ShadowOpCode

633 posts

ShadowOpCode banner
ShadowOpCode

ShadowOpCode

@ShadowOpCode

Malware analyst & reverse engineer 🧠 Threat intel on stealers, RATs, live campaigns 🕵️ Technical analysis. No buzzwords. 📍DM open for research collabs

Katılım Mayıs 2025
161 Takip Edilen997 Takipçiler
ShadowOpCode
ShadowOpCode@ShadowOpCode·
malspam campaign in 🇮🇹📧 .bat creates persistence with HTA file 👇 powershell.exe uses XOR and AES with key SHA256(salt+"phazzy Lee") to decrypt a shellcode (Donut?) 👇 🐚Shellcode injected in explorer.exe 👇 Dynamic API resolver 👇 🦠XWorm 👇 📡C2: 69.61.36[.]229:2080 bazaar 👇
ShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet media
English
3
4
15
637
ShadowOpCode
ShadowOpCode@ShadowOpCode·
"Conferma richiesta premio GARMlN" hxxps://prolificrevokement[.]space hxxps://prizeonlines[.]com/ @illegalFawn
ShadowOpCode tweet mediaShadowOpCode tweet media
0
2
6
554
ShadowOpCode
ShadowOpCode@ShadowOpCode·
"v_mail-202603<RANDOM>.mp3" 👇 HTML attached 👇 larozada[.]com (wordpress likely compromised) 👇 wispy-fly-84775382[.]figma[.]site (fake Voicemail) 👇 foxrofhschiid[.]com (O365 exfiltration)
ShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet media
English
0
2
7
579
JAMESWT
JAMESWT@JAMESWT_WT·
New #Click-Fix Variant / webdav / workflow Some Related Samples +extra 👇 bazaar.abuse.ch/browse/tag/185… AnyRun Zip app.any.run/tasks/9af568c0… Triage Zip tria.ge/260221-2ety2ae… Msi tria.ge/260201-sfg67ae… cc @1ZRR4H @ShadowOpCode @k3dg3
JAMESWT tweet mediaJAMESWT tweet media
The Hacker News@TheHackersNews

⚠️ A new ClickFix variant abuses Win+R to mount a remote WebDAV drive and run malware. It launches a trojanized WorkFlowy Electron app that beacons to C2 every 2 seconds. @Atos says it bypassed Microsoft Defender and surfaced only through threat hunting. 🔗 Inside: WebDAV trick + ASAR injection → thehackernews.com/2026/03/invest…

English
3
3
29
6K
ShadowOpCode
ShadowOpCode@ShadowOpCode·
Malspam campaign targeting 🇮🇹 users "Avviso urgente: fattura scaduta - sospensione imminente" postmaster@dsignit[.pt 👇 termo[.traduccionesrenace[.com 👇 hxxps://strong-emerald-cheetah[.31-22-7-102[.cpanel[.site/invoice/ 👇 /invoice/quick-payment.php 👇 hxxps://lucky2lucky[.com/
ShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet media
English
0
4
14
1.1K
ShadowOpCode
ShadowOpCode@ShadowOpCode·
🚨ALERT🚨 New #phishing campaign #PagoPA in Italy to harvest credit card data hxxps://anisatransport[.co[.ke/wp-content/id/pagopa/log/msdpweb/index.php ⚠️exposing phishing admin panel without authentication⚠️ 🤖Telegram bot in the admin panel
ShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet mediaShadowOpCode tweet media
English
0
6
16
1.3K
ShadowOpCode
ShadowOpCode@ShadowOpCode·
hxxps://pub-4c182737706e41d29aee6cc5517f834d[.r2.dev/img_163200.png C2: hxxps://officedesk2026[.4nmn[.com:1709
Filipino
0
0
2
169
ShadowOpCode
ShadowOpCode@ShadowOpCode·
hxxps://pub-e6f64f05a00d4309aec9508777bc43bc[.r2.dev/img_181532.png hxxps://ia601609.us[.archive.org/5/items/msi-pro-with/MSI_PRO_with.png hxxps://ia601409.us[.archive.org/19/items/optimized_msi_20260303_1054/optimized_MSI.png more👇
HT
1
0
2
178
ShadowOpCode
ShadowOpCode@ShadowOpCode·
@D3LabIT UpCrypter is injecting two malwares inside InstallUtil.exe and MSBuild.exe. The one in MSBuild (and at this stage is no more UpCrypter) is doing connections to webdot[.]ddns[.]net which was already pointed out by FORTINET in this report: fortinet.com/blog/threat-re…
ShadowOpCode tweet mediaShadowOpCode tweet media
English
1
0
4
142
D3Lab
D3Lab@D3LabIT·
🚨 Distribuito il malware #UPcrypter in #Italia Email: “Nuovo ordine 2026” con allegato HTML malevolo. Apertura → redirect → JS offuscato → download payload → contatto C2. IOC: mandatechgroup[.]com/ai/ eventul[.]com/it/i[.]php JS: 06ba9a11d693b8ab94e61f696e46faaf
D3Lab tweet mediaD3Lab tweet media
Italiano
5
5
22
1.8K
matac
matac@matacmalware·
@D3LabIT Ci sono altri IoC?
Italiano
1
0
0
21