MalwareHunterTeam

71K posts

MalwareHunterTeam banner
MalwareHunterTeam

MalwareHunterTeam

@malwrhunterteam

Official MHT Twitter account. Check out ID Ransomware (created by @demonslay335). More photos & gifs, less malware.

Earth. Katılım Ekim 2014
37 Takip Edilen250.4K Takipçiler
Sabitlenmiş Tweet
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
So many shits in 2025... but still nothing really big, interesting, exciting... Let's see 2026. I not want to wait much more... 😂 🤷‍♂️
English
1
4
22
30.9K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
🤷‍♂️
Moonlock Lab@moonlock_lab

1/ New #macOS samples, 0 detections on VT as of writing, but multiple artifacts suggest Sliver-like HTTP(S) C2. Shared by @malwrhunterteam. What stood out: procedural URL patterns, PNG-wrapped network payloads, no plaintext IOCs, and wazero/WASM-related execution. More below👇

ART
0
0
5
1.6K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
@SinghSoodeep Seen some .lnk samples like this in past days, but not knew the source of them... Thanks.
English
0
0
1
141
Sudeep_Singh
Sudeep_Singh@SinghSoodeep·
New ClickFix instance abusing TON blockchain to fetch C2 server address Attacker registered domain masquerades as @bookingcom and uses #ClickFix social engineering technique to execute PowerShell command line ClickFix -> PowerShell -> downloads node.exe -> decrypts and executes JavaScript -> C2 domain fetch from TON blockchain -> encrypted C2 communication Similar attack chain delivered via Windows LNK file as well. LNK MD5 hash: 99e00fe729159d4538309e3cb069ff14 PowerShell script MD5 hash: fe86223148f9bcf013d37db3a8fb11f8 Malicious domain: bokphotguest[.]pro TON smart contract: c66119f0e5635c4380441d7a79baf0c02a0ab7ea6cd78de06507fc5dc2c1a5d9 Calls get_domain method of the deployed smart contract on TON blockchain to retrieve the C2 domain TTPs have overlap with Tsundere botnet and EtherRAT however abusing TON blockchain in this case. @YungBinary @iphelix @malwrhunterteam #threatintel
Sudeep_Singh tweet mediaSudeep_Singh tweet media
English
1
3
17
1.1K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
185.241.208[.]147 "1337 Services GmbH" 😂 🤷‍♂️
MalwareHunterTeam tweet media
Deutsch
1
1
12
3K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
api.weatherchecker[.]live 🤷‍♂️
MalwareHunterTeam tweet media
English
1
2
13
7.9K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
@1ZRR4H The machine looks still infected today... no one can help? 🤷‍♂️
English
1
1
3
1.6K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
With @1ZRR4H's help, noticed that a machine that is communicating with a C2 belongs to "Beijing Marine Communication & Navigation Company", and possibly 500+ files got stolen from it. From the name, it could be at least a little serious. Anyone has a contact there?
English
1
7
13
5.6K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Looks like VT is more and more becoming a tool for actors that can be used to help convince their targets into thinking that their malware is not malware... 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
0
1
17
2.9K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Was too busy so missed to update: the samples are too big for Bazaar (it's 2026 and 100MB is still too much 🤷‍♂️) so @smica83 couldn't upload as he usually does. But at least @SquiblydooBlog uploaded one to Mega too for anyone to download: x.com/SquiblydooBlog…
Squiblydoo@SquiblydooBlog

@malwrhunterteam Certificate reported. Uploaded to Triage for analysis and available for others to download: tria.ge/260316-qyhvbsg… Also made available on Mega NZ: #Id-ichinwCbfOOCJHT-USys2xO4hnxf32XXCxtWLagM" target="_blank" rel="nofollow noopener">mega.nz/file/tntjDKpY#…

English
0
1
4
2.1K
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
There are these totally legit sites: https://tralert[.]online/ https://tralert7[.]com/ You can be sure that the "AgilusTech LLC" (SSL Corp given cert) signed files that are coming from these sites are also very legit, totally not malicious, but especially no North Korean malware can be found in them... 😂 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
4
9
29
4.7K