MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile
MalwareHunterTeam

@malwrhunterteam

Official MHT Twitter account.
Check out ID Ransomware (created by @demonslay335).
More photos & gifs, less malware.

ID: 2847021941

linkhttps://id-ransomware.malwarehunterteam.com calendar_today27-10-2014 17:46:31

68,68K Tweet

239,239K Followers

39 Following

Jocelyn Anderson Photography (@jocaphotography) 's Twitter Profile Photo

This is the second Red-bellied Woodpecker that I’ve seen that can catch peanuts midair. It’s so impressive! I believe this is the mate of the male Red-bellied Woodpecker that will hand-feed.

MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile Photo

"Atualizacao-Plugin-06-2025-1748972931.js" seen from Brazil: 3bbc57b4a9220df17c25e107579ec6ade2542c1e516f55aa68c646d73d302dcc From: https://javasplugin[.]com/plugin-atualizacao/ 5.189.168[.]52 Germán Fernández

"Atualizacao-Plugin-06-2025-1748972931.js" seen from Brazil: 3bbc57b4a9220df17c25e107579ec6ade2542c1e516f55aa68c646d73d302dcc
From: https://javasplugin[.]com/plugin-atualizacao/
5.189.168[.]52
<a href="/1ZRR4H/">Germán Fernández</a>
Kseniia \n (@naumovax) 's Twitter Profile Photo

🚨 new C2 communication of #SVCStealer (1st screen) and #stealer version changing (3.3 -> 4.4) with sending uuid in uid (2nd screen) ⬇️ C2: 62.60.226[.]191:27015, 80 app.any.run/tasks/f99aab90… tria.ge/250604-e7e91sd…

🚨 new C2 communication of #SVCStealer (1st screen) and #stealer version changing (3.3 -&gt; 4.4) with sending uuid in uid (2nd screen) ⬇️

C2: 62.60.226[.]191:27015, 80

app.any.run/tasks/f99aab90…
tria.ge/250604-e7e91sd…
tooManyOpenThreats (@ownerprocessid_) 's Twitter Profile Photo

1/ This script manipulates Windows PrintTicket/DevMode conversion via ActiveX + XML, embeds fake namespaces, and downloads + executes remote code via MSXML2.ServerXMLHTTP and Function(), well done way for initial access or persistence 2º stage: hxxp://paste.ee/d/U5rjHHR7/0

1/
This script manipulates Windows PrintTicket/DevMode conversion via ActiveX + XML, embeds fake namespaces, and downloads + executes remote code via MSXML2.ServerXMLHTTP and Function(), well done way for initial access or persistence

2º stage: hxxp://paste.ee/d/U5rjHHR7/0
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

Seen from 🇷🇺 "Вложение без имени 00003.doc": 6ce99690955241a306fba345da4c2cc0c747d803eedfe8819bccde848839a781 👁️ Comms to: http://gemme-cotti[.]ru/zibaba.hta http://lieri[.]ru:8443/ http://mytho[.]su/bg.rtf http://emec[.]su/bg.rtf #CobaltStrike C2: http://cba.abc92[.]ru:8443/

Seen from 🇷🇺 "Вложение без имени 00003.doc": 6ce99690955241a306fba345da4c2cc0c747d803eedfe8819bccde848839a781 👁️

Comms to:
http://gemme-cotti[.]ru/zibaba.hta
http://lieri[.]ru:8443/
http://mytho[.]su/bg.rtf
http://emec[.]su/bg.rtf

#CobaltStrike 
C2: http://cba.abc92[.]ru:8443/
Nextron Research ⚡️ (@nextronresearch) 's Twitter Profile Photo

When we talk backdoors, we think C2 comms, auth bypasses, persistence. But some leave subtle traces. 🔍 Tools like THOR APT Scanner pick up on weak signals traditional AV/EDR often miss. Sample One of our detection signatures flagged an unusual Linux x64 sample - a stealthy

When we talk backdoors, we think C2 comms, auth bypasses, persistence. But some leave subtle traces.

🔍 Tools like <a href="/thor_scanner/">THOR APT Scanner</a> pick up on weak signals traditional AV/EDR often miss.

Sample
One of our detection signatures flagged an unusual Linux x64 sample - a stealthy
Albert Dros (@albertdrosphoto) 's Twitter Profile Photo

My work can now be seen (and purchased) in the new Fine Art Box Gallery in Amsterdam at the Kalverstraat 84. I'll be there on June 14 and June 29, from 12 to 6 PM. Who's coming to say Hi?

My work can now be seen (and purchased) in the new Fine Art Box Gallery in Amsterdam at the Kalverstraat 84. I'll be there on June 14 and June 29, from 12 to 6 PM. Who's coming to say Hi?
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

♦️ Meta ad leads to a website that impersonates "TradingView" and downloads an MSI signed by "LLC Torgovyi Dom Energia" (now revoked). ⚠️ Final URL is different from the one shown in the ad. https://apps-download-pc[.]com/ (malicious site is only displayed if you come from

♦️ Meta ad leads to a website that impersonates "TradingView" and downloads an MSI signed by "LLC Torgovyi Dom Energia" (now revoked).

⚠️ Final URL is different from the one shown in the ad. 

https://apps-download-pc[.]com/ (malicious site is only displayed if you come from
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

🚩 Website impersonating AnyDesk on anydeske[.]icu, downloads a .NET loader which then launches a stealer, both unknown to me 🤔 Nexts stages: - https://pastebin[.]com/raw/YwvHhwUk - https://pastebin[.]com/raw/WrgrtxSu - http://45.145.7[.]134/hook/upgrade.php -

🚩 Website impersonating AnyDesk on anydeske[.]icu, downloads a .NET loader which then launches a stealer, both unknown to me 🤔

Nexts stages:
- https://pastebin[.]com/raw/YwvHhwUk
- https://pastebin[.]com/raw/WrgrtxSu
- http://45.145.7[.]134/hook/upgrade.php
-
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

1/ 🚨🇨🇱 Alerta por comportamiento anómalo en el registro de dominios .CL . H/T CronUp Ciberseguridad 👁️ Se trata de una serie de dominios sospechosos compuestos de 5 letras aleatorias, registrados con poca diferencia de tiempo, utilizando el mismo agente registrador y la misma

1/ 🚨🇨🇱 Alerta por comportamiento anómalo en el registro de dominios .CL . H/T <a href="/Cronup_CyberSec/">CronUp Ciberseguridad</a> 👁️

Se trata de una serie de dominios sospechosos compuestos de 5 letras aleatorias, registrados con poca diferencia de tiempo, utilizando el mismo agente registrador y la misma