A new #Opendir spotted: hxxps://www[.]danhinsley[.]com/downloads/ — contains 21 .EXE files. Handle with caution. Good source for #Malware analysts. #Opendir #Malware

cyberfeeddigest's tweet image. A new #Opendir spotted: hxxps://www[.]danhinsley[.]com/downloads/ — contains 21 .EXE files. Handle with caution. Good source for #Malware analysts.

#Opendir #Malware

So, someone is running a social engineering campaign (#ClickFix) impersonating Rapid7 and using an old/abandoned domain that belonged to the same company? 🤔 🔸 https://rapid7labs[.]com/printer.html (#opendir) "Printer Vulnerability Remediation Steps" (possibly related to this…

1ZRR4H's tweet image. So, someone is running a social engineering campaign (#ClickFix) impersonating Rapid7 and using an old/abandoned domain that belonged to the same company? 🤔

🔸 https://rapid7labs[.]com/printer.html (#opendir)
"Printer Vulnerability Remediation Steps" (possibly related to this…
1ZRR4H's tweet image. So, someone is running a social engineering campaign (#ClickFix) impersonating Rapid7 and using an old/abandoned domain that belonged to the same company? 🤔

🔸 https://rapid7labs[.]com/printer.html (#opendir)
"Printer Vulnerability Remediation Steps" (possibly related to this…
1ZRR4H's tweet image. So, someone is running a social engineering campaign (#ClickFix) impersonating Rapid7 and using an old/abandoned domain that belonged to the same company? 🤔

🔸 https://rapid7labs[.]com/printer.html (#opendir)
"Printer Vulnerability Remediation Steps" (possibly related to this…
1ZRR4H's tweet image. So, someone is running a social engineering campaign (#ClickFix) impersonating Rapid7 and using an old/abandoned domain that belonged to the same company? 🤔

🔸 https://rapid7labs[.]com/printer.html (#opendir)
"Printer Vulnerability Remediation Steps" (possibly related to this…

🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir). "CRITICAL ADVISORY: Xerox Client Update Immediate action required for all Moose" + "If you're looking at this, this is part of a…

1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…


#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80

Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80
Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80

cc: @skocherhan @smica83 hxxp://freenet[.]am/~zombi #OpenDir thingy [ more your gig ]

medsci_yb3r's tweet image. cc: @skocherhan @smica83 

hxxp://freenet[.]am/~zombi

#OpenDir thingy [ more your gig ]

Large #opendir at: http://57.180.253.244 medium confidence msbuild.exe is #ghostrat

James_inthe_box's tweet image. Large #opendir at:

http://57.180.253.244

medium confidence msbuild.exe is #ghostrat

🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir). "CRITICAL ADVISORY: Xerox Client Update Immediate action required for all Moose" + "If you're looking at this, this is part of a…

1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…
1ZRR4H's tweet image. 🚩 #ClickFix ("Rapid7 IT Advisory") → macOS users → Apfell (red teaming framework). URL: https://security-usa[.]com:8443/printer.html (#opendir).

"CRITICAL ADVISORY: Xerox Client Update
Immediate action required for all Moose"

+ "If you're looking at this, this is part of a…

#Malware posible APT-C-36 🇨🇴 Remcos & njrat #Opendir hxxp://167.0.201.5/ hxxps://186.169.63.46/ hxxp://190.9.223.135/ hxxp://186.169.83.212/ C2 sost2024ene.]duckdns.]org:1213 remcosoct.]duckdns.]org:4576 02oct.]duckdns.]org:9001

Merlax_'s tweet image. #Malware posible APT-C-36  🇨🇴 Remcos & njrat
#Opendir
hxxp://167.0.201.5/
hxxps://186.169.63.46/
hxxp://190.9.223.135/
hxxp://186.169.83.212/

C2
sost2024ene.]duckdns.]org:1213
remcosoct.]duckdns.]org:4576
02oct.]duckdns.]org:9001
Merlax_'s tweet image. #Malware posible APT-C-36  🇨🇴 Remcos & njrat
#Opendir
hxxp://167.0.201.5/
hxxps://186.169.63.46/
hxxp://190.9.223.135/
hxxp://186.169.83.212/

