#opendir نتائج البحث
🚨#Opendir #Malware🚨 Do you want to spent some time analyzing #Malware? Here we go ⤵️ 1⃣hxxps://pi-healing-sudan-kennedy.trycloudflare.com/ 2⃣hxxps://holidays-diary-some-vancouver.trycloudflare.com/ 3⃣hxxps://meat-media-sl-type.trycloudflare.com/


🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605



#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/



![jstrosch's tweet image. some #opendir (reverse) #base64 fun :)
hxxp://52.152.223[.]228/](https://pbs.twimg.com/media/F3lJF4MbQAAP9qW.png)
![jstrosch's tweet image. some #opendir (reverse) #base64 fun :)
hxxp://52.152.223[.]228/](https://pbs.twimg.com/media/F3lJMnracAEalwc.png)
#Malware 🇧🇷 Sitio falso de MercadoEnvios descarga: - zip -> msi - AnyDesk Sites: hxxps://52.159.123.0/ hxxp://20.206.241.68/ #opendir C2 52.159.123.]0:6400 20.206.241.]68:6400
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tB5FMXoAEroug.jpg)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tCQqMXgAQKPNW.png)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tCVH-X0AAYH4Y.jpg)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tDJNiWYAEHTQc.png)
Hunting Open Directories With Random File Names?🧐 Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. Let's look at signaturing a random file name to find new malicious open directories and IOC's. #malware #intel #opendir



#opendir for today! http://39.105.31.193:1389/ Client-built[.]exe = #QuasarRAT for you to analyse the rest!
![banthisguy9349's tweet image. #opendir for today!
http://39.105.31.193:1389/
Client-built[.]exe = #QuasarRAT
for you to analyse the rest!](https://pbs.twimg.com/media/GeGZ9IAXUAEEzWZ.jpg)

#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80
![Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷
Payloads #Opendir
hxxp://92.205.129.120/
Contador
hxxps://3illeceara1e2.likescandy.com/
C2
92.205.231.]161:80](https://pbs.twimg.com/media/GMCTZN9XwAEpBBN.png)
![Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷
Payloads #Opendir
hxxp://92.205.129.120/
Contador
hxxps://3illeceara1e2.likescandy.com/
C2
92.205.231.]161:80](https://pbs.twimg.com/media/GMCTb0hX0AA-7zC.png)
#opendir 106.14.176.]208 Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.
![Huntio's tweet image. #opendir 106.14.176.]208
Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic.
RingQ, an open-source Windows shellcode generator, is also present.
A week ago, Vshell was also detected on this IP on port 8082.](https://pbs.twimg.com/media/GU2WZl6a8AArWdk.jpg)
![Huntio's tweet image. #opendir 106.14.176.]208
Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic.
RingQ, an open-source Windows shellcode generator, is also present.
A week ago, Vshell was also detected on this IP on port 8082.](https://pbs.twimg.com/media/GU2WrsqaoAAgdA1.jpg)
#snakekelogger hta's at #opendir : http://192.3.176\.138/xampp/ozon drops http://192.3.176\.138/105/sahost.exe (also 106) d9863b7b710599bc2b308a0b78970da8c42ee5bc6d3dcda05c2de52a88125726 exfils to: [email protected]

Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…
![silascutler's tweet image. Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…](https://pbs.twimg.com/media/G2qNOEiWIAAHCZU.jpg)
![silascutler's tweet image. Back in the rest of the #opendir, uploads/ is used by app.py, I don't see where downloads_cache is used, but similar agent-[0-9]+ structure. The SANS PDF "All-books-in-oneSANSSEC670RedTeamingTools-DevelopingCustomToolsforWindows.pdf" may be the inspiration behind…](https://pbs.twimg.com/media/G2qNOCVWoAAifxj.jpg)
Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts. platform.censys.io/hosts/185.208.… search.censys.io/hosts/185.208.… #malware #thread 🧵
![silascutler's tweet image. Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts.
platform.censys.io/hosts/185.208.…
search.censys.io/hosts/185.208.…
#malware #thread 🧵](https://pbs.twimg.com/media/G2qNOA6XAAA0fIC.jpg)
![silascutler's tweet image. Interesting #OpenDir on #QuasarRat C2 server 185.208.159[.]161:8000 . The open web directory includes source code for a backdoor + misc development artifacts.
platform.censys.io/hosts/185.208.…
search.censys.io/hosts/185.208.…
#malware #thread 🧵](https://pbs.twimg.com/media/G2qNOCdWQAAP13L.jpg)
🚨#Opendir #Malware🚨 🧵1 hxxps://tiger-checkout-draws-basketball.trycloudflare.com/ It's a nice time to learn how some TAs carry out their TTPs and at once invest time in #DetectionEngineering ☣️📸tp.bat➡️f136138d2e16aad30f27c6f30742dd7b Drops and execute a few runtimes⤵️


⚠️ Opendir Exposure | turdinc[.]kicks-ass[.]net Open directory hxxps://turdinc[.]kicks-ass[.]net/Msntv/imagesJP/JPbuildDC1004/WINCE/ hosts numerous files incl. .EXE. Flagged for #Malware analysts. Handle with extreme caution — DO NOT download or execute. #Opendir
![cyberfeeddigest's tweet image. ⚠️ Opendir Exposure | turdinc[.]kicks-ass[.]net
Open directory hxxps://turdinc[.]kicks-ass[.]net/Msntv/imagesJP/JPbuildDC1004/WINCE/ hosts numerous files incl. .EXE. Flagged for #Malware analysts. Handle with extreme caution — DO NOT download or execute.
#Opendir](https://pbs.twimg.com/media/G2XIL-EXMAAvOM6.jpg)
⚠️ LucasArts Opendir Exposure | #Opendir Open directory hosting 121 .EXE files found at hxxp://ftp[.]xtal[.]net/pub/archives/ftp-sites/ftp[.]lucasarts[.]com/patches/pc/ — Potential #Malware.For #Malware analysts. Handle with extreme caution; do NOT download or execute.
![cyberfeeddigest's tweet image. ⚠️ LucasArts Opendir Exposure | #Opendir
Open directory hosting 121 .EXE files found at hxxp://ftp[.]xtal[.]net/pub/archives/ftp-sites/ftp[.]lucasarts[.]com/patches/pc/ — Potential #Malware.For #Malware analysts. Handle with extreme caution; do NOT download or execute.](https://pbs.twimg.com/media/G2XBbFaXMAAGAdU.jpg)
⚠️ #Opendir Exposure | #GuardianProject Open directory at hxxps://guardianproject[.]info/releases/ — hosting 1000+ .EXE files. Marked as a source for #Malware analysts. Handle with extreme caution; do NOT download or execute. #CyberSecurity #DataLeak
![cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | #GuardianProject
Open directory at hxxps://guardianproject[.]info/releases/ — hosting 1000+ .EXE files. Marked as a source for #Malware analysts. Handle with extreme caution; do NOT download or execute.
#CyberSecurity #DataLeak](https://pbs.twimg.com/media/G2VlYvCW8AAQ8WF.jpg)
⚠️ #Opendir Exposure | #NewZealand Open directory found at hxxps://www[.]msupply[.]org[.]nz/files/old/ — hosting 100+ .EXE files. Flagged for #Malware analysts; handle with extreme caution. Do NOT download or execute. #CyberSecurity #DataLeak
![cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | #NewZealand
Open directory found at hxxps://www[.]msupply[.]org[.]nz/files/old/ — hosting 100+ .EXE files. Flagged for #Malware analysts; handle with extreme caution. Do NOT download or execute.
#CyberSecurity #DataLeak](https://pbs.twimg.com/media/G2VRdF7XMAAvJEi.jpg)
⚠️ #Opendir Exposure | cloudio[.]dedyn[.]io Leak Open directory (hxxps://cloudio[.]dedyn[.]io/~dio/) reportedly hosts samples: ipscan.zip, netscan.exe, netscan.zip, netscan_portable.zip. Tagged for #Malware analysts — handle with extreme caution.
![cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure | cloudio[.]dedyn[.]io Leak
Open directory (hxxps://cloudio[.]dedyn[.]io/~dio/) reportedly hosts samples: ipscan.zip, netscan.exe, netscan.zip, netscan_portable.zip. Tagged for #Malware analysts — handle with extreme caution.](https://pbs.twimg.com/media/G2PBFI0WUAAOPDb.jpg)
'Document.lnk' uploaded from Ireland @abuse_ch bazaar.abuse.ch/sample/d2c4344… #opendir hxxp://193.233.84(.)146/Documents/Document.lnk (Russia) Try to drop this one: hxxps://goole(.)com/a.exe
⚠️ #Opendir Exposure Open upload directory (hxxps://support[.]green[.]cz/uploads/index[.]php) hosts .EXE samples — netscan.exe, NetworkScannerSetup-3.0.4.exe. Tagged as a research source for #Malware analysts; handle with extreme caution. #Czech
![cyberfeeddigest's tweet image. ⚠️ #Opendir Exposure
Open upload directory (hxxps://support[.]green[.]cz/uploads/index[.]php) hosts .EXE samples — netscan.exe, NetworkScannerSetup-3.0.4.exe. Tagged as a research source for #Malware analysts; handle with extreme caution.
#Czech](https://pbs.twimg.com/media/G2MzXw-XAAAZDCr.jpg)
🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605



