RexorVc0 Profile Banner
Aaron Jornet Profile
Aaron Jornet

@RexorVc0

Followers
4K
Following
5K
Media
313
Statuses
716

Threat Researcher at @One_eSecurity | Malware Researcher | Threat Hunter | CTI ยฆ Former @ElevenPaths @Panda_Security

Joined December 2020
Don't wanna be here? Send us removal request.
@RexorVc0
Aaron Jornet
4 months
๐Ÿšจ#DarkCloud, New research of this #malware #stealer. Seen in numerous campaigns, hits companies and users for all kinds of information๐Ÿšจ. ๐Ÿ”—Full Analysis: #RE #intel #threat #malwareanalysis #infosec #cti
Tweet media one
3
13
37
@RexorVc0
Aaron Jornet
8 days
#IOC. 8930abf86e2e94b1a4b373e25d01f2ff.e5cfa25f8f3fab90dc1777ac1b96c890.29e584797a4c1bb71e8c1c018bd431ad.4cc371651f43e31df87b9f08013a14f6.13c5617da56d8b821e6acd1d5c8f8780.2f1b002352c3a5469f5708de756f3f76.85ba2585c44c95c9ab40fffa2cdd6e36. ๐Ÿ”—VT:
Tweet media one
0
2
4
@RexorVc0
Aaron Jornet
8 days
#TTP. ๐Ÿ“ฉ[T1566.001] Spear-Phishing.๐Ÿ‘ฅ[T1036] Bait PDF.๐Ÿ—‚๏ธ[T1204.002] LNK.๐Ÿ“ฅ[T1105] Download next stage.โš“๏ธ[T1053] Persistence over Tasks.๐Ÿงฉ[T1140] Decrypt code.๐Ÿ’‰[T1055] Inject SC in mem.๐Ÿ•ท๏ธ[T1082] Get device & user info.๐Ÿ“ก[T1071] C&C communication
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
5
@RexorVc0
Aaron Jornet
8 days
#APT #Patchwork #DroppingElephant #WhiteElephant #threat #malware. ๐Ÿ“๐Ÿ‡ฎ๐Ÿ‡ณ.๐Ÿ’ฅ๐Ÿ‡ต๐Ÿ‡ฐ๐Ÿ‡จ๐Ÿ‡ณ๐ŸŒ. โ›“๏ธ #Phishing > LNK > PS > Download > Bait doc + exe > Task persistence > exe decrypt SC + Load > #RAT > Info Collection > #C2. ๐Ÿ”—QiAnXin:
Tweet media one
1
15
54
@RexorVc0
Aaron Jornet
10 days
#IOC. f4cd4449e556b0580c2282fec1ca661f.d1ec20144c83bba921243e72c517da5e.16d30316a6b700c78d021df5758db775.a6598bbdc947286c84f951289d14425c.07fbf46d3a595a6f82e477ed4571294b. ๐Ÿ”—VT:
Tweet media one
0
0
1
@RexorVc0
Aaron Jornet
10 days
#TTP. ๐Ÿ“ฉ[T1566.001] Spear-Phishing .๐Ÿงฉ[T1140] Decrypt code.๐Ÿ“‡[T1218.005] HTA exec.๐Ÿ“œ[T1059.005] VBS script.๐Ÿ”ƒ[T1218.010] Abuse of regsvr to load dll.๐Ÿ“ฅ[T1105] Download Next stage.๐Ÿ•ท๏ธ[T1082] Get device info.โš“๏ธ[T1053] Persistence tasks.๐Ÿ‘ฅ[T1105] Copy Itself (dll).๐Ÿ“ก[T1071] C&C
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
1
@RexorVc0
Aaron Jornet
10 days
