Thanks to @anyrun_app, it appears the 2nd-stage payload in the #Crunchyroll hack, was in fact Meterpreter. Updated:
https://bartblaze.blogspot.co.uk/2017/11/crunchyroll-hack-delivers-malware.html …
-
-
Replying to @bartblaze @anyrun_app
Awesome! I had only found one pcap from when it was live at payload security but it returned 0 content to their sandbox
1 reply 0 retweets 1 like
Replying to @sysopfb @anyrun_app
Yeah, my PCAPs showed mostly resets (RST) as well. Great catch by the @anyrun_app team.
1:45 PM - 5 Nov 2017
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.