Fox_threatintel Profile
Fox_threatintel

@banthisguy9349

Followers
11,059
Following
191
Media
2,493
Statuses
7,549

Just a person who is against cyber crime. Special thanks to | | | for making my research easier.

Joined November 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@banthisguy9349
Fox_threatintel
2 days
http://45.120.107.43:8080/ #opendir full with malware and suspicious files. Malware analysers. Do your thing :D
Tweet media one
2
38
227
@banthisguy9349
Fox_threatintel
6 months
https://94.242.61.211 is full with malware. malware analysers GO!
Tweet media one
70
369
2K
@banthisguy9349
Fox_threatintel
8 months
this is one way to hide your mirai.
Tweet media one
Tweet media two
17
124
1K
@banthisguy9349
Fox_threatintel
6 months
what the actual fuck. #elf being spread through #waybackmachine
Tweet media one
38
71
902
@banthisguy9349
Fox_threatintel
6 months
whoever is behind this honeypot is a legend. http://185.90.101.112/
Tweet media one
8
67
546
@banthisguy9349
Fox_threatintel
6 months
malware analysers i need help. i am looking at a file with 0 detections that is most like #mirai #elf but it seems to be obfuscated or some shit. @UK_Daniel_Card @500mk500 @tosscoinwitcher @tolisec
Tweet media one
39
48
536
@banthisguy9349
Fox_threatintel
3 months
#brutal c2 cracked version in #opendir http://81.69.248.100:8000 with many other files
Tweet media one
12
78
453
@banthisguy9349
Fox_threatintel
10 months
#opendir goldmine c2: 91.92.251.25:8000
Tweet media one
14
33
347
@banthisguy9349
Fox_threatintel
1 month
mimikatz fscan windows-defender-remover smbexec 😆 hxxp://47.113.230.158:5000/ #opendir
Tweet media one
7
46
321
@banthisguy9349
Fox_threatintel
9 months
who can help? these apks are 0 detections on VT although i am almost 100% sure they are malicious.
Tweet media one
26
38
303
@banthisguy9349
Fox_threatintel
2 months
Scraping with cyberchef + Virustotal Guide in order to find as much malicious urls/files/c2's Step 1 find a suspected malicious ip through , honeypot , web crawlers , twitter posts Chuck the ip in Virustotal as such and click graph
Tweet media one
4
62
304
@banthisguy9349
Fox_threatintel
5 months
http://91.92.242.200/3.txt who can debunk this encoded Potential malware? its on the malicious asn 394711, Limenet
Tweet media one
20
26
256
@banthisguy9349
Fox_threatintel
7 months
i am fairly positive that a zero-day exploit is being used in this shellscript c2: 194.9.172.135:8080 ce07d922a8fd26f647a3d1cf653c6a579cbc77c18f4f8801bceda9c7ee750525 htop hxxp://194.9.172.135/htop (MALWARE DOWNLOAD, DOWNLOAD WITH CAUTION) 0 detections #elf
Tweet media one
Tweet media two
7
38
225
@banthisguy9349
Fox_threatintel
2 months
stupidity level 1337 ✅ by leaving the #botnet api exposing his credentials + other ip that he operates from http://94.156.71.166/api.php with a fake #Operation #PowerOFF 😆
Tweet media one
Tweet media two
8
26
214
@banthisguy9349
Fox_threatintel
4 months
http://141.11.109.151:8000/ Yikes opendir full with malware
Tweet media one
12
33
205
@banthisguy9349
Fox_threatintel
4 months
Do not act suspicious! 🤣🤣🤣
Tweet media one
12
15
196
@banthisguy9349
Fox_threatintel
11 months
Some repos that are used amongst hackers. hxxps://github.com/NullCode1337/NullRAT/releases/tag/v7.0 hxxps://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/releases/tag/v0.5.7B hxxps://github.com/quasar/Quasar/releases/tag/v1.4.0 hxxps://github.com/rapiz1/rathole/releases/tag/v0.4.0
2
29
187
@banthisguy9349
Fox_threatintel
15 days
want to analyse malware? browse through here to new find new malware urls that were send in for a deeper analyses cc: @500mk500 @malwrhunterteam
Tweet media one
2
43
198
@banthisguy9349
Fox_threatintel
6 months
We have discovered that botnets are controlled through SSH. we have written a query that detects the ips that basically control the botnets. The asn's come up are the typical ASN's that hosting botnet infrastructure. cc: @500mk500 @abuse_ch @tolisec
Tweet media one
5
25
190
@banthisguy9349
Fox_threatintel
8 months
Guide to hunt #opendir malware with @censysio and @abuse_ch urlhaus. Step one 1: find a unique malware name. I am using hxxps://urlhaus.abuse.ch/browse/ in this case. (picture 1/2) See comments for next steps.
