Pyvonix
@Pyv0nix
Security Research • If all persons who can do something are in the bad side, the game could not be balanced.
قد يعجبك
#opendir: http://hokoog[.]com/yo/ I think I like these little guys that make your life easier by letting access to to their webshell. @JAMESWT_MHT @James_inthe_box @ViriBack
#opendir: aitelong[.]top/amadi/ contents: .exe and .hta malware: #lokibot #pony For this episode of "chose your malware", I offer a wide range of files. @James_inthe_box
Besides developing malware, they make poetry... Oh wait. It's lyrics of Nerd Ambition by YTCracker. Malware: #tinynuke Payload: coriolis[.]site/facture/ Panel: 4s65xlo930ubyjz8dlcm[.]com/admin/login.php
Second stage dropper hosted on: pomf.pyonpyon[.]moe/befqki.doc Find different payload on #opendir: irishlebanese[.]com/wp-admin/images/eight/ It's seen like files aren't on Virus Total, yet. @malwrhunterteam @ViriBack
Our Security Research Team has identified a zero-day #vulnerability in Adobe Flash that enables an attacker to execute code on a victims computer. #0day #networksecurity ow.ly/6plP50hBDMp
Current wave of #dropper but i'm not sur about the payload... Do you have more info? @malwrhunterteam @James_inthe_box @ViriBack All info: pastebin.com/iQXsPvXR
Today the presentation of my POC: a solution who collect and identify threats ✓ scalable solution ✓ automatically collect links ✓ identify the threat ✓ design a "user friendly" interface Thank to @benkow_ and @ViriBack for them great job who help me for identification
Amazing PO_.doc: RTF HASH: d6122adcf1bc34f293fed334d928f25dda5a76e53226c89a7bdb4c869c734ec8 It's NOT a dropper but an "all inclusive package" with all what he needs Behavior: #Ransomware + #Persistance Request: test1[.]ru/newbuild/t.php (may be a test ?) @malwrhunterteam
Website compromised: mcts-qatar[.]com Url used for delivering payload: mcts-qatar[.]com/wp-content/plugins/de6.exe Well, it's not your first time: urlhaus.abuse.ch/host/mcts-qata… … May be it's time to upgrade your Wordpress extensions or you deliberately host malware?
Wave of office document. mimetype: RTF Dropper use CVE-2017-11882 with eqnedt32.exe Domain with payload: b.reich[.]io (/jsdrjs.exe or /kdhqfz.png) Paypload: Password Stealer #lokibot Panel: detini.nut[.]cc cc @ViriBack @malwrhunterteam
Malware from: sendspace[.]com/file/6fjyyf He embed and use the @ImminentMethods solution (Cf. official website : imminentmethods.net ). Sample behavior: Keylogging C&C: DUJANADEC.djaoke[.]ga (no reponse) C&C infos :urlquery.net/report/924a8f3…
Dropper dowload payload from @github : github[.]com/yeahtheboys19892/beets/raw/master/beets/bin.exe Payload: AutoIT Keylogger Hash: 49475fa8074b25cd6aeb06551fa1f8544cdbc90e8d479858802a6510bb205d67 Behavior: drop 'nthwytulqctogyqrypoegivdc1696780.png'
United States الاتجاهات
- 1. Clippers 14K posts
- 2. Harden 10.2K posts
- 3. Huda 8,969 posts
- 4. #DWTS 50.1K posts
- 5. Ty Lue 1,505 posts
- 6. Kawhi 3,649 posts
- 7. Giannis 30K posts
- 8. Whitney 15.6K posts
- 9. #RHOSLC 7,754 posts
- 10. #APEC2025 77.7K posts
- 11. #RMxAPEC 191K posts
- 12. #DearOlandria 1,147 posts
- 13. Askarov N/A
- 14. South Korea 72.8K posts
- 15. Markstrom 1,723 posts
- 16. Caden 8,431 posts
- 17. Wayne 57.7K posts
- 18. Chris Paul 1,545 posts
- 19. Zubac 1,699 posts
- 20. Joon 13.3K posts
قد يعجبك
-
JaromirHorejsi
@JaromirHorejsi -
Davide Setti #netneutrality
@SettiDavide89 -
Dee
@ViriBack -
MalHunters
@MalHunters -
James
@James_inthe_box -
WifiRumHam
@WifiRumHam -
MalShare
@mal_share -
unpack64
@SwitchToThread -
Herbie Zimmerman
@HerbieZimmerman -
avman
@avman1995 -
Joe Roosen
@JRoosen -
Tino aka Paladin316
@Paladin3161 -
Saurabh Sharma
@SaurabhSha15
Something went wrong.
Something went wrong.