#APT #Kimsuky #VelvetChollima #Thallium #malware #HappyDoor #threat. ๐Ÿ“๐Ÿ‡ฐ๐Ÿ‡ต.๐Ÿ’ฅ๐Ÿ‡ฐ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ช๐Ÿ‡บ๐ŸŒ. โ›“๏ธ #Phishing > Bandizip > regsvr32+dll & mshta (.HTA) exec > #VBS + Load > Steal info > Persistence in Tasks > #C2 . ๐Ÿ”—360 Threat Intel:
Tweet media one
1
20
76
@RexorVc0
Aaron Jornet
1 month
#IOC. b15cadf2a4e6670c075f80d618b26093.e5c4f8ad27df5aa60ceb36972e29a5fb.d4db59139f2ae0b5c5da192d8c6c5fa0.hxxp://june[.]drydate[.]p-e[.]kr. ๐Ÿ”—VT:
Tweet media one
0
0
1
@RexorVc0
Aaron Jornet
1 month
#TTP . ๐Ÿ‘ฅ[T1036] Fake PDF extension.๐Ÿงฉ[T1140] Decrypt code.๐Ÿ“ฅ[T1620] Load code in mem.โš“๏ธ[T1053] Persistence over Tasks.๐Ÿ•ท๏ธ[T1082] Get device info.๐Ÿ“ก[T1071] C&C
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
1
@RexorVc0
Aaron Jornet
1 month
#APT #Kimsuky #VelvetChollima #Thallium #malware #threat. ๐Ÿ“๐Ÿ‡ฐ๐Ÿ‡ต.๐Ÿ’ฅ๐Ÿ‡ฐ๐Ÿ‡ท๐ŸŒ. โ›“๏ธ #Phishing | Watering Hole | Social Eng > Exe decryptor (pdf extension) + DLL (#Endoor) > Exe decrypt & load code > Task Persistence > Device + User Info > #C2. ๐Ÿ”—QiAnXin report:
Tweet media one
1
18
61
@RexorVc0
Aaron Jornet
1 month
#IOC. 452cd18570471e80dd6bf34addede334.d5a3766e744a563278b18267d6bd7113.c763ecf315481525afcd47c5f32c1fd7.68fbe197c62a3777d2299f9eabed2c70.43e4260c595b20e357be75c0c1fbec29.d24c797f94933a3ec5227a6f57e15358.c8c21b4642f12c28f6e5e0389bbf8c36. ๐Ÿ”—VT:
Tweet media one
0
3
7
@RexorVc0
Aaron Jornet
1 month
#TTP. โœ‰๏ธ[T1566.001] Spear-Phishing .๐Ÿ‘ฅ[T1036] Fake PDF.๐Ÿ“ฅ[T1105] Download next stage (G Cloud).๐Ÿงฉ[T1140] Decrypt file info.โš“๏ธ[T1053] Task to persistence.๐Ÿ”‹[T1543.003] Create Service.๐Ÿ•ท๏ธ[T1555.003] Info from browsers.๐Ÿ•ท๏ธ[T1560] Steal docs/pdf/xls. ๐Ÿ“ก[T1567.002] C&C exfil
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
6
@RexorVc0
Aaron Jornet
1 month
#APT #APT36 #TransparentTribe #MythicLeopard #threat #malware #Disgomoji. ๐Ÿ“๐Ÿ‡ต๐Ÿ‡ฐ.๐Ÿ’ฅ๐Ÿ‡ฎ๐Ÿ‡ณ๐ŸŒ. โ›“๏ธ#Phishing > ZIP > PDF bait + psw file > Download next (Curl G Drive) > #Disgomoji + Aux files > Persistence Task > Steal info > #C2. ๐Ÿ”—360 Advanced Threat intel:
Tweet media one
1
12
60
@RexorVc0
Aaron Jornet
2 months
#IOC + related info. 60d49d1dce771612aa87b885db493147.des-cinema-democrat-san.trycloudflare[.]com/history.mit-walking-endorsed-lc.trycloudflare[.]com/restringent. ๐Ÿ”—VT: ๐ŸงฌRelated:
Tweet media one
0
1
1
@RexorVc0
Aaron Jornet
2 months
#TTP. ๐Ÿ“ฉ[T1566.001] Spear-Phishing.๐Ÿ“œ[T1059.005] VBS script execution.ยฎ๏ธ[T1112] Registry with C2 info.๐Ÿ—‚๏ธ[T1204.002] LNK as PDF/DOC.โš“๏ธ[T1053] Persistence over Tasks.๐Ÿ•ท๏ธ[T1082] Get device & user info.๐Ÿ“ฆ[T1012] Collect info & registry (Created before).๐Ÿ“ก[T1071] C&C communication
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
1
@RexorVc0
Aaron Jornet
2 months
#APT #Gamaredon #TridentUrsa #BlueAlpha #PrimitiveBear #threat #malware. ๐Ÿ“๐Ÿ‡ท๐Ÿ‡บ.๐Ÿ’ฅ๐Ÿช–๐ŸŒ. โ›“๏ธ#Phishing > #VBS dopped > decode + VBS script > TMP folder file > Public folder copy > Task Persistence > Collect info > #C2. ๐Ÿ”—360 Advanced Threat Research:
Tweet media one
1
5
20
@RexorVc0
Aaron Jornet
2 months
#IOC. e39413d9a67acbc5df2d8b8c0a170f4b.8157be7acc05f719dc125d677133ca40.c13dfd03cbdd66c0d6d53eb55ba9d551.2f1c58c7214471c28283b9e161ceed1c.f8e30dad9130bbc04164dda4f31a1b23. ๐Ÿ”—VT:
Tweet media one
0
0
2
@RexorVc0
Aaron Jornet
2 months
#TTP. ๐Ÿ“ฉ[T1566.001] Spear-Phishing.๐Ÿ—‚๏ธ[T1137.001] Macros.๐Ÿ‘ฅ[T1036] Fake ppt & fake traffic to github.๐Ÿ“ฅ[T1105] Download next stage.โš“๏ธ[T1053] Persistence over Tasks.๐Ÿ•ท๏ธ[T1082] Get device & user info.๐Ÿงฉ[T1027.013] Domain XOR info.๐Ÿ“ก[T1071] C&C communication
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
3
@RexorVc0
Aaron Jornet
2 months
#APT #Patchwork #DroppingElephant #WhiteElephant & #DONOT #threat #malware. ๐Ÿ“๐Ÿ‡ฎ๐Ÿ‡ณ.๐Ÿ’ฅ๐Ÿ‡ต๐Ÿ‡ฐ๐Ÿ‡ง๐Ÿ‡ฉ๐Ÿ‡ฑ๐Ÿ‡ฐ๐ŸŒ. โ›“๏ธ #Phishing > ppt+VBA macro | #Spyder > Download DLL+Rundll32 exec | Fake ppt > #C2 check > Persistence (Tasks) > Info Collection > #C2. ๐Ÿ”—QiAnXin:
Tweet media one
1
18
50
@RexorVc0
Aaron Jornet
2 months
#IOC. 81c08366ea7fc0f933f368b120104384.723f80d1843315717bc56e9e58e89be5.7822e53536c1cf86c3e44e31e77bd088.324688238c42d7190a2b50303cbc6a3c.a635bd019674b25038cd8f02e15eebd2.beeaca6a34fb05e73a6d8b7d2b8c2ee3. ๐Ÿ”—VT:
Tweet media one
0
1
4
@RexorVc0
Aaron Jornet
2 months
#TTP . โœ‰๏ธ[T1566.001] Spear-Phishing .๐Ÿ“ฅ[T1105] Download next stage (Dropbox).๐Ÿ“‡[T1027.012] LNK file.๐Ÿ“œ[T1059] PS & BAT script execution.๐Ÿ‘ฅ[T1620] Load #RokRat SC (BAT/PS execution).๐Ÿงฉ[T1140] Decrypt PE (#RokRat).๐Ÿ•ท๏ธ[T1082] System info collection.๐Ÿ“ก[T1071.001] C&C
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
4