Tweet media one
Tweet media two
2
45
181
@banthisguy9349
Fox_threatintel
4 months
roblox stealer with discord api webhook making use of 3500 different proxies from p.webshare[.]io
Tweet media one
Tweet media two
5
26
181
@banthisguy9349
Fox_threatintel
9 months
possible #botnet with infected phones on hxxps://91.92.249.28/
Tweet media one
7
33
173
@banthisguy9349
Fox_threatintel
8 months
is anyone with high expertise of malware analysis able to investigate this one?? 0 hits on VT on the ''fuckingdllENCR.dll" file although i think its #ransomware . #opendir hxxp://5.42.64.3/dll/
Tweet media one
16
27
174
@banthisguy9349
Fox_threatintel
4 months
i have discovered a ip that keeps track of ransomware victims. hxxps://93.127.195.88/ share this to dark_web intelligence trackers @DarkWebInformer @DailyDarkWeb @Gi7w0rm
Tweet media one
7
33
175
@banthisguy9349
Fox_threatintel
6 months
#opendir suspicious exe's lmao malware analysers go!
Tweet media one
7
25
170
@banthisguy9349
Fox_threatintel
3 months
hxxp://107.172.46.157:80 #cobaltstrike c2 hxxp://107.172.46.157:8000/ #opendir @abuse_ch how good is your chinese?
Tweet media one
Tweet media two
Tweet media three
7
29
166
@banthisguy9349
Fox_threatintel
1 month
reversed tracking! Knowing the c2 already although not knowing the malware being used? 1 of the possibilities of finding you the malware! First find yourself a ip of a c2 through @ViriBack and or a webcrawler like @censysio
Tweet media one
2
40
157
@banthisguy9349
Fox_threatintel
9 months
i have just found a malicious domain that reveals a #Opendir that is found and shows the exact same contents on like 1500+ other ips? anyone got a explanation for this? @UK_Daniel_Card @Gi7w0rm hxxp://mijnbelastingdienst-bs3819122.info/
Tweet media one
Tweet media two
Tweet media three
Tweet media four
18
17
138
@banthisguy9349
Fox_threatintel
3 months
When the VPN drops connection and your in the middle of a hunt.
Tweet media one
15
13
139
@banthisguy9349
Fox_threatintel
5 months
Its been a pleasure exfiltrating all the data from these #botnet #chinese #threatactors Here one of the many archives we retrieved http://45.61.184.159/1.tar.gz
Tweet media one
@banthisguy9349
Fox_threatintel
6 months
has been under control for 11 months. This ip is most likely the C2 for these botnet owners. they go by the name #sjy hxxps://api.telegram.org/bot6663236764:AAHYupAG9Xlz5JD7ukC8jt2FMYJRmG3Ek3M/getChatAdministrators?chat_id=-1001919880242
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
2
24
5
26
128
@banthisguy9349
Fox_threatintel
3 months
Tweet media one
Tweet media two
Tweet media three
6
17
126
@banthisguy9349
Fox_threatintel
3 months
#locker #leaks admin panel on http://80.76.49.112/ most likely related to a #ransomware group.
