Alexey Vishnyakov

@Vishnyak0v

Senior Specialist, Threats Analysis Group at . Tweets are my own

Vrijeme pridruživanja: svibanj 2018.

Tweetovi

Blokirali ste korisnika/cu @Vishnyak0v

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Vishnyak0v

  1. prije 2 sata

    April, 🇪🇸, Barcelona ... Let's dive deeper into high-level threats at together. See you all! 🤠

    Poništi
  2. 28. sij

    Suddenly old signed (DUHANEY LIMITED) DnsShellClient under group packer 5dedfd0d766de680e5a7bb0612bee53c \\Mac\Home\dev\e-spy\DnsShellClient\bin\Win32\Release\installer.pdb ns1[.]dot[.]net[.]in A few links with

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    Alexey Vishnyakov, Senior Specialist, Threats Analysis Group at will deliver a talk on "Mlw #41: a new sophisticated loader by group TA505" at . ℹ️ Register today & avail pre-con discount to save up to Rs. 6,000➡️

    Poništi
  4. 21. sij

    A quite convenient approach for choosing the domain name by group: apt5-secure3-state[.]com ab6d150d745053afae1d86f464954c42 a9c7d342359cb7a6180f71c6dc18be2b Fake overlaps with and a false trace to China? ...

    Poništi
  5. 17. sij

    Nice! The talk about advanced loader of group has been accepted to in India 🇮🇳. Let's come back to Goa 🌴

    Poništi
  6. 16. sij
    Prikaži ovu nit
    Poništi
  7. 13. sij

    One more malware from recent attacks against Russia and South Korea. XOR encrypted payload. RC4 encrypted strings and C2 communication remains the same. 221b9de416d42a979288cfa196912af4 15af764731c257caf1ee26d1cfc049a9 etude.servemp3[.]com

    Poništi
  8. 27. pro 2019.

    New Year wishes from the group (with love for russian researchers): MD5: a7cea801e0382676ff8e800187607276 hxxp://jopanovigod.xyz/f8h7ghd8gd8/index.php jopanovigod -> jopa novi god -> ass new year

    Poništi
  9. 27. pro 2019.

    The // infection checker. Possibly from MD5: 86c9e95dcf69f6eca2a176407dcb99ff RahaSecIOC-x86.exe

    Poništi
  10. 23. pro 2019.

    A wonderful gift for the Christmas and upcoming birthday. The lightning talk "Mlw #41: a new sophisticated loader by APT group TA505" has been accepted! Looking forward to attend

    Prikaži ovu nit
    Poništi
  11. 18. pro 2019.
    Prikaži ovu nit
    Poništi
  12. 18. pro 2019.
    Prikaži ovu nit
    Poništi
  13. 16. pro 2019.

    dfsugfygeyy4ggf[.]xyz dsigoisdijgjg[.]xyz asfasfijfjsi55[.]xyz dsgsdgpogsdj24dgoiu[.]xyz kiparis[.]xyz ofiughfuu[.]xyz dsnnguyrygfu[.]xyz hxxp://almagel.icu/cp.exe hxxp://almagel.icu/ssh.zip hxxp://gabardina.xyz/log.txt hxxp://kuarela.xyz/1.txt

    Prikaži ovu nit
    Poništi
  14. 16. pro 2019.

    f8a436fdf56a55cdc50b783e8d76f5e4 942436cfe7b54865a5dfe7460610d763 ca411b87c7f85d7ea15b8d1b4bfd000b 1814164fbd7b5507bcb48be080817942 c982570ca4be486ffd1337e8c61db972 asggh554tgahhr[.]pw sgahugu4ijgji[.]xyz dfsgu747hugr[.]pw kilimadzhara[.]xyz d8ufhhhfa448[.]xyz

    Prikaži ovu nit
    Poništi
  15. 16. pro 2019.

    A few fresh and rebuilt samples related to group. The Vigenere encryption for strings remains the same.

    Prikaži ovu nit
    Poništi
  16. 10. pro 2019.

    group started using the stealer under their packer: ccdc3f83d847daf09e6c10be46b63b2e 185.203.117[.]232

    Poništi
  17. 9. pro 2019.

    loader from Malaysian attacks linked to TEMP.Periscope group: 8a133a382499e08811dceadcbe07357e accountsx.bounceme[.]net

    Poništi
  18. 28. stu 2019.

    Problems with an office document? Nothing after opening? Seems that suspicious? Try to print out it! 27a10e250f846dbfca0f56b12913d60d

    Poništi
  19. 27. stu 2019.

    A funny korean fake_konni.doc with 🇷🇺 text and domain as C2. Some kind of joke? :-) bf27815282d53d4182f54507e83b8c5a hxxp://file.ahnlab.com/1.txt

    Poništi
  20. 27. stu 2019.

    One more overlap between groups: MainModule backdoor under packer. A config is compressed with the adaptive -based algorithm. 692c4e4db4aaec596dc570b1f12b8c2a 45.84.0[.]201 Special thanks to

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·