Alex. Turing (@turingalex) 's Twitter Profile
Alex. Turing

@turingalex

Kernel Developer | Security REsearcher | Basketball Fan
{Botconf | VirusBulletin | Kaspersky SAS} Speaker
Current: @Xlab_qax
EX: @360Netlab @Kaspersky
AKA 渣兔

ID: 2941997052

linkhttps://blog.xlab.qianxin.com calendar_today24-12-2014 15:27:10

198 Tweet

889 Followers

289 Following

Alex. Turing (@turingalex) 's Twitter Profile Photo

c92e2655d115368f92e7b7de5803b7bc, a VT 0 detected #ELF #backdoor stands out for leveraging the #MQTT protocol and specifically targeting devices with the hardcoded name #ORPAK. I wrote a Chinese analysis report, hope it’s your cup of tea! freebuf.com/articles/paper… Xlab #IOC

c92e2655d115368f92e7b7de5803b7bc, a VT 0 detected  #ELF #backdoor stands out for leveraging the #MQTT protocol and specifically targeting devices with the hardcoded name #ORPAK. I wrote a Chinese analysis report, hope it’s your cup of tea!  freebuf.com/articles/paper…
<a href="/Xlab_qax/">Xlab</a> #IOC
Alex. Turing (@turingalex) 's Twitter Profile Photo

An Unusual Year-Long Campaign: #APT #Winnti vs. Cybercrime Scammers.🤣According to anonymous sources, 60% of the source code shared on Chinese scam-related cybercrime forums is embedded with the #Glutton backdoor. Samples have remained virtually undetected.Stay vigilant,Xlab

An Unusual Year-Long Campaign: #APT #Winnti vs. Cybercrime Scammers.🤣According to anonymous sources, 60% of the source code shared on Chinese scam-related cybercrime forums is embedded with the #Glutton backdoor. Samples have remained virtually undetected.Stay vigilant,<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

Haha, 英雄所“见”略同,😁.I dropped a Chinese analysis on this malware back on 11.28. freebuf.com/articles/paper… I had a hunch there was some background to it, but didn’t realize it was this big, "a cyberweapon". The background and impact analysis in Claroty's report is pure gold,🫡

Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨🚨Recently caught the latest update from the #vo1d #android #botnet—still boasting an impressive scale of 1.3 million bots. Stay vigilant,⏰⏰!Xlab

🚨🚨Recently caught the latest update from the #vo1d #android #botnet—still boasting an impressive scale of 1.3 million bots. Stay vigilant,⏰⏰!<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨Initially thought to be a new #IOCONTROL sample from Germany on VT, turned out to be a UPX magic tweak—"ABC!" to "GBC!". Despite this minor tweak, the detection plummeted from 32/63 to just 3/63. #C2 points to a new IP: 3.127.232.142. who’s behind this update?Xlab Claroty

🚨Initially thought to be a new #IOCONTROL sample from Germany on VT, turned out to be a UPX magic tweak—"ABC!" to "GBC!". Despite this minor tweak, the detection plummeted from 32/63 to just 3/63. #C2 points to a new IP: 3.127.232.142. who’s behind this update?<a href="/Xlab_qax/">Xlab</a> <a href="/Claroty/">Claroty</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

January 20th is a special day. Let's take a look at a few #C2 domains: {trump2024.oss & liberalretard.libre}. It seems the botnet is run by #Trump supporters, but ironically, they launched a #DDoS attack on the Trump-#Musk Livestream in 2024. "Money is the root of.."🤣 Xlab

January 20th is a special day. Let's take a look at a few #C2 domains: {trump2024.oss &amp; liberalretard.libre}.
It seems the botnet is run by #Trump supporters, but ironically, they launched a #DDoS attack on the Trump-#Musk Livestream in 2024. "Money is the root of.."🤣 <a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

Back from Spring Festival🍷, finished a new blog on #Vo1d variant infected ~160m TV. For RE fans, the coolest bit is how the Vo1d author messed with the XXTEA , ditching LSR for ASR,total genius move👏! You can bet some #DDoS #botnets will nab this trick. Stay vigilant, Xlab

Back from Spring Festival🍷, finished a new blog on #Vo1d variant infected ~160m TV. For RE fans, the coolest bit is how the Vo1d author messed with the XXTEA , ditching LSR for ASR,total genius move👏! You can bet some #DDoS #botnets will nab this trick. Stay vigilant, <a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

Absolutely loved this #RE challenge—#Vo1d is a clever foe! If you’re into it, check out the Codomain & ASR_XXTEA parts—you won’t be disappointed. Oh, and if you want #DGA details , pls follow Xlab & DM—My boss’ll share u code.(他太闲了,给他找点活干,🤣)🍷"LONG LIVE THE RE"🍷

Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨#Speculoos #Backdoor 3db8e26f059e8b1fd3bbb96c052cfe4a belongs to #APT41 #WINNTI, has stayed undetected since 2023.04.23. #IOC #C2 is sshc.webtechnovelty[.]com. Comparing with Unit 42 samples, function names alone reveal expanded capabilities. Stay vigilant, ⏰Xlab

🚨#Speculoos #Backdoor 3db8e26f059e8b1fd3bbb96c052cfe4a belongs to #APT41 #WINNTI,  has stayed undetected since 2023.04.23. #IOC #C2 is sshc.webtechnovelty[.]com. Comparing with <a href="/Unit42_Intel/">Unit 42</a> samples, function names alone reveal expanded capabilities. Stay vigilant, ⏰<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

A new #botnet rolls into town. The ciphertext quotes love song lyrics, what a sentimental threat actor,🤣. We’ve got another song for the actor, “Let It Go.” #C2 👉 re.santasbigcandycane[.]ru. "santasbigcandycane" is clearly a nod to #Mirai. Have Fun and Stay vigilant Xlab

Alex. Turing (@turingalex) 's Twitter Profile Photo

🫡Fox, you’ve got a keen eye for detail,👍. The bot isn’t actually leveraging the A record. The threat actor deliberately pulled an IP from the #FBI’s ASN infras —a bold, in-your-face provocation. The real #C2 communication is happening via the TXT record.Stay vigilant,Xlab

🫡Fox, you’ve got a keen eye for detail,👍. The bot isn’t actually leveraging the A record. The threat actor deliberately pulled an IP from the #FBI’s ASN infras —a bold, in-your-face provocation. The real #C2 communication is happening via the TXT record.Stay vigilant,<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨#IOC #Backdoor New low detection #AutoColor samples found on VT, initially exposed by Unit 42 , leverage a zero-detection #C2: update[.]dateplugs[.]com. Happy hunting 🍷 & Stay vigilant ⏰, Xlab

🚨#IOC #Backdoor New low detection  #AutoColor  samples found on VT, initially exposed by <a href="/Unit42_Intel/">Unit 42</a> , leverage a zero-detection #C2: update[.]dateplugs[.]com.  Happy hunting 🍷 &amp; Stay vigilant ⏰, <a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

#IOC Some cool Easter eggs from #DDoS #Botnet 5FA0454DB32325C42EE70186CD5760C2: 📸"dick surgey isn't cheap" & 🚨"Arrest Alex" Bro—oh wait, I guess I should call you sis now 🤣. Did the surgery hurt? Also, please don’t arrest Alex.🙏 Happy hunting 🍷 & Stay vigilant ⏰,Xlab

#IOC Some cool Easter eggs from #DDoS #Botnet 5FA0454DB32325C42EE70186CD5760C2: 
📸"dick surgey isn't cheap" &amp; 🚨"Arrest Alex"
Bro—oh wait, I guess I should call you sis now 🤣. Did the surgery hurt? Also, please don’t arrest Alex.🙏  Happy hunting 🍷 &amp; Stay vigilant ⏰,<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨#IOC #ELF sample (cafbe0a19de0401d895c6d7c7c37f79b) with low detection 4/65 on VT, decrypted to reveal a payload consistent with the classic #Rekoobe #Backdoor, using get.astrarepository[.]com as its #C2. C2 is zero detections.Happy hunting 🍷 & Stay vigilant ⏰,Xlab

🚨#IOC #ELF sample (cafbe0a19de0401d895c6d7c7c37f79b) with  low detection  4/65 on VT, decrypted to reveal a payload consistent with the classic #Rekoobe #Backdoor, using get.astrarepository[.]com as its #C2. C2 is zero detections.Happy hunting 🍷 &amp; Stay vigilant ⏰,<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨 #IOC Identified zero-detection #ELF samples on VT with a VMP-like shell, featuring two uncommon sections🤔. Analysis of the dumped config confirms they are #APT41 #WINNTI #Backdoor. 📸 #C2 👉 {linux|rk|win}.tklolasi.com. Happy hunting 🍷 & Stay Stay vigilant! ⏰ Xlab

🚨 #IOC Identified zero-detection #ELF samples on VT with a VMP-like shell, featuring two uncommon sections🤔.
Analysis of the dumped config confirms they are  #APT41 #WINNTI #Backdoor. 📸 #C2 👉 {linux|rk|win}.tklolasi.com. Happy hunting 🍷 &amp; Stay Stay vigilant! ⏰ <a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

很艰难的一次法国之旅,一落地就病倒了;很有意思的一次聚会,总是惊叹于大佬们的奇思妙想

很艰难的一次法国之旅,一落地就病倒了;很有意思的一次聚会,总是惊叹于大佬们的奇思妙想
Alex. Turing (@turingalex) 's Twitter Profile Photo

#IOC Rubick.ai | AI eCommerce Solutions Your servers are pwned! Attackers are leveraging them to serve up downloads for the #PickAI #backdoor. The #C2's detection rate is practically nonexistent right now. Happy hunting 🍷 & Stay vigilant! 📷Xlab

#IOC <a href="/rubick_ai/">Rubick.ai | AI eCommerce Solutions</a>  Your servers are pwned! Attackers are leveraging them to serve up downloads for the #PickAI #backdoor.  The #C2's detection rate is practically nonexistent right now. Happy hunting 🍷 &amp; Stay vigilant! 📷<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨 #IOC #Backdoor Identified low-detection #ELF samples on VT with a VMP-like shell, 🤔. Analysis of the dumped config confirms they are #NoodleRAT . #C2 📸{ 107.148.33.2 | 43.246.209.83 }📸. Ip 43 affiliated with #APT #Higaisa. Happy hunting 🍷 & Stay vigilant⏰Xlab

🚨 #IOC #Backdoor  Identified low-detection #ELF samples on VT with a VMP-like shell, 🤔. Analysis of the dumped config confirms they are  #NoodleRAT . #C2 📸{ 107.148.33.2  |  43.246.209.83 }📸. Ip 43 affiliated with #APT #Higaisa.

Happy hunting 🍷 &amp; Stay vigilant⏰<a href="/Xlab_qax/">Xlab</a>
Alex. Turing (@turingalex) 's Twitter Profile Photo

🚨#APT #Higaisa Another intriguing discovery was the file 91f0ebb41949f14d16f1c70a4086cb45 utilized #AppImage as a "packing mechanism" to evade static detection🤔. It had only 7/66 on VT, while its extracted payload scored 27/66😅. Happy hunting 🍷 & Stay vigilant⏰ Xlab

🚨#APT #Higaisa Another intriguing discovery was the file 91f0ebb41949f14d16f1c70a4086cb45 utilized #AppImage as a "packing mechanism" to evade static detection🤔. It had only 7/66 on VT, while its extracted payload scored 27/66😅.

Happy hunting 🍷 &amp; Stay vigilant⏰ <a href="/Xlab_qax/">Xlab</a>