Tweet media one
Tweet media two
Tweet media three
5
19
123
@banthisguy9349
Fox_threatintel
3 months
Tweet media one
6
25
123
@banthisguy9349
Fox_threatintel
9 months
sometimes i get asked ''how you find these panels" well sometimes its just very simple. just ask the threatactor.
Tweet media one
Tweet media two
Tweet media three
3
8
121
@banthisguy9349
Fox_threatintel
6 months
#opendir with loads of sketchy hacktools, trojans hxxp://23.81.41.166/
Tweet media one
4
23
120
@banthisguy9349
Fox_threatintel
10 months
ip: 43.153.223.73 has some serious malicious code behind the button press #asyncrat
Tweet media one
6
16
119
@banthisguy9349
Fox_threatintel
6 months
Tweet media one
@luc4m
lc4m
6 months
@JustWantToQ1 @banthisguy9349 @TalosSecurity @MichalKoczwara @StopMalvertisin @WhichbufferArda @h2jazi Legit, probabily it is a common toolset for Chinese actor, But, there are matches on what Talos was describing on February. Idk if it could be apt41 or some other groups in that spectrum. But triggered my curiosity
Tweet media one
1
1
8
2
22
118
@banthisguy9349
Fox_threatintel
8 months
Guys. huge shoutout for @censysio automating to threatfox. @thehappydinoa is going for these credits!
Tweet media one
3
9
117
@banthisguy9349
Fox_threatintel
7 months
c2 for educational purposes my ass. 🤡🤡🤡🤡
Tweet media one
5
4
114
@banthisguy9349
Fox_threatintel
5 months
After tracking the same botnet over and over again we finally caught the botnet actor slipping pretty big time. Here a sample of the code that we retrieved
Tweet media one
Tweet media two
Tweet media three
6
21
112
@banthisguy9349
Fox_threatintel
11 months
Chinese threatactor that uses 'dlccandy @126 .com' as their email. Pov of their server:
Tweet media one
3
15
102
@banthisguy9349
Fox_threatintel
5 months
#opendir with very suspicous files on a known Malicious ASN http://94.156.8.104/ Malware analysers, do your thing ;)
Tweet media one
4
15
110
@banthisguy9349
Fox_threatintel
9 months
New #googledork discovered to track down #Ransomware intext:"How_to_back_files.html" intitle:"index of"
Tweet media one
Tweet media two
4
16
105
@banthisguy9349
Fox_threatintel
5 months
lets break their security?
Tweet media one
@banthisguy9349
Fox_threatintel
5 months
how does this shit still exist. RemcosRAT was observed to be bought and abused 9 months ago by a “heavy” threatactor.
6
7
39
3
13
102
@banthisguy9349
Fox_threatintel
4 months
People sometimes wonder: How does malware get spread? Google Ads Mail Youtube Telegram LinkedIN Github Pastebin etc. Filesharing services Hacking forums (and more.) Look at the picture for the typical malware hidden within fake software.
Tweet media one
12
24
101
@banthisguy9349
Fox_threatintel
9 months
Bro the state of this company. Holyshit lmao. @Gi7w0rm @UK_Daniel_Card
Tweet media one
22
11
96
@banthisguy9349
Fox_threatintel
6 months
Tweet media one
5
18
96
@banthisguy9349
Fox_threatintel
10 months
seems to be ransomware in this directory
Tweet media one
5
4
96
@banthisguy9349
Fox_threatintel
9 months
LMAO this webhost actually gave me the email from the cybercriminal without me asking for it.
Tweet media one
8
6
93
@banthisguy9349
Fox_threatintel
10 months
time to wipe the threatactors datacenter in abit :)
Tweet media one
6
8
91
@banthisguy9349
Fox_threatintel
11 months
Threat actor serbian maffia Pov of the hacker + his search history
Tweet media one
Tweet media two
6
11
95
@banthisguy9349
Fox_threatintel
24 days
195.18.23.81:8000 #Opendir Russia INFKOM-AS (51153) Yeah! thats the way to go. Just leave all your malicious files exposed cc; @RacWatchin8872 @NDA0E @BlinkzSec
Tweet media one
6
21
97
@banthisguy9349
Fox_threatintel
10 months
hook panel interface. threat actor tested the malware on himself.
