ShadowChasing1 Profile Banner
Shadow Chaser Group Profile
Shadow Chaser Group

@ShadowChasing1

Followers
11K
Following
3K
Media
629
Statuses
3K

Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group focused on APT hunt and analysis

Earth
Joined April 2020
Don't wanna be here? Send us removal request.
@ShadowChasing1
Shadow Chaser Group
6 years
Hi,bro Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group is focus on #APT hunte and analysis I hope you will follow us :-)
4
11
53
@volrant136
Demon
20 hours
@Huntio 4/ Similarly, by analyzing the domain over @virustotal, we have found another subdomain targeting #Pakistan Ministry of Foreign Affairs (#MOFA). mail[.]mofa[.]gov[.]pk[.]officemuwork[.]online #APT #Sidewinder
0
3
5
@volrant136
Demon
20 hours
2/ The analysis of web page shows the username and password being exfiltrated to same domain on URI "/sumit" Similarly, the IP Address and Browser Details of user visiting the webpage is also captured.
1
2
4
@volrant136
Demon
20 hours
3/ Furthermore, using @Huntio, a #HuntSQL query is created to find similar webpages among past 3 months. The results show one additional #APT #Sidewinder domain. http://mail[.]navy[.]mil[.]bd[.]officemuwork[.]online/swpGMooD
1
4
5
@volrant136
Demon
20 hours
#APT #Sidewinder targets #Bangladesh #Navy 1/ Using @Huntio, a new Fake Zimbra Login Page found targeting Bangladesh Navy. IoC: https://mail-bcc-gov-bd-7j5la[.]bunny[.]run/ @500mk500 @MichalKoczwara @malwrhunterteam
1
8
9
@suyog41
Yogesh Londhe
3 days
bba114b1c16d26f032a878432d6e69dd zip d5aad3c3e1f6853fd92e95a33592e8e1 lnk C2 igamingroundtable[.]com #APT #IOC
@suyog41
Yogesh Londhe
10 days
ROKRAT ee648192370dacdf2a1e9fe7deac95d1 zip 1. KB국민은행 거래내역 제출 안내서.hwp.lnk KB Kookmin Bank Transaction History Submission Guide.hwp.lnk f5842320e04c2c97d1f69cebfd47df3d C2 igamingroundtable[.]com #ROKRAT #APT37 #APT #IOC
0
5
16
@smica83
Szabolcs Schmidt
3 days
'212th_Confirm_Minutes.chm' seen from Sri Lanka @abuse_ch https://t.co/M1jPMOZPnf @volrant136 @RedDrip7 @suyog41 Could this be Sidewinder?
1
4
8
@JVPv5sIM3eFmGyi
why2try
5 days
给压缩包做加密处理的PatchWork组织 #APT #PatchWork
3
11
25
@volrant136
Demon
4 days
@volrant136
Demon
25 days
#APT #Sidewinder using #New #Exfiltration #Server in Phising Campaign Targeting #Srilanka 1/ @Huntio tracked a new collection server "mailsserver-lk[.]com" in recent sightings in 3 attacks. Observed PDF: WPS NAP 5th Core Steering comm -Meeting Minute.pdf
0
4
19
@RedDrip7
RedDrip Team
4 days
#APT #Patchwork used a trojan named as "ShadowAgent" communicating with the C2 server via websocket + http 1c335be51fc637b50d41533f3bef2251 f78fd7e4d92743ef6026de98291e8dee Download URL: hxxps://firebasescloudemail.com/reports/OPS-VII-SIR[.]zip C2: www.mydropboxbackup[.]com:443
1
22
84
@malwrhunterteam
MalwareHunterTeam
5 days
Possible interesting "CC Development Document.7z": 8bbc0b45edb265a0ba51d6b017e0bc3b883382e29e70db5a52b11d1ccfeb1458
2
8
15
@volrant136
Demon
9 days
#APT #Sidewinder targets #Bangladesh Computer Council (BCC) 1/ Using @Huntio, I have tracked a webpage targeting Bangladesh using Fake #Zimbra Page. https://bccgov-bd-production[.]up[.]railway[.]app/?ioewroiewrioweroiriwwoei=1 @500mk500 @MichalKoczwara @malwrhunterteam
1
4
18
@PrakkiSathwik
Sathwik Ram Prakki
9 days
#Philippines Campaign PCG_124th_Anniversary_Event_Documents_Office_of_the_President_23102025-Archive.zip 8e130c2604516ccd4bcba72cc6549649 124th_Anniversary_of_the_Philippine_Coast_Guard_Event_Summary_and_Feedback_Request_Office_of_the_Appointments_Secretary_OP_23102025.pdf.lnk
@PrakkiSathwik
Sathwik Ram Prakki
11 days
#APT #Phishing #Malware DS_Store.zip 8313a5281796df3e920ea6558eedc9cb update.vbs 672e1010eb6b8dea7f1680b94fc716f7 DllSafeCheck64.dll 0ed85f4b01e24b186893205002f29e3a (signed, sideloaded by svchost.exe) readme.dat #Shellcode b81ae158a5d2cd7bd6c717f18ab20c41 #C2 150.109.111.36
2
7
19
@cyberwar_15
CyberWar - 싸워
10 days
#NorthKorea #Konni XX은행 송금 및 거래내역 관련 확인자료 제출 서류.zip (ee648192370dacdf2a1e9fe7deac95d1) D:\3_Attack Weapon\Autoit\Build\__Poseidon - Attack\client3.3.14.a3x igamingroundtable[.]com 109.234.36[.]135 B073WE15-D8QD-87A1-7464-CE66A8819E701
3
6
17
@byrne_emmy12099
Emmy Byrne
8 days
Similar Sample f6ceb2a7ae53e0b0a63fde0347bda58bf50f79e0ff8395a03d3f6bb47e3ec744
0
1
5
@byrne_emmy12099
Emmy Byrne
10 days
6. [UnKnown] LiveUpdate_for_GE_VERNOVA_v2.01.0001_Silent.exe -MD5:4cbcee776548fe1c5bc96b90fc9205fb 6. [UnKnown] Fasoo_DRM_Client.exe -MD5:f70ff2102bc0039df206f37b7c7f75d5 7. [UnKnown] UnKnown -MD5:f21c6b0807043722876c8fcf79930458 -MD5:c393a281f4969fa7e0223df247c1e45d
1
1
5
@ThreatBookLabs
ThreatBook
7 days
Threat Alert: #MuddyWater — Phoenix Backdoor C2 Activity Observed C2 / Compromised Hosts: support[.]micsoft[.]store fourdjecem[.]shop poundpills[.]com IP: 64[.]7[.]198[.]12 ThreatBook Intelligence: https://t.co/VIFMs5wA3G
0
8
31
@byrne_emmy12099
Emmy Byrne
10 days
*Fasoo CodeSign Malware* 1. [25.10.25]국내 A형간염 현황 및 예방접종 권고 대상자 안내.pdf.scr.exe -MD5:0f3e5058154de146fb3f1921c7f89952 2. [250908]A_HK이노션_SecuwaySSL VPN Manager U100S 100user_견적서.scr -MD5:d28f74a6b2dd6301f2d30f46600f6bd6 #APT #Lazarus
2
5
16
@volrant136
Demon
9 days
@Huntio 3/ However, the #sidewinder still using the same domain and C2 server to continue phishing. ref: https://t.co/tPVgs5DdjU
0
2
4
@volrant136
Demon
9 days
2/ Research on #Operation #SouthNet by @Huntio also revealed that same pages was observed at https://mailcbmgovmm[.]pages[.]dev which is now reported as phishing.
1
3
4