ShadowOpCode's profile picture. Malware analyst & reverse engineer 🧠
Threat intel on stealers, RATs, live campaigns 🕵️
Technical analysis. No buzzwords.
📍DM open for research collabs

ShadowOpCode

@ShadowOpCode

Malware analyst & reverse engineer 🧠 Threat intel on stealers, RATs, live campaigns 🕵️ Technical analysis. No buzzwords. 📍DM open for research collabs

Pinned

🚨 New #JavaStealer “MaksStealer” uncovered! Fully in-memory, FUD, DES–Blowfish runtime decryption, WebSockets on 4025/4028/6662. Author “Max, 17yo” left his signature in the payload 🤯 Full report & IoCs 👉 github.com/ShadowOpCode/M… #infosec #malware #ThreatIntel @malwrhunterteam

ShadowOpCode's tweet image. 🚨 New #JavaStealer “MaksStealer” uncovered!
Fully in-memory, FUD, DES–Blowfish runtime decryption, WebSockets on 4025/4028/6662.
Author “Max, 17yo” left his signature in the payload 🤯
Full report & IoCs 👉 github.com/ShadowOpCode/M…
#infosec #malware #ThreatIntel @malwrhunterteam

🚨#Formbook #Xloader spotted in a malspam campaign in #Italy ⚠️Using another "Lorem Ipsum Dolores" variation! Related tweet: x.com/ShadowOpCode/s… @anyrun_app analysis: app.any.run/tasks/43bfa36b… C2: www[.]grevla[.]top

ShadowOpCode's tweet image. 🚨#Formbook #Xloader spotted in a malspam campaign in #Italy
⚠️Using another "Lorem Ipsum Dolores" variation!
Related tweet: x.com/ShadowOpCode/s…
@anyrun_app analysis: app.any.run/tasks/43bfa36b…
C2: www[.]grevla[.]top
ShadowOpCode's tweet image. 🚨#Formbook #Xloader spotted in a malspam campaign in #Italy
⚠️Using another "Lorem Ipsum Dolores" variation!
Related tweet: x.com/ShadowOpCode/s…
@anyrun_app analysis: app.any.run/tasks/43bfa36b…
C2: www[.]grevla[.]top
ShadowOpCode's tweet image. 🚨#Formbook #Xloader spotted in a malspam campaign in #Italy
⚠️Using another "Lorem Ipsum Dolores" variation!
Related tweet: x.com/ShadowOpCode/s…
@anyrun_app analysis: app.any.run/tasks/43bfa36b…
C2: www[.]grevla[.]top
ShadowOpCode's tweet image. 🚨#Formbook #Xloader spotted in a malspam campaign in #Italy
⚠️Using another "Lorem Ipsum Dolores" variation!
Related tweet: x.com/ShadowOpCode/s…
@anyrun_app analysis: app.any.run/tasks/43bfa36b…
C2: www[.]grevla[.]top

🚨ALERT🚨 #Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2 Related tweet: x.com/guelfoweb/stat… updated network config extractor: github.com/ShadowOpCode/M…

ShadowOpCode's tweet image. 🚨ALERT🚨
#Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2
Related tweet: x.com/guelfoweb/stat…
updated network config extractor: github.com/ShadowOpCode/M…
ShadowOpCode's tweet image. 🚨ALERT🚨
#Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2
Related tweet: x.com/guelfoweb/stat…
updated network config extractor: github.com/ShadowOpCode/M…


#ClickFix #FakeCAPTCHA in an italian website hxxps://www.chiocciola40[.]it/ hxxp://te.vakun[.]ru/ptg90q8t hxxp://dqay.ci6ef[.]ru/sinkers @anyrun_app analysis: app.any.run/tasks/1e167278…

ShadowOpCode's tweet image. #ClickFix #FakeCAPTCHA in an italian website
hxxps://www.chiocciola40[.]it/
hxxp://te.vakun[.]ru/ptg90q8t
hxxp://dqay.ci6ef[.]ru/sinkers
@anyrun_app analysis: app.any.run/tasks/1e167278…
ShadowOpCode's tweet image. #ClickFix #FakeCAPTCHA in an italian website
hxxps://www.chiocciola40[.]it/
hxxp://te.vakun[.]ru/ptg90q8t
hxxp://dqay.ci6ef[.]ru/sinkers
@anyrun_app analysis: app.any.run/tasks/1e167278…

🚨ALERT🚨 #Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2 Related tweet: x.com/guelfoweb/stat… updated network config extractor: github.com/ShadowOpCode/M…

ShadowOpCode's tweet image. 🚨ALERT🚨
#Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2
Related tweet: x.com/guelfoweb/stat…
updated network config extractor: github.com/ShadowOpCode/M…
ShadowOpCode's tweet image. 🚨ALERT🚨
#Formbook #Xloader started using "incididunt ut labore" dummy text instead of "Lorem Ipsum" in its C2
Related tweet: x.com/guelfoweb/stat…
updated network config extractor: github.com/ShadowOpCode/M…

ShadowOpCode reposted

🚫 Il dominio è stato dismesso! Dalle 04:50 di oggi il team Abuse di @Hostinger lo ha disattivato; attualmente non è più raggiungibile.

Come ci segnala l’utente @ShadowOpCode su X, questa mattina il codice della pagina è stato modificato: ora viene inviata una richiesta GET a un dominio esterno ospitato su #Supabase, una piattaforma open-source che offre database.



ShadowOpCode reposted

Come ci segnala l’utente @ShadowOpCode su X, questa mattina il codice della pagina è stato modificato: ora viene inviata una richiesta GET a un dominio esterno ospitato su #Supabase, una piattaforma open-source che offre database.

🇮🇹 #Phishing sulla verifica del permesso di soggiorno prende di mira i cittadini stranieri in #Italia 📅 Il dominio registrato il 13 ottobre 2025, giorno successivo all’avvio del sistema. ℹ️ Approfondimenti 👇 🔗 cert-agid.gov.it/news/phishing-…

AgidCert's tweet image. 🇮🇹 #Phishing sulla verifica del permesso di soggiorno prende di mira i cittadini stranieri in #Italia 

📅 Il dominio registrato il 13 ottobre 2025, giorno successivo all’avvio del sistema.

ℹ️ Approfondimenti 👇

🔗 cert-agid.gov.it/news/phishing-…


United States Trends

Loading...

Something went wrong.


Something went wrong.