Tweet media one
9
11
96
@banthisguy9349
Fox_threatintel
3 months
Seems like the Brutal C4 author is a little bit butthurt that there is a cracked version going around. Can you imagine blocking me without even have spoken to me. Geesh some people really weird 😅
Tweet media one
@banthisguy9349
Fox_threatintel
3 months
#brutal c2 cracked version in #opendir http://81.69.248.100:8000 with many other files
Tweet media one
12
78
453
9
7
90
@banthisguy9349
Fox_threatintel
8 months
took me 1minute to find this shit on pfcloud[.]io ASN #ransonware #opendir @@@ @GO here on your own risk@@@@ hxxp://193.35.18.38/
Tweet media one
7
12
90
@banthisguy9349
Fox_threatintel
4 months
wait whats happening here 👀
Tweet media one
4
9
89
@banthisguy9349
Fox_threatintel
6 months
@maietta Yeah cuz why not?
0
1
90
@banthisguy9349
Fox_threatintel
1 month
#asyncrat IOC! Active ips: 23.26.108.141 23.94.126.49 51.81.30.54 104.243.47.92 109.199.101.109 149.102.147.106 154.216.20.112 185.150.190.160 206.53.55.147 active malware urls:
Tweet media one
3
21
90
@banthisguy9349
Fox_threatintel
1 month
How to detect whether your ip's devices are potentially compromised? These are botnet samples retrieved from this ip address that also host the c2 Its very common for the botnet to only contact 300 infected clients per sample.
Tweet media one
4
28
90
@banthisguy9349
Fox_threatintel
4 months
#opendir with a bunch of exploits http://148.135.35.177:3389/ "namespace bing.Exploits.Local"
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
16
85
@banthisguy9349
Fox_threatintel
8 months
Some heavy malware discovered in this #Opendir http://91.92.255.205/ download with caution!
Tweet media one
2
10
86
@banthisguy9349
Fox_threatintel
8 months
#opendir #Neptune loader found on 94.156.69.85
Tweet media one
1
15
85
@banthisguy9349
Fox_threatintel
9 months
well. whoever want some samples. to analyse some malware. here is a public dir from a threat lab.
Tweet media one
Tweet media two
2
22
85
@banthisguy9349
Fox_threatintel
9 months
Phishing framework found on 87.121.113.251 Targetting serveral know banks.
Tweet media one
2
16
83
@banthisguy9349
Fox_threatintel
8 months
http://91.215.85.223/ #opendir full of malware. my Virustotal is not running in VM :(. who can check this out and put into triage/vt/ @abuse_ch ?
Tweet media one
11
15
81
@banthisguy9349
Fox_threatintel
2 months
63.147.117.146 < this ip is under control by a cybercriminal that make use of Redlinestealer. He goes by the name Josh Zimmermen which is not confirmed to be his actual name. The email that he uses o7lab.me @gmail .com Pov of his cybercriminal activities below:
Tweet media one
7
19
81
@banthisguy9349
Fox_threatintel
6 months
#opendir hxxp://193.93.248.103/ #ddos #flooder
Tweet media one
Tweet media two
2
18
79
@banthisguy9349
Fox_threatintel
4 months
https://t[.]me/bf_scams These are the type of people responsible for the typicale phishing page
Tweet media one
1
18
78
@banthisguy9349
Fox_threatintel
10 months
whos able to help me investigate this ip? This one is connected to a massive fake casino scam + 129 supershell panels. seems to be the main dataserver from the threat actor
Tweet media one
6
15
79
@banthisguy9349
Fox_threatintel
1 month
Tweet media one
@holypryx
pryx
1 month
@banthisguy9349 @vxunderground Shut up furry, do ur malware investigation stuff and leave the dude alone
1
0
0
7
7
77
@banthisguy9349
Fox_threatintel
1 month
Geroin c2 panel? hxxp://91.214.78.195/tabak/login.php when faulty login Russian text appear seems like a new c2 panel to my knowledge.
