Felipe Duarte

1.7K posts

Felipe Duarte banner
Felipe Duarte

Felipe Duarte

@dark0pcodes

Malware researcher, CEH, GREM, electronics geek, IoT enthusiast, programmer, drone lover and machine learning fan. Just hunting malware for fun... and profit!

Bogotá, D.C., Colombia Beigetreten Ağustos 2017
745 Folgt2.8K Follower
Felipe Duarte retweetet
Nicolas Krassas
Nicolas Krassas@Dinosn·
I built an open-source library of 700+ cybersecurity skills for AI coding agents -- covers DFIR, threat hunting, cloud security, and more github.com/mukul975/Anthr…
English
66
590
3.1K
187.4K
Felipe Duarte retweetet
0b1d1
0b1d1@_0b1d1·
🚨 SOC Playbook Complete Phishing Investigation Guide 🚨 🎯 From Inbox to Incident Closure: Mastering Phishing Defense Phishing continues to be the leading initial compromise method in modern cyber breaches 📧Comment PDF for full Guide
0b1d1 tweet media
English
648
186
1.1K
96.2K
Felipe Duarte
Felipe Duarte@dark0pcodes·
@colCERT Campaña activa de Phishing. Redirect: hxxps://pgsmit[.]fi/multas Phishing: simit-pago[.]cc Ataque inicia con un mensaje de texto que contiene el nombre de la victima.
Felipe Duarte tweet media
Español
0
2
3
214
Felipe Duarte
Felipe Duarte@dark0pcodes·
Things that you only see in malware analysis 🤯 I just unpacked Lumma Stealer, and the first sign to know I nailed it: a warning pop up! A debug message to remind rookie attackers not to self-infect 😂 #MalwareAnalysis #Cybersecurity
Felipe Duarte tweet media
English
3
15
34
2.9K
Felipe Duarte
Felipe Duarte@dark0pcodes·
@Myrtus0x0 Qbot, I analyzed it so hard one time that it would be nice to validate all my conclusions with the source code.
English
0
0
2
118
Myrtus
Myrtus@Myrtus0x0·
If you could see the source code of any malware family, what would it be? 🤔 (full git history too if you want)
English
9
3
6
2.8K
Felipe Duarte
Felipe Duarte@dark0pcodes·
¡Atención! 🚩 Están circulando campañas de distribución del malware Lumma Stealer, usando una técnica tan simple (y estúpida) como peligrosa. Esta campaña afecta especialmente en sitios de streaming llenos de anuncios.
Felipe Duarte tweet mediaFelipe Duarte tweet media
Español
6
47
125
15.6K
Felipe Duarte retweetet
Merl
Merl@Merlax_·
#Malware RAT Operador 🇧🇷 posible Ousaban🤔 - Objetivos 🇧🇷 y posible 🇦🇷 - El panel web parece loguear la actividad al congelar el equipo de la víctima 🤦‍♂️
Merl tweet mediaMerl tweet mediaMerl tweet mediaMerl tweet media
Español
1
14
56
9.4K
Felipe Duarte retweetet
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
You can also leverage @virustotal Enterprise to search for potential C2s related to #LummaC2 based on the redirect page.
RussianPanda 🐼 🇺🇦 tweet media
WatchingRac@RacWatchin8872

#Lumma Possible Lumma C2: -assaultxnh[.site -febnceokwi[.site -jealouskfnn[.site -mountainywj[.site -sunhsinkujh[.site -throaatyinpak[.site -witnesjwuka[.site All nginx default page, all have /api and all Namecheap + Cloudflare Thanks @g0njxa for helping me in this crazy idea

English
8
14
77
12.1K
Felipe Duarte retweetet
Who said what?
Who said what?@g0njxa·
Quick changes on this reCAPTCHA malware campaign now abusing @digitalocean S3 buckets and CDN to still deliver #Lumma Stealer. Similar behavior, Detonation: app.any.run/tasks/02afc68d…
Who said what? tweet mediaWho said what? tweet media
Who said what?@g0njxa

reCAPTCHA malware campaign is now abusing @Vultr S3 buckets and CDN to deliver #Lumma Stealer Detonation: app.any.run/tasks/ccf381f1… Also loading another unidentified binary from /onefreex.com/api/download that only downloads with a custom User Agent: app.any.run/tasks/d9d21810…

English
2
24
77
14.5K
Felipe Duarte retweetet
WatchingRac
WatchingRac@RacWatchin8872·
#Lummac2 With this simple query is possible to find more Lumma C2: #hash%3A51280dabfbc880cdc5f92cc2f4f22c8032de5aba401c3268250a11eeb2df1f73%20AND%20page.url%3A%22%2Fapi%22" target="_blank" rel="nofollow noopener">urlscan.io/search/#hash%3… CC: @banthisguy9349 @NDA0E @BlinkzSec @kddx0178318 @raghav127001 @DaveLikesMalwre @g0njxa @ViriBack @500mk500 @ge0lev
WatchingRac tweet media
Fox_threatintel@banthisguy9349

@RussianPanda9xx I have seen a change! They are not using only .shop domain extensions!

English
1
18
84
11.7K