#IOCS

2026-02-05

To follow up on the earlier thread, the impersonation of AECOM HR part 2 continues with the malicious actors respond to my reply.

I had responded to the threat actor, providing availability for a conversation. The threat actor responded with the questions below at 0331 AM PT 2026-02-04. This should have been a big tell for me as the spoofed HR persona is located in Portland, OR and not likely working in the middle of the night.
Then when I had not responded, they replied to the same email thread with the same content at 1737 PM PT 2026-02-04. This is what triggered my further analysis and recognized the miscreant at work.
I posted the IOCs and details on my Github:
github.com/obrientg/Analysis/b

#jobsearch #fraud #impersonation #informationsecurity #abuse #risk #riskmanagement #gethired #hiring #threatintel #IOC #IOCs #gethired #hiring #threatlandscape #getFediHired #threatInteligence #cybersecurity #phishing

🚨 𝗔 𝗻𝗲𝘄 𝗚𝗼-𝗯𝗮𝘀𝗲𝗱 #𝗿𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲 𝗶𝘀 𝗮𝗰𝘁𝗶𝘃𝗲. GREENBLOOD encrypts files fast using ChaCha8 and tries to delete its executable to reduce visibility. Attackers threaten victims with leaking stolen data on their TOR-based website, creating business and compliance risks.

#ANYRUN Sandbox exposed ransomware behavior and cleanup attempts in real time, so SOC teams can act before the damage spreads.

👾 See the analysis session and collect #IOCs to speed up detection and response: app.any.run/tasks/6f5d3098-14c

🔍 Pivot from IOCs and subscribe to Query Updates to proactively track evolving attacks: intelligence.any.run/analysis/

👨‍💻 Learn how #ANYRUN Sandbox helps SOC teams detect complex threats early: any.run/features/?utm_source=m

IOCs:
12bba7161d07efcb1b14d30054901ac9ffe5202972437b0c47c88d71e45c7176
5d234c382e0d8916bccbc5f50c8759e0fa62ac6740ae00f4923d4f2c03967d7a

#cybersecurity #infosec

:mastodon: deciodecio@infosec.exchange
2026-02-04

Pour la chasse et vérification dans les logs réseau notamment pour la période juin ➡️ décembre 2025

👇

validin.com/blog/exploring_not

⬇️

🔍 IOC — Validin (Exploring Notepad++ network indicators)

Ces IOC proviennent du rapport d’analyse de l’infrastructure C2 associé à l’attaque Notepad++ (indiqués dans l’article Validin).

  • 95.179.213[.]0 (confirmé le même que Rapid7)

  • api[.]skycloudcenter[.]com

  • 61.4.102[.]97

  • api[.]wiresguard[.]com

  • 59.110.7[.]32

  • 124.222.137[.]114

  • 45.32.144[.]255

  • 160.250.93[.]48

  • cloudtrafficservice[.]com

  • api[.]cloudtrafficservice[.]com

  • 103.159.133[.]178

👇

securelist.com/notepad-supply-

🔍 IOC — Securelist (Notepad supply chain attack)

Cet article donne plusieurs catégories d’indicateurs (machines de mise à jour malicieuses, C2, fichiers, etc.).

⚠️ Malicious Updater URLs

  • hxxp://45.76.155[.]202/update/update.exe
  • hxxp://45.32.144[.]255/update/update.exe
  • hxxp://95.179.213[.]0/update/update.exe
  • hxxp://95.179.213[.]0/update/install.exe
  • hxxp://95.179.213[.]0/update/AutoUpdater.exe

📡 System Info Upload / C2

  • hxxp://45.76.155[.]202/list
  • hxxps://self-dns.it[.]com/list

⚙️ Metasploit downloader / Cobalt Strike

  • hxxps://45.77.31[.]210/users/admin
  • hxxps://cdncheck.it[.]com/users/admin
  • hxxps://safe-dns.it[.]com/help/Get-Start

