Rezultati pretraživanja
  1. 4. velj

    Today we have received 628 eMails of this malicious campaign! 🙄 Our Feed is full of details! 🤟 Thanks to the whole Twitter community for spreading information and fighting these campaign!

  2. 4. velj

    Subject: Sollecito di pagamento - Received From: 93.46.44.198 - Attachment: 579486_sollecito_SOL20A4760324.xls - MD5 Hash: 99C177598FA892CB999816EF94E1D041

  3. 4. velj

    2020204 target Italy xls -> wmic -> PowerShell -> xls: Payload from: s://romaitaliacommerciale[.]site/etis?<UUID>(37.221.114[.]86) Ursnif:

    Prikaži ovu nit
  4. 4. velj
  5. 4. velj

    targets 🇮🇹 from XLS > VBA > DLL hxxps://romaitaliacommerciale.site/etis?<GUID> romaitaliacommerciale].site milanoofficialfatt.]online barifattonumero[.pw officebuysell].pro

  6. 3. velj

    > (macro) HTML: a5e91dcc988768fe55d10ba1ce6ebef8 (obfuscated JS) --> MalDoc: 3d64db988c898b9232863d1a31674c28 (sleeps ~5 min) --> hxxps://194.36.188[.]132/random.png

  7. 3. velj

    What kind of malware is dropped by this in Czech?🤔 Is this downloader? Subject: Připomenutí o splacení dluhu FileName: F-44011156.doc

  8. Kazakstan Bank themed on close from hxxps://nationalbank.bz/Doc/Prikaz.doc PS -> hxxps://wateroilclub.com/file/dwm.exe einmrmdmy.exe 6/68 on VT (SSL) -> formixing[.]com Not sure what this but it crashes in AnyRun or appears to. AnyRun:

  9. Interesting ! doc -> Macro -> PowerShell -> Shellcode -> ??  …

  10. 30. sij

    Interested in learning how to debug macros or learn more about the structure of user forms? In my latest video, I show you how to use the Office IDE to debug a recent

  11. 30. sij
  12. compromised Advanced Ortho Center's website and uses (72e371542ad6fda96bb3fc3b1ee68d92) to communicate w/ the C2 server advanceorthocenter[.]com/wp-includes/editor[.]php. . Persistence in the System32 directory.

  13. 28. stu 2019.
    Prikaži ovu nit
  14. 4. stu 2019.
    Prikaži ovu nit
  15. 31. lis 2019.

    found this on anyrun it starts notepad.exe in the background, and i think it injects a coinminer throttled to 50% cpu

    Prikaži ovu nit
  16. 21. lis 2019.

    SOC report 10 22 2019.doc Fake Security Operations Center (SOC) report attack. Sample upload at 2019-10-21,So maybe attack Starting at 10-22. Test sample name : Maldoc3 (1),submit from us IOC List:

  17. Did you know that you can protect your VBA code in MS Office documents from being viewable? Here's a walkthrough from our very own Carrie Roberts!

  18. 28. kol 2019.
  19. 18. lip 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.