklist you automatically receive protection against QakBot botnet C2 traffic 🐸🔥 👉 feodotracker.abuse.ch/downloads/ipbl…

QakBot + FeodoTracker = 💥

Feodo Tracker is now tracking #QakBot botnet C2s 🥳

👉 feodotracker.abuse.ch/browse/qakbot/

If you are already using Feodo Tracker's blocklist you automatically receive protection against QakBot botnet C2 traffic 🐸🔥

👉 feodotracker.abuse.ch/downloads/ipbl…
KevTheHermit (@kevthehermit) 's Twitter Profile Photo

Lots going in with logj4 but don't forget to look at the new patch Tuesday from Microsoft Threat Intelligence Includes CVE-2021-43890 Windows AppX being exploited in the wild.

Lots going in with logj4 but don't forget to look at the new patch Tuesday from <a href="/MsftSecIntel/">Microsoft Threat Intelligence</a> Includes CVE-2021-43890 Windows AppX being exploited in the wild.
Paul Melson (@pmelson) 's Twitter Profile Photo

I don’t have a SoundCloud, but if you want to click on something, it would be pretty great if you decided to help out some fellow Americans in dire need right now: secure.kentucky.gov/formservices/F…

lc4m (@luc4m) 's Twitter Profile Photo

nice catch! tracking #ursnif #isfb version:2.50 build:239 group:3000 [Jun 22 2022][WJWoBDOsnmP2wric][/drew/] 5382ef90ef9a33baca2ed2119059154f ioc down here 👇🧐 Felix avman hazmalware Artsiom Holub abuse.ch malware_traffic

nice catch! tracking #ursnif #isfb version:2.50 build:239 group:3000 [Jun 22 2022][WJWoBDOsnmP2wric][/drew/]

5382ef90ef9a33baca2ed2119059154f

ioc down here  👇🧐

<a href="/felixw3000/">Felix</a>  <a href="/avman1995/">avman</a>  <a href="/HazMalware/">hazmalware</a> <a href="/Mesiagh/">Artsiom Holub</a> <a href="/abuse_ch/">abuse.ch</a> <a href="/malware_traffic/">malware_traffic</a>
JAMESWT (@jameswt_wt) 's Twitter Profile Photo

Mentioned Samples + ⚠️extra 👇 bazaar.abuse.ch/browse/tag/116… #opendir 💠116.203.19.]97/1/ + ⚠️https://raw.githubusercontent.]com/alibaba2044/hauL2/main/wininfo64.zip 🆘https://github].com/alibaba2044?tab=repositories 👇 bazaar.abuse.ch/browse/tag/git… cc reecDeep James

Mentioned Samples + ⚠️extra
👇
bazaar.abuse.ch/browse/tag/116…
#opendir
💠116.203.19.]97/1/
+
⚠️https://raw.githubusercontent.]com/alibaba2044/hauL2/main/wininfo64.zip

🆘https://github].com/alibaba2044?tab=repositories
👇
bazaar.abuse.ch/browse/tag/git…

cc <a href="/reecdeep/">reecDeep</a> <a href="/James_inthe_box/">James</a>
Max_Malyutin (@max_mal_) 's Twitter Profile Photo

#Bumblebee Infection Flow TTPs🐝 [+] Mark-of-the-Web Bypass: IMG (T1553.005) [+] Malicious File: LNK (T1204.002) [+] Windows Command Shell: BAT (T1059.003) [+] Rename System Utilities: copy & rename (T1036.003) [+] Scheduled Task: schtasks.exe (T1053.005) [+] Rundll32(T1218.011)

#Bumblebee Infection Flow TTPs🐝

[+] Mark-of-the-Web Bypass: IMG (T1553.005)
[+] Malicious File: LNK (T1204.002)
[+] Windows Command Shell: BAT (T1059.003)
[+] Rename System Utilities: copy &amp; rename (T1036.003)
[+] Scheduled Task: schtasks.exe (T1053.005)
[+] Rundll32(T1218.011)
herrcore (@herrcore) 's Twitter Profile Photo

🔴We are live rn! Join us with special guest Duncan Ogilvie 🍍 for a deep dive into hacking #ChatGPT Let’s see far off the rails we can push this thing! twitch.tv/oalabslive

🔴We are live rn!

Join us with special guest <a href="/mrexodia/">Duncan Ogilvie 🍍</a> for a deep dive into hacking #ChatGPT

Let’s see far off the rails we can push this thing!

twitch.tv/oalabslive