💻 Cobalt Strike Beacon / Payload C2

  • hxxps://45.77.31[.]210/api/update/v1
  • hxxps://45.77.31[.]210/api/FileUpload/submit
  • hxxps://cdncheck.it[.]com/api/update/v1
  • hxxps://cdncheck.it[.]com/api/Metadata/submit
  • hxxps://cdncheck.it[.]com/api/getInfo/v1
  • hxxps://cdncheck.it[.]com/api/FileUpload/submit
  • hxxps://safe-dns.it[.]com/resolve
  • hxxps://safe-dns.it[.]com/dns-query

#CyberVeille #NotepadPlusPlus #IoCs

Frise chronologique illustrant les différentes étapes de l’attaque de la chaîne d’approvisionnement Notepad++ entre juin et décembre : compromission du serveur Notepad++ en juin, Chaîne 1 fin juillet–début août, Chaîne 2 mi-septembre, changement d’adresse IP (Chaîne 3) début octobre, nouveau changement d’IP mi-octobre, modification de l’URL du serveur malveillant fin octobre, puis remédiation de l’attaque sur le serveur de mise à jour en décembre.

⚠️ #BQTLock ransomware uses #Remcos injected into explorer.exe to hide inside normal system activity. In the #ANYRUN Sandbox, behavioral analysis and file system monitoring exposed a UAC bypass via fodhelper.exe, followed by persistence through autorun mechanisms with elevated privileges.

👾 Once elevated, the malware moves into data theft and screen capture. See the full execution chain and collect #IOCs to speed up detection and cut response time: app.any.run/tasks/90be5f16-fdd

👨‍💻 Learn how #ANYRUN Sandbox helps SOC teams detect complex threats early: any.run/features/?utm_source=m

#cybersecurity #infosec

🚨 #RustyWater: How Word Macros Still Enable Initial Access
Macros execution blends into normal document use and often runs before security tools raise alerts. In this case, the attack chain starts with a malicious Word document whose macros drops and executes the RustyWater implant.

The activity is linked to a #MuddyWater spearphishing campaign aimed at high-risk sectors.

⚠️ The implant launches from ProgramData via cmd[.]exe, bypassing static detection pushing defenders straight into incident response phase.

Execution pattern breakdown:
1️⃣ Document_Open
The macros trigger WriteHexToFile and love_me__ once the document is opened.

2️⃣ WriteHexToFile
Hex data from UserForm1.TextBox1 is cleaned, converted to bytes, and written to C:\ProgramData\CertificationKit[.]ini. This function acts as a dropper for the implant.

3️⃣ love_me__
The macros dynamically constructs WScript[.]Shell using Chr() and creates the object. It then builds and runs the command: cmd.exe /c C:\ProgramData\CertificationKit[.]ini. The implant runs without a visible window.

4️⃣ Strings, object names, and commands are obfuscated to complicate static inspection and signature-based detection.

👨‍💻 See live execution and download actionable report: app.any.run/tasks/6f60427a-522

❗️ Why macros-based initial access still works?
Macros execute payloads before actionable alerts appear. The delayed visibility forces teams to investigate after execution has already occurred. Earlier behavioral visibility helps contain threats before escalation, reducing investigation time and business impact.

🔍 Find similar Word macros-on-open cases and pivot from #IOCs in TI Lookup: intelligence.any.run/analysis/

IOCs:
f38a56b8dc0e8a581999621eef65ef497f0ac0d35e953bd94335926f00e9464f
7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58
nomercys[.]it[.]com

🚀 Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod

#cybersecurity #infosec

2026-01-18

aww man, looking around to see if anyone has already done some reversing/modding work on a game that's piqued my interest recently has led me to this itch account using the blog feature to redirect to fake downloads.

httpX://itch[.]io/blog/1318716/hollow-knight-silksong-mod-menu-software-for-pc-control-

Initial landing page: gitcompiler[.]com, appears to call out and test 3 sub domains to redirect to which in turn will send to a landing page. (though 2 of the domains have busted cors rules and don't work anyway)

Interestingly I was only able to download the sample on my linux machine by using the "responsive mode" emulating a mobile device in firefox for the (purpose of User Agent spoofing). Anyrun and virustotal didn't pick anything up, but another user got some signals using the recorded future sandbox under a different download.