C2
sost2024ene.]duckdns.]org:1213
remcosoct.]duckdns.]org:4576
02oct.]duckdns.]org:9001

some #opendir (reverse) #base64 fun :) hxxp://52.152.223[.]228/

jstrosch's tweet image. some #opendir (reverse) #base64 fun :) 

hxxp://52.152.223[.]228/
jstrosch's tweet image. some #opendir (reverse) #base64 fun :) 

hxxp://52.152.223[.]228/

#DarkVisionRAT #opendir https://5.89.185[.]156/

lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605

💡No #opendir? Why don't you check for .DS_Store files listing the structure ? Our scans found 11,856,006 IPs and DNS exposing the file. Link: leakix.net/search?scope=l… Ref: 0day.work/parsing-the-ds…

leak_ix's tweet image. 💡No #opendir? Why don't you check for .DS_Store files listing the structure ?

Our scans found 11,856,006 IPs and DNS exposing the file.

Link: leakix.net/search?scope=l…
Ref: 0day.work/parsing-the-ds…

#Cloudflare sites with 🚨#Opendir #Malware🚨 1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/ 2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/ 3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/

ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/
ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/
ShanHolo's tweet image. #Cloudflare sites with 🚨#Opendir #Malware🚨

1⃣hxxps://pretty-ebony-feeds-ericsson.trycloudflare.com/
2⃣hxxps://watches-omaha-partnerships-median.trycloudflare.com/
3⃣hxxps://static-obligations-baths-carnival.trycloudflare.com/

#malware #opendir at: http://179.43.176].109:8081/Downloads/1/

James_inthe_box's tweet image. #malware #opendir at:

http://179.43.176].109:8081/Downloads/1/
James_inthe_box's tweet image. #malware #opendir at:

http://179.43.176].109:8081/Downloads/1/
James_inthe_box's tweet image. #malware #opendir at:

http://179.43.176].109:8081/Downloads/1/
James_inthe_box's tweet image. #malware #opendir at:

http://179.43.176].109:8081/Downloads/1/

#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/

Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/

#malware #opendir at: http://invoicetrycloudflare\.com:9983/

James_inthe_box's tweet image. #malware #opendir at:

http://invoicetrycloudflare\.com:9983/

A new #Opendir spotted: hxxps://www[.]danhinsley[.]com/downloads/ — contains 21 .EXE files. Handle with caution. Good source for #Malware analysts. #Opendir #Malware

cyberfeeddigest's tweet image. A new #Opendir spotted: hxxps://www[.]danhinsley[.]com/downloads/ — contains 21 .EXE files. Handle with caution. Good source for #Malware analysts.

#Opendir #Malware

hxxps://mem-wedding-reputation-regulated.trycloudflare(.)com/ #WsgiDAV #opendir 'Rechnung_2025_11_33828247000801.pdf.lnk' bazaar.abuse.ch/sample/4045825…

smica83's tweet image. hxxps://mem-wedding-reputation-regulated.trycloudflare(.)com/
#WsgiDAV #opendir 
'Rechnung_2025_11_33828247000801.pdf.lnk' 
bazaar.abuse.ch/sample/4045825…
smica83's tweet image. hxxps://mem-wedding-reputation-regulated.trycloudflare(.)com/
#WsgiDAV #opendir 
'Rechnung_2025_11_33828247000801.pdf.lnk' 
bazaar.abuse.ch/sample/4045825…

#Opendir hxxp://dl1[.]iranroid[.]com/software/persian_apps/. Hundreds of .apk files exposed. Good source for #Malware analysts — handle with caution. #Opendir #Malware

cyberfeeddigest's tweet image. #Opendir hxxp://dl1[.]iranroid[.]com/software/persian_apps/. Hundreds of .apk files exposed. Good source for #Malware analysts — handle with caution.

