
Squiblydoo
@SquiblydooBlog
Followers
4K
Following
8K
Media
327
Statuses
1K
Malware Analysis Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0 Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9
Joined November 2020
Low detection #bumblebee .Distributed disguised as NetSetMan.msi . "LLC Onixgroup".--.I don't post every cert we report. But if you want to see what gets reported, use Cert Central or the Cert Central API. certcentral[.]org
0
0
3
Pro tip:.If you receive a screen saver named "Coinbase_incident_report.scr"* you shouldn't run it. *file format SCR is identical to EXE.--.Disguised as PDF.Code-signed by "GeoTech-IT Oy". h/t @g0njxa .also uploaded to MB by @JAMESWT_WT ❤️.🔗🧵
2
5
14
#bumblebee signed "LLC Ugurmana". Distributed disguised as Advanced IP Scanner and NetSetMan . https://bazaar.abuse[.]ch/sample/a14506c6fb92a5af88a6a44d273edafe10d69ee3d85c8b2a7ac458a22edf68d2/.
https://tria[.]ge/250716-nltd7avzcy/behavioral2. h/t @g0njxa .@JAMESWT_WT.
0
4
20
Thats the way I like my libssl.dll: signed by a Indian company that makes nutrients for livestock "GAUAMRIT NUTRICARE PRIVATE LIMITED". MD5: ae0912ba4a5bff3f3543f5f393446adb. https://bazaar.abuse[.]ch/browse.php?search=serial_number:737c5c461d3864ac4f089e26.h/t
@g0njxa
3
3
21
Fake DBeaver signed by "LLC Vtorsintez" 🇷🇺.MD5: 4fa9f678df14a33e2e5480d63604f811.(Too big for MalwareBazaar). https://tria[.]ge/250711-n4tsnst1fs/behavioral1. Anti-analysis: wmic memorychip get Capacity -> exits.h/t @g0njxa .@JAMESWT_WT
2
6
17
#bumblebee disguised as NetSecMan, installs real thing as decoy. Signed: "LLC Resource+". https://bazaar.abuse[.]ch/sample/cd454d80b75cbd4b23f9ec4a3e5746e53552f5a2a30c3ea1d5d3215cf41484aa/.
https://tria[.]ge/250711-nmnkbstygy/behavioral2. h/t @g0njxa .@JAMESWT_WT
0
5
31
Dear #Bumblebee malware dev, do you really need 199 dga domains?.--.Signed "LLC Invest Center". Appears to be delivered via ads for Advanced IP Scanner and ManageEngine-OpManager. https://bazaar.abuse[.]ch/browse.php?search=serial_number:073b9b32fe16b00a4268f97b. h/t @g0njxa
3
7
34
Low detection #Latrodectus .signed "LLC Jupiter". MD5: 2c2b6ab5549fe70cd9befe1ef5ac63a3.MB: https://bazaar.abuse[.]ch/browse/tag/LLC-Jupiter/. C2: gorahripliys[.]com, aliondrifdions[.]com.@JAMESWT_WT
1
7
26
RT @ExpelSecurity: ⚠️ New version of the malware disguised as PuTTy. The files are signed “Alternative Power Systems Solutions LLC”. Fake P….
0
8
0
RT @1ZRR4H: ⚠️ "New" #CrazyEvil campaign 🇷🇺.Landing domain: rivatalk[.]com. As usual, there is a signed malware for Windows ("Heze Hongwei….
0
13
0
TribeWars scam signed "Al-Base Trading Corp.". Actors commonly abusing code-signing certificates targeting cryptowallets. Launches a CAPTCHA for anti-analysis by sandboxes.
Nearly a year after @g0njxa and I exposed #CryptoLove (now defunct due to alleged exit scam), we are still tracking the launchers. Evidence suggests former CL members may have migrated to #FRIENDSCOMPANY and other groups. Help us protect the community - please report their
2
6
13