x3ph(@x3ph1) 's Twitter Profile Photo

Observed

➡️js Browser_update16.0.5836.js->DLs and exec 11.bat from magydostravel[.]com
➡️11.bat->DLs lolo.7z,7zip,22.bat from mangoairsoft[.]com
➡️lolo.7z->NetSupportRAT-> C2: 94.158.247[.]23:5050
➡️22.bat->persistence regkey->netsupporRAT

Observed #NetSupportRAT

➡️js Browser_update16.0.5836.js->DLs and exec 11.bat from magydostravel[.]com
➡️11.bat->DLs lolo.7z,7zip,22.bat from mangoairsoft[.]com
➡️lolo.7z->NetSupportRAT-> C2: 94.158.247[.]23:5050
➡️22.bat->persistence regkey->netsupporRAT
account_circle
RussianPanda 🐼 🇺🇦(@RussianPanda9xx) 's Twitter Profile Photo

I am naming this campaign that leverages URL shortcuts to drop 🐀
1/

➡️ The user is getting infected via a drive-by download with the fake update screen (similar to SocGholish behavior). The initial payload is hosted on compromised WordPress

I am naming this #RogueRaticate campaign that leverages URL shortcuts to drop #NetSupportRAT  🐀
1/

➡️ The user is getting infected via a drive-by download with the fake update screen (similar to SocGholish behavior). The initial payload is hosted on compromised WordPress
account_circle
RussianPanda 🐼 🇺🇦(@RussianPanda9xx) 's Twitter Profile Photo

1/ 👻
Similar to the previous infection x.com/anfam17/status…

Download URL: publicccescpolace[.]com
NetSupportRAT C2: 94.158.244[.]118:1203

1/ #SocGholish #FakeUpdates 👻
Similar to the previous infection x.com/anfam17/status…

Download URL: publicccescpolace[.]com
NetSupportRAT C2: 94.158.244[.]118:1203
account_circle
x3ph(@x3ph1) 's Twitter Profile Photo

Observed

➡️Compressed gzip file containing a javascript called date_browser_176436.js
➡️JS->writes a compressed zip named 'Update - 920240108\.zip' file containing 3 javascript files->JS->DLs VBS from https[:]//choosetotruck[.]com/cache/letter.php->loads PS

Observed #netsupportrat

➡️Compressed gzip file containing a javascript called date_browser_176436.js
➡️JS->writes a compressed zip named 'Update  -  920240108\.zip' file containing 3 javascript files->JS->DLs VBS from https[:]//choosetotruck[.]com/cache/letter.php->loads PS
account_circle
x3ph(@x3ph1) 's Twitter Profile Photo

observed
➡️FakeBrowserUpdate downloads and runs on system.
➡️Implant of NetSupportRAT
➡️NetSupportRAT established connections: noinmsyvhruhjbi4hs[.]cn, gkdkr[.]icu

#SOCGholish observed
➡️FakeBrowserUpdate downloads and runs on system.
➡️Implant of NetSupportRAT
➡️NetSupportRAT established connections: noinmsyvhruhjbi4hs[.]cn, gkdkr[.]icu
account_circle
SecGaps(@secgaps) 's Twitter Profile Photo

Beware: FIN7 hacker group's latest tactic involves using malicious Google Ads to distribute NetSupport RAT.

Stay vigilant and ensure robust cybersecurity measures!

account_circle
RussianPanda 🐼 🇺🇦(@RussianPanda9xx) 's Twitter Profile Photo

1/ deploying at the first stage. The threat actor(s) deployed a PowerShell script via the NetSupport session after 2 days. Thanks dr4k0nia for a reversing session, she found the next stage to be 🐀

1/ #socgholish deploying #NetSupportRAT at the first stage. The threat actor(s) deployed a PowerShell script via the NetSupport session after 2 days. Thanks @dr4k0nia for a reversing session, she found the next stage to be #asyncrat 🐀
account_circle
WATI(@WATIforIT) 's Twitter Profile Photo

Protect your organization from phishing with NetSupport RAT, cloud platform abuse for undetectable URLs, and hackers targeting Windows NTLM hashes. Get our comprehensive guide now - wati.com/guide-to-prote…

Protect your organization from phishing with NetSupport RAT, cloud platform abuse for undetectable URLs, and hackers targeting Windows NTLM hashes. Get our comprehensive guide now - wati.com/guide-to-prote…

#PhishingEmails #NetSupportRAT #CloudSecurity #WATICybersecurity
account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

We've updated the vx-underground malware sample collection.

- TriangleDB
- CaddyWiper
- DoubleZeroWiper
- BlisterLoader
- HeaderTip
- Denoia
- Remcos
- WizardUpdate
- Blackcat
- Sharkbot
- AvosLocker
- NetSupportRAT
- Mirai
- IcedId

Check it out here: samples.vx-underground.org/samples/Famili…

We've updated the vx-underground malware sample collection.

- TriangleDB
- CaddyWiper
- DoubleZeroWiper
- BlisterLoader
- HeaderTip
- Denoia
- Remcos
- WizardUpdate
- Blackcat
- Sharkbot
- AvosLocker
- NetSupportRAT
- Mirai
- IcedId

Check it out here: samples.vx-underground.org/samples/Famili…
account_circle
Broad Analysis(@BroadAnalysis) 's Twitter Profile Photo


SocGholish Stage1 - taxes.rpacx[.]com
SocGholish Stage2 - hjgk67kg[.]xyz
SocGholish Stage3 - *.asset.tradingvein[.]xyz
NetSupportRat C2 - 52226asdiobioboioie[.]com (IP 94.158.244.38)

#socgholish #NetSupportRat
SocGholish Stage1 - taxes.rpacx[.]com
SocGholish Stage2 - hjgk67kg[.]xyz
SocGholish Stage3 - *.asset.tradingvein[.]xyz 
NetSupportRat C2 - 52226asdiobioboioie[.]com (IP 94.158.244.38)
account_circle
x3ph(@x3ph1) 's Twitter Profile Photo

Observed

A new domain has been observed trk.canadiantrk[.]site, leading to a download of Version2.exe which installs an instance of transmission-qt which then implants NetSupportRAT, C2 206.166.251[.]123.

CC Gi7w0rm, Namecheap.com

Observed #NetSupportRAT

A new domain has been observed trk.canadiantrk[.]site, leading to a download of Version2.exe which installs an instance of transmission-qt which then implants NetSupportRAT, C2 206.166.251[.]123.

CC @Gi7w0rm, @Namecheap
account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

We've updated the vx-underground malware sample collection

- Arechclient2
- CobaltStrike
- Emotet
- IcedId
- LockBitRansomware
- NetSupportRAT
- NSIS
- Paradies
- PoweRAT
- QakBot
- RedCap
- RedLine
- RoyalRansomware
- SpyNote
- Xdr33

Check it out here: vx-underground.org

We've updated the vx-underground malware sample collection

- Arechclient2
- CobaltStrike
- Emotet
- IcedId
- LockBitRansomware
- NetSupportRAT
- NSIS
- Paradies
- PoweRAT
- QakBot
- RedCap
- RedLine
- RoyalRansomware
- SpyNote
- Xdr33

Check it out here: vx-underground.org
account_circle
Burning Tree(@BurningTreeLtd) 's Twitter Profile Photo

Beware of the new — the remote access trojan, NetSupportRAT.

Through fraudulent updates, malware and phishing, criminals are hacking into victims’ computers and networks...

To protect your business, call our team of specialists on 01252 843014.

Beware of the new #CyberThreat — the remote access trojan, NetSupportRAT.

Through fraudulent updates, malware and phishing, criminals are hacking into victims’ computers and networks...

To protect your business, call our team of #CyberSecurity specialists on 01252 843014.
account_circle
Chris Pardue(@cpardue09) 's Twitter Profile Photo

-s :malware_traffic: 2023-01-18 (Wednesday) - malspam pushes - Many of the same IOCs we saw last month and reported at: x.com/unit42_intel/s…

Email attachment (zip archive) available at: bazaar.abuse.ch/sample/be7b369… pic.x.com/eilsjpwgqj

account_circle
iamdeadlyz(@Iamdeadlyz) 's Twitter Profile Photo

1/

Two-in-one: Wallet drainer &

Mass mentions & DMs to lure -> Pokemon Stacking Cards Game (82226526)

/pokemoncards-nft.com
Notif to: 195.133.197[.]185

🚩Etherscan
0xaAcCa4Ed989A3508d37e2432ADE900B8Ce657d2F
has back-and-forth txs: 0xE497Dc4cDCCbE258968A65dEBbe2006d3B3Ad15f

1/

Two-in-one: Wallet drainer & #NetSupportRAT

Mass mentions & DMs to lure -> @jobjobsjob (82226526)

/pokemoncards-nft.com
Notif to: 195.133.197[.]185

🚩@etherscan 
0xaAcCa4Ed989A3508d37e2432ADE900B8Ce657d2F
has back-and-forth txs: 0xE497Dc4cDCCbE258968A65dEBbe2006d3B3Ad15f
account_circle