#cryptbot 搜尋結果

🤖New #Cryptbot activity detected. Of course, the campaign is delivered through pirate sites with "cracked" software. 🔍Investigated website: mycrackfree.]com (with cloudflare protection) ↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…

V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…

Same very fresh (2023-Apr-11) #cryptbot in this run: app.any.run/tasks/63ceea5c… cc @500mk500

James_inthe_box's tweet image. Same very fresh (2023-Apr-11) #cryptbot in this run:

app.any.run/tasks/63ceea5c…

cc @500mk500

Found a #cryptbot sample. Bloated AutoKMS installer. Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe 🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt 🌐 whiueo14[.]top/gate.php 🌐uhfyl01[.]top/trombe.dat

nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat

@LinkedIn accounts are compromised in a daily basis to join a big SEO poisoning campaign via LinkedIn Pulses. Users are then redirected to fake malicious sites where malware is being distributed, mainly #Lumma Stealer, #Cryptbot and #AMOS for Mac Users (finally found! 🍎) 👇👇


Cryptbot Download LINK (ALTERNATIVE).url 06996bb69b5978d822b228766c4b44c0 URL=http://gg[.]gg/1b9jyb password protected zip Sеtup.exe 4de2056db3a3b39bee9d833d403091d4 #Cryptbot C2 twex12ht[.]top #IOC

suyog41's tweet image. Cryptbot

Download LINK (ALTERNATIVE).url
06996bb69b5978d822b228766c4b44c0

URL=http://gg[.]gg/1b9jyb
password protected zip

Sеtup.exe
4de2056db3a3b39bee9d833d403091d4 #Cryptbot

C2
twex12ht[.]top

#IOC
suyog41's tweet image. Cryptbot

Download LINK (ALTERNATIVE).url
06996bb69b5978d822b228766c4b44c0

URL=http://gg[.]gg/1b9jyb
password protected zip

Sеtup.exe
4de2056db3a3b39bee9d833d403091d4 #Cryptbot

C2
twex12ht[.]top

#IOC

There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔 🛜 C2: vdeight8vt[.]top (81.94.159[.]120) 🔥 @unpacme did a great job with unpacking unpac.me/results/1a23fb… 📁 More related samples:…

RussianPanda9xx's tweet image. There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔

🛜 C2: vdeight8vt[.]top (81.94.159[.]120)

🔥 @unpacme did a great job with unpacking 
unpac.me/results/1a23fb…
 
📁 More related samples:…
RussianPanda9xx's tweet image. There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔

🛜 C2: vdeight8vt[.]top (81.94.159[.]120)

🔥 @unpacme did a great job with unpacking 
unpac.me/results/1a23fb…
 
📁 More related samples:…

💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…

PRODAFT's tweet image. 💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…
PRODAFT's tweet image. 💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…

#100DaysofYARA Day21: this rule detects the unpacked version of #CryptBot Stealer rule -> github.com/FarghlyMal/Yar…

FarghlyMal's tweet image. #100DaysofYARA Day21:

this rule detects  the unpacked version of #CryptBot Stealer 

rule -> github.com/FarghlyMal/Yar…

#Snatch #ransomware initially hosted in 🇧🇬 185.246.221.63, then transferred to 🇷🇺 Also found that same IP is C2 for #cryptbot #malware! snatchnews./top 176.124.222.177 80.66.64.67 #Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec

RakeshKrish12's tweet image. #Snatch #ransomware initially hosted in 🇧🇬
185.246.221.63, then transferred to 🇷🇺

Also found that same IP is C2 for #cryptbot #malware!
snatchnews./top
176.124.222.177
80.66.64.67

#Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec
RakeshKrish12's tweet image. #Snatch #ransomware initially hosted in 🇧🇬
185.246.221.63, then transferred to 🇷🇺

Also found that same IP is C2 for #cryptbot #malware!
snatchnews./top
176.124.222.177
80.66.64.67

#Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec

Igor is now helping you "activating" your unpaid Office products on hxxps://office-activator[.]com/. What a gentleman, but don't forget to disable your antivirus if you want to see your credentials stolen in your browser also... #cryptbot #infostealer

H_Miser's tweet image. Igor is now helping you "activating" your unpaid Office products on hxxps://office-activator[.]com/. 

