ULTRAFRAUD Profile Banner
ULTRAFRAUD Profile
ULTRAFRAUD

@ULTRAFRAUD

Followers
2K
Following
3K
Media
152
Statuses
217

Underground bon vivant hunting for #malware

Buncoverse
Joined April 2022
Don't wanna be here? Send us removal request.
@ULTRAFRAUD
ULTRAFRAUD
2 years
#QuasarRAT C2 🦠 212.192.31[.211 https://t.co/HJZUcm1tCC Sample (no longer available) spread by 37.1.200[.46:8081 #opendir 🎰
1
2
37
@RustyNoob619
Yashraj Solanki
2 years
#100DaysofYARA Day83: Suspicious files attempting to impersonate Google Update Utilities https://t.co/4m0w7E2Yv6 Thanks to @ULTRAFRAUD for sharing the signed malware sample which allowed me to build this YARA
@ULTRAFRAUD
ULTRAFRAUD
2 years
ζ‚¨ηš„ζ΅θ§ˆε™¨η‰ˆζœ¬θΏ‡δ½ŽοΌŒθ―·ε‡ηΊ§ζ΅θ§ˆε™¨η‰ˆζœ¬ Signed #AsyncRAT stealer dressed as @googlechrome targeting chinese users πŸ’€ Low detection rate 🦠 /download-updata.com C2 /s2.download-updata.com https://t.co/qnjSMss16v
3
8
18
@ULTRAFRAUD
ULTRAFRAUD
2 years
ζ‚¨ηš„ζ΅θ§ˆε™¨η‰ˆζœ¬θΏ‡δ½ŽοΌŒθ―·ε‡ηΊ§ζ΅θ§ˆε™¨η‰ˆζœ¬ Signed #AsyncRAT stealer dressed as @googlechrome targeting chinese users πŸ’€ Low detection rate 🦠 /download-updata.com C2 /s2.download-updata.com https://t.co/qnjSMss16v
0
16
46
@ULTRAFRAUD
ULTRAFRAUD
2 years
/bbystealer.xyz /nt-stealer.xyz @500mk500 @karol_paciorek
3
6
13
@ULTRAFRAUD
ULTRAFRAUD
2 years
Interesting loader disguised as CreateStudio Pro, dropping an obfuscated Python payload via @pythonanywhere 🐳 /download-createstudioo.com /kingkh.pythonanywhere.com β†ͺ️/kingkh.pythonanywhere.com/SRC/test.zip
1
8
26
@ULTRAFRAUD
ULTRAFRAUD
2 years
Byakugan stealer panel πŸ‘€ /207.244.251.87:8080/auth πŸ‡ΊπŸ‡Έ
4
10
23
@ULTRAFRAUD
ULTRAFRAUD
2 years
LOLBin @AteraCloud agent dressed as @Adobe Acrobat Reader installer targeting Brasil πŸ‡§πŸ‡· /acrobat-download.pages.dev (auto DL) 7c166c4e8e31346574caf94a1eb609c1 https://t.co/q9bhK8sjY1
0
1
6
@ULTRAFRAUD
ULTRAFRAUD
2 years
Same #Smokeloader C2 still active ☒️ Working #opendir at /109.186.217[.138 with several samples πŸ’€ https://t.co/TIoDOQumB6
@James_inthe_box
James
2 years
For a good time, search for 77.91.68[.]29 on @anyrun_app ; 19 pages of #smokeloader starting June 26th
1
4
24
@ULTRAFRAUD
ULTRAFRAUD
2 years
Interesting #opendir at /89.23.98[.143:8000πŸ‘οΈ #Raccoon stealer sample 🦠 Nice UA πŸ™ƒ C2 /5.42.64[.45:80 cbf9b27a8f0e0694c727f4365776b745 In all likelihood a miner πŸͺ™ Dropper /89.23.98[.143:30020/receive 04a526f66fc4459a0ace9ec403c750ca
1
5
32
@ULTRAFRAUD
ULTRAFRAUD
2 years
#Mars C2 panel source βœ… via /pushpointdelivery.com/panel/login.php https://t.co/KpOmoOJUQK
@banthisguy9349
Fox_threatintel
2 years
