Squiblydoo

1.8K posts

Squiblydoo banner
Squiblydoo

Squiblydoo

@SquiblydooBlog

Malware Analysis Creator of Debloat, certReport, and https://t.co/hEJGt0jzIq Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9

The Cert Graveyard Bergabung Kasım 2020
94 Mengikuti4.6K Pengikut
Squiblydoo
Squiblydoo@SquiblydooBlog·
@rmoskovy Can you help me understand the 2025 date on the post? Is the whole post new or just a portion of it?
English
1
0
0
235
Squiblydoo
Squiblydoo@SquiblydooBlog·
@andrewdanis An actor had obtained a certificate from Certum the same month for the same company. It was used to sign ZhongStealer.
Squiblydoo tweet media
English
0
0
1
15
andrew danis
andrew danis@andrewdanis·
Appears to be a .NET browser search hijacker, specifically looks for MSEdge running on host, installs malicious chrome extension. IoC's: s.speedtoolmetrics[.]com search.connectionperformance[.]com
andrew danis tweet mediaandrew danis tweet media
English
1
1
8
266
Squiblydoo
Squiblydoo@SquiblydooBlog·
"gozofeliz4-guerrainfinita.exe" signed "ZHEJIANG WILLING FOREIGN TR CO MAKİNA TİCARET LİMİTED ŞİRKETİ" 808fa714b5308a813df21094c1f8e8b0 "gozofeliz4-guerrainfinita.exe" signed by "Lway Firmware" f13b26c2d4c8f1d536519b947c7300e0 what could go wrong C2: pinpadat[.]com
English
0
3
10
763
Squiblydoo
Squiblydoo@SquiblydooBlog·
Reported to CertGraveyard: 143fa9567ebbccacceb58201dd85b7206fdf22882ff2cea0da994a513572f14e signed by "Mann Technologies LLC" Fake Citrix installer, FUD on VirusTotal, installs Zoho Meeting.
Squiblydoo tweet mediaSquiblydoo tweet media
English
2
7
23
2.3K
Squiblydoo
Squiblydoo@SquiblydooBlog·
"Certificado_2026_283821345.exe" signed by "Mariah Lingle" Uploaded to MalwareBazaar by @johnk3r C2: oficiospolicia[.]com 1/61 detections on VT Added to the CertGraveyard
Squiblydoo tweet media
English
0
2
12
862
Squiblydoo
Squiblydoo@SquiblydooBlog·
@luke92881 I saw the comments, but I'm also having difficulty validating what activity NovaViewer does to help justify reporting the certificate.
English
2
0
2
170
Squiblydoo
Squiblydoo@SquiblydooBlog·
AnyRun themselves are using this to build out their automated analysis around phishing; once decrypted, they run Suricata rules against the traffic and easily identify malicious JavaScript and traffic. Used for analysis and it goes into their intel feed. 2/3
Squiblydoo tweet media
English
1
1
11
817
Squiblydoo
Squiblydoo@SquiblydooBlog·
Nice update to @anyrun_app that seems easy to miss: HTTPS decryption. If you look at the network traffic, click Network Threats, you can click into the analysis to see the decrypted traffic You can also just download the entire decrypted PCAP. 1/3
Squiblydoo tweet mediaSquiblydoo tweet media
English
1
18
80
6.9K
Squiblydoo
Squiblydoo@SquiblydooBlog·
@malwrhunterteam Certificate reported. Uploaded to Triage for analysis and available for others to download: tria.ge/260316-qyhvbsg… Also made available on Mega NZ: #Id-ichinwCbfOOCJHT-USys2xO4hnxf32XXCxtWLagM" target="_blank" rel="nofollow noopener">mega.nz/file/tntjDKpY#…
English
0
0
4
2.4K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
There are these totally legit sites: https://tralert[.]online/ https://tralert7[.]com/ You can be sure that the "AgilusTech LLC" (SSL Corp given cert) signed files that are coming from these sites are also very legit, totally not malicious, but especially no North Korean malware can be found in them... 😂 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
4
9
29
4.7K
Squiblydoo me-retweet
Who said what?
Who said what?@g0njxa·
A kind message from threat actors, not funny))
Who said what? tweet media
Who said what?@g0njxa

⚠️Watch out for a SEO poisoning campaign impersonating VMware vSphere downloads leveraging MeshCentral RMM tool bundled into fake installers targeting enterprise environments. Sample: dbfe1f915f40122a336cd5d0de802a6f3ec0204ab75321934a06dafbc1964446 Detonation: app.any.run/tasks/e0937ead… From malicious search results -> vmware-vsphere[.]com (associates, vmwarevsphere[.]com, vmware-remote-console[.]com, remote-console-vmware[.]com, vsphere-client[.]com, vsphere-client[.]org ) leading to vmware-repository[.]com A malicious build with EV signature issued to malicious signer "Pacex Learning Private Limited" (Globalsign) is delivered from Dropbox. The build connects to 103.65.230.86 (MeshCentral RMM C2) and installs legit VMware product as decoy

