
M4lcode
@M4lcode
Followers
618
Following
923
Media
27
Statuses
179
Malware Researcher exploring malware, APT groups, and their campaigns across the wild. | Threat Researcher @dexpose_io | Blog Author @anyrun_app & @cyber5w
Egypt
Joined February 2023
RT @muha2xmad: As-salamu Alaykum.I wrote 3 #yara rules about #RedLine stealer , #ArrowRAT, and #MilleniumRat. RedLine:.
0
3
0
PureLogs is live. A new challenge created by me. good luck.
New Challenge on PureLogs Stealer. A fresh analysis challenge is now live. This time, you're looking at PureLogs, a .NET-based info-stealer thatās been seen in active campaigns. Your job is to analysis it to answer our questions.created by: @M4lcode
0
0
15
RT @mSult4n: Just published a new blog post on how Microsoftās āMouse Without Bordersā can be abused for data exfiltration & lateral movemeā¦.
0xsultan.github.io
Abusing Mouse Without Borders for Data Exfiltration and Lateral Movement
0
11
0
#DiscoQueen stealer panel spotted . https://41.216.188[.]41/. It uses the same domain discoqueen[.]lol, which previously resolved to 41[.]216.183.17. @500mk500 @ViriBack
1
0
6
#clickfix #booking #fakecaptcha.bokparthub[.]click ā (Under Construction). apartmenr-di16[.]click ā PowerShell ( ā ā LightYellow4.pfx Hex-based ZIP reconstructed ā payload cleaned ā executed via regsvr32.exe abuse (LOLBins)
0
3
16
RT @MalGamy12: Weāre excited to announce the launch of , a platform built by analysts, for analysts and itās complā¦.
0
54
0
RT @dexpose_io: A .NET PE injector hid on flagged clean & raising no alarms. Our Threat Intel team analyzed it, eā¦.
0
3
0
Fake job interviews are a growing attack vector One example here is InvisibleFerret, a malware from North Korea, that targets tech professionals.See detailed analysis of its code and collect IOCs to avoid infection . by @MauroEldritch .@anyrun_app.
any.run
Discover a detailed technical analysis of the InvisibleFerret malware that targets businesses across different industries.
1
1
16
Check out my latest report on s blogš¤ .
any.run
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.
0
1
5