Brad

@malware_traffic

Sharing information on malicious network traffic and malware samples

127.0.0.1
Joined July 2013

Tweets

You blocked @malware_traffic

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @malware_traffic

  1. 36 minutes ago

    2018-12-27 - pushes () - 7 email examples, a of the infection traffic, and the associated at: - saw sent with this infection and numerous Wordpress site login attempts from my infected host

    Undo
  2. 9 hours ago

    2018-12-27 - The message text in this example from today seems a little more lazy than usual - Paste of the email: - Pastebin raw:

    Undo
  3. 9 hours ago

    2018-12-27 - executable files sent as URLs ending in ".png" from 195.123.212[.]29 starting today - Paste with info on today's examples: - Pastebin raw: - See Pastebin info about toler.png (it's always an old file)

    Undo
  4. Dec 26

    2018-12-26 - Two files I provided for UA-CTF in Nov 2018 - Now available to the public, with my suggested tasks and answers - Not a , but bonus material for those who've done the regular exercises but want more practice -

    Undo
  5. Dec 26

    2018-12-18 - Traffic Analysis Exercise - Eggnog Soup - Answers are now available: -

    Undo
  6. Dec 26

    2018-12-26 - campaign using malicious XLS file attachments - Not sure what this is, but saw thousands of emails went out from this campaign earlier today - Paste of details at: - Pastebin Raw:

    Undo
  7. Retweeted
    Dec 26
    Undo
  8. Dec 24

    2018-12-24 - executable files sent as URLs ending in ".png" from 91.200.100[.]169 starting as early as Wednesday 2018-12-19 - Paste with info on today's examples available at: - Pastebin raw:

    Undo
  9. Retweeted
    Dec 21

    Filename Check_Track_130838161.doc Download URLs hxxp://23.92.89 155/hole2.php hxxp://192.227.204 214/hole1.php hxxp://167.160.36 37/hole3.php Excutable: hxxp://[above ip]/crean.ova

    Undo
  10. Dec 21

    2018-12-19 - pushing is still a thing (ever since 2004). I don't think it will ever go away. - Recent examples and a of the infection traffic available at:

    Undo
  11. Dec 21
    Undo
  12. Retweeted
    Dec 21

    2018-12-21: [Technical] Let's Learn: In-Depth on / Golang | Project Debugging Path -> "C:/!Project/C1/ProjectC1Dec/main.go" | Host Collection, Screenshot, C2, Exec | Golang Open Source Copy/Paste | 16 main* Functions +

    Undo
  13. Dec 20

    2018-12-20 - Three days of infections, today with - files of the infection traffic, associated , and two examples available at

    Undo
  14. Dec 20

    2018-12-20 - File info from malspam infection (XLS file, EXE, EXE, and EXE) - Original thread started by : - Paste: - Pastebin raw (without the ads):

    Undo
  15. Dec 19

    2018-12-19 - Traffic Analysis Exercise - Eggnog Soup - Join the fun at: - How do you make an Eggnog Soup exercise? - Add a few Windows hosts and a scoop of non-Windows hosts to the mix, then bake the at 1500 MTU for 11 min -

    Undo
  16. Retweeted
    Dec 19

    More via passworded resume doc hosted at: http://209.141.61[.]249/555.exe c2 domains: lanoj[.]pw losived[.]host priolonis[.]host whoisther[.]com cc

    Show this thread
    Undo
  17. Dec 19
    Undo
  18. Undo
  19. Dec 19

    2018-12-19 - File info from malspam infection (XLS file, EXE, and EXE) - Thanks for your initial tweet chain about this - Paste: - Pastebin raw (without the ads):

    Undo
  20. Retweeted
    Dec 19

    Thanks for the heads up on this issue - I have found the bug which is now fixed in . I won't be able to update the community instance until tonight or tomorrow but I will reprocess these failed jobs. Sorry for the inconvenience!

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·