Rezultati pretraživanja
  1. 3. velj

    2020-02-03:🆕🔥 Loader➡️ 'HiddenDesktop' 1⃣"FudV"|2⃣Recompiled from Leak| 3⃣AVE_MARIA 🛡️C2: 94.103.81. 79 👾PDB: C:\Users\Administrator\Documents\c++ project\hVNC\Client\Release\FudV.pdb h/t MD5: 6d8d825d00a4a1d8e3f406bad69fa4a7

  2. 26. ruj 2019.

    53daa43d1313d5cb4ce240c7f850ee86 () c2: jokertor.]com/api (/check.get, /Clipper.post, /Clipper.get, /gate.get,..) Downloads : http://digalitol.]fun/u/sppsvw.exe () c2: http://zalivy.]ug/gate.php

    Prikaži ovu nit
  3. 15. kol 2019.
  4. 4. lip 2019.

    Loader / Spammer spread in France for a few weeks now ! Domains related (recommended to block) are here (fun fact you'll recognize a well known style in the malware code and TTPS )

    Prikaži ovu nit
  5. 27. ožu 2019.

    What if you need to determine the type of , but C2 is already dead? 🤔 Just use the contextual search in by domains, IPs or hashes! Here is the example of from : Today: From 10 Jan:

  6. 26. ožu 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Hello! This is . After rebooting we can see the C2 - m0pedx9[.]su, Unresolved, but you can find related tasks in public submissions by context (domain), here are:

  7. 14. velj 2019.

    Active c2 at: http://pagefinder52[.]uz/razer/gate.php thanks to for the sample, hash 34e252f4c5dd63e61686d77100120f42 on

    Prikaži ovu nit
  8. 9. sij 2019.

    I've just released an old script to retrieve WebInjects and binaries from CnCs. It's available on GitHub:

  9. 17. pro 2018.

    Soit le prix du kebab a augmenté dans les balkans soit y'en a un qui nous fait une petite crise existentielle, mais est de retour en France depuis une dizaine de jours ! c2: sample (du jour): 903f4b1ce7fc9e9127d5e08dce805619

    Prikaži ovu nit
  10. 11. lis 2018.

    : Actual hidden message from Tinynuke's botmaster posted on Onion C&C are : > RIMBAUD : Jeunesse (Illuminations 1873) > Papal indulgence 1516 (Essay on catholic reformation) > Adam and Eve

  11. 8. lis 2018.

    spread in France this morning ! (same guy as usual) hxxps://telechargement-email[.]cc/setup.exe

  12. 26. srp 2018.

    Another Tinynuke campaign targeting Poland just appeared. Malicious DLL is called this time "iloveyou.dll" with new PDB too "c:\users\user\documents\visual studio 2012\Projects\HoodRich\Release\HoodRich.pdb"

  13. 15. srp 2018.

    7-15-2018: ITW (Leaked Src Base) 🤔 C2[2]: { "dingparighrewrec].win", "refendisoked[.win" } /panel/client.php | Same XOR key string encryption | "Entering bot loader" | MD5: 1a097463e356b255875fd8b4779ecd1d PDB: C:\work\bot\Bin\int32.pdb Stay safe!🛡️

  14. 10. srp 2018.

    : Hidden message (C&C text) from Tinynuke's botmaster posted for security companies !

    Prikaži ovu nit
  15. 25. lip 2018.

    6-25-2018: VT Hunt: Banker & Stealer C2 Block -> /tarati.se/.pma/ TinuNuke MD5 (C2 /php/): 4dbf7ad8904de470d0ee45d38f70c68a Default Webinject Template Pony MD5 (C2 /mysql/): 6650056f1360dc206ef647a9a6c28476 Uploaded Samples -> 🛡️

  16. 25. lip 2018.

    After the victory of the political elections of , an attack of malspam from Turkey hits Italy and spreads the trojan banker

    Prikaži ovu nit
  17. 14. lip 2018.

    6/13 Votre facture coriolis[.]site downloads zip with exe facture_31254872_13.06.2018.exe ytcracker - nerd ambition.mp3 cc

  18. 14. lip 2018.

    Besides developing malware, they make poetry... Oh wait. It's lyrics of Nerd Ambition by YTCracker. Malware: Payload: coriolis[.]site/facture/ Panel: 4s65xlo930ubyjz8dlcm[.]com/admin/login.php

  19. 19. stu 2017.
    Odgovor korisnicima i sljedećem broju korisnika:

    I am tracking it as well. It looks another iteration of the leaked banking Trojan source code and appears to be related to .

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.