RedDrip Team

476 posts

RedDrip Team banner
RedDrip Team

RedDrip Team

@RedDrip7

Technical Twitter of QiAnXin Technology, leading Chinese security vendor. It is operated by RedDrip Team which focuses on malware, APT and threat intelligence.

เข้าร่วม Nisan 2018
29 กำลังติดตาม16.6K ผู้ติดตาม
RedDrip Team
RedDrip Team@RedDrip7·
#Malware #DCRAT JS -> powershell extracts loader from remote JPEG -> loader gets DCRAT from Github ("albaluzzgom-byte/032026666") 1bfed54ae970308843d0e55ee96eddd9 (js) 8159845a1821df1e5067703af2fa0fb8 (loader) 05aff2b6242e9b2618ade8d34178d46a (DCRAT) vps30002026.kozow[.com:3000
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
1
12
59
3.6K
RedDrip Team
RedDrip Team@RedDrip7·
Related #APT malware (DLL written in Rust) 9a95078a7a5f1045c61fe95ab308ec3f a70e0e057bb9cc33913ca035fb3a1138 hxxps://support.cc-cvbs-sco.workers[.dev:443/api/analytics/collect hxxps://cms.bahria-edu.workers[.dev:443/api/analytics/collect
RedDrip Team tweet mediaRedDrip Team tweet media
RedDrip Team@RedDrip7

Suspected #APT #Sidewinder VBA macros in .xls downloads EXE + malicous DLL (Rust trojan). Cloudflare workers domain is abused for C2 infra. 753bb1b5d8b879f478babb21ed4d9696 (xls) f310ee836f88cc43d3939f8a88b20495 (dll) *.goldibrowhoami.workers[.dev *.desco-gov-bd.workers[.dev

English
0
11
75
5.7K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter 3ee66f56461fc046f600230d11ebe731 (MSI) f57975b8bc1169b35ae17b975327195e (EXE) hxxps://99media.com[.]pk/scvz zoemagicbook[.]com
RedDrip Team tweet mediaRedDrip Team tweet media
HT
2
8
30
2.7K
RedDrip Team
RedDrip Team@RedDrip7·
Related 7c5116f2412ebcbce7ab99ccfbb2a21a 79ca03e5f149f6cddfbc92262d3f6da9 officesite.onrender[.]com 8b9a7fec4bbb53bb7f9b8c673fd4ab52 mnjkuilhgftrew.baiduwebhost[.]com
RedDrip Team tweet mediaRedDrip Team tweet media
0
1
3
1.6K
RedDrip Team
RedDrip Team@RedDrip7·
Suspected #APT #Donot samples VBA uses plenty of comment statements to seperate malicious code which creates scheduled tasks and drops BAT files. cab89ee28820b38d1626806f9c1acb9f e5f0a8b4ab983a1457ec2b0a4bff89eb 04cce783b42af18f9208fe5527fa04a8 shop.gladiolus[.]live
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
2
11
33
4.7K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter trojan 8523f2ff3ff13e510a9bf75665562b3b ashersoftlib[.]com:44908
RedDrip Team tweet mediaRedDrip Team tweet media
English
0
6
37
3.8K
RedDrip Team
RedDrip Team@RedDrip7·
e3b8be98de37a64d72b20e71b92f7adb ("Rastriya satarkata kendra NIDEPT Audit Schedule.vhdx") 6b8efd4e7eb44f3149bbe23703a1efc2 ("CryptBase.dll")
Română
0
0
2
2.4K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter targeted Nepal. VHDX file contains hidden malicious DLL which creates a scheduled task named "VerifiedTaskMS". C2 domain is overlapped with previous campaign. www.joelgardens[.]com/gvb.php?uq=%username%_%computername%
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
RedDrip Team@RedDrip7

#APT #Bitter #IoC f04e4f5e197e47a89c406734c4c14a21 e828f8cacbe8df690a2e82410f307362 be1ff48fd155a44293c9b121c7735268 florabrocuisine[.]com oscarskatingcoach[.]com joelgardens[.]com