English
2
3
27
3.7K
Squiblydoo me-retweet
Who said what?
Who said what?@g0njxa·
⚠️Watch out for a SEO poisoning campaign impersonating VMware vSphere downloads leveraging MeshCentral RMM tool bundled into fake installers targeting enterprise environments. Sample: dbfe1f915f40122a336cd5d0de802a6f3ec0204ab75321934a06dafbc1964446 Detonation: app.any.run/tasks/e0937ead… From malicious search results -> vmware-vsphere[.]com (associates, vmwarevsphere[.]com, vmware-remote-console[.]com, remote-console-vmware[.]com, vsphere-client[.]com, vsphere-client[.]org ) leading to vmware-repository[.]com A malicious build with EV signature issued to malicious signer "Pacex Learning Private Limited" (Globalsign) is delivered from Dropbox. The build connects to 103.65.230.86 (MeshCentral RMM C2) and installs legit VMware product as decoy
Who said what? tweet mediaWho said what? tweet mediaWho said what? tweet media
English
3
22
71
10.6K
Squiblydoo
Squiblydoo@SquiblydooBlog·
@JAMESWT_WT @smica83 @500mk500 I myself am not convinced that the certs "Amy Cherne" and "Donald Gay" are being used exclusively by MuddyWater, I think they are still being used for some Russian cybercrime. While they could be trying to blend in with Cybercrime, it looks more like certificate sharing.
English
0
1
6
229
Squiblydoo
Squiblydoo@SquiblydooBlog·
@Kostastsale Glad you're giving it a spin. I used it for Speakeasy's emulation, but hadn't thought about using it for memory dumps. I'll be looking forward to hearing what you do with it.
English
1
0
3
747
Kostas
Kostas@Kostastsale·
Testing the new GPT-5.4 inside REMnux with real malicious artifacts, memory dumps, and the custom analysis skill I built for it. Honestly… this is next level. The speed at which it pivots through artifacts, correlates behavior, and surfaces relevant findings is something I haven’t seen before. Still early testing, but very impressive so far.
Kostas tweet media
English
11
20
199
14.6K
Squiblydoo
Squiblydoo@SquiblydooBlog·
@d4rksystem @luke92881 I've personally had good success with it. I've instructed it to do things like use Speakeasy etc; stuff that I myself hadn't learned to use well. It can dump a file or domain for additional analysis easily. I don't have the volunteers I need, so it fills a gap.
English
0
0
1
83
Squiblydoo
Squiblydoo@SquiblydooBlog·
"NotAWord.exe" signed "Astro Bright LTD" MD5: 7be1f9a968c5b1567570e12738392d7c Yet Another PDF Application (YAPA) App contains reversed and chunked domains. I'm now using Remnux MCP to generate reports for these apps and confirming the findings. 1/2
Squiblydoo tweet mediaSquiblydoo tweet media
English
3
6
16
2.6K
Squiblydoo me-retweet
Who said what?
Who said what?@g0njxa·
News - February 19, 2026 Five residents of Yugra, the Republic of Komi, and the Tyumen region, aged 21 to 36 (Russia 🇷🇺) are accused of spreading malware worldwide and will face trial. "The criminals engaged in illegal activities from September 2021 to May 2022. The organizer ,a 21 year old resident of Surgut, involved four accomplices in the criminal scheme through closed communities" "On a popular video hosting platform, the accomplices posted videos in which they offered to download a program under the guise of game add-ons, supposedly giving a gaming advantage. Users, by clicking on the links specified in the description, downloaded not only the plug-in but also a malicious application that did not require installation and ran covertly on their computers. This allowed the defendants to gain access to the players' personal data. Then the accomplices collected various information about the citizens and handed it over to unidentified individuals for a fee. According to investigators, more than a thousand computers belonging to users not only from Russia, but also from countries near and far abroad, were infected." Source: t.me/police_ugra/89… Summarizing, caught after committing crimes spreading infostealers on YouTube as game cheats 4 years ago. It is interesting to see the images that police officers shared, showing the devices seized, but most important the two telegram screenshots showing a chat (with images of a Redline stealer advertisement) and also a screenshot of a bot of a traffer team (MMM) that I tried to profile it a bit in the past here -> @g0njxa/profiling-%D1%82%D1%80%D0%B0%D1%84%D1%84%D0%B5%D1%80%D1%8B-ghostbusters-mmm-0a0c341533c2" target="_blank" rel="nofollow noopener">medium.com/@g0njxa/profil… As I show in the blog, MMM team offered META (the Redline stealer variant that had no GEO block and could have stolen information from all computers worldwide) to their "workers". As police details, this cybercriminals spread the builds to generate infostealer logs (shown in the screenshot in zip format) for the usage on further criminal activities This traffer team closed, their administrator started developing and selling their new malware solution (D3F@CKLoader malware) and then become GlobalMan, one of the biggest EV cert sellers. No further information about this old traffer team is provided
Who said what? tweet mediaWho said what? tweet mediaWho said what? tweet mediaWho said what? tweet media
English
1
12
62
5.1K