Zoekresultaten
  1. 6 uur geleden
  2. 10 uur geleden
    Deze collectie tonen
  3. 17 uur geleden
  4. 25 jun.
  5. 12 jun.
  6. 25 mei
  7. 16 mei

    Now you can open malicious link in the default browser at without downloading HTML files. Very useful for researching exploits. And it is already available on FREE plans! example:

    Deze collectie tonen
  8. 9 apr.

    to then by exploiting Flash vulnerability CVE-2018-4878 (other runs seen by and earlier today) drops . Using Flash 28,0,0,126 and fully patched Win 7 64 bit. 😬 I blogged! Files and such on ->

  9. 9 apr.
  10. 14 mrt.

    2018-03-14 - freegogpcgames[.]pro is a fake domain that led to campaign pushing - 53hshshshs[.]info is the gate and was on 46.229.213.39 when I checked - sample:

  11. 12 mrt.

    3-11-2018: -> Landing 92.53.127[.101 (AS9123) Decrypt payload key "uDoW4P6LPK" cmd.exe (char obfuscation/split/XOR) Possible sequence detection on RigEK drops: 'cmd.exe /q /c cd /d "%tmp%"' & 'start wscript //B //E:JScript' Paste: ⚔️

  12. 1 mrt.
  13. 15 feb.

    2-15-2018: via -> banker -> gang's hidden VNC module Tested: exports & hidden session via another explorer.exe 🤔 Hash: 5ae2ad8f0be144ce732badf7dec0a16e Still a formidable weapon for (Demetra) crooks to control a remote PC for carding/ATO 🧐

  14. 13 feb.
  15. 30 jan.

    2018-01-30 - sends , follow-up malware: - pcaps/malware/more info at - possibly the campaign but cannot confirm

  16. 29 jan.

    2018-01-29 - Three days of campaign pushing - pcaps/malware samples at: - Wikipedia tells me "Gand" is an Indian slang term for the buttocks, so you might hear me refer to "GandCrab" as "ButtCrab" ransomware.

  17. 19 jan.

    2018-01-19 - Three recent examples of campaign - pcap and malware samples at:

  18. 17 jan.

    Let's Learn: Dissect Rig Exploit Kit Anti-Bot Filter Gate Malchain: Seamless Gate -> Anti-Bot Filter Gate -> Landing Page -> Flash Exploit CVE-2015-8651 -> Banking Source:

  19. 11 jan.

    2018-01-11 - (probably the campaign) sends / which grabs - pcap/malware available at:

  20. 10 jan.

    2018-01-09 - campaign continues using to send - pcap/malware/artifacts at: - also has a recent example at - Thanks to for his help!

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.