@500mk500 fyi #quasarRAT #opendir urlhaus.abuse.ch/url/3635801/ urlhaus.abuse.ch/url/3635800/ thanks to @huntio and @ReversingLabs

Heyyy if I was you and you want to learn more about #Malware @ryanlrussell wrote an awesome article you can read and learn a lot! How everything began with an #Opendir and end up in a so interesting research.
Check out my latest article: Are you tired of .bat, .lnk, and .py files yet? botw-ryanlrussell-18 linkedin.com/pulse/you-tire… Wherein I think I've seen this threat actor before. s/o @ShanHolo
Same Threat Actor behind these #opendir / Similar Stealer and PS1 scripts: Analysis through @Huntio revealed same certificate hash. Certificates.HashSha256:C3D1588C312A2CE47B1987E4EF5A44932E3F6FE563BC0A0B34898BE00A54559A 2nd opendir: 196.251.73.58 VT: virustotal.com/gui/ip-address…


#Cloudflare sites with 🚨#Opendir #Malware🚨 1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/ 2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/ 3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/



⚠️ #OPendir Discovery — #NAS #Australia downloads expose 50+ .EXE files (incl. psexec.exe). Handle with caution — potential malware / dual-use binaries. For #MalwareAnalysts & defenders only. 🔗 nas[.]com[.]au/downloads/ #CyberSecurity
![cyberfeeddigest's tweet image. ⚠️ #OPendir Discovery — #NAS #Australia downloads expose 50+ .EXE files (incl. psexec.exe). Handle with caution — potential malware / dual-use binaries. For #MalwareAnalysts & defenders only. 🔗
nas[.]com[.]au/downloads/ #CyberSecurity](https://pbs.twimg.com/media/G11bZOyXgAAo5ht.jpg)
'Document.js' from #opendir @abuse_ch hxxp://46.28.71(.)42:8080/html/dl/Document.js bazaar.abuse.ch/sample/5c2a5a4… C2 📡 hxxp://wkkuakciqmwewgyk(.)xyz:443/api/client_hello