As much as I'd love to try and dig at it myself to practice some reversing I don't have the setup here to do anything of the sort safely

reuploaded sample: app.any.run/tasks/5ee02578-a65
sample from malicious host: app.any.run/tasks/eb5dc590-a83
public sandbox: tria.ge/260117-qf18ysat4c

virustotal.com/gui/file/f6dfc0

#iocs #itch

// Primary landing page 

*.gitcompiler[.]com

// Redirect mirrors, contains an AES encrypted url in /head/meta[name='token']

httpX://digitalwavesway[.]com

httpX://gametolifeservers[.]com

httpX://techflowtime[.]com

// landing page for digitalwavesway

httpX://mailer.soham-sn[.]com/

// redirects to this anon filehost for applicable UAs

httpX://download.us-east-1.fromsmash[.]co/transfer/o__j34ymsr-et/file/57f99acc7c450b6d46375299cfea313a04b5c9d2?identity=a3aa69c86700fc05b854066a0e9dc0c5-46a18736882df635ff3cb7ed43d39ba05859a992c5ec0d2b7ef47c8d99fc4de6c7884d5fcf7019eafa90291a05c7421c3ef7b7b78d70fbcdced31f8a3b50dec16c04299c9ea69377415fe2a33d26899c&Expires=1768719805&Key-Pair-Id=APKAIM76HR2FWFZRN3HA&Signature=eG9gFcmZF2zZXoRTPyWemG0syj4bEbtNOitCECgcjF-XyQzUb6i9skCN~9pKcSr0n31JPfnCbfSytbNS1MdgsbQH5kpxQQthp4bhK38Xqmbsd~Gc-VgT7M~3ml7K0H1uiPrvd8eu7oWTWEaUJJjyAn-ZbqAVRSD99AjhJ8O~yWD49~nlYowUR0fO7R-gPtNd1BtB278xB3DdW0js1M2os8T5AwIULZKOW3-oDjMhrAXCfqzwGOrH8GxNyJpA09sP8ZBWvDOb73ykYWb47~UZPBLV0T2hnWGkDW5ZHoKhZUwedrankpheTBG51DeSM81OZi3ZPOEbngtGZDvtIYQtEg__

🚨 #Phishing on Trusted Cloud Infrastructure: Google, Microsoft, Cloudflare.
We’re tracking a growing trend where phishing kit infrastructure is hosted on legitimate cloud and CDN platforms, not newly registered domains. In some cases, these campaigns specifically target enterprise users. This creates serious visibility challenges for security teams.

We’ve observed this pattern across multiple #phishkits:
🔹 #Tycoon hosted on alencure[.]blob[.]core[.]windows[.]net (Microsoft Azure Blob Storage): app.any.run/tasks/29b53d89-99b
⚠️ #Sneaky2FA hosted on legitimate cloud platforms, filtering out free email domains via a fake Microsoft 365 login to target corporate accounts:
firebasestorage[.]googleapis[.]com (Cloud Storage for Firebase): app.any.run/tasks/8189dd5e-015
cloudfront[.]net (AWS CloudFront): app.any.run/tasks/9a2d1537-e95
🔹 #EvilProxy hosted on sites[.]google[.]com (Google Sites): app.any.run/tasks/07995c22-6e7

Victims see a “trusted” provider domain, while the network only sees normal HTML being loaded from cloud infrastructure. What looks clean at first glance is exposed by #ANYRUN Sandbox in under 60 seconds, directly reducing MTTD and MTTR.

