#Evilcrackz (#Vidar) malware has a dynamic page, which fools user to download malware with a message. Turns out that last parameter in URL after _ is base64 for message shown to the victim. Replacing this with "PC9oMj48c2..", which is base64 for document.domain,leads to XSS !

ankit_anubhav's tweet image. #Evilcrackz (#Vidar)  malware has a dynamic page, which fools user to download malware with a message.

Turns out that last parameter in URL after _ is base64 for message shown to the victim.

Replacing this with "PC9oMj48c2..", which is base64 for document.domain,leads to XSS !
ankit_anubhav's tweet image. #Evilcrackz (#Vidar)  malware has a dynamic page, which fools user to download malware with a message.

Turns out that last parameter in URL after _ is base64 for message shown to the victim.

Replacing this with "PC9oMj48c2..", which is base64 for document.domain,leads to XSS !

From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz ) These will be password protected but as the name says, the password is 1234. AV doesnt' know the password so its 0 on VT. But the victim knows 1234 and gets infected.

ankit_anubhav's tweet image. From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz )

These will be password protected but as the name says, the password is 1234. 
AV doesnt' know the password so its 0 on VT.
But the victim knows 1234 and gets infected.
ankit_anubhav's tweet image. From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz )

These will be password protected but as the name says, the password is 1234. 
AV doesnt' know the password so its 0 on VT.
But the victim knows 1234 and gets infected.

Hmmmmm, could it be weird that your average crack download site has more than 6k inbound links ? #SEOpoisoning #EvilCrackz

Gi7w0rm's tweet image. Hmmmmm, could it be weird that your average crack download site has more than 6k inbound links ?

#SEOpoisoning #EvilCrackz

Current stats for #EvilCrackz: - 462 malicious initial sides found - nearly 10.000 websites manually categorized into good, evil and suspicious - Custom crawler running to hunt new initial pages. - Several important pieces of intel collected. And the hunt continues 😈

Gi7w0rm's tweet image. Current stats for #EvilCrackz:

- 462 malicious initial sides found 
- nearly 10.000 websites manually categorized into good, evil and suspicious
- Custom crawler running to hunt new initial pages.
- Several important pieces of intel collected. 

And the hunt continues 😈

Me thinking I could clean my logs of all the #SEO poisoning the #EvilCrackz sites throw at me I am kinda giving up on this... Anybody a better idea for filtering ? 1 in 20 links might be important, so a block based tld is impossible @malwrhunterteam @KevTheHermit @Ledtech3

Gi7w0rm's tweet image. Me thinking I could clean my logs of all the #SEO poisoning the #EvilCrackz sites throw at me
I am kinda giving up on this...

Anybody a better idea for filtering ? 
1 in 20 links might be important, so a block based tld is impossible
@malwrhunterteam @KevTheHermit @Ledtech3

#EvilCrackz with another change in #TTP s. Today coming in with Eziriz's .Net Reactor loading 3 different #payload s . tria.ge/221220-agsp7sb… Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? Anybody can help identify bebra.exe ? tria.ge/221220-aqymtab… IoC below.

Gi7w0rm's tweet image. #EvilCrackz with another change in #TTP s. Today coming in with Eziriz's .Net Reactor loading 3 different #payload s .

tria.ge/221220-agsp7sb…

Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? 

Anybody can help identify bebra.exe ?
tria.ge/221220-aqymtab…

IoC below.

I can further confirm that I have seen log collections and victim counts of 45.000 victims with one campaign of #EvilCrackz and 85.000 logs in a recent #SectopRat campaign observed. If you have not read it, the link is here: link.medium.com/rqt9LE5y1wb

link.medium.com

A long way to SectopRat

Investigating a highly obfuscated stealer sample


Today for the first time I observe #EvilCrackz using #Discord CDN. hxxps://cdn.discordapp.com/attachments/1073630551627542569/1086965268653289543/The_LatestApps_There.zip is #Raccoonv2 / #RecordBreaker #Stealer tria.ge/230319-pnfrjsa… Sample template:…


Observing an unknown binary being pushed as part of a #Raccoonv2 / #RecordBreaker campaign since yesterday. VT is also not really helpful. Anybody an idea what this is? Campaign: tria.ge/230303-y6mr9ab… Binary: tria.ge/230303-zksbaab… #EvilCrackz


#cryptbot sample found. Tria.ge: tria.ge/230102-ahyylsg… C2: hxxp://luvasm712.top/gate.php Something for you to investigate @500mk500 ;) And for others to block ! #EvilCrackz


More #cryptbot tria.ge/230112-28e2zaf… C2: hxxp://avosma45.top/gate.php @500mk500 you know the drill ;) Part of #EvilCrackz


If I was to release some research into SEO-poisend #malware sharing sites, would you rather like: #EvilCrackz


New #cryptbot #C2 observed as part of #EvilCrackz: C2: hxxp://tystne110[.]top/gate.php Additional #ioc / #payload : hxxp://pabryd01[.]top/firlot.dat


When the #Rabbithole you are investigating just has no end... #EvilCrackz


This is part of the #EvilCrackz campaign I am currently investigating... Its only the tip of the Iceberg...


There are also many more things to come on the #EvilCrackz research which is now on and going for several months. I hope I can bring it to an end soon, sadly Twitter is only place 3 in my daily obligations besides work and university. But there is a lot done already. 6/x


Today for the first time I observe #EvilCrackz using #Discord CDN. hxxps://cdn.discordapp.com/attachments/1073630551627542569/1086965268653289543/The_LatestApps_There.zip is #Raccoonv2 / #RecordBreaker #Stealer tria.ge/230319-pnfrjsa… Sample template:…


Observing an unknown binary being pushed as part of a #Raccoonv2 / #RecordBreaker campaign since yesterday. VT is also not really helpful. Anybody an idea what this is? Campaign: tria.ge/230303-y6mr9ab… Binary: tria.ge/230303-zksbaab… #EvilCrackz


There are also many more things to come on the #EvilCrackz research which is now on and going for several months. I hope I can bring it to an end soon, sadly Twitter is only place 3 in my daily obligations besides work and university. But there is a lot done already. 6/x


I can further confirm that I have seen log collections and victim counts of 45.000 victims with one campaign of #EvilCrackz and 85.000 logs in a recent #SectopRat campaign observed. If you have not read it, the link is here: link.medium.com/rqt9LE5y1wb

link.medium.com

A long way to SectopRat

Investigating a highly obfuscated stealer sample


Did some statistics today. During the last months I have sorted more than 14.000 websites visiting each individual website to look at its content. I judged around 12.000 as clean, but more than 1100 are part of #EvilCrackz related campaigns. And many still to crawl and sort...


More #cryptbot tria.ge/230112-28e2zaf… C2: hxxp://avosma45.top/gate.php @500mk500 you know the drill ;) Part of #EvilCrackz


Seems I have stubled upon #NullMixer #Loader spreading through some #EvilCrackz sites. There is actually an article by @Securelist from 09.2022 that describes this behavior. Some IoC align securelist.com/nullmixer-oodl… Sadly it seems they opted for VMprotect. tria.ge/230111-r37jxsd…


@crep1x have you seen that some #EvilCrackz actors are opting for a download of a .txt file with url for the download in it plus password ? Wondering why they opt for this technique...


Btw I have to give a huge shoutout to: arraythis.com by #populu It got so useful while working on #EvilCrackz that I actually have a makro key to open it now ^^


Yep, will add the missing ones to my list of more than 460 initial domains. This is what I call #EvilCrackz :)


Current stats for #EvilCrackz: - 462 malicious initial sides found - nearly 10.000 websites manually categorized into good, evil and suspicious - Custom crawler running to hunt new initial pages. - Several important pieces of intel collected. And the hunt continues 😈

Gi7w0rm's tweet image. Current stats for #EvilCrackz:

- 462 malicious initial sides found 
- nearly 10.000 websites manually categorized into good, evil and suspicious
- Custom crawler running to hunt new initial pages.
- Several important pieces of intel collected. 

And the hunt continues 😈

#cryptbot sample found. Tria.ge: tria.ge/230102-ahyylsg… C2: hxxp://luvasm712.top/gate.php Something for you to investigate @500mk500 ;) And for others to block ! #EvilCrackz


Current and previous #C2 from #Vidar 634: hxxps://t.me/robloxblackl hxxps://steamcommunity.com/profiles/76561199458928097 <- Look at previous names 116.202.4[.]70:80 157.90.244[.]205:80 116.203.3[.]152:80 Triage: tria.ge/230101-s3fa4sc… #EvilCrackz


Some pretty #evasive #EvilCrackz here: tria.ge/221223-tzarwsb… Anybody with some #Intel on 94.131.98[.]99 94.131.98[.]100 ? VT has literally nothing :/ @0xToxin @ankit_anubhav @crep1x


Finally back to sorting #EvilCrackz #SEO websites. Amazing to see how many #CAD programs are out there... And don't even get me started in Music Studio Software... 👀


#EvilCrackz with another change in #TTP s. Today coming in with Eziriz's .Net Reactor loading 3 different #payload s . tria.ge/221220-agsp7sb… Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? Anybody can help identify bebra.exe ? tria.ge/221220-aqymtab… IoC below.

