imp0rtp3

179 posts

imp0rtp3

imp0rtp3

@imp0rtp3

Security Researcher, Threat Intelligence And Malware Analysis for fun. CTI Team Leader in @Fortinet. Keybase: imp0rtp3 Mastodon: @[email protected]

Katılım Haziran 2021
292 Takip Edilen794 Takipçiler
imp0rtp3
imp0rtp3@imp0rtp3·
@WhichbufferArda Nice Find, 5.199.162[.]72 170.64.180[.]66 Related to same infrastructure
English
0
0
1
63
Arda Büyükkaya
Arda Büyükkaya@WhichbufferArda·
a8d1b963b5de74e24733fd6766dd9082e091a19143525675208b7222111f03da
Português
1
0
1
557
Arda Büyükkaya
Arda Büyükkaya@WhichbufferArda·
#APT #Gamaredon Malicous HTA files contains Base-64 Encoded VBscript 6bd8ff39e46e501c7d3ece116861121207741abb92f5e12a527cdf8b7c2c4cb8 9e1d16b50209d83aaa92ad8391982d99a9cee280e51cfe2c5b9c080599697837 C2: t[.]me/s/oearps 137[.]184[.]2[.]98/jug/71[.]aif?=Function
Arda Büyükkaya tweet media
Français
1
19
62
14.3K
imp0rtp3
imp0rtp3@imp0rtp3·
TA was less careful with the windows samples - left us some clues: - GBK (Chinese) encoding of the computer info (later changed to utf-8) - UTC+8 compile time string inside sample (exactly 8 hours ahead of PE compile time)
imp0rtp3 tweet media
English
1
0
1
448
imp0rtp3
imp0rtp3@imp0rtp3·
New IPs related to the TA exploiting #CVE_2022_42475: 139.99.35[.116 139.99.37[.119 194.62.42[.105 45.86.231[.71 45.86.229[.220 185.250.149[.32 137.175.30[.138 146.70.157[.133 155.138.220[.254 #JA3: bf2b95ac267823f6588b2436bc537b26
English
1
13
33
7.4K
imp0rtp3
imp0rtp3@imp0rtp3·
Advisory of #CVE_2022_42475 (FortiOS SSL-VPN RCE) updated with additional IPs of the threat actor exploiting it: 139.180.184[.]197 66.42.91[.]32 158.247.221[.]101 107.148.27[.]117 139.180.128[.]142 155.138.224[.]122 185.174.136[.]20 fortiguard.com/psirt/FG-IR-22…
English
0
5
14
1.7K
imp0rtp3 retweetledi
Karsten Hahn
Karsten Hahn@struppigel·
Undetected PyInstaller stealers on Virustotal Search for behaviour:"mdvksublbpczqluqvvbytfprxdwakuke"
Karsten Hahn tweet media
Eesti
1
27
83
0
imp0rtp3
imp0rtp3@imp0rtp3·
IoCs: sha256 - edfe81babf50c2506853fd8375f1be0b7bebbefb2e5e9a33eff95ec23e867de1 hxxp://mblogci3rudehaagbryjznltdp33ojwzkq6hn2pckvjq33rycmzczpid[.]onion hxxp://monti5o7lvyrpyk26lqofnfvajtyqruwatlfaazgm3zskt3xiktudwid[.]onion/chat/c7c5b8b0703950c40e6614bf957f94c1
imp0rtp3 tweet media
Suomi
1
0
3
0
imp0rtp3
imp0rtp3@imp0rtp3·
New rebranded #Conti #Ransomeware Linux & ESXi locker surfaced on VT as #Monti. Almost identical to previous versions of Conti. Added cmdline argumens --detach --size, --file (latter unused). We wrote about previous campaign on September (YARA included): fortiguard.com/threat-signal-…
imp0rtp3 tweet media
English
3
14
51
0
imp0rtp3 retweetledi
Lorenzo Franceschi-Bicchierai
NEW: Cybersecurity startup Corellium gave trials to NSO Group and DarkMatter. It also sold to cellphone cracking firms Cellebrite and Elcomsoft in Russia, as well as Pwnzen, a hacking firm with ties to China's government, according to a leaked document. wired.com/story/corelliu…
English
6
163
354
0