English
1
17
52
11.8K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter 5afab8e66a9c92c6818a90bee737353a ("Annexure-1.accdr") 6f572f39afa365b54c25929aaffde084 ("BTRC Meeting Notice.accdr") www.pinkrosesandmore[.]com/vbdfsbad.php?d=%username%_%computername% www.prolukemarion[.]com/ceszvd.php?d=%username%_%computername%
English
0
8
16
4.3K
RedDrip Team
RedDrip Team@RedDrip7·
db52ad75d66ef6f4a76d3ea3c9fb214e ("%programdata%\\USOShared\\Logs\\User\\FlightConfig.dll") 35b83f9021299e4ba69eb000eac3ba46 ("%programdata%\\Microsoft\\DeviceSync\\8acd6e71-bf10-4800-aeee-7de00edc9781\\background.png")
English
0
1
8
3K
RedDrip Team
RedDrip Team@RedDrip7·
#APT Suspected #APT28 malware VBA in xls drops dll + png. Dll extracts shellcode from png and loads .NET trojan in memory. Trojan abuses Filen API as C2 channel. 575d6f5c4d098079c4e947b38aa774b5 ("Дані для зустрічі.xls")
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
2
24
112
8.6K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Patchwork used Punjab PHATA application form as decoy LNK -> EXE + DLL -> BadNews trojan variant in memory a410d0169642afac5f1332867fdf4eaa (lnk) 051a3a3f6926642b1e9e85c75d367b13 (SAMLIB.dll) be38c3b2447204261c120cc7c29fa1ef (trojan PE) peeca[.site webmajic[.org
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
0
15
56
4.6K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #MysteriousElephant Related .NET backdoor 69e93946271cd7e3273129784d54a5f0 134.255.210[.]127:443
RedDrip Team@RedDrip7

#APT #MysteriousElephant targeted Pakistan and Bangladesh Decoy CHM files c463ae1ba749ad0b99a51c57cefa018b 6cd49dd6ce96c7bc92155850272b10e8 Backdoor 51b6300980982a20e1464831c21988d3 79a31fd09d2d327d5a816643ae2bbe4d 83.243.121[.]87:443 185.193.50[.]233:443

English
0
10
25
4K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter "Economic Policy Advisory.accdr" 594335680b2f5f64d6c3b3a7997d1708 70237a7df7f72d98f7a90495661e7b90 www.crudestopics[.]com/hcfq.php?d=%username%_%computername%
Français
0
9
19
3.6K
RedDrip Team
RedDrip Team@RedDrip7·
Related samples: b53aba6a17a156a865c62d84d7e0e367 ("CrowdStrike-Deployment-Status.xls") 90311c17ed09780d9a359a3d16c90252 (dll) *.netof66867.workers[.dev *.ahsaanullaahkhan.workers[.dev
RedDrip Team tweet mediaRedDrip Team tweet media
English
0
0
6
2.6K
RedDrip Team
RedDrip Team@RedDrip7·
Suspected #APT #Sidewinder VBA macros in .xls downloads EXE + malicous DLL (Rust trojan). Cloudflare workers domain is abused for C2 infra. 753bb1b5d8b879f478babb21ed4d9696 (xls) f310ee836f88cc43d3939f8a88b20495 (dll) *.goldibrowhoami.workers[.dev *.desco-gov-bd.workers[.dev
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
1
13
59
11.6K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #Bitter #IoC 2cd7bcf6677d15a5fd0434806f0748f2 ("UACC-Course-Details.accdr") broadsforthestate[.]com
RedDrip Team tweet media
English
1
9
27
4.3K
RedDrip Team
RedDrip Team@RedDrip7·
#APT #MysteriousElephant targeted Pakistan and Bangladesh Decoy CHM files c463ae1ba749ad0b99a51c57cefa018b 6cd49dd6ce96c7bc92155850272b10e8 Backdoor 51b6300980982a20e1464831c21988d3 79a31fd09d2d327d5a816643ae2bbe4d 83.243.121[.]87:443 185.193.50[.]233:443
RedDrip Team tweet mediaRedDrip Team tweet media
English
0
14
46
9.6K