Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @malware_traffic
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @malware_traffic
-
2022-04-16 (Thursday) - Reviewed
#Qakbot/#CobaltStrike#pcap I posted at https://www.malware-traffic-analysis.net/2022/04/14/index.html …. Saw weird DNS traffic for Cobalt Strike DNS CnC activity, thanks to using so-import-pcap in#SecurityOnion with the#ETPRO ruleset. Malicious domain in DNS traffic: gmhteuster[.]compic.twitter.com/TLcafiNXw7
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
2022-04-14 (Thursday) - Ongoing activity using URL --> zip --> .msi -->
#Qakbot -->#CobaltStrike. Researchers started seeing this infection method as early as Monday (2022-04-11). IOCs for today's activity available at: https://bit.ly/3KME8TV pic.twitter.com/tkVPtnmH5d
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Thanks. Twitter will use this info to make your timeline better. UndoUndo
-
2022-04-11 (Monday) - This is how I picture successful
#Qakbot infections from today's .msi filespic.twitter.com/EeHyN3weXc
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-04-11 (Monday) - Saw
#CobaltStrike using kuxoemoli[.]com on 172.241.27[.]237 from a#Qakbot infection - References: https://twitter.com/k3dg3/status/1513514251788464132 … & https://twitter.com/Max_Mal_/status/1513539551070937093 …pic.twitter.com/HIiSkt12fQ
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
2022-04-05 (Monday) - From a
#Bumblebee malware infection, we saw#CobaltStrike traffic from 23.108.57[.]23 using cuhitiro[.]com as its domain. More info available at: https://bit.ly/3ul7Gm1 pic.twitter.com/EZODKrTE7T
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
ISC Diary:
@malware_traffic reviews new#MetaStealer malware first seen on 2022-03-30 https://i5c.us/d28522 pic.twitter.com/1561uSr7WK
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Ivan after last week's attempt by Emotet to use links didn't work out...pic.twitter.com/LNNFudmo8N
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-04-04 (Monday) -
#Emotet#epoch5 infection with#spambot activity -#pcap of the infection, some malware samples, email examples, and IOCs are available at: https://www.malware-traffic-analysis.net/2022/04/04/index.html …pic.twitter.com/Bcan5gJv3A
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-03-31 (Thursday) - obama173 distribution
#Qakbot (#Qbot) - UPS theme - "/nmt/" in the URL string. Email example: https://app.any.run/tasks/3e06833e-cf63-4c26-8372-da42f8308bee … Downloaded zip: https://tria.ge/220331-z7fwrsdhgk … DLL: https://tria.ge/220331-z8t5sahgg2 … DLL: https://tria.ge/220331-z9gk3seaaq … DLL: https://tria.ge/220331-z9yvcshgh5 …pic.twitter.com/klsPFiRQvr
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
2022-03-29 (Tuesday) -
#Emotet started using links again in its malspam since yesterday - We've consistently seen#CobaltStrike from infections so far this week using verofes[.]com as its C2 domain - IOCs for today's example available at: https://bit.ly/3Dj0REp pic.twitter.com/mosWIfGnXc
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
2022-03-28 (Monday) - Sometime today,
#Emotet#epoch4 switched to links in the malspam instead of attachments. Example: https://urlhaus.abuse.ch/url/2117720/ pic.twitter.com/vg81PEsKG8
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Thanks. Twitter will use this info to make your timeline better. UndoUndo
-
March 2022 traffic analysis exercise - use a
#pcap of infection traffic to write an incident report - https://www.malware-traffic-analysis.net/2022/03/21/index3.html … -#TrafficAnalysisExercisepic.twitter.com/pFLhaCJ8g8
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-03-21 (Monday) -
#Hancitor (#Chanitor/#MAN1/#Moskalvzapoe/#TA511) infection with#CobaltStrike and#MarsStealer -#pcap of the infection traffic, associated malware samples, and list of IOCs available at: https://www.malware-traffic-analysis.net/2022/03/21/index2.html …pic.twitter.com/4IBl1legxq
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-03-24 (Thursday) -
#pcap of the infection, 20 email examples, 12 Excel files, 1 DLL for#Emotet#epoch4 infection with another DLL for#CobaltStrike - based on an earlier tweet from today - available at: https://www.malware-traffic-analysis.net/2022/03/24/index.html …pic.twitter.com/LGI4VmjAa1
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Agh! Typo! That
#CobaltStrike domain verofes[.]com is using 139.60.160[.]8 -- not [.]9 from my original tweet. Cobalt Strike sample & analysis: - https://bazaar.abuse.ch/sample/0ed486eb2a9a7c36ea1110a5ab15a95e046b8fdc3e62663cf6c25a7c3ebdde83/ … - https://tria.ge/220324-xz7y6shhhl … - https://app.any.run/tasks/a041d990-c8ee-4231-9b90-44a94283d215 …Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-03-24 (Thursday) - From an
#Emotet epoch4 infection, I saw verofes[.]com as a#CobaltStrike domain on 139.60.160[.]9 over TCP port 443 today. Also saw more Cobalt Strike lgbtqplusfriendlydomain[.]com on 144.202.49[.]189 over TCP port 444.pic.twitter.com/6mAjeXkmHx
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
2022-03-23 (Wednesday) - info dump from
#Qakbot (#Qbot) with the "aa" distribution tag.#pcap, email, malware samples, and list of IOCs available at: https://github.com/brad-duncan/IOCs/blob/main/2022-03-23-AA-Qakbot-data-dump.zip … - password: infectedpic.twitter.com/jiIp5EOA4Y
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Brad Retweeted
ISC Diary:
@malware_traffic reviews#Arkei variants#Vidar,#OskiStealer and#MarsStealer https://i5c.us/d28468 pic.twitter.com/v1VnJEtxMG
Thanks. Twitter will use this info to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.