Germán Fernández :verified:

🏴‍☠️ OFFENSIVE-INTEL 🏴‍☠️ Cyber Threat Intelligence by Hackers | Security Researcher en CronUp.com | @CuratedIntel Member | 🥷🧠🇨🇱

Germán Fernández :verified: boosted:
2024-07-31

I wrote a quick blog post on this ongoing #malvertising campaign disguised as Google Authenticator and using.... Google ads.

malwarebytes.com/blog/news/202

#threatintel

Germán Fernández :verified:1ZRR4H@infosec.exchange
2024-07-30

@th3_protoCOL + https://github[.]com/authe-gogle/authgg

Germán Fernández :verified: boosted:
2024-07-30

Google #malvertising impersonating google authenticator

🎣 chromeweb-authenticators[.]com
📂 "Authenticator.exe"

Delivers digitally signed malware with a low detection ratio on #virustotal

🔗 virustotal.com/gui/file/5d1e3b

#Malware #IOCs

Google search results with a malicious ad impersonating "google.com"Fake google authentication site
Germán Fernández :verified:1ZRR4H@infosec.exchange
2024-06-07

🚨 Watch out, threat actors are exploiting another GitHub feature related to the commenting and notification system.

With the above, they manage to deliver #phishing emails through the legitimate account "notifications@github[.]com". In addition, the sender's name can be manipulated by renaming the attacker's GitHub account.

Two campaigns seen:
1⃣ New Gitloker attacks wipe GitHub repos in extortion scheme > bleepingcomputer.com/news/secu
2⃣ Crypto scams on GitHub > github.com/orgs/community/disc

Germán Fernández :verified: boosted:
James Forshaw :donor:tiraniddo@infosec.exchange
2024-06-06

Damn, I really thought the Recall database security would at least be, you know, secure. Turns out Microsoft did pretty much what I blogged about for WindowsApps, except you need to find a specific WIN://SYSAPPID instead. So to bypass the security just get the token for the AIXHost.exe process, then impersonate that and you can access the database, no admin required. Or, as the files are owned by the user, just grant yourself access using icacls etc :D

Germán Fernández :verified:1ZRR4H@infosec.exchange
2024-06-06

🚩 Active #RemcosRAT campaign is distributed via GitHub through abuse of comments in legitimate repositories.

Some malicious links:
- https://github[.]com/ustaxes/UsTaxes/files/15421286/2022and2023TaxDocuments[.]zip
- https://github[.]com/ustaxes/UsTaxes/files/15419438/2023TaxDocuments[.]zip
- https://github[.]com/PolicyEngine/policyengine-us/files/15487603/2023.TAX.ORGANIZER.pdf[.]zip
- https://github[.]com/hmrc/claim-tax-refund/files/15487332/TaxrefundlistPDF[.]zip

They also got creative and registered the user "user-attachments" on GitHub 😄
- https://github[.]com/user-attachments/files/15592343/Rachel.Completed.Organizer.Season.TAX.2023[.]zip

Remcos C2 servers:
- pattreon.duckdns[.]org:7035
- deytrycooldown.duckdns[.]org:7070
- newlink.duckdns[.]org:5111
* Botnet: RemoteHost

REF: bleepingcomputer.com/news/secu

Germán Fernández :verified: boosted:
2024-06-04

FIN7 #malvertising #threatintel

concuur[.]net
concuur[.]org
concuur[.]com
concur2024[.]com

96dfb6337647d890875919334a8dfc1f8f6e887f4b9ff6afedfb3574c7b444a3

Germán Fernández :verified: boosted:
SECUINFRA Falcon TeamSI_FalconTeam@infosec.exchange
2024-02-02

#100DaysOfYARA

Today: Detecting the "qBit Stealer" exfiltration tool

qBit Stealer was developed by the "qBit #Ransomware-as-a-Service" group to exfiltrate victim data to the MEGA file sharing service. It is implemented in #Golang.

About two months ago the source code of qBit Stealer was published on BreachForums for anyone to use and repurpose (Image 1).

Based on the source code and the sample shared by @1ZRR4H (twitter.com/1ZRR4H/status/1751), we created a YARA rule to look for qBit Stealer samples (Image 2).

Interestingly, most of the in-the-wild samples contain build artifacts of the "XFiltr8" variant, compiled by a user named "187ir".
We only found two other public samples that contain different path artifacts (Image 3).

