M4lcode Profile Banner
M4lcode Profile
M4lcode

@M4lcode

Followers
618
Following
923
Media
27
Statuses
179

Malware Researcher exploring malware, APT groups, and their campaigns across the wild. | Threat Researcher @dexpose_io | Blog Author @anyrun_app & @cyber5w

Egypt
Joined February 2023
Don't wanna be here? Send us removal request.
@M4lcode
M4lcode
11 days
RT @muha2xmad: As-salamu Alaykum.I wrote 3 #yara rules about #RedLine stealer , #ArrowRAT, and #MilleniumRat. RedLine:.
0
3
0
@M4lcode
M4lcode
17 days
Just wrote a deep-dive APT profiling report on Mustang Panda, the Chinese state-aligned cyberespionage group. The report covers adversary focus areas, tactics and tradecraft, abuse of Visual Studio Code tunneling, kernel-level EDR evasion, custom malware and toolsets, exploited
Tweet media one
1
37
114
@M4lcode
M4lcode
19 days
PureLogs is live. A new challenge created by me. good luck.
@MalGamy12
Gameel Ali 🤘
19 days
New Challenge on PureLogs Stealer. A fresh analysis challenge is now live. This time, you're looking at PureLogs, a .NET-based info-stealer that’s been seen in active campaigns. Your job is to analysis it to answer our questions.created by: @M4lcode
Tweet media one
0
0
15
@M4lcode
M4lcode
1 month
RT @mSult4n: Just published a new blog post on how Microsoft’s ā€œMouse Without Bordersā€ can be abused for data exfiltration & lateral moveme….
Tweet card summary image
0xsultan.github.io
Abusing Mouse Without Borders for Data Exfiltration and Lateral Movement
0
11
0
@M4lcode
M4lcode
1 month
Open directory spotted: 20.243.255[.]185.Hosting multiple suspicious files, including:. shell_le: Metasploit ELF payload - recently submitted to VirusTotal. true.png: PNG file with embedded VBScript (1/61 on VT) - recently submitted to VirusTotal. main_mips: ELF binary flagged
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
10
41
@M4lcode
M4lcode
1 month
#DiscoQueen stealer panel spotted . https://41.216.188[.]41/. It uses the same domain discoqueen[.]lol, which previously resolved to 41[.]216.183.17. @500mk500 @ViriBack
Tweet media one
Tweet media two
1
0
6
@M4lcode
M4lcode
2 months
#clickfix #booking #fakecaptcha.bokparthub[.]click → (Under Construction). apartmenr-di16[.]click → PowerShell ( → → LightYellow4.pfx Hex-based ZIP reconstructed → payload cleaned → executed via regsvr32.exe abuse (LOLBins)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
3
16
@M4lcode
M4lcode
2 months
This is my first time in tracking APTs, so I'm open for any advices and corrections.
2
0
5
@M4lcode
M4lcode
2 months
Low Confidence Infrastructure – APT43 (Kimsuky).222[.]73[.]105[.]195 --> 0/94.This IP refers to 2 malicious files imperosnate Yunda Express . 91[.]210[.]106[.]42 --> 0/94. 146[.]70[.]81[.]61 --> 0/94 resolves --> health15hde[.]xyz. 124[.]40[.]247[.]67 --> 0/94.
0
2
8
@M4lcode
M4lcode
2 months
38[.]54[.]50[.]57 --> 1/94.156[.]244[.]19[.]218 --> 1/94
Tweet media one
Tweet media two
0
1
6
@M4lcode
M4lcode
2 months
95[.]196[.]78[.]150 --> 0/94.206[.]72[.]192[.]71 --> 0/94.91[.]195[.]240[.]123 --> 9/94
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
1
9
@M4lcode
M4lcode
2 months
just hunted down fresh undetected & low detected APT43 (kimsuky) infra by pivoting using HTTP header analysis and SSL JARM fingerprinting. 162[.]220[.]11[.]84 --> 0/94.194[.]63[.]129[.]86 --> 0/94.3[.]89[.]115[.]251 --> 0/94.110[.]142[.]212[.]109 --> 1/94.More IOCs in replies
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
11
104
@M4lcode
M4lcode
3 months
RT @MalGamy12: We’re excited to announce the launch of , a platform built by analysts, for analysts and it’s compl….
0
54
0
@M4lcode
M4lcode
4 months
Lately, I've been working on analyzing several stealers and a PE injector. Take a look 😃. Fileless pe injector uses reflective loading : Purelogger: Salat Stealer: Flesh Stealer:
Tweet media one
2
32
111
@M4lcode
M4lcode
4 months
Tweet media one
0
241
0
@M4lcode
M4lcode
4 months
FExcited to share that now supports Android OS inside its interactive sandbox! You can analyze APK behavior in real time, right in the cloud. šŸ”„ Available for ALL plans (yes, even free!). šŸ“· Let’s check it out together!
Tweet media one
1
1
14
@M4lcode
M4lcode
5 months
RT @dexpose_io: A .NET PE injector hid on flagged clean & raising no alarms. Our Threat Intel team analyzed it, e….
0
3
0
@M4lcode
M4lcode
6 months
Fake job interviews are a growing attack vector One example here is InvisibleFerret, a malware from North Korea, that targets tech professionals.See detailed analysis of its code and collect IOCs to avoid infection . by @MauroEldritch .@anyrun_app.
Tweet card summary image
any.run
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.
1
1
16
@M4lcode
M4lcode
8 months
Check out my latest report on s blog🤠.
Tweet card summary image
any.run
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
@anyrun_app
ANY.RUN
8 months
šŸ‘¾ #Nova is a new fork of #Snake #Keylogger.Discover technical analysis of this #malware's advanced mechanics from our guest author @M4lcode . See how it steals and exfiltrates data, collect #IOCs ā¬‡ļø.
0
1
5