🔍 Hunt for related activity and pivot from #IOCs using these search queries in TI Lookup:
🔹 Microsoft Azure Blob Storage abuse: intelligence.any.run/analysis/
🔹 Firebase Cloud Storage abuse: intelligence.any.run/analysis/
🔹 Google Sites abuse: intelligence.any.run/analysis/

Many security vendors will flag these domains as legitimate. Technically, they are. That’s why security teams need behavioral analysis and network-level signals to reliably uncover phishing before impact.

🚀 Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod
#ExploreWithANYRUN

#IOCs:
mphdvh[.]icu
kamitore[.]com
aircosspascual[.]com
Lustefea[.]my[.]id

#cybersecurity #infosec

🚨 #CastleLoader attacks government agencies, compromising up to 400+ devices at once.

Its unusual process hollowing via an AutoIt3 script is hard for EDR to detect.

See full analysis with extracted runtime config, C2s, and #IOCs 👇
any.run/cybersecurity-blog/cas

#cybersecurity #infosec

🔍 Fresh, actionable threat intelligence for security leaders.
This report covers three high-impact malware families affecting Windows and mobile environments:
🔹 #Albiriox, an Android banking trojan offered as MaaS, combining VNC-based remote control and overlays to bypass protections in 400+ financial apps.
🔹 #OctoRAT, a .NET-based Windows RAT with UAC bypass, credential theft, proxying, and full remote control for long-term access.
🔹 #GuLoader, a downloader using heavily obfuscated PowerShell, shellcode, and process injection to deliver RATs and infostealers.

👨‍💻 Explore an exclusive report with #IOCs, YARA, and detection insights in the TI Lookup Premium plan: intelligence.any.run/reports/6

New to TI Lookup? Start a trial to explore more in-depth analyses of active threats and APTs: any.run/plans-ti/?utm_source=m

#cybersecurity #infosec

2026-01-04

Command-and-control IPv4 map, 2025-12-22 to 2026-01-04 #IOCs
abjuri5t.github.io/SarlackLab/

156.234.96[.]0/20
103.48.132[.]0/22
156.234.152[.]0/23
156.234.208[.]0/23
156.234.145[.]0/24
103.41.6[.]0/23
156.234.216[.]0/21
156.234.252[.]0/22
104.140.144[.]0/20

2026-01-04

Already in holiday mode? Don’t switch off yet.
Year-end emails about bonuses, HR requests, and finance updates feel routine. That is exactly why attackers use them as #phishing lures.

👨‍💻 Explore an exclusive report with examples and #IOCs in the TI Lookup Premium plan: intelligence.any.run/reports/1

New to TI Lookup? Start a trial to explore more in-depth analyses of active threats and APTs: any.run/plans-ti/?utm_source=m

#cybersecurity #infosec

🚨 #Udados: New Botnet Behind HTTP Flood #DDoS Attacks
⚠️ We identified a new botnet #malware family and named it Udados. Its activity is linked primarily to the Technology and Telecommunications sectors.

Infected hosts communicate with a C2 and receive commands to launch HTTP flood DDoS attacks. Once triggered, they send high volumes of HTTP POST requests to the victim’s domain, generating sustained attack traffic.

❗️ The malware connects to infrastructure hosted in a frequently abused ASN (AS214943 – RAILNET) at IP 178[.]16[.]54[.]87.

HTTP-based flooding remains effective because it can blend into legitimate traffic, delaying mitigation and disrupting business continuity. For defenders, this highlights the importance of understanding how C2 commands translate into attack traffic to limit downtime and financial impact.

👨‍💻 See Udados’ DDoS execution chain and traffic patterns in the #ANYRUN Sandbox: app.any.run/tasks/a85696de-147

📤 The infected host sends structured JSON data to the C2, including:
Uid: user ID
St: task execution status
Msg: status message sent to C2
Tid: task ID
Bv: bot version
Priv: privilege level on the system
Src: DNS-beacon
Sys: system information of the infected host

📥 In response, the C2 issues commands containing:
Id: C2 response identifier
Command: C2 command, for instance, !httppost, which triggers the HTTP POST DDoS module
888: attack duration
88: number of threads
Base64: data sent in POST requests to overload the target server: {"data":"random_data_0.28543390397237833"}

📌 How to detect:
Track HTTP requests to the specific URI /uda/ph.php. Inspect the request body for characteristic parameters such as uid, st, msg, tid, bv, priv, src, sys. Monitor short-term spikes in outbound HTTP activity from a single host to external destinations.