What a gentleman, but don't forget to disable your antivirus if you want to see your credentials stolen in your browser also... 

#cryptbot #infostealer

Importante lo que agrega @g0njxa, el malware podría ser realmente #CryptBot, más los dominios de distribución activos en este momento.

1ZRR4H's tweet image. Importante lo que agrega @g0njxa, el malware podría ser realmente #CryptBot, más los dominios de distribución activos en este momento.

La pagina desde donde descargo: /oficial-kmspico.com/ aun activo sirviendo #Cryptbot /rars-uploaded.com/KMSpico/ Detonacion app.any.run/tasks/7d03c494… Esta campaña es conocida y antigua, el resto es historia



🔐Сrypt🤖Bot There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 Search by #cryptbot tag 🔍-> any.run/malware-trends… file[] - is waiting for rule📯)) DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…

Jane_0sint's tweet image. 🔐Сrypt🤖Bot 
There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 
Search by #cryptbot tag 🔍-> any.run/malware-trends…
file[] - is waiting for rule📯)) 
DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…
Jane_0sint's tweet image. 🔐Сrypt🤖Bot 
There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 
Search by #cryptbot tag 🔍-> any.run/malware-trends…
file[] - is waiting for rule📯)) 
DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…

未找到 "#cryptbot" 的結果

Found a #cryptbot sample. Bloated AutoKMS installer. Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe 🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt 🌐 whiueo14[.]top/gate.php 🌐uhfyl01[.]top/trombe.dat

nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat
nosecurething's tweet image. Found a #cryptbot sample.  Bloated AutoKMS installer. 
Installed by bloated KMS_Pico_Full_Setup.exe > setup.exe > PS >aspnet_compiler.exe > trombe.exe, dpeditor.exe
🌐45.93.201[.]114/docs/ynupxDnDelE4X3wIwlgB92MU5VemJf.txt
🌐 whiueo14[.]top/gate.php
🌐uhfyl01[.]top/trombe.dat

Same very fresh (2023-Apr-11) #cryptbot in this run: app.any.run/tasks/63ceea5c… cc @500mk500

James_inthe_box's tweet image. Same very fresh (2023-Apr-11) #cryptbot in this run:

app.any.run/tasks/63ceea5c…

cc @500mk500

🤖New #Cryptbot activity detected. Of course, the campaign is delivered through pirate sites with "cracked" software. 🔍Investigated website: mycrackfree.]com (with cloudflare protection) ↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…

V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…
V3n0mStrike's tweet image. 🤖New #Cryptbot activity detected.
Of course, the campaign is delivered through pirate sites with "cracked" software.

🔍Investigated website: mycrackfree.]com (with cloudflare protection)
↩️Redirects: freeinstallcpc.]xyz @namecheap -> etradistribuciones.]com -> href.]li ->…

💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…

PRODAFT's tweet image. 💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…
PRODAFT's tweet image. 💣Until #Google's takedown of #CryptBot malware infrastructure, the responsible threat actors infected over 17 MILLION unique devices worldwide in the last 5️⃣ years - by tricking Google users into downloading fraudulent Google Chrome versions. As you can see in our graph below,…

There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔 🛜 C2: vdeight8vt[.]top (81.94.159[.]120) 🔥 @unpacme did a great job with unpacking unpac.me/results/1a23fb… 📁 More related samples:…

RussianPanda9xx's tweet image. There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔

🛜 C2: vdeight8vt[.]top (81.94.159[.]120)

🔥 @unpacme did a great job with unpacking 
unpac.me/results/1a23fb…
 
📁 More related samples:…
RussianPanda9xx's tweet image. There is a new version of #CryptBot spreading around with VMProtect? The infrastructure belongs to CryptBot 🤔

🛜 C2: vdeight8vt[.]top (81.94.159[.]120)

🔥 @unpacme did a great job with unpacking 
unpac.me/results/1a23fb…
 
📁 More related samples:…

Estoy de acuerdo. Esta imagen revela el árbol de archivos de logs generados por #Cryptbot durante la infección del operador de Orange. Los nombres de estos archivos coinciden con investigaciones anteriores sobre esta amenaza, como se muestra en este interesante artículo de…

V3n0mStrike's tweet image. Estoy de acuerdo. Esta imagen revela el árbol de archivos de logs generados por #Cryptbot durante la infección del operador de Orange. Los nombres de estos archivos coinciden con investigaciones anteriores sobre esta amenaza, como se muestra en este interesante artículo de…