#Opendir #Malware

#Payloads #Opendir hxxps://wedding-tray-interracial-authorities.trycloudflare.com/ BB1.txt➡️ 1⃣The script relaunches itself via PowerShell in mode hide 2⃣Opens a legit random PDF as decoy 3⃣Generates random filenames via custom function 4⃣📸⤵️Uses Base64-encoded C2 URLs

ShanHolo's tweet image. #Payloads #Opendir 

hxxps://wedding-tray-interracial-authorities.trycloudflare.com/

BB1.txt➡️
1⃣The script relaunches itself via PowerShell in mode hide
2⃣Opens a legit random PDF as decoy
3⃣Generates random filenames via custom function
4⃣📸⤵️Uses Base64-encoded C2 URLs
ShanHolo's tweet image. #Payloads #Opendir 

hxxps://wedding-tray-interracial-authorities.trycloudflare.com/

BB1.txt➡️
1⃣The script relaunches itself via PowerShell in mode hide
2⃣Opens a legit random PDF as decoy
3⃣Generates random filenames via custom function
4⃣📸⤵️Uses Base64-encoded C2 URLs

#Opendir alert 🚨 An exposed directory found at hxxp://www[.]irai[.]com/pp/ containing 15 .EXE and 57 .apk files. Flagged by Google Chrome as “Dangerous”. Handle with caution. Good source for #Malware analysts. #Opendir #Malware

cyberfeeddigest's tweet image. #Opendir alert 🚨 An exposed directory found at hxxp://www[.]irai[.]com/pp/ containing 15 .EXE and 57 .apk files. Flagged by Google Chrome as “Dangerous”.
Handle with caution. Good source for #Malware analysts.

#Opendir #Malware

cc: @skocherhan @smica83 hxxp://freenet[.]am/~zombi #OpenDir thingy [ more your gig ]

medsci_yb3r's tweet image. cc: @skocherhan @smica83 

hxxp://freenet[.]am/~zombi

#OpenDir thingy [ more your gig ]

Another #WsgiDAV #opendir hxxps://lens-facility-calvin-theorem.trycloudflare(.)com/ju/

smica83's tweet image. Another #WsgiDAV #opendir 
hxxps://lens-facility-calvin-theorem.trycloudflare(.)com/ju/

There's nothing to see here, please move along. #opendir

BlinkzSec's tweet image. There's nothing to see here, please move along.

#opendir

#Opendir hxxps://www.launch[.]sk/download/. Contains 23 .apk files. Handle with caution — potential risk. Good source for #Malware analysts. #Opendir #Malware

cyberfeeddigest's tweet image. #Opendir hxxps://www.launch[.]sk/download/. Contains 23 .apk files. Handle with caution — potential risk. Good source for #Malware analysts.

#Opendir #Malware

#opendir #remcos cc: @500mk500 @JAMESWT_WT hta. -> hex+XOR(0x37) -> powershell script -> download zip -> extract -> run exe SyAlpha16.exe -> FrameTrac32.exe -> remcos app.any.run/tasks/fcc2769d… "C2": [ "seguritypostload/.duckdns.org:1122" ], 👇 urlhaus.abuse.ch/host/192.159.9…

BlinkzSec's tweet image. #opendir #remcos

cc: @500mk500 @JAMESWT_WT 
hta. -> hex+XOR(0x37) -> powershell script -> download zip -> extract -> run exe

SyAlpha16.exe -> FrameTrac32.exe -> remcos
app.any.run/tasks/fcc2769d…

"C2": [
"seguritypostload/.duckdns.org:1122"
],
👇
urlhaus.abuse.ch/host/192.159.9…
BlinkzSec's tweet image. #opendir #remcos

cc: @500mk500 @JAMESWT_WT 
hta. -> hex+XOR(0x37) -> powershell script -> download zip -> extract -> run exe

SyAlpha16.exe -> FrameTrac32.exe -> remcos
app.any.run/tasks/fcc2769d…

"C2": [
"seguritypostload/.duckdns.org:1122"
],
👇
urlhaus.abuse.ch/host/192.159.9…
BlinkzSec's tweet image. #opendir #remcos

cc: @500mk500 @JAMESWT_WT 
hta. -> hex+XOR(0x37) -> powershell script -> download zip -> extract -> run exe