Tweet media one
Tweet media two
3
13
76
@banthisguy9349
Fox_threatintel
8 months
i have written a query with @censys that discovered 400 ips that are currently #compromised by #mirai #malware and are actively part of a botnet. @thehappydinoa this is crazy.
Tweet media one
Tweet media two
1
17
75
@banthisguy9349
Fox_threatintel
10 months
wtf is this shit lmaoooo
Tweet media one
3
10
74
@banthisguy9349
Fox_threatintel
6 months
#lockbit sample seems to be just shared on malware bazaar from @abuse_ch
Tweet media one
0
11
75
@banthisguy9349
Fox_threatintel
3 months
#amadey #c2 hxxp://check-ftp.ru/forum/Login.php registrated with Registrar: R01-RU
Tweet media one
2
21
74
@banthisguy9349
Fox_threatintel
7 months
uhmmm... undetectable? #elf #malware 0 detections hxxp://194.48.250.71/http_storm 46d463a3ddd35d9b96d5e5d106a847a7fc986a3ebce58e5eca93d4264fd874a9 http_storm no wonder why their telegram group has 4.5k is pretty huge botnet...
Tweet media one
Tweet media two
4
5
73
@banthisguy9349
Fox_threatintel
1 month
attack observed! coming from 27.25.151.236 target.txt exposes the targetted site. hxxp://ejt.myjjzd.com
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
9
73
@banthisguy9349
Fox_threatintel
3 months
#opendir hxxp://173.212.248.30 @ContaboCom with full of malicious files cc: @NDA0E @RacWatchin8872have fun analysing cc: @UK_Daniel_Card ROCKYOUUUUUUUUUUUU! #cve -2023-4911 poc
Tweet media one
4
14
71
@banthisguy9349
Fox_threatintel
5 months
Almost 7k followers and i appreciate every single one of you. ❤️🙏🏻 Yes threatactors who follow me for intelligence you to… i know you have a good heart down there, that do have possibility to make a change into being better human being.
3
4
73
@banthisguy9349
Fox_threatintel
1 month
#attention #allegedly this domain is spreading ransomware domain registration with @Namecheap hosting with @awscloud
Tweet media one
8
27
72
@banthisguy9349
Fox_threatintel
29 days
IOC's! @Namecheap please check the pastebin for suspending the malicious domains.
Tweet media one
@NDA0E
NDA0E
30 days
#Mirai #C2 domains are using Round-Robin DNS to resolve to multiple hosts Using "Resolve-DnsName" in PowerShell we can resolve the domains to their corresponding IPs. Ports used for Mirai connection: 1337, 2222, 2474, 5555, 6969, 8745, 8932, 12381 IOCs:
Tweet media one
Tweet media two
1
12
42
3
17
72
@banthisguy9349
Fox_threatintel
7 months
#qakbot query with @censys that showing 32 active c2's currently
Tweet media one
2
11
72
@banthisguy9349
Fox_threatintel
7 months
http://91.92.253.92/ #Phishing kits exposed targetting several branches
Tweet media one
Tweet media two
1
17
71
@banthisguy9349
Fox_threatintel
2 months
hxxp://68.183.92.154:3000/login html title says Botnet. 😅
Tweet media one
5
9
70
@banthisguy9349
Fox_threatintel
7 months
Looking good! Virustotal literally listed all ips as malicious. definition of a malicious ASN.
