
Aaron Jornet
@RexorVc0
Followers
4K
Following
5K
Media
313
Statuses
716
Threat Researcher at @One_eSecurity | Malware Researcher | Threat Hunter | CTI ยฆ Former @ElevenPaths @Panda_Security
Joined December 2020
๐จ#DarkCloud, New research of this #malware #stealer. Seen in numerous campaigns, hits companies and users for all kinds of information๐จ. ๐Full Analysis: #RE #intel #threat #malwareanalysis #infosec #cti
3
13
37
#TTP. ๐ฉ[T1566.001] Spear-Phishing.๐ฅ[T1036] Bait PDF.๐๏ธ[T1204.002] LNK.๐ฅ[T1105] Download next stage.โ๏ธ[T1053] Persistence over Tasks.๐งฉ[T1140] Decrypt code.๐[T1055] Inject SC in mem.๐ท๏ธ[T1082] Get device & user info.๐ก[T1071] C&C communication
1
1
5
#APT #Patchwork #DroppingElephant #WhiteElephant #threat #malware. ๐๐ฎ๐ณ.๐ฅ๐ต๐ฐ๐จ๐ณ๐. โ๏ธ #Phishing > LNK > PS > Download > Bait doc + exe > Task persistence > exe decrypt SC + Load > #RAT > Info Collection > #C2. ๐QiAnXin:
1
15
54
#TTP. ๐ฉ[T1566.001] Spear-Phishing .๐งฉ[T1140] Decrypt code.๐[T1218.005] HTA exec.๐[T1059.005] VBS script.๐[T1218.010] Abuse of regsvr to load dll.๐ฅ[T1105] Download Next stage.๐ท๏ธ[T1082] Get device info.โ๏ธ[T1053] Persistence tasks.๐ฅ[T1105] Copy Itself (dll).๐ก[T1071] C&C
1
0
1
#TTP. โ๏ธ[T1566.001] Spear-Phishing .๐ฅ[T1036] Fake PDF.๐ฅ[T1105] Download next stage (G Cloud).๐งฉ[T1140] Decrypt file info.โ๏ธ[T1053] Task to persistence.๐[T1543.003] Create Service.๐ท๏ธ[T1555.003] Info from browsers.๐ท๏ธ[T1560] Steal docs/pdf/xls. ๐ก[T1567.002] C&C exfil
1
1
6
#APT #APT36 #TransparentTribe #MythicLeopard #threat #malware #Disgomoji. ๐๐ต๐ฐ.๐ฅ๐ฎ๐ณ๐. โ๏ธ#Phishing > ZIP > PDF bait + psw file > Download next (Curl G Drive) > #Disgomoji + Aux files > Persistence Task > Steal info > #C2. ๐360 Advanced Threat intel:
1
12
60
#TTP. ๐ฉ[T1566.001] Spear-Phishing.๐[T1059.005] VBS script execution.ยฎ๏ธ[T1112] Registry with C2 info.๐๏ธ[T1204.002] LNK as PDF/DOC.โ๏ธ[T1053] Persistence over Tasks.๐ท๏ธ[T1082] Get device & user info.๐ฆ[T1012] Collect info & registry (Created before).๐ก[T1071] C&C communication
1
1
1
#APT #Gamaredon #TridentUrsa #BlueAlpha #PrimitiveBear #threat #malware. ๐๐ท๐บ.๐ฅ๐ช๐. โ๏ธ#Phishing > #VBS dopped > decode + VBS script > TMP folder file > Public folder copy > Task Persistence > Collect info > #C2. ๐360 Advanced Threat Research:
1
5
20
#TTP. ๐ฉ[T1566.001] Spear-Phishing.๐๏ธ[T1137.001] Macros.๐ฅ[T1036] Fake ppt & fake traffic to github.๐ฅ[T1105] Download next stage.โ๏ธ[T1053] Persistence over Tasks.๐ท๏ธ[T1082] Get device & user info.๐งฉ[T1027.013] Domain XOR info.๐ก[T1071] C&C communication
1
1
3
#APT #Patchwork #DroppingElephant #WhiteElephant & #DONOT #threat #malware. ๐๐ฎ๐ณ.๐ฅ๐ต๐ฐ๐ง๐ฉ๐ฑ๐ฐ๐. โ๏ธ #Phishing > ppt+VBA macro | #Spyder > Download DLL+Rundll32 exec | Fake ppt > #C2 check > Persistence (Tasks) > Info Collection > #C2. ๐QiAnXin:
1
18
50