🚨#Opendir #Malware🚨 Do you want to spent some time analyzing #Malware? Here we go ⤵️ 1⃣hxxps://pi-healing-sudan-kennedy.trycloudflare.com/ 2⃣hxxps://holidays-diary-some-vancouver.trycloudflare.com/ 3⃣hxxps://meat-media-sl-type.trycloudflare.com/

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

Do you want to spent some time analyzing #Malware?

Here we go ⤵️

1⃣hxxps://pi-healing-sudan-kennedy.trycloudflare.com/
2⃣hxxps://holidays-diary-some-vancouver.trycloudflare.com/
3⃣hxxps://meat-media-sl-type.trycloudflare.com/
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

Do you want to spent some time analyzing #Malware?

Here we go ⤵️

1⃣hxxps://pi-healing-sudan-kennedy.trycloudflare.com/
2⃣hxxps://holidays-diary-some-vancouver.trycloudflare.com/
3⃣hxxps://meat-media-sl-type.trycloudflare.com/

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605

🚨#OpenDir hxxp://sremc.duckdns.org

DarkWebInformer's tweet image. 🚨#OpenDir

hxxp://sremc.duckdns.org

#DarkVisionRAT #opendir https://5.89.185[.]156/

lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/

#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/

Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/

some #opendir (reverse) #base64 fun :) hxxp://52.152.223[.]228/

jstrosch's tweet image. some #opendir (reverse) #base64 fun :) 

hxxp://52.152.223[.]228/
jstrosch's tweet image. some #opendir (reverse) #base64 fun :) 

hxxp://52.152.223[.]228/

#Malware 🇧🇷 Sitio falso de MercadoEnvios descarga: - zip -> msi - AnyDesk Sites: hxxps://52.159.123.0/ hxxp://20.206.241.68/ #opendir C2 52.159.123.]0:6400 20.206.241.]68:6400

Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400

Hunting Open Directories With Random File Names?🧐 Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. Let's look at signaturing a random file name to find new malicious open directories and IOC's. #malware #intel #opendir

embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir
embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir
embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir

couple of busy #opendir hxxp://89.23.96[.]203/dashboard/1/ hxxp://51.79.49[.]73/crc/

jstrosch's tweet image. couple of busy #opendir

hxxp://89.23.96[.]203/dashboard/1/

hxxp://51.79.49[.]73/crc/
jstrosch's tweet image. couple of busy #opendir

hxxp://89.23.96[.]203/dashboard/1/

hxxp://51.79.49[.]73/crc/

#opendir for today! http://39.105.31.193:1389/ Client-built[.]exe = #QuasarRAT for you to analyse the rest!

banthisguy9349's tweet image. #opendir for today!
http://39.105.31.193:1389/

Client-built[.]exe = #QuasarRAT

for you to analyse the rest!

Large #opendir at: http://57.180.253.244 medium confidence msbuild.exe is #ghostrat

James_inthe_box's tweet image. Large #opendir at:

http://57.180.253.244

medium confidence msbuild.exe is #ghostrat

#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80

Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80
Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80

#malware #opendir at: http://invoicetrycloudflare\.com:9983/

James_inthe_box's tweet image. #malware #opendir at:

http://invoicetrycloudflare\.com:9983/

#opendir 106.14.176.]208 Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.

Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.
Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.

#snakekelogger hta's at #opendir : http://192.3.176\.138/xampp/ozon drops http://192.3.176\.138/105/sahost.exe (also 106) d9863b7b710599bc2b308a0b78970da8c42ee5bc6d3dcda05c2de52a88125726 exfils to: [email protected]

James_inthe_box's tweet image. #snakekelogger hta's at #opendir :

http://192.3.176\.138/xampp/ozon
drops
http://192.3.176\.138/105/sahost.exe (also 106)

d9863b7b710599bc2b308a0b78970da8c42ee5bc6d3dcda05c2de52a88125726

exfils to: resultlog62@gmail.com

http://124.158.5.149:8081/ #opendir with #sliver #c2 and payload hosted. #malware analysers do your thing :)

banthisguy9349's tweet image. http://124.158.5.149:8081/ #opendir with #sliver #c2 and payload hosted.

#malware analysers do your thing :)

Nice hit!! 🫡#opendir everywhere...


Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…

silascutler's tweet image. Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…
silascutler's tweet image. Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…

Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts. platform.censys.io/hosts/185.208.… search.censys.io/hosts/185.208.… #malware #thread 🧵

silascutler's tweet image. Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts.

platform.censys.io/hosts/185.208.…
search.censys.io/hosts/185.208.…

#malware #thread 🧵
silascutler's tweet image. Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts.

platform.censys.io/hosts/185.208.…
search.censys.io/hosts/185.208.…

#malware #thread 🧵

🚨#Opendir #Malware🚨 🧵1 hxxps://tiger-checkout-draws-basketball.trycloudflare.com/ It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering ☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b Drops and execute a few runtimes⤵️

ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️
ShanHolo's tweet image. 🚨#Opendir #Malware🚨 🧵1

hxxps://tiger-checkout-draws-basketball.trycloudflare.com/

It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering

☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b
Drops and execute a few runtimes⤵️

⚠️ Opendir Exposure | turdinc[.]kicks-ass[.]net Open directory hxxps://turdinc[.]kicks-ass[.]net/Msntv/imagesJP/JPbuildDC1004/WINCE/ hosts numerous files incl. .EXE. Flagged for #Malware analysts. Handle with extreme caution — DO NOT download or execute. #Opendir

cyberfeeddigest's tweet image. ⚠️ Opendir Exposure | turdinc[.]kicks-ass[.]net 

Open directory hxxps://turdinc[.]kicks-ass[.]net/Msntv/imagesJP/JPbuildDC1004/WINCE/ hosts numerous files incl. .EXE. Flagged for #Malware analysts. Handle with extreme caution — DO NOT download or execute. 
#Opendir

⚠️ LucasArts Opendir Exposure | #Opendir Open directory hosting 121 .EXE files found at hxxp://ftp[.]xtal[.]net/pub/archives/ftp-sites/ftp[.]lucasarts[.]com/patches/pc/ — Potential #Malware.For #Malware analysts. Handle with extreme caution; do NOT download or execute.

cyberfeeddigest's tweet image. ⚠️ LucasArts Opendir Exposure | #Opendir

Open directory hosting 121 .EXE files found at hxxp://ftp[.]xtal[.]net/pub/archives/ftp-sites/ftp[.]lucasarts[.]com/patches/pc/ — Potential #Malware.For #Malware analysts. Handle with extreme caution; do NOT download or execute.

⚠️ #Opendir Exposure | #GuardianProject Open directory at hxxps://guardianproject[.]info/releases/ — hosting 1000+ .EXE files. Marked as a source for #Malware analysts. Handle with extreme caution; do NOT download or execute. #CyberSecurity #DataLeak

cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | #GuardianProject

Open directory at hxxps://guardianproject[.]info/releases/ — hosting 1000+ .EXE files. Marked as a source for #Malware analysts. Handle with extreme caution; do NOT download or execute.

#CyberSecurity #DataLeak

⚠️ #Opendir Exposure | #NewZealand Open directory found at hxxps://www[.]msupply[.]org[.]nz/files/old/ — hosting 100+ .EXE files. Flagged for #Malware analysts; handle with extreme caution. Do NOT download or execute. #CyberSecurity #DataLeak

cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | #NewZealand

Open directory found at hxxps://www[.]msupply[.]org[.]nz/files/old/ — hosting 100+ .EXE files. Flagged for #Malware analysts; handle with extreme caution. Do NOT download or execute.

#CyberSecurity #DataLeak

⚠️ #Opendir Exposure | cloudio[.]dedyn[.]io Leak Open directory (hxxps://cloudio[.]dedyn[.]io/~dio/) reportedly hosts samples: ipscan.zip, netscan.exe, netscan.zip, netscan_portable.zip. Tagged for #Malware analysts — handle with extreme caution.

cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | cloudio[.]dedyn[.]io Leak

Open directory (hxxps://cloudio[.]dedyn[.]io/~dio/) reportedly hosts samples: ipscan.zip, netscan.exe, netscan.zip, netscan_portable.zip. Tagged for #Malware analysts — handle with extreme caution.

'Document.lnk' uploaded from Ireland @abuse_ch bazaar.abuse.ch/sample/d2c4344… #opendir hxxp://193.233.84(.)146/Documents/Document.lnk (Russia) Try to drop this one: hxxps://goole(.)com/a.exe


⚠️ #Opendir Exposure Open upload directory (hxxps://support[.]green[.]cz/uploads/index[.]php) hosts .EXE samples — netscan.exe, NetworkScannerSetup-3.0.4.exe. Tagged as a research source for #Malware analysts; handle with extreme caution. #Czech

cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure 

Open upload directory (hxxps://support[.]green[.]cz/uploads/index[.]php) hosts .EXE samples — netscan.exe, NetworkScannerSetup-3.0.4.exe. Tagged as a research source for #Malware analysts; handle with extreme caution.

#Czech

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605

Heyyy if I was you and you want to learn more about #Malware @ryanlrussell wrote an awesome article you can read and learn a lot! How everything began with an #Opendir and end up in a so interesting research.

Check out my latest article: Are you tired of .bat, .lnk, and .py files yet? botw-ryanlrussell-18 linkedin.com/pulse/you-tire… Wherein I think I've seen this threat actor before. s/o @ShanHolo



Same Threat Actor behind these #opendir / Similar Stealer and PS1 scripts: Analysis through @Huntio revealed same certificate hash. Certificates.HashSha256:C3D1588C312A2CE47B1987E4EF5A44932E3F6FE563BC0A0B34898BE00A54559A 2nd opendir: 196.251.73.58 VT: virustotal.com/gui/ip-address…

volrant136's tweet image. Same Threat Actor behind these #opendir / Similar Stealer and PS1 scripts:

Analysis through @Huntio revealed same certificate hash.

Certificates.HashSha256:C3D1588C312A2CE47B1987E4EF5A44932E3F6FE563BC0A0B34898BE00A54559A

2nd opendir: 196.251.73.58

VT: virustotal.com/gui/ip-address…
volrant136's tweet image. Same Threat Actor behind these #opendir / Similar Stealer and PS1 scripts:

Analysis through @Huntio revealed same certificate hash.

Certificates.HashSha256:C3D1588C312A2CE47B1987E4EF5A44932E3F6FE563BC0A0B34898BE00A54559A

2nd opendir: 196.251.73.58

VT: virustotal.com/gui/ip-address…

#Cloudflare sites with 🚨#Opendir #Malware🚨 1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/ 2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/ 3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/

ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/
ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/
ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/

⚠️ #OPendir Discovery — #NAS #Australia downloads expose 50+ .EXE files (incl. psexec.exe). Handle with caution — potential malware / dual-use binaries. For #MalwareAnalysts & defenders only. 🔗 nas[.]com[.]au/downloads/ #CyberSecurity

cyberfeeddigest's tweet image. ⚠️ #OPendir Discovery — #NAS #Australia downloads expose 50+ .EXE files (incl. psexec.exe). Handle with caution — potential malware / dual-use binaries. For #MalwareAnalysts & defenders only. 🔗 

nas[.]com[.]au/downloads/ #CyberSecurity

'Document.js' from #opendir @abuse_ch hxxp://46.28.71(.)42:8080/html/dl/Document.js bazaar.abuse.ch/sample/5c2a5a4… C2 📡 hxxp://wkkuakciqmwewgyk(.)xyz:443/api/client_hello

smica83's tweet image. 'Document.js' from #opendir @abuse_ch hxxp://46.28.71(.)42:8080/html/dl/Document.js 
bazaar.abuse.ch/sample/5c2a5a4… 
C2 📡 
hxxp://wkkuakciqmwewgyk(.)xyz:443/api/client_hello

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605

#DarkVisionRAT #opendir https://5.89.185[.]156/

lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/

🚨#OpenDir hxxp://sremc.duckdns.org

DarkWebInformer's tweet image. 🚨#OpenDir

hxxp://sremc.duckdns.org

#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/

Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/

#malware #opendir at: http://invoicetrycloudflare\.com:9983/

James_inthe_box's tweet image. #malware #opendir at:

http://invoicetrycloudflare\.com:9983/

#Malware 🇧🇷 Sitio falso de MercadoEnvios descarga: - zip -> msi - AnyDesk Sites: hxxps://52.159.123.0/ hxxp://20.206.241.68/ #opendir C2 52.159.123.]0:6400 20.206.241.]68:6400

Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400
Merlax_'s tweet image. #Malware 🇧🇷 

Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk

Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir 

C2
52.159.123.]0:6400
20.206.241.]68:6400

#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80

Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80
Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80

#opendir 106.14.176.]208 Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.

Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.
Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.

Hunting Open Directories With Random File Names?🧐 Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. Let's look at signaturing a random file name to find new malicious open directories and IOC's. #malware #intel #opendir

embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir
embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir
embee_research's tweet image. Hunting Open Directories With Random File Names?🧐

Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. 

Let's look at signaturing a random file name to find new malicious open directories and IOC's. 

#malware #intel #opendir

Institución educativa en 🇨🇱Chile expone información confidencial de al menos 553 personas en un #opendir, incluyendo cédulas de identidad (ambas caras), certificados de estudio y nacimiento. Lo más grave es que esta info. es accesible para cualquiera, mediante una simple búsqueda…

V3n0mStrike's tweet image. Institución educativa en 🇨🇱Chile expone información confidencial de al menos 553 personas en un #opendir, incluyendo cédulas de identidad (ambas caras), certificados de estudio y nacimiento. Lo más grave es que esta info. es accesible para cualquiera, mediante una simple búsqueda…
V3n0mStrike's tweet image. Institución educativa en 🇨🇱Chile expone información confidencial de al menos 553 personas en un #opendir, incluyendo cédulas de identidad (ambas caras), certificados de estudio y nacimiento. Lo más grave es que esta info. es accesible para cualquiera, mediante una simple búsqueda…

#stealc #opendir at: http://91.92.250[.]161/files/

James_inthe_box's tweet image. #stealc #opendir at:

http://91.92.250[.]161/files/

#opendir for today! http://39.105.31.193:1389/ Client-built[.]exe = #QuasarRAT for you to analyse the rest!

banthisguy9349's tweet image. #opendir for today!
http://39.105.31.193:1389/

Client-built[.]exe = #QuasarRAT

for you to analyse the rest!

#Opendir Mails y cuentas expuestas relacionada a 🇧🇷 Site hxxps://102.165.46.179/

Merlax_'s tweet image. #Opendir  

Mails y cuentas expuestas relacionada a 🇧🇷

Site
hxxps://102.165.46.179/

Loading...

Something went wrong.


Something went wrong.


United States Trends