
NDA0E
@NDA0E
Followers
437
Following
2K
Media
39
Statuses
199
Joined April 2024
RT @RacWatchin8872: #AsyncRat #Malware.💣holder-apartments-face-matthew[.]trycloudflare[.]com/uline/Nr-2005-028763-2024-PDF[.]lnk💣.lnk->vbs-….
0
18
0
RT @anyrun_app: 🚨 Attackers use public open directories for hosting #malicious scripts disguised as .txt and .jpg files. These are utilized….
any.run
See how attackers use open directories for hosting malicious files that are used to infect systems with AsyncRAT.
0
31
0
RT @banthisguy9349: Its been a while for me to check up on this issue!.96 ips are currently found to be uses for controlling botnets to per….
0
6
0
RT @kddx0178318: One more sample of #spearphishing gz attachment reaching #Lokibot C2 104.248.205.66:80.DHL Shipment DOC_643040277.gz >DHL….
0
7
0
Distribution domain queries for #RobotDropper on @ValidinLLC and @censysio. Validin: RapidShare - Fast & Secure File Transfer for Free. Censys: services.http.response.html_title="RapidShare - Fast & Secure File Transfer for Free". IOCs shared on ThreatFox:
💢 Low-Detection MSI Dropper Delivers #Malware – #ExploreWithANYRUN . ⚠️ A recently developed #dropper is an #MSI file containing a #password-protected RAR archive . 📌 Both the sample and #C2 domains have a very low detection rate on #VirusTotal.🔗 . 📤
0
4
19
RT @banthisguy9349: are they even trying to hide it @NDA0E ? 😆. http://154.216.18.175/
#opendir . Bulletproof ASN: AS215240 NETRESEARCH http….
0
12
0
#Censys query to find #GossRAT #C2 servers:.services.http.response.body_hash="sha1:b7c4a3bf814a5aaf96e208f47a17066c32ac0ad0". The URL path used for C2 communication is the same across all domains > /rat/apps/mellat/notify.php. IOCs: #IOC #IRATA #GossRAT
Iranian threat actors are using phishing sites that impersonate @mellatbankiran to distribute #GossRAT through a download page claiming to be the bank's mobile app. Using @censysio DNS records i found over 100 domains to have been involved, most of them using .buzz as their TLD.
0
7
51
Iranian threat actors are using phishing sites that impersonate @mellatbankiran to distribute #GossRAT through a download page claiming to be the bank's mobile app. Using @censysio DNS records i found over 100 domains to have been involved, most of them using .buzz as their TLD.
2
0
6
Search using @urlscanio . filename: "interpol.mp4" AND filename:"country.json" 🔥. cancel-service[.]info.
I have identified eight more domains targeting Russian individuals. cyber-eu[.]info.cyber-payback[.]info.get-return[.]com.global-refund[.]digital.inter-return[.]com.internet-cyberpolice[.]network.payback-int[.]com.refund-service[.]digital
1
0
2