Shadow Chaser Group

3.1K posts

Shadow Chaser Group banner
Shadow Chaser Group

Shadow Chaser Group

@ShadowChasing1

Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group focused on APT hunt and analysis

Earth 가입일 Nisan 2020
569 팔로잉10.9K 팔로워
고정된 트윗
Shadow Chaser Group
Shadow Chaser Group@ShadowChasing1·
Hi,bro Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group is focus on #APT hunte and analysis I hope you will follow us :-)
English
5
11
53
0
Shadow Chaser Group 리트윗함
JangPro
JangPro@JangPr0·
#APT 3ba252288bde5cd59db0903b26edecd2 d45696ee33baef59ae97d7a54af221d7 > Create bot id: BCryptGenRandom{8} > Authorization: Bearer [A/U-botID] > response data RC4 Key: #RsfsetraW#@EsfesgsgAJOPj4eml; > response data export func name "hello" > load.erasecloud.n-e[.]kr/fwrite.php
JangPro tweet mediaJangPro tweet mediaJangPro tweet mediaJangPro tweet media
English
0
8
34
2.6K
Shadow Chaser Group 리트윗함
Sathwik Ram Prakki
Sathwik Ram Prakki@PrakkiSathwik·
#APT36 Letter to BEL by Def Secy.xlam Letter to Indian Coast Guards by Def Secy.xlam db1b11b63d631e2d0cebdefb322c2e7a cisf[.]ink /mod.pptx /mysite .zip (Password@2025) #HiBit.exe #Golang 53.85MB 2ad4d0a366a51f3c0b70c7967994909f #C2 85.137.249[.]243:8080 CN=shareef @500mk500
Sathwik Ram Prakki tweet mediaSathwik Ram Prakki tweet mediaSathwik Ram Prakki tweet media
Sathwik Ram Prakki@PrakkiSathwik

#APT36 #TransparentTribe #Phishing #APT 1/ ppt regarding DRDO-Larsen & Toubro (L&T) Projects Details.ppam f1b6c9239fc1eb4f777d9cd13d01fc12 defenceindia[.]site BRO_India_Projects_Details.7z ebda2b7bb07893b2315e38cacad352bd VRDE-LandT-Strategic-Collaboration.pptx (gamma decoy)

English
1
8
28
5.1K
Shadow Chaser Group 리트윗함
Sathwik Ram Prakki
Sathwik Ram Prakki@PrakkiSathwik·
#APT36 #TransparentTribe د دفاع وزارت وړاندیز.docm (Ministry of Defense Proposal) #Afghanistan 73f52b47a91aa4a7967e6ad010ee489f Upload from 🇮🇱 and 🇶🇦 #CrimsonRAT zucrohz isavids.exe #C2 dwdada[.]xyz sharemaxme28[.]net 93.127.133[.]106 6898, 9626, 19821, 28168, 35821 @500mk500
Sathwik Ram Prakki tweet media
Sathwik Ram Prakki@PrakkiSathwik

#APT36 #TransparentTribe #APT Office of Public Affairs #Afghanistan opa[.zip 6f0be35d0a9a79f7b827c91d83333a2b XLAM 164f7996b586499ba1ebdb8e10f5581e #CrimsonRAT jivarthr edis.exe fed22809d70062733cd1c34e16b75c05 3a231bcc60569143aa899295e4a5ce8a 61bc43314cbcba044f3d0b7ffcf082d6

Català
2
9
34
4.9K
Shadow Chaser Group 리트윗함
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Lazarus #IoC d6296ad786e76b2dd1d7e6de897491d4 45[.]83.140.55:1244
RedDrip Team tweet media
Italiano
1
8
52
9.8K
Shadow Chaser Group 리트윗함
RedDrip Team
RedDrip Team@RedDrip7·
Suspected #APT #Donot samples VBA uses plenty of comment statements to seperate malicious code which creates scheduled tasks and drops BAT files. cab89ee28820b38d1626806f9c1acb9f e5f0a8b4ab983a1457ec2b0a4bff89eb 04cce783b42af18f9208fe5527fa04a8 shop.gladiolus[.]live
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
2
11
34
4.8K
Shadow Chaser Group 리트윗함
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter trojan 8523f2ff3ff13e510a9bf75665562b3b ashersoftlib[.]com:44908
RedDrip Team tweet mediaRedDrip Team tweet media
English
0
6
38
3.9K
Shadow Chaser Group 리트윗함
Tonmoy
Tonmoy@r3dactt·
Possible DPRK malware downloader, downloads a zip file from kit-haus[.]net/mac-driver Similar persistence mechanism as other 'CDriver' campaign. 0a716920017fba0b70b7295c6d7a06710df38c0d6158a12d3723343919da7fd2 @malwrhunterteam @L0Psec
Tonmoy tweet media
English
2
4
24
3K
Shadow Chaser Group 리트윗함
JangPro
JangPro@JangPr0·
#APT #Kimsuky #Happydoor d9be5226e4df9b95a09ccce5ee675f73 Filename: app.package Mutex: ooooppppoooopppp hxxp://cms.spaceyou.o-r[.]kr/index.php hxxp://erp.spaceme.p-e[.]kr/index.php Screen capture, Keylogging, Mic record, File monitor, etc... x.com/JangPr0/status…
JangPro tweet mediaJangPro tweet mediaJangPro tweet mediaJangPro tweet media
JangPro@JangPr0

