ViriBack Profile Banner
Dee Profile
Dee

@ViriBack

Followers
10K
Following
6K
Media
680
Statuses
1K

#Malware C2 hunter #infosec passionate. Tweets are my own.

Canada
Joined March 2015
Don't wanna be here? Send us removal request.
@ViriBack
Dee
2 years
Over the 10k #malware C2 panels on https://t.co/NCtVSQlP6n
5
14
70
@ViriBack
Dee
2 days
IOC: verify-captcha[.]sbs 83.217.209[.]224 www.msk-captcha[.]cfd Port: 3000 #malware #UniHex #RAT Title: UNIHEX C2 // ROOT
0
2
5
@James_inthe_box
James
4 days
pdb path for the win on this #stealerium run: https://t.co/NGoyQ3pgbU
0
3
12
@solostalking
Raaz
4 days
Bear Stealer 94[.156.114.203:5000 9222dc6f7effcd68d7fbd81e979a38ba8ce16bd1b780d107cdf9b073fb298fb1 @500mk500
1
3
14
@KrakenLabs_Team
KrakenLabs
6 months
πŸ§ͺ New "123 | Stealer" Offered in Underground Forums The threat actor #koneko is offering a credential stealer for US$120 per month, as advertised on a cybercrime forum. πŸ” Alleged features: – Written in C++ – Steals: browser data, cookies, passwords, crypto wallets, process
1
5
19
@solostalking
Raaz
7 days
Santa Stealer promoted on TG 31[.57.38.244 stealer[.su/login Lot of exe communicating to the IP @500mk500
3
8
44
@solostalking
Raaz
6 days
123 Stealer 91[.215.85.42:3003 Edits: https://t.co/FrQqvT2tUA https://t.co/7aX5HKTIFu
@KrakenLabs_Team
KrakenLabs
6 months
πŸ§ͺ New "123 | Stealer" Offered in Underground Forums The threat actor #koneko is offering a credential stealer for US$120 per month, as advertised on a cybercrime forum. πŸ” Alleged features: – Written in C++ – Steals: browser data, cookies, passwords, crypto wallets, process
0
3
32
@solostalking
Raaz
8 days
MioLab MacOS Stealer being promoted on forum. Found some panels miov2iaiaoubqosiqoiajwowiwjso[.online 196[.251.107.97 on port 80 and 3000 mioisiskwowiwjowuwjwolab[.club @500mk500
0
8
28
@SquiblydooBlog
Squiblydoo
9 days
CertCentral is now TheCertGraveyard[.]org & CertGraveyard[.]org. The CertCentral API returns an error directing to use the new domains. Please give me a like or a share to get the word out. Also use the site to report and investigate certificates used to sign malware. :)
@SquiblydooBlog
Squiblydoo
10 days
I'm being required to give up the domain CertCentral[.]org; and the change has to happen by Monday. I'm noodling on alternative names. Keep an eye out for the change.
5
47
82
@Fact_Finder03
Coral Jasmine
21 days
Browser Stealer Login http[://185.126.67.34[:8000/ @500mk500 @ViriBack
0
3
4
@solostalking
Raaz
2 months
zenRAT active on 185[.158.251.148[:4000 Being promoted on TG and \\ #RAT
3
8
76
@g0njxa
Who said what?
2 months
Currently seeing a surge on #CastleLoader malware being delivered through fake websites impersonating software used in enterprise environments such as Zabbix or RVTools (see photo 1 & 2). IOCS below πŸ‘ΎπŸ”Ž Please note that this campaign uses the same exact template lures of
2
24
85
@FannieMae
Fannie Mae
3 months
Lenders can more easily work with state and local agencies to find grants and programs that may help borrowers afford a home thanks to our streamlined resources. Learn how.
7
28
220
@SquiblydooBlog
Squiblydoo
2 months
If you want to understand attacker actions on target without being the target yourself, check out DeceptionPro. DeceptionPro creates an enterprise network for you to detonate malware payloads. Check out my blogpost in the thread to learn more about how it works. πŸ”—πŸ‘‡
1
5
21
@solostalking
Raaz
2 months
Cyber Stealer jerk hiding behind se* shop (LLCPPC you need to do something again 🀣) dorklife[.vip cyberv2[.live https[://176[.65.141.143 fofa icon_hash="-516595605" @500mk500
2
1
11
@solostalking
Raaz
3 months
New Active Panel 31[.58.169.29[:1133/login 151[.243.254.56[:1133/login
@solostalking
Raaz
5 months
Lazarus Stealer πŸ€·β€β™‚οΈβ˜ οΈ(now they speak Russian as well, hehe not real ikr ) 193[.151.108.203[:1133/login 193[.151.108.33[:1133/login 193[.151.108.243[:1133/login 193[.151.108.207[:1133/login 193[.151.108.49[:1133/login @500mk500 @ViriBack
1
6
30
@SquiblydooBlog
Squiblydoo
3 months
Low detection Latrodecus Signed "Ballbusters Oy" 😳 C2: gansroroyfgdst[.]com/work/, triosdoryumkas[.]com/work/ 49c20938fbd31a92a359147b539de76d59be71abf7560801ecc497ca9c8ae809 AnyRun: https://app.any[.]run/tasks/3becb418-0a63-48c5-b54d-adcea0450e45
4
10
44
@Xanderuxsf5
Xanderux
3 months
πŸ›‘οΈLazarus Stealer IP : 193.151.108.39 AS 207957( Serv .host Group Ltd ) Low detection on @virustotal more Lazarus servers detected by #C2Watcher on https://t.co/od5mNFcggD
2
3
16
@Fact_Finder03
Coral Jasmine
3 months
#CYBERSTEALER #panel http[://195.177.94[.232/webpanel/panel/login.php https[://arbitrationengine[.com/webpanel/panel/login.php @500mk500 @ViriBack #Stealer #WEBPANEL #THREATINTEL
1
5
12
@Xanderuxsf5
Xanderux
4 months
πŸ•΅οΈβ€β™‚οΈ SpY-Agent v1.2 IP : 178.16.54[.]226:80 AS 209800( metaspinner net GmbH ) Undetected on @virustotal more Spy-Agent v1.2 servers detected by #C2Watcher on https://t.co/eSMKnpwhzM
1
5
17
@CMEActiveTrader
CME Active Trader
4 months
Trade more with less with E-mini S&P 500 futures. With only 5-10% margin required, futures offers more margin savings compared with top S&P 500 ETFs.
4
13
76
@Xanderuxsf5
Xanderux
4 months
🟒 Zerotrace IP : 185.174.135[.]177:8080 AS 59711( HZ Hosting Ltd ) Undetected on @virustotal more Zerotrace servers detected by #C2Watcher on https://t.co/CamTjDYMxD
2
10
38