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605



#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/



#Malware 🇧🇷 Sitio falso de MercadoEnvios descarga: - zip -> msi - AnyDesk Sites: hxxps://52.159.123.0/ hxxp://20.206.241.68/ #opendir C2 52.159.123.]0:6400 20.206.241.]68:6400
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tB5FMXoAEroug.jpg)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tCQqMXgAQKPNW.png)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tCVH-X0AAYH4Y.jpg)
![Merlax_'s tweet image. #Malware 🇧🇷
Sitio falso de MercadoEnvios descarga:
- zip -> msi
- AnyDesk
Sites:
hxxps://52.159.123.0/
hxxp://20.206.241.68/ #opendir
C2
52.159.123.]0:6400
20.206.241.]68:6400](https://pbs.twimg.com/media/F0tDJNiWYAEHTQc.png)
#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80
![Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷
Payloads #Opendir
hxxp://92.205.129.120/
Contador
hxxps://3illeceara1e2.likescandy.com/
C2
92.205.231.]161:80](https://pbs.twimg.com/media/GMCTZN9XwAEpBBN.png)
![Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷
Payloads #Opendir
hxxp://92.205.129.120/
Contador
hxxps://3illeceara1e2.likescandy.com/
C2
92.205.231.]161:80](https://pbs.twimg.com/media/GMCTb0hX0AA-7zC.png)
#opendir 106.14.176.]208 Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.
![Huntio's tweet image. #opendir 106.14.176.]208
Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic.
RingQ, an open-source Windows shellcode generator, is also present.
A week ago, Vshell was also detected on this IP on port 8082.](https://pbs.twimg.com/media/GU2WZl6a8AArWdk.jpg)
![Huntio's tweet image. #opendir 106.14.176.]208
Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic.
RingQ, an open-source Windows shellcode generator, is also present.
A week ago, Vshell was also detected on this IP on port 8082.](https://pbs.twimg.com/media/GU2WrsqaoAAgdA1.jpg)
Hunting Open Directories With Random File Names?🧐 Random file names can seem tricky to pivot on, but it's easy to do with some neat regex tricks. Let's look at signaturing a random file name to find new malicious open directories and IOC's. #malware #intel #opendir



Institución educativa en 🇨🇱Chile expone información confidencial de al menos 553 personas en un #opendir, incluyendo cédulas de identidad (ambas caras), certificados de estudio y nacimiento. Lo más grave es que esta info. es accesible para cualquiera, mediante una simple búsqueda…


#opendir for today! http://39.105.31.193:1389/ Client-built[.]exe = #QuasarRAT for you to analyse the rest!
![banthisguy9349's tweet image. #opendir for today!
http://39.105.31.193:1389/
Client-built[.]exe = #QuasarRAT
for you to analyse the rest!](https://pbs.twimg.com/media/GeGZ9IAXUAEEzWZ.jpg)
![jstrosch's tweet image. #opendir #uadmin #panel #zip
hxxp://179.43.141[.]100/](https://pbs.twimg.com/media/Fw5uifBXgAYOzsp.png)
![jstrosch's tweet image. #opendir #uadmin #panel #zip
hxxp://179.43.141[.]100/](https://pbs.twimg.com/media/Fw5ur-FXwAAaRWq.jpg)
Something went wrong.
Something went wrong.
United States Trends
- 1. Chiefs 106K posts
- 2. Branch 31.8K posts
- 3. Mahomes 32.3K posts
- 4. #TNABoundForGlory 53.4K posts
- 5. #LoveCabin 1,059 posts
- 6. LaPorta 10.4K posts
- 7. #LaGranjaVIP 61K posts
- 8. Bryce Miller 4,376 posts
- 9. Goff 13.6K posts
- 10. Rod Wave 1,095 posts
- 11. Kelce 16.2K posts
- 12. Dan Campbell 3,710 posts
- 13. #OnePride 6,347 posts
- 14. Red Cross 30.7K posts
- 15. #DETvsKC 4,928 posts
- 16. Butker 8,439 posts
- 17. Mariners 48.8K posts
- 18. JuJu Smith 4,073 posts
- 19. Baker 54.4K posts
- 20. Gibbs 5,474 posts