🔍 Search for Udados-related activity and pivot across infrastructure using TI Lookup: intelligence.any.run/analysis/

#IOCs
SHA256:
7e2350cda89ffedc7bd060962533ff1591424cd2aa19cd0bef219ebd576566bb
770d78f34395c72191c8b865c08b08908dff6ac572ade06396d175530b0403b8
IP: 178[.]16[.]54[.]87
URI: /uda/ph[.]php
Domain: ryxuz[.]com
Request body: uid, st, msg, tid, bv, priv, src, sys

🚀 Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod

#cybersecurity #infosec

🚨 Stego-Based Delivery Chain Targeting Windows Environments

⚠️ #LOTUSHARVEST blends into legitimate activity, creating visibility gaps that raise the risk of delayed detection and costly compromise for enterprises.

The attack starts with an LNK shortcut disguised as a PDF CV and a “PNG image”. In #ANYRUN Sandbox, the full execution chain becomes visible, exposing how the #malware stages payloads and bypasses detection.

The malware uses findstr.exe, a text-filtering and pattern-search utility (T1564), to locate the required parts inside the “PNG image”. The temporary file with Base64 string is then cleaned of noise and moved into ProgramData (T1059.003).

❗️ What makes this chain stand out:
1️⃣ Abuse of ftp.exe as a script runner
ftp -s:<file> executes any line that looks like an FTP command, even local shell commands starting with !. LOTUSHARVEST places ASCII instructions at the top of the PNG, turning it into a pseudo-script (T1202, T1218).

2️⃣ PNG as a stacked container
The PNG is a multi-layered container holding a script, a PDF fragment, and an encoded PE (T1027.003), enabling stealthy delivery without extra artifacts.

3️⃣ DeviceCredentialDeployment.exe used as a LOLBin
This legitimate Windows component can hide console windows. LOTUSHARVEST uses it to run command chains invisibly (T1564.003), making detection harder.

👨‍💻 #ANYRUN Sandbox detected and executed LOTUSHARVEST in real time. See the analysis session: app.any.run/tasks/228cbbb7-b55

Attackers rely on legitimate utilities and layered containers to remain persistent without raising alerts. For security teams, understanding these techniques is essential for spotting malicious activity early and stopping breaches before they escalate.

🔍 Track similar activity and pivot from #IOCs using TI Lookup:
Suspicious use of ftp.exe: intelligence.any.run/analysis/
Suspicious LNK patterns: intelligence.any.run/analysis/
Hidden DeviceCredentialDeployment.exe execution: intelligence.any.run/analysis/

💬 Find IOCs in the comments.

🚀 Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod

#cybersecurity #infosec

2025-11-26

RE: chaos.social/@christopherkunz/

potentially pivotal: key indicators of compromise (#IoCs) identified by GitLab's Vulnerability Research team concerning an active, large-scale supply chain attack on the #npm ecosystem.
#DevSecOps

🚨 𝗝𝗦𝗚𝘂𝗟𝗱𝗿: 𝗠𝘂𝗹𝘁𝗶-𝗦𝘁𝗮𝗴𝗲 𝗟𝗼𝗮𝗱𝗲𝗿 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝗶𝗻𝗴 𝗣𝗵𝗮𝗻𝘁𝗼𝗺𝗦𝘁𝗲𝗮𝗹𝗲𝗿
TL;DR: We identified #JSGuLdr, a multi-stage JavaScript-to-PowerShell loader used to deliver #PhantomStealer. A JScript file triggers PowerShell through an Explorer COM call, pulls the second stage from %APPDATA%\Registreri62, then uses Net.WebClient to fetch an encrypted payload from Google Drive into %APPDATA%\Autorise131[.]Tel. The payload is decoded in memory and loaded, with PhantomStealer injected into msiexec.exe.

