@Valthr0m Profile picture

0xValthr0m

@Valthr0m

Phis-Hunter | CTI | Rider

Big brother is watching you... <MaskDrop> Detection time :) URL: hxxps://yuznuguldircekfrsat.shop/sadece-online-ozel/

Tweet Image 1
Tweet Image 2
Tweet Image 3

Detecting a new one phishing campaigns against @Akbank Domain: investele.com/test.html Similar: x.com/Balthr0maw/sta…

Tweet Image 1
Tweet Image 2

#phishing campaign against #Akbank -> abotas[.]co[.]uk/test.html Screenshots:

Tweet Image 1
Tweet Image 2
Tweet Image 3


#phishing campaign against #Akbank -> abotas[.]co[.]uk/test.html Screenshots:

Tweet Image 1
Tweet Image 2
Tweet Image 3

0xValthr0m Reposted

[1/2] I came across numerous phishing scripts targeting crypto asset investors in an opendir I found. Threat actor's usernames: X: monkeydrainer GitHub: devildrainer Telegram: devildrainer, devildrainers Medium: devildrainer ENS: devildrainer.eth

Tweet Image 1

0xValthr0m Reposted

devices affected by the Android Botnet and the panels it is connected to 👇 #ThreatIntelligence #Botnet #ThreatHunting sample: 24986ad9f604b33c6b925a3a5071dcc3 C2: http://shehwhwhhe[.]xyz reference: @zoomeye_team

Tweet Image 1

0xValthr0m Reposted

#amadey #malware It appears that the Amadey malware is spreading through pornographic content C2 server: hxxp://77.91.68.52 cc:@ViriBack

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

0xValthr0m Reposted

I came across a Supershell C2 hosted on @tencentcloud . There are 32 victims within the panel. C2: hxxp://118.89.125[.]171:8888/supershell/login

Tweet Image 1
Tweet Image 2

0xValthr0m Reposted

#opendir different domains, same files http://mailgo24[.]sbs/ http://newall-getrenew[.]digital/ http://pr24note[.]info/ http://wholeadress-renew[.]digital/ @malwrhunterteam

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

0xValthr0m Reposted

No sandbox was able to detect the C2 address of this #android #malware. It's targeting 500+ banks; however, how did a simple HTTP request go undetected? 50532b97a338f3659aaa699dbbe5daec C2: hxxp://nu-confirmacaoemail.com @malwrhunterteam @500mk500

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

0xValthr0m Reposted

⚠️Crax RAT and the recently emerged Anonymous RAT using multiple techniques to bypass detection. They use a tool called "APKeditor" to do this. this tool is open source.(github.com/REAndroid/APKE…) @LukasStefanko @malwrhunterteam #malware

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

0xValthr0m Reposted

Sekiryu is an useful tool to automate tasks with Headless mode Ghidra Credits @2ourc3 github.com/20urc3/Sekiryu #infosec #ghidra

Tweet Image 1
Tweet Image 2
Tweet Image 3

0xValthr0m Reposted

VeDich Stealer Roberto Coin Jewelry - Campaign Information[.]zip 81764a9228378358eb3e8632357cea7e - Zip contains decoy video and images along with VeDich Stealer - Get PC info - Get browser data and exfiltrate via telegram #VeDichStealer #Stealer #IOC

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

0xValthr0m Reposted

Also useful functions for unpacking. You can find the infographic on my page, they are under Creative Commons license (CC BY): struppigel.github.io/WisdomForHedge…

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.