MeltX0R

@MeltX0R

Threat Intelligence, Research, and Analysis.

Vrijeme pridruživanja: rujan 2018.

Tweetovi

Blokirali ste korisnika/cu @MeltX0R

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MeltX0R

  1. 20. pro 2019.
    Prikaži ovu nit
    Poništi
  2. 20. pro 2019.

    Low detection on VT. /: 600154fcb03e775f007ef7b1547b169c 6ec0edd1889897ff9b4673600f40f92f C2: telekom-support[.]info

    Prikaži ovu nit
    Poništi
  3. 11. pro 2019.
    Prikaži ovu nit
    Poništi
  4. 11. pro 2019.

    MD5: 755f43ea09f065082ac4f57348e5f8fa PDB: C:\Users\qaz\Desktop\sea\client - jhb\Release\client.pdb No C2 was initiated during initial analysis, but two domains were present in the executable: proxy.intranet[.]gov[.]cy & www.cumburi[.]com

    Prikaži ovu nit
    Poništi
  5. 6. pro 2019.
    Prikaži ovu nit
    Poništi
  6. 6. pro 2019.

    OneDrive URL: onedrive[.]live[.]com/redir?resid=B092B6A5A6799E8E!107&authkey=!AIRTzE3EsZ0wA2s&ithint=file%2Cpdf&e=AIAGS2 onedrive.pdf: 72497130c829430d247a3c7a8143df92 Redirect URL: beserorman[.]com/inex.html

    Prikaži ovu nit
    Poništi
  7. 6. pro 2019.

    Initial infection vector is via to deliver a PDF, which is used to redirect to the aforementioned goknar-mobilya[.]com URL.

    Prikaži ovu nit
    Poništi
  8. 6. pro 2019.

    Doc: goknar-mobilya[.]com/Documents/Documents.rtf (6d55252fad0207756c671de8d5f97e7f) downloads payload from 45.77.239[.]169/putty.exe /: f8c29e77db2b1ed69d7eb04552291058 8510cf9a962d813e368f79c28cb4be9d C2: cari-properti[.]info

    Prikaži ovu nit
    Poništi
  9. 14. stu 2019.
    Prikaži ovu nit
    Poništi
  10. 14. stu 2019.

    / MD5: 7d339ee10e6561f1fb9de3ab05dd4fb8 b372fd09864d839112b79b7f0675f7df C2: adminassistance[.]info bestguesspass[.]info

    Prikaži ovu nit
    Poništi
  11. 24. lis 2019.
    Prikaži ovu nit
    Poništi
  12. 24. lis 2019.

    Suspected Targeted attacks against mining corporations in Kazakhstan IOCS: 27e9247d28598207794424eeb5ea4b1b a863c2944581bc734619bf8d6ab1aef8 57c2b46c7f2ad9aba80e4b6248f9367a Analysis:

    Prikaži ovu nit
    Poništi
  13. 23. lis 2019.

    Another hash: fd6e378ee8e518113893e4f157efe74e

    Prikaži ovu nit
    Poništi
  14. 23. lis 2019.
    Prikaži ovu nit
    Poništi
  15. 23. lis 2019.
    Prikaži ovu nit
    Poništi
  16. 23. lis 2019.

    / MD5: feb0fc8429f843d79fa1f4da1eea5a1c 418ab6be4016d851eff94b086e22bc9e f0d0d4c366af9455329497ae33b8c52d C2: fraud-bank[.]host

    Prikaži ovu nit
    Poništi
  17. 21. lis 2019.
    Prikaži ovu nit
    Poništi
  18. 21. lis 2019.

    / MD5: 75d8cb1292c25e10fa189f1af69b4413 406451a97cc4f963ecfe25aa9f813d43 32955a8252db8eb1c1e9cb155e67d375 ed1c36673c90a5b041e2078ad4f2e520 C2: centos-update[.]info 0345432456[.]info paysimcard[.]info

    Prikaži ovu nit
    Poništi
  19. 17. lis 2019.
    Prikaži ovu nit
    Poništi
  20. 17. lis 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·