⚠️ The chain combines obfuscation, cloud-hosted payloads, COM-based execution, and fileless in-memory loading, making it difficult to detect with automated or static detection solutions.

Execution chain: wscript.exe ➡️ explorer.exe (svchost.exe) ➡️ explorer.exe (COM) ➡️ powershell.exe ➡️ msiexec.exe

👨‍💻 See analysis session: app.any.run/tasks/7b295f6f-5f1

Stage 1️⃣: The sample is an obfuscated JScript script signed with a fake Authenticode certificate to bypass trust checks. It builds an encrypted PowerShell string and writes it to %APPDATA%\Registreri62, forming the second stage.

Through Shell.Application and Explorer COM interaction, the script launches powershell.exe under explorer.exe, masking the execution chain as normal user activity.

🎯 TTPs: Obfuscation (T1027), Signed binary proxy execution (T1553.006), COM interaction (T1559.001), Proxy execution via explorer.exe (T1218)

Stage 2️⃣: The PowerShell code decodes and runs %APPDATA%\Registreri62, reconstructing hidden commands (iex) and loading a new payload from Google Drive. The file is saved as an encrypted container for the third stage.

🎯 TTPs: Encrypted payload download (T1105), Cloud storage abuse (T1105), Local file staging (T1074.001)

Stage 3️⃣: Autorise131[.]Tel acts as an on-disk container for an in-memory payload.
The same PowerShell process decodes it, extracts bytes, and executes the result through Invoke-Expression, running PhantomStealer filelessly in memory.

The payload is injected into msiexec.exe, enabling PhantomStealer to steal data.

🎯 TTPs: Fileless execution (T1059.001), Reflective .NET module loading (T1620), Process injection (T1055), Proxy execution via msiexec.exe (T1218.007)

🔍 Track similar activity and pivot from IOCs using this TI Lookup search query: intelligence.any.run/analysis/

#IOCs:
URL: hxxps://drive[.]google[.]com/uc?export=download&id=1gUB_fKBej5Va_l3ZSEXk_7r5Q4EeJuwd
Files: %APPDATA%\Registreri62, %APPDATA%\Autorise131[.]Tel
CMD: powershell.exe "$Citize=$env:appdata+'\Registreri62';$Guazuma=gc $Citize;$Aristape=$Guazuma[4460..4462] -join ''"

🚀 Gain fast detection and full visibility with #ANYRUN. Sign up: app.any.run/?utm_source=mastod

#cybersecurity #infosec

⚠️ Gunra is a fast-growing #ransomware using Conti-based code and double extortion

It targets healthcare, manufacturing, and other sectors worldwide, deletes recovery options, and encrypts data across entire networks

👾 Explore analysis & gather #IOCs: any.run/malware-trends/gunra/?

#cybersecurity

abuse.ch :verified:abuse_ch@ioc.exchange
2025-11-11

Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.

👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.
💀 The most-shared malware family (or in this case framework)? Clearfake, with 2,817 IOCs reported.

Find the full breakdown here: 👉 threatfox.abuse.ch/statistics/

#ThreatFox #CommunityPower #SharingIsCaring #CyberThreatIntel

Total IOCs Shared (Last 30 Days)

🚨#XWorm: PNGs hiding an in-memory loader.
A malicious JavaScript installer named PurchaseOrder_25005092.JS is delivered via #phishing pages and emails (T1566.001). The script uses an IIFE-style obfuscation (T1027), writes three staged files to C:\Users\PUBLIC, and creates a scheduled task to ensure persistence (T1053.005).

This JS checks for required artifacts and, if missing, writes them to disk using long Base64 blobs and AES-encrypted strings (T1027.013). The staged files are named Kile.cmd, Vile.png, and Mands.png.