SyAlpha16.exe -> FrameTrac32.exe -> remcos
app.any.run/tasks/fcc2769d…

"C2": [
"seguritypostload/.duckdns.org:1122"
],
👇
urlhaus.abuse.ch/host/192.159.9…

This #opendir has got it all @HackingLZ - 83.147.241.206


Go away, there's nothing to see here. #opendir

BlinkzSec's tweet image. Go away, there's nothing to see here.
#opendir

#Opendir spotted — contains utility samples incl. a Handle with caution. Good source for #Malware analysts hxxps://silentdragon.com/

cyberfeeddigest's tweet image. “#Opendir spotted — contains utility samples incl. a  Handle with caution. Good source for #Malware analysts

hxxps://silentdragon.com/

#Opendir spotted — contains utility samples incl. a port-scanner .exe. Handle with caution. Good source for #Malware analysts hxxp://173.212.252.156:60000/HW/Utility/

cyberfeeddigest's tweet image. “#Opendir spotted — contains utility samples incl. a port-scanner .exe. Handle with caution. Good source for #Malware analysts

hxxp://173.212.252.156:60000/HW/Utility/

🚨 #Opendir spotted at hxxp://info.elf.stuba.sk/packages/pub/pc/comm/ Hosting 478 .EXE files. Handle with caution. Useful for #Malware analysts. Includes: netscan.exe, portscan, ipscan25.exe, netscan #Opendir #Malware

cyberfeeddigest's tweet image. 🚨 #Opendir spotted at hxxp://info.elf.stuba.sk/packages/pub/pc/comm/

 Hosting 478 .EXE files. Handle with caution. 
Useful for #Malware analysts. Includes: netscan.exe, portscan, ipscan25.exe, netscan

#Opendir #Malware

🚨 #Opendir found at hxxps://cloudio[.]dedyn[.]io/~dio/ flagged by Chrome as dangerous. Handle with caution. Useful for #Malware analysts. Sample files include: FTSDeskUpdate.exe, SpaceSniffer.exe, netscan.exe/zip, putty.exe, sleep.exe.

cyberfeeddigest's tweet image. 🚨 #Opendir found at hxxps://cloudio[.]dedyn[.]io/~dio/

 flagged by Chrome as dangerous. Handle with caution. Useful for #Malware analysts. 
Sample files include: 
FTSDeskUpdate.exe, SpaceSniffer.exe, netscan.exe/zip, putty.exe, sleep.exe.

New domain, same #OpenDir + new #malware directory. libertytrading-biz[.]com/pure/APPDATA[.]exe "APPDATA.exe" - app.any.run/tasks/99bcb3f6… #stealer #purehvnc #netreactor #zgrat @anyrun_app

🧵 www[.]packinqsolutionsindia[.]com - An interesting collection of #RMM dropper and #Phishing pages in an #OpenDir #SimpleHelp #ConnectWise #LogMeInResolve etc. Impersonates @SocialSecurity @CanRevAgency @Intuit @QuickBooks @onedrive @TencentGlobal etc. Operation has been…

eqv_sec's tweet image. 🧵 www[.]packinqsolutionsindia[.]com - An interesting collection of #RMM dropper and #Phishing pages in an #OpenDir 

#SimpleHelp #ConnectWise #LogMeInResolve etc.

Impersonates @SocialSecurity @CanRevAgency @Intuit @QuickBooks @onedrive @TencentGlobal etc.

Operation has been…


#DarkVisionRAT #opendir https://5.89.185[.]156/

lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/
lontze7's tweet image. #DarkVisionRAT #opendir

https://5.89.185[.]156/

🚨#Opendir #Malware🚨 hxxps://45.81.113.220/ ⚠️#QuasarRAT ☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6 📡📸tcp://45.81.113.220:1605

ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605
ShanHolo's tweet image. 🚨#Opendir #Malware🚨

hxxps://45.81.113.220/

⚠️#QuasarRAT 
☣️📸Client.exe➡️efffe2afbc5d8a0ad85b16155f0e1ed6
📡📸tcp://45.81.113.220:1605

#malware #opendir at: http://invoicetrycloudflare\.com:9983/

James_inthe_box's tweet image. #malware #opendir at:

http://invoicetrycloudflare\.com:9983/

#Malware KL Remota "Zeus" 🇧🇷 Payloads #Opendir hxxp://92.205.129.120/ Contador hxxps://3illeceara1e2.likescandy.com/ C2 92.205.231.]161:80

Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80
Merlax_'s tweet image. #Malware KL Remota "Zeus" 🇧🇷

Payloads #Opendir
hxxp://92.205.129.120/

Contador
hxxps://3illeceara1e2.likescandy.com/

C2
92.205.231.]161:80

#phishing #opendir: https://dmc.otarvesq\.com/POST/

James_inthe_box's tweet image. #phishing #opendir:

https://dmc.otarvesq\.com/POST/

#malware #opendir #asyncrat at: http://horus-protector\.pro/d/

James_inthe_box's tweet image. #malware #opendir #asyncrat at:

http://horus-protector\.pro/d/

#malware #opendir at: http://176.65.134\.79/HOST/

James_inthe_box's tweet image. #malware #opendir at:

http://176.65.134\.79/HOST/

#Malware posible APT-C-36 🇨🇴 Remcos & njrat #Opendir hxxp://167.0.201.5/ hxxps://186.169.63.46/ hxxp://190.9.223.135/ hxxp://186.169.83.212/ C2 sost2024ene.]duckdns.]org:1213 remcosoct.]duckdns.]org:4576 02oct.]duckdns.]org:9001

Merlax_'s tweet image. #Malware posible APT-C-36  🇨🇴 Remcos & njrat
#Opendir
hxxp://167.0.201.5/
hxxps://186.169.63.46/
hxxp://190.9.223.135/
hxxp://186.169.83.212/

C2
sost2024ene.]duckdns.]org:1213
remcosoct.]duckdns.]org:4576
02oct.]duckdns.]org:9001
Merlax_'s tweet image. #Malware posible APT-C-36  🇨🇴 Remcos & njrat
#Opendir
hxxp://167.0.201.5/
hxxps://186.169.63.46/
hxxp://190.9.223.135/
hxxp://186.169.83.212/

C2
sost2024ene.]duckdns.]org:1213
remcosoct.]duckdns.]org:4576
02oct.]duckdns.]org:9001

#Opendir #Panel 🇧🇷 Sites: hxxp://74.207.237.97/ hxxp://24.152.39.178/contador/ hxxp://24.152.37.226/contador/

Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/
Merlax_'s tweet image. #Opendir #Panel 🇧🇷

Sites:
hxxp://74.207.237.97/
hxxp://24.152.39.178/contador/
hxxp://24.152.37.226/contador/

#venomrat #opendir at: http://trackingshipmentt\.xyz:9394/ http://trackmyshipeng\.site:9094/ app.any.run/tasks/086f767d…

James_inthe_box's tweet image. #venomrat #opendir at:

http://trackingshipmentt\.xyz:9394/
http://trackmyshipeng\.site:9094/

app.any.run/tasks/086f767d…
James_inthe_box's tweet image. #venomrat #opendir at:

http://trackingshipmentt\.xyz:9394/
http://trackmyshipeng\.site:9094/

app.any.run/tasks/086f767d…

#purecryptor #opendir at: http://198.12.126].164/tst/

James_inthe_box's tweet image. #purecryptor #opendir at:

http://198.12.126].164/tst/

#opendir 106.14.176.]208 Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.

Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.
Huntio's tweet image. #opendir 106.14.176.]208

Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. 

RingQ, an open-source Windows shellcode generator, is also present. 

A week ago, Vshell was also detected on this IP on port 8082.

Large #opendir at: http://57.180.253.244 medium confidence msbuild.exe is #ghostrat

James_inthe_box's tweet image. Large #opendir at:

http://57.180.253.244

medium confidence msbuild.exe is #ghostrat

Loading...

Something went wrong.


Something went wrong.


United States Trends