#APT 대국민서비스관리운영체계_현장점검_증적(초안).pif 8983ffa6da23e0b99ccc58c17b9788c7 C:\Users\user\AppData\Roaming\AppRoot\app.package upx compressed

English
1
7
22
3K
Shadow Chaser Group 리트윗함
Sathwik Ram Prakki
Sathwik Ram Prakki@PrakkiSathwik·
Similar #LNK from 🇵🇰 _Finance.lnk a617b203a440783a987f454738327e00 #EXE .NET w/ same #C2 185.82.202[.]150 b67530ef2420d45ff61b27e609d1e6cf 947edbaadf96b1bd38df447fda0a99b1 81a83f28a91d92dc3620b71509185585 5d60956bea461e5dcfd4f9e81226433e phost.pdb p4.7.2.pdb WINTEN power4.7.2
Sathwik Ram Prakki tweet media
Savant@WabiSabi777_

Susp Indian #APT Targetting Pak Navy jalaiyt.rar from Pakistan b25bc18bda9be41df2b9ecd2fa6b060196a842bb90ac17bdb03faf1ba6292dad drops _Outreach 2026-27 NHQ.pdf .lnk d53c1a27f692f4320428d849abb21824 interesting chain @malwrhunterteam @smica83 @volrant136 @ElementalX2

English
1
11
26
5.2K
Shadow Chaser Group 리트윗함
Sathwik Ram Prakki
Sathwik Ram Prakki@PrakkiSathwik·
#APT36 (ISO-LNK-BAT) triggers HTA-based #ReverseRAT & #GetaRAT, instead of CrimsonRAT [seen early Dec-2025] commskl.iso 7edf05d02d84b160b39e4e778a226959 commskl.docx.lnk 7f735f1605a54a18072f299a14507a5d #C2 AS14956 172.86.122[.]203:5863 dns.sysdllfile[.]site @500mk500
Sathwik Ram Prakki tweet mediaSathwik Ram Prakki tweet mediaSathwik Ram Prakki tweet mediaSathwik Ram Prakki tweet media
Sathwik Ram Prakki@PrakkiSathwik

#APT36 Latest Deployment Updates.iso cb5fc8584023ec7be2721e45845f5434 LATEST DEPLOYMENT UPDATE.PPTX.LNK 8d6dea4fbc1618a0ab90509e0b70bfaf #CrimsonRAT rgwnshnr wsfcias.exe 191e9e0f6dd48379d084868506a34025 #C2 AS32097 204.12.218[.]202 9916, 14955, 18961, 25226, 37822 @500mk500

English
1
8
32
6.9K
Shadow Chaser Group 리트윗함
Demon
Demon@volrant136·
#APT #Sidewinder targeting #Srilanka #Navy 🇱🇰 Tracked by @Huntio +1 🔗https://mail-navy-lk-43897fyi78945tr78945uio89045iuort89045prt054k[.]pages[.]dev/?username=dglogstaff ref: x.com/volrant136/sta… cc: @500mk500 @MichalKoczwara @malwrhunterteam
Demon tweet mediaDemon tweet mediaDemon tweet mediaDemon tweet media
Demon@volrant136

Ongoing #APT #Sidewinder Campaign targeting #Srilanka #Army and #Defence #sector 1/ Using @Huntio, I have found new exfiltration server found last 4 attacks: slservices-lk[.]com cc: @500mk500 @MichalKoczwara @malwrhunterteam

English
3
4
16
1.8K
Shadow Chaser Group 리트윗함
Yogesh Londhe
Yogesh Londhe@suyog41·
Cyber_Advisory_Review_Checlist_Banking.xlsx.msc ff3a4a0b681644e3c59194e67adbbc9e C2 cdn-pkcert-gov-pk.pages[.dev #IOC
English
1
5
7
1.5K
Shadow Chaser Group 리트윗함
Demon
Demon@volrant136·
#Phishing Air Marshall, Inc. | Purchace Order Doc Tracked by @Huntio 🔗https://office36s-azure365-nzloutook[.]squarespace[.]com/ 🔗https://office-oneshare-file8-osiwin[.]squarespace[.]com/ Exfil to: ⚠️https://submit-form[.]com/u65jenlMI
Demon tweet mediaDemon tweet mediaDemon tweet media
English
1
3
8
1.4K