Tweet media one
2
6
69
@banthisguy9349
Fox_threatintel
5 months
well welll well.. #potential #malicious #powershell #exposed from the looks of it to target @Steam users with malware
Tweet media one
2
14
69
@banthisguy9349
Fox_threatintel
7 months
#apt33 alfa team webshell was observed. The alfa team webshells is used by alot of other APTs after some digging with @tosscoinwitcher we have observed over 380 alfa webshells and seen APT's such as #fsociety #turkhackteam
Tweet media one
Tweet media two
@banthisguy9349
Fox_threatintel
7 months
[ ./AlfaTeam © 2012-2024 ] Donate Us ! solevisible[at] #APT33 ALFA TEAM have their root #Opendir 🤣🤣🤣🤣 http://34.101.157.124/bins/
Tweet media one
Tweet media two
4
7
46
2
9
67
@banthisguy9349
Fox_threatintel
11 months
have you ever wondered what a desktop of a malware maker looks like? Well see the following picture. I may or may not reported him to the canadian police with his full name + adres :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
8
6
67
@banthisguy9349
Fox_threatintel
8 months
hxxp://93.123.39.69/admin/dashboard.php hxxp://93.123.39.80/admin/dashboard.php hxxp://93.123.39.108/admin/dashboard.php hxxp://93.123.39.127/admin/dashboard.php hxxp://93.123.39.139/admin/dashboard.php New phishing framework found.
Tweet media one
7
8
65
@banthisguy9349
Fox_threatintel
6 months
with the following query you can track down #foxy #stealer
Tweet media one
@karol_paciorek
Karol Paciorek
6 months
Foxy Stealer ➡️ Asuka Stealer ❌Malicious IP: 5.42.66[.4 🌐 #CTI ETag: 6603a18b-350 🗒️Another, more "popular" panel address for #Asuka #Stealer is 5.42.66[.25
Tweet media one
4
14
52
1
9
66
@banthisguy9349
Fox_threatintel
11 months
Another operation that i infiltrated in 2022. Pov of the Info stealer and malware that was used.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
2
60
@banthisguy9349
Fox_threatintel
7 months
I have found a ip that reveals logs of infected devices by #elf malware. visit only in secure environment 211.215.19.94
Tweet media one
Tweet media two
4
15
63
@banthisguy9349
Fox_threatintel
5 months
All i gotta say for cybercriminals like this. (2nd picture)
Tweet media one
Tweet media two
9
4
64
@banthisguy9349
Fox_threatintel
8 months
I need help. there is about 85 discord phishing pages connected to a botnet infrastructure that spreads #bobik malware. Allthough the phishing pages download gives 0 VT. I suspect the TA to have a zero day to avoid detection. http://31.31.203.206:606/
Tweet media one
Tweet media two
8
20
63
@banthisguy9349
Fox_threatintel
5 months
Malicious exe's and asyncrat found in the jpg and txt http://91.92.252.220 #opendir #asyncrat
Tweet media one
4
14
64
@banthisguy9349
Fox_threatintel
8 months
Russian threatactor targetting senate[.]gov and house[.]gov emailadresses with ''mcafee Malicious url seems to be suspended. http://185.66.9.215:81/ #opendir
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
13
63
@banthisguy9349
Fox_threatintel
10 months
opendir c2's through @censysio hxxps://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=labels%3D+%60c2%60+and+labels%3D+%60open-dir%60 @thehappydinoa
Tweet media one
2
15
63
@banthisguy9349
Fox_threatintel
4 months
#new #ransomware extension found ".hmallox" in the same directory of a #locked #ransomware victim careful with traveling to this directory since there is malware active in there. the how_to_back_files.txt seems to be from .hmallox although the output is scrambled.
Tweet media one
Tweet media two
4
13
62
@banthisguy9349
Fox_threatintel
6 months
Once again abuse is being ignored by our lovely host @pfcloudio
Tweet media one
Tweet media two
Tweet media three
4
6
62
@banthisguy9349
Fox_threatintel
8 months
With the following urlscan query i have retrieved a 8month history of all types of ddos tool domain/advertisement websites related to my earlier findings:
Tweet media one
@banthisguy9349
Fox_threatintel
8 months
their telegram on the bottom of the website
1
1
2
1
18
62