.

158 posts

. banner
.

.

@__0XYC__

Security Researcher

Katılım Nisan 2020
32 Takip Edilen814 Takipçiler
.
.@__0XYC__·
bank details.tar 8887b47d43df80b63f5802f86a5ed149 ravels[.]in Interesting headers! #APT
. tweet media
English
1
4
11
1.1K
.
.@__0XYC__·
NEW ORDER 2026.03.02 KYUNG SUNG.xls c6e8e9266a822905211f3e26def6a3f7 #APT
. tweet media
Filipino
2
4
10
830
Namecheap.com
Namecheap.com@Namecheap·
@__0XYC__ Hello! It seems the domain name grabfiles[.]net is neither registered nor hosted with us, the report should be forwarded to the current Registrar or hosting provider. Thanks!
English
1
0
1
92
.
.@__0XYC__·
Pension Guide 2026.pdf hXXps://swo-gov-pk.grabfiles[.]net/52863484/adobe-reader @Dynadot hope you aren't as dead as your report abuse form! phishing campaign mail-pk[.]org CC @Namecheap #APT
. tweet media. tweet media
English
2
7
16
9.4K
. retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
ESET Research uncovered GhostChat, an Android spyware campaign using romance-scam tactics to target individuals in Pakistan. The campaign uses fake profiles (likely operated via WhatsApp), while the spyware exfiltrates victim data. welivesecurity.com/en/eset-resear…
Virus Bulletin tweet media
English
0
14
47
4.6K
.
.@__0XYC__·
hxxps://mzrakq.short[.]gy/A6tpOv redirects to hxxps://zimbra10-nml3wp-max8143-fn1rsf7l.leapcell[.]dev/login.html?gfjdliotrgojnghgherbegrehureert0e0ee #APT #phishing cc @short_io TA IP 203.124.34.84 🥱
. tweet media
English
2
4
7
3.5K
.
.@__0XYC__·
hXXps://myworkdrivemanager[.]org/uploads/GSR_Requirements.zip pwd: GSR@71 uses schtasks to download next stage from hXXps://nexnxky[.]info , geofenced targeted campaign #APT #LNK
. tweet media
English
2
5
31
4.2K
.
.@__0XYC__·
Email > pdf > Cloudflare > dl[.]vlc-services[.]cfd > password protected zip > .lnk + hXXps://nadracloudx.pages[.]dev/?0EmMmV2NmhjRyUCZmNmLzV2YpZnclNXLjxmduwGZGJTJGJTJBNTJzBHd0hmO6QWa password: DIA@2025! @Cloudflare  @namesilo #APT
. tweet media. tweet media
Indonesia
2
3
7
2.5K
.
.@__0XYC__·
Some #APT hXXps://fileonlinetransfer[.]center/Defence/Requirements.rar pwd:  Xcd@34VFDf
. tweet media
English
1
4
12
7.9K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Okay, no. Let's explain. So we have this "Brief on National Security 5th November 2025 & Minutes of Meeting\.zip" archive: 436c07ee636be7bd5d98db9612343923cb96e4d5e97ba86586575594f75d6714 Inside there is a "Brief on National Security 5th November 2025.PDF.exe", which is a renamed "pack200.exe", that is legit and signed (this is on the screenshot in his tweet). The actors simply decided to used that to load their malicious "jli.dll" file: 96964582c71caa0e19d06f1634e2324b323f3a45fe8b04227c6074fa36efb335 Payload is Remcos RAT. C2 domain: appsupdate[.]xyz - already has some detections. The IP the domain is currently resolving to: 93.127.132[.]225 - more detections, tagged as Remcos C2 already a few days ago too. 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
5
4
16
6.3K