Paths and hashes:
C:/Users/187ir/Golang-Projects/XFiltr8/Builder/XFiltr8.go
089ba2fb4eaa13b572ba558288592ed9
de2e25d217d28d1f360068048b5e4d54
bef9a0031387e0841166d41b047f8a13
fec2f286abc06554f68e5586a44662d5
03a18e5842e08a32d08703fe0c563687
e3211f650d932848a544d4da6f9fd599
1e6dca21cb0249525375e87358ff4fbc
4738ddef9cc4cd33dbbd616c722d5f46
97d87da8e4b22863681ef8eeef685826

C:/Users/benign_os/Desktop/malware_samples/3086/SMW3086/payloads/windows/qBitStealer/qBitStealer.go
f06c4a0af2181eb43a7b3763e8f5d5ea

C:/Users/lilia/Downloads/Telegram Desktop/qBitStealer/qBitStealer.go
b4247d41d89972d3a3cf34bca30c16f1

Samples will be shared via @abuse_ch Malware Bazar
The rules will be pushed to the 100DaysOfYARA and our detection repo :)
🍪

#infosec #cybersecurity

Germán Fernández :verified: boosted:
2023-12-15

Malicious slack ad leading to #Pikabot malware ⚠️​ Pikabot is closely associated with ransomware intrusions.

Redirection Infrastructure:
slalk.onelink[.]me
anewreseller[.]top

Fake Site:
siack.ovmv[.]net

.msi payload hosted on dropbox:
virustotal.com/gui/file/f1bc54

#IOCs #malvertising

Google search results with a malware ad spoofing slack.comFake slack website used for malware distribution
Germán Fernández :verified: boosted:
2023-12-13

Malicious advertisement spoofing zooms website⚠️ ​

Redirects the user to a fake site:
zoomus.onelink[.]me ->
zoonn.virtual-meetings.cn[.]com

Downloads .msix payload and launches it with ms-appinstaller:
ms-appinstaller:?source=https[:]//scheta[.]site/apps.store/ZoomInstaller.msix

Drops digitally signed malware "install.exe" (GlobalSign Code Signin)

Delivers #Batloader payload

#IOCs
🔗​ virustotal.com/gui/file/462df2
🔗​ virustotal.com/gui/file/48aa23

#malvertising #CTI

Malicious zoom ad spoofing the legit zoom websitefake zoom website used to distribute malware
Germán Fernández :verified: boosted:
2023-12-13

How can anyone reasonably expect a user to detect google ad abuse without visiting the malicious site?

Here's an example of a malicious google ad spoofing anydesk today.

This one redirects users to https[:]//anyowpdesk[.]com before downloading .msi malware:
virustotal.com/gui/file/9d85ae

#malvertising #malware #IOCs

Google search results with a malicious ad at the top. The ad looks like a link to anydesk.comFake AnyDesk website
Germán Fernández :verified: boosted:
2023-07-17

New #SolarMarker malware! 🌞​

Bing SEO poisoning -> fake website impersonating @internetarchive -> .exe malware (298.09 MB) -> walkymanki[.]com

#IOCs #Malware #CTI
virustotal.com/gui/file/7a8d7d

I used this script for extracting the C2 value from the sample: github.com/RussianPanda95/Conf

Fake website used for malware distribution, themed as the Internet archiveVirusTotal webpage, only 2/66 Vendors detect the file as malwareBing search result with SEO poisoned resultes
Germán Fernández :verified:1ZRR4H@infosec.exchange
2023-01-11

#RaspberryRobin 🪱 (REF: blog.sekoia.io/raspberry-robin)

'Clean' C2 domains:
/a7k.ro
/a5az.com
/v4a3.com
/4w.pm
/hlv1.com
/ubv5.com
/c43p.com
/2ipn.com

'Clean' compromised QNAP:
151.83.67.5
84.97.18.146
88.130.94.229
188.10.57.97

'New' exploited QNAP:
61.93.39.13
94.14.45.160

#EvilCorp

Germán Fernández :verified:1ZRR4H@infosec.exchange
2022-11-21

Monday Botnet 😍​

Germán Fernández :verified:1ZRR4H@infosec.exchange
2022-11-21

@th3_protoCOL

Current #payloads:

-ZipCosdaz.exe (#RedLine)
C2: 193.56.146.114:44271
Botnet: NewBuild

- ZipCosdaz1.exe (#Ursnif aka #Gozi)
C2 servers:
45.11.182.97
79.132.128.108
91.241.93.98
79.132.128.109
91.242.217.28
91.241.93.111
Botnet: 2503

- ConsoleDWS.exe (Destroy Windows 10 Spying)
GitHub repo: github.com/spinda/Destroy-Wind

+ And another download URL: archiverportal[.]space/porn.php

Germán Fernández :verified:1ZRR4H@infosec.exchange
2022-11-20

@th3_protoCOL Interesting, the C2 endpoints are different from the ones I knew.

The flow of connections is:

http://archiverportal[.]space/start.php ↓
https://www[.]win-rar[.]com/fileadmin/winrar-versions/winrar/winrar-x64-611.exe ↓
https://raw[.]githubusercontent[.]com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe ↓
http://qtorrent[.]space/7z.zip (Payloads: ZipCosdaz.exe, ZipCosdaz1.exe and ConsoleDWS.exe) ↓
http://archiverportal[.]space/install.php

Unfortunately, the server with the payloads is now down ¬¬

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst