NDA0E Profile Banner
NDA0E Profile
NDA0E

@NDA0E

Followers
437
Following
2K
Media
39
Statuses
199

Joined April 2024
Don't wanna be here? Send us removal request.
@NDA0E
NDA0E
9 months
RT @abuse_ch: On the 1st of December, the notorious Socks5Systemz payload server hosted at AS57678 (Cat Technologies 🇭🇰) that is already ac….
0
13
0
@NDA0E
NDA0E
9 months
RT @RacWatchin8872: #AsyncRat #Malware.💣holder-apartments-face-matthew[.]trycloudflare[.]com/uline/Nr-2005-028763-2024-PDF[.]lnk💣.lnk->vbs-….
0
18
0
@NDA0E
NDA0E
10 months
RT @anyrun_app: 🚨 Attackers use public open directories for hosting #malicious scripts disguised as .txt and .jpg files. These are utilized….
Tweet card summary image
any.run
See how attackers use open directories for hosting malicious files that are used to infect systems with AsyncRAT.
0
31
0
@NDA0E
NDA0E
11 months
RT @NDA0E: @mdmck10 @malwrhunterteam @DNSPod @ICANN Big news! .ICANN issued a Notice of Breach against @DNSPod in response to my complaint….
0
5
0
@NDA0E
NDA0E
1 year
RT @banthisguy9349: Its been a while for me to check up on this issue!.96 ips are currently found to be uses for controlling botnets to per….
0
6
0
@NDA0E
NDA0E
1 year
RT @kddx0178318: One more sample of #spearphishing gz attachment reaching #Lokibot C2 104.248.205.66:80.DHL Shipment DOC_643040277.gz >DHL….
0
7
0
@NDA0E
NDA0E
1 year
#Mirai #C2 domains are using Round-Robin DNS to resolve to multiple hosts. Using "Resolve-DnsName" in PowerShell we can resolve the domains to their corresponding IPs. Ports used for Mirai connection: 1337, 2222, 2474, 5555, 6969, 8745, 8932, 12381. IOCs:
Tweet media one
Tweet media two
1
12
43
@NDA0E
NDA0E
1 year
Distribution domain queries for #RobotDropper on @ValidinLLC and @censysio. Validin: RapidShare - Fast & Secure File Transfer for Free. Censys: services.http.response.html_title="RapidShare - Fast & Secure File Transfer for Free". IOCs shared on ThreatFox:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@anyrun_app
ANY.RUN
1 year
💢 Low-Detection MSI Dropper Delivers #Malware#ExploreWithANYRUN . ⚠️ A recently developed #dropper is an #MSI file containing a #password-protected RAR archive . 📌 Both the sample and #C2 domains have a very low detection rate on #VirusTotal.🔗 . 📤
Tweet media one
0
4
19
@NDA0E
NDA0E
1 year
RT @banthisguy9349: are they even trying to hide it @NDA0E ? 😆. http://154.216.18.175/ #opendir . Bulletproof ASN: AS215240 NETRESEARCH http….
0
12
0
@NDA0E
NDA0E
1 year
#Censys query to find #GossRAT #C2 servers:.services.http.response.body_hash="sha1:b7c4a3bf814a5aaf96e208f47a17066c32ac0ad0". The URL path used for C2 communication is the same across all domains > /rat/apps/mellat/notify.php. IOCs: #IOC #IRATA #GossRAT
Tweet media one
@NDA0E
NDA0E
1 year
Iranian threat actors are using phishing sites that impersonate @mellatbankiran to distribute #GossRAT through a download page claiming to be the bank's mobile app. Using @censysio DNS records i found over 100 domains to have been involved, most of them using .buzz as their TLD.
Tweet media one
0
7
51
@NDA0E
NDA0E
1 year
RT @spamhaus:
Tweet media one
0
17
0
@NDA0E
NDA0E
1 year
Welcome to EVILEMPIRE v2. Previous threat actors using #Amadey have already moved their infrastructure to #AS51381 ELITETEAM-PEERING-AZ1.
Tweet media one
Tweet media two
1
1
14
@NDA0E
NDA0E
1 year
1
0
2
@NDA0E
NDA0E
1 year
As for now, the 10 active domains are delivering the same #GossRAT payload. URLhaus: Mellat.apk:
1
0
3
@NDA0E
NDA0E
1 year
Iranian threat actors are using phishing sites that impersonate @mellatbankiran to distribute #GossRAT through a download page claiming to be the bank's mobile app. Using @censysio DNS records i found over 100 domains to have been involved, most of them using .buzz as their TLD.
Tweet media one
2
0
6
@NDA0E
NDA0E
1 year
#Rhadamanthys #C2 at 91.92.242.245:443.
1
0
1
@NDA0E
NDA0E
1 year
#GuLoader #opendir. hXXps://www.pineappletech.ae/at/. at.vbs: #Rhadamanthys ? .#Stealer
Tweet media one
2
0
10
@NDA0E
NDA0E
1 year
Also targeting different agencies and law enforcement from foreign countries:. international-return-back[.]vip.legalteam[.]top.cyberpol-int[.]services.cyber-pl[.]info.zujupeo[.]com.ic3cyber[.]org.
16
0
2
@NDA0E
NDA0E
1 year
Search using @urlscanio . filename: "interpol.mp4" AND filename:"country.json" 🔥. cancel-service[.]info.
@NDA0E
NDA0E
1 year
I have identified eight more domains targeting Russian individuals. cyber-eu[.]info.cyber-payback[.]info.get-return[.]com.global-refund[.]digital.inter-return[.]com.internet-cyberpolice[.]network.payback-int[.]com.refund-service[.]digital
Tweet media one
1
0
2