Rezultati pretraživanja
  1. 3. velj

    2020-02-03:🆕🔥 Loader➡️ 'HiddenDesktop' 1⃣"FudV"|2⃣Recompiled from Leak| 3⃣AVE_MARIA 🛡️C2: 94.103.81. 79 👾PDB: C:\Users\Administrator\Documents\c++ project\hVNC\Client\Release\FudV.pdb h/t MD5: 6d8d825d00a4a1d8e3f406bad69fa4a7

  2. 2. ruj 2019.
  3. 4. velj
    Odgovor korisniku/ci

    /milagrecf.php is the sign of

  4. 31. sij
    Odgovor korisniku/ci

    Oh nice.......nasty...cc been a while since I've seen it.

  5. 23. pro 2019.
    Odgovor korisnicima

    Looks like some action as well...

  6. 8. ruj 2019.
    Prikaži ovu nit
  7. 9. kol 2019.

    Nice found by my friend at: beastmas[.]club/dl/ (VtpYRswHC.exe) and / sig to match the traffic: c2 on the : 23.83.133.215 these inject into WerFault.exe instead of svchost.exe, cc

    Prikaži ovu nit
  8. 25. srp 2019.
    Odgovor korisnicima

    Yes. To be frank, it is very rare we see new modules lately outside of you flagging here. Here is the older tweet re: x86 (or vnc64Dll x64) aka -like replica ->

  9. 9. srp 2019.

    A very interesting at: apertona[.]com found by c2's: 32.41.89.121 https://sertacio12[.]com/~yb284fvbhsd/error_faust.php possible modded so cc hash cb0b5f73d5804b86a0bd90e2bf6cad8a on

  10. 13. lip 2019.

    HVNC C&C : hxxp://13.232.142.19

  11. 10. ožu 2019.

    Hidden remote desktop tool DarkVNC C&C : hxxp://23.82.19.60:8070

  12. 28. sij 2019.
  13. 3. sij 2019.
    Odgovor korisniku/ci

    from the malware author desktop

  14. 17. stu 2018.

    the guys are more active there days with a few versions

  15. 14. ruj 2018.
    Odgovor korisnicima i sljedećem broju korisnika:

    Correct. This is the same leaked improved complied source code (with roots) from an underground dev "ABS0LEM."

  16. 12. ruj 2018.

    (?) hosted at: 31.210.172.47 c2 is 74.118.139.159 orig and extracted hashes on "4debd59e6e01c49e995658000f9c6b702ae65fafd30a0ddeef4c706cf7a8ac81" "38075690fdaa2371c8fc7e1b1db0902006e736f4032119cbb94c9e5bb98d1e33"

    Prikaži ovu nit
  17. 21. velj 2018.

    Let's Learn: Deeper Dive into (demetra) Hidden ”VNC " Remote Control Module Allows Concurrent Victim PC Usage for ATO Hidden Desktop Creation | Code Reuse of | Copy/Paste of ISFB AcDLL Inject | mem Source:

  18. 17. lis 2017.

    2017 Talk: Who Hid My Desktop – Deep Dive Into - Or Safran & Pavel Asinovsky

  19. 26. sij 2017.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.