Shadow Chaser Group
@ShadowChasing1
Followers
11K
Following
3K
Media
629
Statuses
3K
Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group focused on APT hunt and analysis
Earth
Joined April 2020
Hi,bro Shadow Chaser Group is a sub-group of the GcowSec team which consists of college students who love it.Shadow Chaser Group is focus on #APT hunte and analysis I hope you will follow us :-)
4
11
53
@Huntio 4/ Similarly, by analyzing the domain over @virustotal, we have found another subdomain targeting #Pakistan Ministry of Foreign Affairs (#MOFA). mail[.]mofa[.]gov[.]pk[.]officemuwork[.]online #APT #Sidewinder
0
3
5
2/ The analysis of web page shows the username and password being exfiltrated to same domain on URI "/sumit" Similarly, the IP Address and Browser Details of user visiting the webpage is also captured.
1
2
4
3/ Furthermore, using @Huntio, a #HuntSQL query is created to find similar webpages among past 3 months. The results show one additional #APT #Sidewinder domain. http://mail[.]navy[.]mil[.]bd[.]officemuwork[.]online/swpGMooD
1
4
5
#APT #Sidewinder targets #Bangladesh #Navy 1/ Using @Huntio, a new Fake Zimbra Login Page found targeting Bangladesh Navy. IoC: https://mail-bcc-gov-bd-7j5la[.]bunny[.]run/
@500mk500 @MichalKoczwara @malwrhunterteam
1
8
9
KB국민은행 거래내역 제출 안내서.hwp.lnk 3a2ec9a8ccb085bb6f68909ca8a2819fd517e6e02b3e7fa52e30198c56f2637a https://t.co/GS5Zt7Syic
#APT #Suspicious
igamingroundtable.com
iGaming Roundtable for Leaders. Influence. Deals. Email Us Facebook Instagram Our team reviews every request before approval.The iGaming Round Table exists to accelerate growth for ambitious B2B...
2
5
11
bba114b1c16d26f032a878432d6e69dd zip d5aad3c3e1f6853fd92e95a33592e8e1 lnk C2 igamingroundtable[.]com #APT #IOC
ROKRAT ee648192370dacdf2a1e9fe7deac95d1 zip 1. KB국민은행 거래내역 제출 안내서.hwp.lnk KB Kookmin Bank Transaction History Submission Guide.hwp.lnk f5842320e04c2c97d1f69cebfd47df3d C2 igamingroundtable[.]com #ROKRAT #APT37 #APT #IOC
0
5
16
'212th_Confirm_Minutes.chm' seen from Sri Lanka @abuse_ch
https://t.co/M1jPMOZPnf
@volrant136 @RedDrip7 @suyog41 Could this be Sidewinder?
1
4
8
#APT #Sidewinder targets #SriLankan #Navy 4th sightings for "mailsserver-lk[.]com" - Another Webpage tracked by @Huntio URL: https://copeparliament[.]github[.]io/mails.navy.lk/ Ref: https://t.co/eJQUmkIDc6
@500mk500 @MichalKoczwara @malwrhunterteam
#APT #Sidewinder using #New #Exfiltration #Server in Phising Campaign Targeting #Srilanka 1/ @Huntio tracked a new collection server "mailsserver-lk[.]com" in recent sightings in 3 attacks. Observed PDF: WPS NAP 5th Core Steering comm -Meeting Minute.pdf
0
4
19
#APT #Patchwork used a trojan named as "ShadowAgent" communicating with the C2 server via websocket + http 1c335be51fc637b50d41533f3bef2251 f78fd7e4d92743ef6026de98291e8dee Download URL: hxxps://firebasescloudemail.com/reports/OPS-VII-SIR[.]zip C2: www.mydropboxbackup[.]com:443
1
22
84
Possible interesting "CC Development Document.7z": 8bbc0b45edb265a0ba51d6b017e0bc3b883382e29e70db5a52b11d1ccfeb1458
2
8
15
#APT #Sidewinder targets #Bangladesh Computer Council (BCC) 1/ Using @Huntio, I have tracked a webpage targeting Bangladesh using Fake #Zimbra Page. https://bccgov-bd-production[.]up[.]railway[.]app/?ioewroiewrioweroiriwwoei=1
@500mk500 @MichalKoczwara @malwrhunterteam
1
4
18
#Philippines Campaign PCG_124th_Anniversary_Event_Documents_Office_of_the_President_23102025-Archive.zip 8e130c2604516ccd4bcba72cc6549649 124th_Anniversary_of_the_Philippine_Coast_Guard_Event_Summary_and_Feedback_Request_Office_of_the_Appointments_Secretary_OP_23102025.pdf.lnk
#APT #Phishing #Malware DS_Store.zip 8313a5281796df3e920ea6558eedc9cb update.vbs 672e1010eb6b8dea7f1680b94fc716f7 DllSafeCheck64.dll 0ed85f4b01e24b186893205002f29e3a (signed, sideloaded by svchost.exe) readme.dat #Shellcode b81ae158a5d2cd7bd6c717f18ab20c41 #C2 150.109.111.36
2
7
19
#NorthKorea #Konni XX은행 송금 및 거래내역 관련 확인자료 제출 서류.zip (ee648192370dacdf2a1e9fe7deac95d1) D:\3_Attack Weapon\Autoit\Build\__Poseidon - Attack\client3.3.14.a3x igamingroundtable[.]com 109.234.36[.]135 B073WE15-D8QD-87A1-7464-CE66A8819E701
3
6
17
Similar Sample f6ceb2a7ae53e0b0a63fde0347bda58bf50f79e0ff8395a03d3f6bb47e3ec744
0
1
5
6. [UnKnown] LiveUpdate_for_GE_VERNOVA_v2.01.0001_Silent.exe -MD5:4cbcee776548fe1c5bc96b90fc9205fb 6. [UnKnown] Fasoo_DRM_Client.exe -MD5:f70ff2102bc0039df206f37b7c7f75d5 7. [UnKnown] UnKnown -MD5:f21c6b0807043722876c8fcf79930458 -MD5:c393a281f4969fa7e0223df247c1e45d
1
1
5
Threat Alert: #MuddyWater — Phoenix Backdoor C2 Activity Observed C2 / Compromised Hosts: support[.]micsoft[.]store fourdjecem[.]shop poundpills[.]com IP: 64[.]7[.]198[.]12 ThreatBook Intelligence: https://t.co/VIFMs5wA3G
0
8
31
@Huntio 3/ However, the #sidewinder still using the same domain and C2 server to continue phishing. ref: https://t.co/tPVgs5DdjU
0
2
4
2/ Research on #Operation #SouthNet by @Huntio also revealed that same pages was observed at https://mailcbmgovmm[.]pages[.]dev which is now reported as phishing.
1
3
4