#Snatch #ransomware initially hosted in 🇧🇬 185.246.221.63, then transferred to 🇷🇺 Also found that same IP is C2 for #cryptbot #malware! snatchnews./top 176.124.222.177 80.66.64.67 #Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec

RakeshKrish12's tweet image. #Snatch #ransomware initially hosted in 🇧🇬
185.246.221.63, then transferred to 🇷🇺

Also found that same IP is C2 for #cryptbot #malware!
snatchnews./top
176.124.222.177
80.66.64.67

#Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec
RakeshKrish12's tweet image. #Snatch #ransomware initially hosted in 🇧🇬
185.246.221.63, then transferred to 🇷🇺

Also found that same IP is C2 for #cryptbot #malware!
snatchnews./top
176.124.222.177
80.66.64.67

#Infosec #Intel #infosecurity #security #hack #ransom #darkweb #OSINT #cybersecurity #cybersec

2ca85769db7d1e6ded7bde9f84bad2e0 taslogin[.]s3[.]ap-southeast-1[.]amazonaws[.]com u[.]arpuu[.]com 13[.]208[.]251[.]115:3158 AS16509 AMAZON-02 🇯🇵 #CryptBot @malwrhunterteam @500mk500 @abuse_ch

skocherhan's tweet image. 2ca85769db7d1e6ded7bde9f84bad2e0
taslogin[.]s3[.]ap-southeast-1[.]amazonaws[.]com
u[.]arpuu[.]com
13[.]208[.]251[.]115:3158
AS16509 AMAZON-02 🇯🇵
#CryptBot @malwrhunterteam @500mk500 @abuse_ch

Cryptbot Download LINK (ALTERNATIVE).url 06996bb69b5978d822b228766c4b44c0 URL=http://gg[.]gg/1b9jyb password protected zip Sеtup.exe 4de2056db3a3b39bee9d833d403091d4 #Cryptbot C2 twex12ht[.]top #IOC

suyog41's tweet image. Cryptbot

Download LINK (ALTERNATIVE).url
06996bb69b5978d822b228766c4b44c0

URL=http://gg[.]gg/1b9jyb
password protected zip

Sеtup.exe
4de2056db3a3b39bee9d833d403091d4 #Cryptbot

C2
twex12ht[.]top

#IOC
suyog41's tweet image. Cryptbot

Download LINK (ALTERNATIVE).url
06996bb69b5978d822b228766c4b44c0

URL=http://gg[.]gg/1b9jyb
password protected zip

Sеtup.exe
4de2056db3a3b39bee9d833d403091d4 #Cryptbot

C2
twex12ht[.]top

#IOC

Importante lo que agrega @g0njxa, el malware podría ser realmente #CryptBot, más los dominios de distribución activos en este momento.

1ZRR4H's tweet image. Importante lo que agrega @g0njxa, el malware podría ser realmente #CryptBot, más los dominios de distribución activos en este momento.

La pagina desde donde descargo: /oficial-kmspico.com/ aun activo sirviendo #Cryptbot /rars-uploaded.com/KMSpico/ Detonacion app.any.run/tasks/7d03c494… Esta campaña es conocida y antigua, el resto es historia



🔐Сrypt🤖Bot There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 Search by #cryptbot tag 🔍-> any.run/malware-trends… file[] - is waiting for rule📯)) DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…

Jane_0sint's tweet image. 🔐Сrypt🤖Bot 
There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 
Search by #cryptbot tag 🔍-> any.run/malware-trends…
file[] - is waiting for rule📯)) 
DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…
Jane_0sint's tweet image. 🔐Сrypt🤖Bot 
There could be quite a lot of text here, but the most paradoxical evidence is noted in the photo 📸 
Search by #cryptbot tag 🔍-> any.run/malware-trends…
file[] - is waiting for rule📯)) 
DGA reminded me of one sample that I called \$CREEN -> app.any.run/tasks/581c8f3c…

Cryptbot registered more than 500 domains in 2023 #malware #cryptbot

tiresearch1's tweet image. Cryptbot registered more than 500 domains in 2023
#malware #cryptbot

Loading...

Something went wrong.


Something went wrong.