we in baby. Time to safe the victims and find the threatactor.
4
9
68
@ULTRAFRAUD
ULTRAFRAUD
2 years
Active #Collector #stealer C2 πŸ¦ πŸ‡·πŸ‡Ί /libscripthubs.mcdir.me @ViriBack
1
3
30
@ULTRAFRAUD
ULTRAFRAUD
2 years
#BlazeStealer sample 🦠 /blazest4ler.000webhostapp.com/BlazeStealer.zip MD5: 9a6681622d3f2f766bada7972b0fc8aa
1
9
52
@ULTRAFRAUD
ULTRAFRAUD
2 years
Another great analysis from @bridewellsec @BridewellCTI πŸ’£ Thank you guys @josh_penny @RustyNoob619 for credits. #EasyStealer
@josh_penny
Joshua Penny
2 years
@RustyNoob619 and I uncovered "Easy Stealer" infrastructure and take you through our initial findings. Will update our blog as we continue to work through what we found. Welcome feedback and contribution from our security community friends. #InformationStealer #EasyStealer
1
2
6
@ULTRAFRAUD
ULTRAFRAUD
2 years
Interesting #Malware #opendir πŸ‘οΈ "\Uranium-235\meltdown.exe" \Uranium-235\nuclear.aul" /46.151.24.25:8000 DDR /alaneade.com C2 /87.251.67[.84/13224453 Mailcow instance /46.151.24.25:8080
1
21
55
@ULTRAFRAUD
ULTRAFRAUD
2 years
#Havoc #opendir /157.245.47.66:8080 @digitalocean
1
4
37
@ULTRAFRAUD
ULTRAFRAUD
2 years
Active #Doenerium stealer dressed up as @anydesk πŸ΄β€β˜ οΈ /anydesks.co/en/downloads/AnyDesk.exe 229037ea33eb267cc08621c8967ab4022f811461f716592ae95be23a8191bfe6 C2 /doenerium.kqnfkpoccicxiudstqonfotuwsrhuxkwhqjjfsbjhonoubrccy.nl
0
8
14
@ULTRAFRAUD
ULTRAFRAUD
2 years
Recently I've been finding several suspicious samples communicating with C2 via MeshAgent πŸ‘€ Take this #opendir for example: /2.155.18[.40:9000 C2 /serrapirate2121.duckdns.org https://t.co/AJ1D9Wd9LE
0
16
74
@ULTRAFRAUD
ULTRAFRAUD
2 years
There are those who look for MATLAB malware and those who instead are spreading midi cyber weapons. Dunno.. aw. much respect fo' free malware ❀️
2
2
15
@1ZRR4H
GermΓ‘n FernΓ‘ndez
2 years
Watch out for this #DarkGate campaign, quite possibly through Malvertising and using signed MSI files with very low (or zero) detection. #SIGNED "PFO GROUP LLC" Other sites on 154.56.47.156: https://openvpnhub[.]com/ https://angryipscanner[.]net/ https://www.putty-ssh[.]com/
@ULTRAFRAUD
ULTRAFRAUD
2 years
Unclassified malware disguised as @WinSCP distributed via @Dropbox. No VT detection RN πŸ’€ /easywinscp.xyz β†ͺ️ /winscphub.com C2 178.236.247[.102 πŸ‡·πŸ‡Ί 510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f
3
67
184
@ULTRAFRAUD
ULTRAFRAUD
2 years
Unclassified malware disguised as @WinSCP distributed via @Dropbox. No VT detection RN πŸ’€ /easywinscp.xyz β†ͺ️ /winscphub.com C2 178.236.247[.102 πŸ‡·πŸ‡Ί 510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f
4
29
113