johnk3r Profile Banner
Johnk3r Profile
Johnk3r

@johnk3r

Followers
2K
Following
3K
Media
214
Statuses
695

Threat Hunter

Chile
Joined February 2015
Don't wanna be here? Send us removal request.
@johnk3r
Johnk3r
3 months
πŸ›‘ Heads-up: #num2words v0.5.15 (just dropped on PyPI) may be #compromised. Early signs probably link it to #Scavenger, the same threat actor behind previous software supply chain intrusions. @MalwareUtkonos @cyb3rjerry @InvokeReversing
6
18
47
@johnk3r
Johnk3r
3 days
@dodo_sec @1ZRR4H @Merlax_ In a new sample observed the Threat Actor changed the payload from "Powershell->WPPworm" to "Python->WPPworm". Additionally, the #Astaroth payload is delivered in an MSI file: IoC: varegjopeaks\.com
0
5
17
@johnk3r
Johnk3r
9 days
The collection has been updated with two new samples from this campaign: https://t.co/X3mS8mBEYQ 6d61d7284a81149ae6db117cbbcbac1e8ced4d762a92e57cd2c7f85f834143de 341252a437e7535f9ea8707e41f0ff2a775eddb16190eeb9f0c0f524214e4f3d Thanks for the feedback @dodo_sec #HappyHunting
Tweet card summary image
bazaar.abuse.ch
Hunt for malware samples tagged with tag 'miportuarios-com'
0
3
11
@Merlax_
Merl
12 days
@johnk3r @dodo_sec @1ZRR4H Nice find πŸ‘ more screenshots of the c2, maybe it's used as a loader
3
6
15
@johnk3r
Johnk3r
12 days
One analyzed C2 shows ~2,000 potential victims @dodo_sec @1ZRR4H @Merlax_
8
3
21
@johnk3r
Johnk3r
12 days
Stage 3: LNK dropper that downloads known #Astaroth payloads (AutoIt).
1
1
13
@johnk3r
Johnk3r
12 days
Stage 1: Obfuscated VBS β€” language checks, host fingerprinting, and C2 retrieval (some samples pull C2 via hardcoded IMAP). Stage 2: WhatsApp session hijack β€” malware copies the browser data folder; if unauthenticated it displays the WhatsApp QR for login.
1
2
16
@johnk3r
Johnk3r
12 days
Brazilian threat actors are abusing WhatsApp to spread banker trojans. The actor behind the infamous #Astaroth/#Guildma runs a 3-stage campaign: obf VBS β†’WhatsApp session hijack β†’ LNK dropper β†’ Astaroth(AutoIt) Note: days ago the same technique delivered Maverick (.NET). 1/4
1
12
60
@johnk3r
Johnk3r
19 days
Just shared the final stages of this threat on MalwareBazaar β€” a related article is available below: https://t.co/GnAlz2kb9p https://t.co/k4eu3eYXH3 #HappyReversing #maverick @JAMESWT_WT @smica83
Tweet card summary image
bazaar.abuse.ch
Hunt for malware samples tagged with tag 'Maverick'
@johnk3r
Johnk3r
22 days
The previous link has expired [MyBad]. Here's the new link with new insights and IoC: https://t.co/fAfp7pzD4K #HappyHunting #Banker #Fraud #LATAM
0
9
29
@johnk3r
Johnk3r
22 days
The previous link has expired [MyBad]. Here's the new link with new insights and IoC: https://t.co/fAfp7pzD4K #HappyHunting #Banker #Fraud #LATAM
@johnk3r
Johnk3r
24 days
Targets extracted from the "Maverick.StageTwo :: MonitorBrowserUrl" module. Logic: b64 β†’ AES-256-CBC (PKCS7) decrypt β†’ GZip decompress β†’ JSON (domains β†’ index). https://t.co/DtlM2fypS5
1
3
18
@johnk3r
Johnk3r
24 days
Targets extracted from the "Maverick.StageTwo :: MonitorBrowserUrl" module. Logic: b64 β†’ AES-256-CBC (PKCS7) decrypt β†’ GZip decompress β†’ JSON (domains β†’ index). https://t.co/DtlM2fypS5
@johnk3r
Johnk3r
24 days
IoC: sorvetenopote\.com/api/itbi/startup/ casadecampoamazonas\.com MaverickZapBot2025SecretKey12345 🧐
0
7
28
@johnk3r
Johnk3r
24 days
IoC: sorvetenopote\.com/api/itbi/startup/ casadecampoamazonas\.com MaverickZapBot2025SecretKey12345 🧐
2
3
6
@johnk3r
Johnk3r
24 days
#Banker malware observed with two modules β€” Maverick.StageTwo and Maverick.Agent β€” spreading via WhatsApp. Victims receive links/files leading to a stager that abuses UI Automation to grab browser URLs and load payloads in memory. #Coyote? @TomerPeled92 1/2
@smica83
Szabolcs Schmidt
26 days
'RES-20250930_112057.lnk' from Brazil @abuse_ch https://t.co/TSQkeVPzx3 URL: hxxps://sorvetenopote(.)com/api/itbi/ug562V8iUfM8j9FeZ6E69g8umGOSGdXf
4
8
54
@johnk3r
Johnk3r
25 days
#BQTLock? #MILITARY APT INFECTION DETECTED - LEVEL: STATE SPONSORED 🧐🧐 p://military-apt\.onion https://t.co/GssT41Q1jz @RexorVc0
2
6
24
@johnk3r
Johnk3r
27 days
ff5dbdcf6d7ae5d97b6f3ef412df0b977ba4a844c45b30ca78c0eeb2653d69a8 [wsftprm.sys - Topaz OFD - PM]
0
1
6
@johnk3r
Johnk3r
27 days
3/3 Samples: 79f560a1677f983ad3ffaca8ff00b8351b9a54f98d0a7d82d4aea6d043696e5d [cartel.exe] 29f275382b0c14c068bb40385c1ed43aa08ab0e2785c2d7efc10510cd6c11c7f [lazarus.exe] #HappyHunting
1
1
6
@johnk3r
Johnk3r
27 days
To debug the driver I used #Radare + #Malcat. Here are the main functions of this vulnerable driver: 0x14000264c | 0x140002848 | 0x1400029b0 Ref.: https://t.co/a0YOSk5R3s 2/3
1
2
8
@johnk3r
Johnk3r
27 days
Observed threat actor abusing a vulnerable driver (wsftprm.sys, Topaz OFD – Brazilian antifraud vendor, #CVE-2023-52271) for defense evasion. Attack chain: cartel.exe β†’ vulnerable driver β†’ Lazarus.exe (final payload, extension ".cry"). First seen in Colombia. 1/3
5
36
114
@johnk3r
Johnk3r
1 month
In the last few days, a global Password Spraying campaign has been targeting EntraID, more precisely the legacy app 'Windows Live Custom Domains', via IPv6. Strengthen defenses with Conditional Access πŸ”. https://t.co/lJ9ThW2MBU
reddit.com
Explore this post and more from the entra community
2
10
64
@johnk3r
Johnk3r
1 month
#Mosquito resurgence β€” updated downloader, C2 shifted to WebSocket, but reuse of UAC & PDB quirks aids attribution. Targets: ~40 orgs in BR & US. IoCs: mku9j[.]com bdeunlock[.]exe Ref.: https://t.co/cbR2EGG1SV #Fraud #Banker
2
10
36