mrglwglwgl (@mrglwglwgl) 's Twitter Profile
mrglwglwgl

@mrglwglwgl

Enjoy Malware

ID: 1744161848583507968

calendar_today08-01-2024 00:59:38

84 Tweet

56 Followers

90 Following

rivitna (@rivitna2) 's Twitter Profile Photo

#PE32 is a new family of #ransomware It's not hard to guess where this ransomware was developed. But it is noteworthy that it's developed in #Rust. Perhaps the author's name is Farza, and he himself uploaded the first versions of his ransomware to VT. github.com/facct-ransomwa…

#PE32 is a new family of #ransomware
It's not hard to guess where this ransomware was developed.
But it is noteworthy that it's developed in #Rust.
Perhaps the author's name is Farza, and he himself uploaded the first versions of his ransomware to VT.
github.com/facct-ransomwa…
mrglwglwgl (@mrglwglwgl) 's Twitter Profile Photo

Banderas Ransomware .crypt instructions.txt c0c59aadd4431da20e79a174f1bc1099f24d1b8627571e5afd43a8a4c2ea92fa http://50.85.82[.]218:8080/Banderas.exe

Banderas Ransomware
.crypt
instructions.txt

c0c59aadd4431da20e79a174f1bc1099f24d1b8627571e5afd43a8a4c2ea92fa
http://50.85.82[.]218:8080/Banderas.exe
Hyuna Lee (@paducklee) 's Twitter Profile Photo

185.39.18[.]56 bcfa1892e328cc8f63a45d71c739d64f ccde96059c24675add801c44548ace17 3d816cbc13e4ad4d00ae467b2025f5d5 a29c37ff774d57230eda3a2e31777d30 3b7f6f2d95067837287941c21194bb04 d197dd2bb854f3cd9856ccdb73889efa

185.39.18[.]56
bcfa1892e328cc8f63a45d71c739d64f
ccde96059c24675add801c44548ace17
3d816cbc13e4ad4d00ae467b2025f5d5
a29c37ff774d57230eda3a2e31777d30
3b7f6f2d95067837287941c21194bb04
d197dd2bb854f3cd9856ccdb73889efa
EQST (@eqstlab) 's Twitter Profile Photo

⚠️CVE-2025-1302 (CVSS 8.9)⚠️ JSONPath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. πŸ”₯PoC + JSONPath-plus setup: github.com/EQSTLab/CVE-20… #JSONPath #RCE #Vulnerability #CyberSecurity #CVE #PoC #Exploit

Hyuna Lee (@paducklee) 's Twitter Profile Photo

J #Ransomware md5 : d69ebd183b2e0072c396e55503d5ede7 onion : w4d5aqmdxkcsc2xwcz7w7jo6wdmvmakgy3y6mfmdtzmyvxe77cjkfbad[.]onion

J #Ransomware
md5 : d69ebd183b2e0072c396e55503d5ede7
onion : w4d5aqmdxkcsc2xwcz7w7jo6wdmvmakgy3y6mfmdtzmyvxe77cjkfbad[.]onion
RAKESH KRISHNAN (@rakeshkrish12) 's Twitter Profile Photo

🚨FOUND REAL IPs of #Weyhro #Ransomware! DLS: …75gfvi47fptm2gftw7cn656rnfhzdqd.onion File Server: …5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion 194.87.85.168 πŸ‡³πŸ‡± 185.106.94.255 πŸ‡¦πŸ‡Ή More: github.com/TheRavenFile/D… #infosec #security #malware #OSINT #cybersecurity #threatintel #russia #CISA #darkweb #TOR FOFA

🚨FOUND REAL IPs of #Weyhro #Ransomware!

DLS: …75gfvi47fptm2gftw7cn656rnfhzdqd.onion
File Server: …5p7wgaegtfh4cobeqbhcq55nwt2m6yd.onion

194.87.85.168 πŸ‡³πŸ‡±
185.106.94.255 πŸ‡¦πŸ‡Ή

More: github.com/TheRavenFile/D…

#infosec #security #malware #OSINT #cybersecurity #threatintel #russia #CISA #darkweb #TOR <a href="/fofabot/">FOFA</a>
mrglwglwgl (@mrglwglwgl) 's Twitter Profile Photo

Global Ransomware 2 Samples md5: 4e01e0eca4d82cbadc70b754a4f9fd3c (Go-based) md5: ca979fad68362cd3d9ad24424d5ac3fd(Mamona-like)

Global Ransomware

2 Samples

md5: 4e01e0eca4d82cbadc70b754a4f9fd3c (Go-based)
md5: ca979fad68362cd3d9ad24424d5ac3fd(Mamona-like)