Gi7w0rm's tweet image. #EvilCrackz with another change in #TTP s. Today coming in with Eziriz&apos;s .Net Reactor loading 3 different #payload s .

tria.ge/221220-agsp7sb…

Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? 

Anybody can help identify bebra.exe ?
tria.ge/221220-aqymtab…

IoC below.

Interesting #malware infection chain of an #EvilCrackz sample. Guessing it is #Vidar, however despite the usual there is an intermediate step using #hastebin. Chain: mega uplaod -> pw protected .zip -> hastebin -> #Vidar #Stealer ? Tweet 2 with the IoC below! 1/2


What are #Traffers ? @sekoia_io published a post on this back in August 2022. It makes pretty clear what #EvilCrackz is part of. Nice read and a good explanation. @ankit_anubhav @crep1x @0xToxin


لا توجد نتائج لـ "#evilcrackz"

#Evilcrackz (#Vidar) malware has a dynamic page, which fools user to download malware with a message. Turns out that last parameter in URL after _ is base64 for message shown to the victim. Replacing this with "PC9oMj48c2..", which is base64 for document.domain,leads to XSS !

ankit_anubhav's tweet image. #Evilcrackz (#Vidar)  malware has a dynamic page, which fools user to download malware with a message.

Turns out that last parameter in URL after _ is base64 for message shown to the victim.

Replacing this with &quot;PC9oMj48c2..&quot;, which is base64 for document.domain,leads to XSS !
ankit_anubhav's tweet image. #Evilcrackz (#Vidar)  malware has a dynamic page, which fools user to download malware with a message.

Turns out that last parameter in URL after _ is base64 for message shown to the victim.

Replacing this with &quot;PC9oMj48c2..&quot;, which is base64 for document.domain,leads to XSS !

From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz ) These will be password protected but as the name says, the password is 1234. AV doesnt' know the password so its 0 on VT. But the victim knows 1234 and gets infected.

ankit_anubhav's tweet image. From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz )

These will be password protected but as the name says, the password is 1234. 
AV doesnt&apos; know the password so its 0 on VT.
But the victim knows 1234 and gets infected.
ankit_anubhav's tweet image. From last 10 days this person has been abusing Github to spread #Vidar ( #EvilCrackz )

These will be password protected but as the name says, the password is 1234. 
AV doesnt&apos; know the password so its 0 on VT.
But the victim knows 1234 and gets infected.

Current stats for #EvilCrackz: - 462 malicious initial sides found - nearly 10.000 websites manually categorized into good, evil and suspicious - Custom crawler running to hunt new initial pages. - Several important pieces of intel collected. And the hunt continues 😈

Gi7w0rm's tweet image. Current stats for #EvilCrackz:

- 462 malicious initial sides found 
- nearly 10.000 websites manually categorized into good, evil and suspicious
- Custom crawler running to hunt new initial pages.
- Several important pieces of intel collected. 

And the hunt continues 😈

Hmmmmm, could it be weird that your average crack download site has more than 6k inbound links ? #SEOpoisoning #EvilCrackz

Gi7w0rm's tweet image. Hmmmmm, could it be weird that your average crack download site has more than 6k inbound links ?

#SEOpoisoning #EvilCrackz

#EvilCrackz with another change in #TTP s. Today coming in with Eziriz's .Net Reactor loading 3 different #payload s . tria.ge/221220-agsp7sb… Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? Anybody can help identify bebra.exe ? tria.ge/221220-aqymtab… IoC below.

Gi7w0rm's tweet image. #EvilCrackz with another change in #TTP s. Today coming in with Eziriz&apos;s .Net Reactor loading 3 different #payload s .

tria.ge/221220-agsp7sb…

Seems like: #Vidar #Stealer + #Laplas #Clipper + 1 more ? 

Anybody can help identify bebra.exe ?
tria.ge/221220-aqymtab…

IoC below.

Me thinking I could clean my logs of all the #SEO poisoning the #EvilCrackz sites throw at me I am kinda giving up on this... Anybody a better idea for filtering ? 1 in 20 links might be important, so a block based tld is impossible @malwrhunterteam @KevTheHermit @Ledtech3

Gi7w0rm's tweet image. Me thinking I could clean my logs of all the #SEO poisoning the #EvilCrackz sites throw at me
I am kinda giving up on this...

Anybody a better idea for filtering ? 
1 in 20 links might be important, so a block based tld is impossible
@malwrhunterteam @KevTheHermit @Ledtech3

Loading...

Something went wrong.


Something went wrong.


United States Trends