⚠️ .png files are not images, they are storage containers for Base64-encoded encrypted payloads (T1036.008). It is a common technique to evade quick detection.

Kile.cmd is a heavily obfuscated batch script with variable noise, percent-based substitutions, chunked Base64 fragments, that reassembles commands at runtime.

❗️ At execution, the JS reconstructs readable commands from those fragments and launches a PowerShell payload (T1059). The PowerShell is a two-stage AES-CBC loader:
1️⃣ Reads C:\Users\PUBLIC\Mands.png as Base64 ➡️ AES-decrypt ➡️ yields Base64-encoded commands. Each command is decoded and executed via Invoke-Expression (IEX). This acts as a command runner.

2️⃣ Reads C:\Users\PUBLIC\Vile.png as Base64 ➡️ AES-decrypt ➡️ raw bytes. The loader attempts to load a .NET assembly from memory and execute its entry point (T1620).

This is an in-memory assembly loader, a fileless/memory-loader pattern: command runner + in-memory payload.

👾 At the end, PowerShell runs an assembly in memory to launch XWorm.

A single successful XWorm infection can give adversaries access to critical systems, leading to breaches and operational disruption. Once inside, attackers can steal data, move laterally, and cause costly downtime.

👨‍💻 Get fast detection and full visibility with #ANYRUN. See live execution and download actionable report: app.any.run/tasks/bec21e02-8fb

👨‍🍳 Use this CyberChef recipe to decode the final PowerShell string:
gchq.github.io/CyberChef/#reci

🔍 Find similar campaigns using these TI Lookup search queries and enrich #IOCs:
🔹 PowerShell .Replace() obfuscation: intelligence.any.run/analysis/
🔹 PowerShell invoking IEX: intelligence.any.run/analysis/
🔹 JS droppers in Public\Libraries: intelligence.any.run/analysis/

Gain full visibility with #ANYRUN to make faster, smarter security decisions 🚀

#cybersecurity #infosec

🚨 How #Pxastealer Uses Masquerading: Execution Flow and TTPs.
⚠️ Pxastealer is delivered through archive links in #phishing emails, bypassing automated filters. Masquerading hides execution and gives attackers time to exfiltrate data.

Execution flow & TTPs:
1️⃣ Initial Access (T1566.002): A victim clicks a link to a malicious archive in a spearphishing email.
2️⃣ Execution & Cleanup (T1059.003, T1070.004): cmd.exe runs a long command chain and deletes traces.
3️⃣ Defense Evasion (1036.008, T1140, T1027): A fake Word file opens to mask background activity, while certutil -decode turns a fake “financial report” into an archive masked as Invoice.pdf. Another file posing as a .jpg unpacks the payload, hiding malicious activity behind trusted formats.
4️⃣ Execution / Masquerading (T1036.005): The attack unpacks Python files and runs Pxastealer under the name svchost.exe, using a trusted filename outside System32 to evade detection.
5️⃣ Persistence (T1547.001): Adds autorun via command line.
6️⃣ Exfiltration / C2 (T1567, T1071.001): Pxastealer exfiltrates data via Telegram.

👨‍💻 Examine Pxastealer behavior and collect #IOCs: app.any.run/tasks/eca98143-ba8
🔍 Further investigate the threat, track campaigns, and enrich IOCs with live attack data:
🔹 intelligence.any.run/analysis/
🔹 intelligence.any.run/analysis/

IOCs:
Sha256: 81918ea5fa5529f04a00bafc7e3fb54978a0b7790cfc7a5dad9fa9640666560a (svchost.exe)

🚀 Gain full visibility with #ANYRUN to make faster, smarter security decisions.

#Cybersecurity #infosec

🚀 Power your @ThreatQuotient setup with fresh, actionable, 99% unique #IOCs from TI Feeds.

Expand threat coverage, shorten MTTR, and solve alert overload.

Deploy via STIX/TAXII connector in 5 minutes 👇
any.run/cybersecurity-blog/thr

#Cybersecurity #infosec

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst