🌃Zerophage🌌 (@zerophage1337) 's Twitter Profile
🌃Zerophage🌌

@zerophage1337

Independent researcher focusing on threat intelligence and exploit kits. 😉

ID: 736664966980308992

linkhttps://zerophagemalware.com/ calendar_today28-05-2016 21:06:29

406 Tweet

3,3K Takipçi

339 Takip Edilen

Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2020-03-04: 🆕🔥"Breaking #TA505’s #Crypter with SMT Solver" h/t sysopfb 🔦Using Satisfiability Modulo Theories (SMT) solver to break the latest variant of the crypter being used on #Get2 Crypter Overlap➡️TA505 leveraging #Clop/CryptoMix & #MINEBRIDGE labs.sentinelone.com/breaking-ta505…

2020-03-04: 🆕🔥"Breaking #TA505’s #Crypter with SMT Solver" h/t <a href="/sysopfb/">sysopfb</a> 

🔦Using Satisfiability Modulo Theories (SMT) solver to break the latest variant of the crypter being used on #Get2

Crypter Overlap➡️TA505 leveraging #Clop/CryptoMix &amp; #MINEBRIDGE

labs.sentinelone.com/breaking-ta505…
James (@james_inthe_box) 's Twitter Profile Photo

Pretty cool #highjacker targeting Barclays Bank ; thanks to 🌃Zerophage🌌 for the vbs: 1st stage: app.any.run/tasks/97c94b9e… 2nd stage: app.any.run/tasks/4f6da57f… c2: casaconceitoltda[.]info

Pretty cool #highjacker targeting <a href="/Barclays/">Barclays Bank</a> ; thanks to <a href="/Zerophage1337/">🌃Zerophage🌌</a> for the vbs:

1st stage:
app.any.run/tasks/97c94b9e…

2nd stage:
app.any.run/tasks/4f6da57f…

c2: casaconceitoltda[.]info
reecDeep (@reecdeep) 's Twitter Profile Photo

⚠️#TA505 #malware as #COVID2019 #COVID19 #COVIDー19 ☣️ hxxp://www.0202.com.tw/~miki/9dwjrv/1mumq.html POST: hxxps://dysoool.]com/casemd Vitali Kremez KW AdamTheAnalyst stoerchl merlos JAMESWT_MHT Matteo Lodi Bl4ng3l #infosec #CyberSecurity #ThreatIntelligence

⚠️#TA505 #malware as #COVID2019 #COVID19 #COVIDー19 ☣️

hxxp://www.0202.com.tw/~miki/9dwjrv/1mumq.html

POST: hxxps://dysoool.]com/casemd

<a href="/VK_Intel/">Vitali Kremez</a> <a href="/Nzc2ZjZjNjY/">KW</a> <a href="/AdamTheAnalyst/">AdamTheAnalyst</a> <a href="/stoerchl/">stoerchl</a> <a href="/merlos1977/">merlos</a>  <a href="/JAMESWT_MHT/">JAMESWT_MHT</a> <a href="/matte_lodi/">Matteo Lodi</a> <a href="/Bl4ng3l/">Bl4ng3l</a>
 
#infosec #CyberSecurity #ThreatIntelligence
MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile Photo

There's a Coronavirus themed ransomware, that actually encrypts. Encrypted files gets name: %email address%___%original filename & ext% Note: CoronaVirus.txt "Donations to the US presidential elections are accepted around the clock." 🤔 Michael Gillespie cc Vitali Kremez

There's a Coronavirus themed ransomware, that actually encrypts.
Encrypted files gets name: %email address%___%original filename &amp; ext%
Note: CoronaVirus.txt
"Donations to the US presidential elections are accepted around the clock."
🤔
<a href="/demonslay335/">Michael Gillespie</a>
cc <a href="/VK_Intel/">Vitali Kremez</a>
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2020-03-18:🆕[Intel Corner]📺 My Perspective on #CoronaVirus Outbreak: #Cybercrime View | Exploiting FUD & Corona Outbreak for Cybercrime | No Honor Among Thieves Help Defend Healthcare as Needed for Time Being to Thwart Disruption youtube.com/watch?v=1Komgg…

0verfl0w (@0verfl0w_) 's Twitter Profile Photo

[Beginners] I recently noticed an IcedID campaign using DLLs as initial loaders, rather than EXEs - as DLL unpacking isn't quite as simple as EXE unpacking, I decided to do a quick write-up on how to unpack them! You can grab the sample from VirusBay! 0ffset.net/reverse-engine…

DynamicAnalysis (@dynamicanalysis) 's Twitter Profile Photo

#ZLoader malspam from today with new downloader URLs: hxxp://nevefe.com/wp-content/themes/calliope/wp-front.php hxxp://lakeviewbinhduong.com.vn/wp-content/themes/calliope/wp-front.php Both redirect to DLL at: hxxp://176.96.238.22/f.dll

#ZLoader malspam from today with new downloader URLs:

hxxp://nevefe.com/wp-content/themes/calliope/wp-front.php

hxxp://lakeviewbinhduong.com.vn/wp-content/themes/calliope/wp-front.php

Both redirect to DLL at:

hxxp://176.96.238.22/f.dll
Johannes Bader (@viql) 's Twitter Profile Photo

I just published a blog post on the domain generation algorithm of Zloader: johannesbader.ch/blog/the-dga-o… #dga #zloader

Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2020-05-26:🎇I am beyond thrilled to 🗣️present on top-tier current #cybercrime group🇷🇺#TrickBot & state-sponsored for-profit #APT operations nexus🇰🇵#Lazarus @ personal favorite European conference 🇵🇱confidenceconf now online format "CONFidenceONline2020" confidence-conference.org/confi_online.h…

2020-05-26:🎇I am beyond thrilled to 🗣️present on top-tier current #cybercrime group🇷🇺#TrickBot &amp; state-sponsored for-profit #APT operations nexus🇰🇵#Lazarus @  personal favorite European conference 🇵🇱<a href="/CONFidenceConf/">confidenceconf</a> now online format "CONFidenceONline2020"
confidence-conference.org/confi_online.h…
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2020-06-08: 🆕🐍#SNAKE/#EKANS #Ransomware | Possible Honda Lockdown Incident RW References to Honda: 1⃣Honda ISP ("AHMC") 🇺🇸IP "170.108.71. 153" 2⃣"MDS. HONDA. COM" Check Source: C:/Users/Admin3/go/src/.../<RAND>.go MalwareHunterTeam BleepingComputer

2020-06-08: 🆕🐍#SNAKE/#EKANS #Ransomware |
Possible <a href="/Honda/">Honda</a> Lockdown Incident

RW References to Honda:
1⃣Honda ISP ("AHMC") 🇺🇸IP "170.108.71. 153"
2⃣"MDS. HONDA. COM" Check

Source:
C:/Users/Admin3/go/src/.../&lt;RAND&gt;.go

<a href="/malwrhunterteam/">MalwareHunterTeam</a> <a href="/BleepinComputer/">BleepingComputer</a>
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2020-07-08:🎇[Exciting] Introducing VK Intel: Digital Forensics & Incident Response: "VK Intel: Digital Forensics & Incident Response" due to multiple requests & business demand😉 ✅Immediate & efficient incident response focusing on breaches & #ransomware Contact & file DFIR/malware ticket👇 vk-intel.com

2020-07-08:🎇[Exciting] Introducing <a href="/vk_dfir/">VK Intel: Digital Forensics & Incident Response</a>: "VK Intel: Digital Forensics &amp; Incident Response" due to multiple requests &amp; business demand😉

✅Immediate &amp; efficient incident response focusing on breaches &amp; #ransomware

Contact &amp; file DFIR/malware ticket👇
vk-intel.com
David Ledbetter (@ledtech3) 's Twitter Profile Photo

Since I couldn't really find any information on #ursa #loader here is a new blog post with 3 rabbit holes on the obfuscation and file extraction. pcsxcetrasupport3.wordpress.com/2020/08/10/urs…

Moxie Marlinspike (@moxie) 's Twitter Profile Photo

A few months ago Cellebrite announced that they would begin parsing data from Signal in their extraction tools. It seems they're not doing that very carefully. Exploiting vulnerabilities in Cellebrite's software, from an app's perspective: signal.org/blog/cellebrit…

Fabian Wosar (@fwosar) 's Twitter Profile Photo

Some researchers are propagating, that since a large number of victims hit during the REvil Kaseya attack were hit with the same public key, only one victim paying the ransom will be enough to decrypt all victims. Let's talk about that.