David Ledbetter Profile
David Ledbetter

@Ledtech3

Followers
4K
Following
17K
Media
3K
Statuses
31K

System Repair, Windows system tools ,Security research. IDA Challenged.

Joined December 2015
Don't wanna be here? Send us removal request.
@executemalware
ExecuteMalware
3 years
As others have mentioned, the "presidents" #qakbot #qbot distribution (obama221) is back to using "DLL Search Order Hijacking" today (see screenshot). Here are the IOCs: https://t.co/JqSmNQxUIf
0
10
45
@ScarletSharkSec
Scarlet Shark Security
3 years
Anyone seeing #Socgholish using localsys-shield[.]com today?
1
2
0
@k3dg3
Kelsey
3 years
#IcedID mixing it up today with CHM files BotID: 1609463178 Loader C2: trolspeaksunt\.com pw-protected, zipped ISO attachments https://t.co/9PDXgxpRAF https://t.co/1jlSljsrFu
Tweet card summary image
bazaar.abuse.ch
redacted-doc-11.14.22.zip has been detected as IcedID by MalwareBazaar
0
13
33
@hasherezade
hasherezade
3 years
so, #FlareOn9 is over! congrats to all the finishers! you can find some of my solution here: https://t.co/GO75tCwZUl (work-in-progress, I will be adding more)
Tweet card summary image
hshrzd.wordpress.com
0
30
142
@Ledtech3
David Ledbetter
3 years
Ok got this post started if anyone wants a "Certain type" of obfuscation added
0
0
1
@Ledtech3
David Ledbetter
3 years
Hey... I'm thinking of a blog post for my site about "Understanding obfuscation" Is there anything special that anyone would like to see explained ?
2
2
4
@bigmacjpg
Kirk Sayre
3 years
New #socgholish stage 3 C2 seen today. Block all *[.]rate[.]coinangel[.]online .
0
6
18
@1ZRR4H
Germán Fernández
3 years
Malware dirigido a empresas en Perú 🇵🇪 email > html > zip +password > vbs Descarga desde (#geofenced): /sunat-mail.xyz/2/ /easynsecureinvest.com/cobr/?id=1 Payloads/C2 desde: /gringox1.chickenkiller.com/g1/ +Header: UA-CPU Samples: https://t.co/jBl2ihkPju Sin atribución 🤔
4
22
37
@executemalware
ExecuteMalware
3 years
Here are some #icedid #bokbot IOCs from today. Arrived via email with a password protected .zip file attachment. https://t.co/JUofXCsrfO
0
10
20
@Cryptolaemus1
Cryptolaemus
3 years
new Emotet E5 urls detected. [DLL] (1/2) hxxp://www[.]muyehuayi[.]com/cmp/8asA99KPsyA/v6lUsWbLen/ hxxps://wijsneusmedia[.]nl/cgi-bin/kFB/ hxxp://concivilpa[.]com[.]py/wp-admin/i3CQu9dzDrMW/
1
5
12
@k3dg3
Kelsey
3 years
#Bumblebee HTML Attachments rolling in. general pattern: Document_[0-9]{4]_Scan_(Nov8)\.html Looks like some updated evasion in this sample. https://t.co/Vl4LdCICft
Tweet card summary image
bazaar.abuse.ch
Document_3944_Scan_(Nov8).html has been detected as BumbleBee by MalwareBazaar
2
14
36
@tosscoinwitcher
Fate112
3 years
Also an few #Emotet today. @James_inthe_box @pr0xylife @0xToxin @0n315 @Cryptolaemus1 @JRoosen All of the sheets are visible in this one and each is the same as sheet 1? Did Ivan do a drunk again? https://t.co/NQz2LU8sIk
0
3
17
@k3dg3
Kelsey
3 years
#TA551 HTML Attachments incoming ID 1559130321 #IcedID Loader C2: anisamnatyrel\.com https://t.co/IZtT9LcHSc https://t.co/lPDcMjpR7t
0
20
36
@SentinelOne
SentinelOne
3 years
🏭 In May, SentinelLabs has investigated a supply-chain attack against the Rust development community that we refer to as ‘CrateDepression’. Learn more https://t.co/oZXYvPS5tj @LabsSentinel #infosec #cybersecurity #supplychain
Tweet card summary image
sentinelone.com
Software developers using GitLab CI are being targeted with malware through a typosquatting attack, putting downstream users at risk.
0
17
23
@filescan_itsec
Filescan.io
3 years
[UPDATE] Here's a #maldoc with (still) live C2 that is quite evasive and shows the detection capability ex-OSINT. Download URL has a "ski" gTLD. Download the sample with a user account (it's not on VT) for free: https://t.co/8iQSfnliQH // #DFIR #malware #analysis
1
11
24
@shortxstack
Whitney Champion 🍪🚀 bluesky @whit.zip
3 years
anyone know of companies hiring director level folks? ideally mobile/web work? i have a good friend looking and he'd be an epic hire.
4
11
14
@cyb3rops
Florian Roth ⚡️
3 years
Noticed an interesting registry export with powershell loader working completely on data stored in the registry Reg export https://t.co/jw9Ak4rdR7 Sample https://t.co/SJkIfwwvmT
3
34
94
@phage_nz
Chris
3 years
Saw a couple of Emotet messages land here this afternoon. First from this recent revival. Thread hijacking. XLM4.0 maldoc attachment. Epoch4 botnet. Sample: https://t.co/dmFV5pxQ1G
0
10
22
@executemalware
ExecuteMalware
3 years
I also received a handful of #emotet (E4) emails today. I saw traffic to the same C2 as yesterday. Here are the IOCs: https://t.co/OlFNfSOb4q
0
12
31