Celestial Stealer is checking for my name or online handle and it won't execute if it's found, but my RE machine is using the name Barry so this check will fail.
Who do I reach out to about this? 😅
www.trellix.com/blogs/resear...
www.huntress.com/blog/nezha-c...
Indicators on Xitter/LinkedIn
www.linkedin.com/posts/activi...
x.com/CyberRaiju/s...
Indicators on Xitter/LinkedIn
www.linkedin.com/posts/activi...
x.com/CyberRaiju/s...
0 VT detections on any component of the malware loader.
Proofpoint rules detect the outbound C2 traffic.
My Yara rule detects the installer.
0 VT detections on any component of the malware loader.
Proofpoint rules detect the outbound C2 traffic.
My Yara rule detects the installer.
www.jaiminton.com/internal-blo...
www.jaiminton.com/internal-blo...
Despite this contributing can be time consuming. That's why I've created HijackLibs Helper!👇
Despite this contributing can be time consuming. That's why I've created HijackLibs Helper!👇
ssd-disclosure.com/ssd-advisory...
The media is reporting this as CVE-2024-7399, but if it is then the patch is incomplete. There is currently NO PATCH AVAILABLE!
ssd-disclosure.com/ssd-advisory...
The media is reporting this as CVE-2024-7399, but if it is then the patch is incomplete. There is currently NO PATCH AVAILABLE!
At the time of scanning 1 vendor detected it, still only 3 at the moment. Deploying LummaC2 unsurprisingly.
This time a binary signed by 'ONE UP LTD' from the Nuclear Coffee VideoGet application used to load into memory.👇
At the time of scanning 1 vendor detected it, still only 3 at the moment. Deploying LummaC2 unsurprisingly.
This time a binary signed by 'ONE UP LTD' from the Nuclear Coffee VideoGet application used to load into memory.👇
Installs itself as 'Directory Converter' in the user LocalAppData 'Programs' directory.
👇
Installs itself as 'Directory Converter' in the user LocalAppData 'Programs' directory.
👇
www.youtube.com/watch?v=knu0...
www.youtube.com/watch?v=knu0...
Enjoy!
www.youtube.com/watch?v=pQ5K...
Enjoy!
www.youtube.com/watch?v=pQ5K...
youtu.be/LrOJBiWOHbE
youtu.be/LrOJBiWOHbE
www.youtube.com/watch?v=NiNI...
www.youtube.com/watch?v=NiNI...
This is an org that helps couples have a family.
🤬😡
www.genea.com.au/pages/import...
www.genea.com.au/sfsites/c/cm...
This is an org that helps couples have a family.
🤬😡
www.genea.com.au/pages/import...
www.genea.com.au/sfsites/c/cm...
www.jaiminton.com/high-impact-...
www.jaiminton.com/high-impact-...
www.speartip.com/fasthttp-use...
We're observing a large number of IPs involved after successful authentication, but a common IP is 113.23.43[.]76
www.speartip.com/fasthttp-use...
We're observing a large number of IPs involved after successful authentication, but a common IP is 113.23.43[.]76
www.virustotal.com/gui/file/f9d...
www.virustotal.com/gui/file/847...
www.virustotal.com/gui/file/f9d...
www.virustotal.com/gui/file/847...
urlscan.io/search/#saaa...
urlscan.io/search/#saaa...
www.cve.org/CVERecord?id...
Meanwhile we're still seeing people exploit CVE-2019-18935 from 5 years ago...
www.cve.org/CVERecord?id...
Meanwhile we're still seeing people exploit CVE-2019-18935 from 5 years ago...
www.huntress.com/blog/cleo-so...
TL;DR: Custom malware specifically targeting Cleo software we called Malichus.
Enjoy!
www.huntress.com/blog/cleo-so...
TL;DR: Custom malware specifically targeting Cleo software we called Malichus.
Enjoy!
#dfir #vulnerability
www.huntress.com/blog/threat-...
#dfir #vulnerability
www.huntress.com/blog/threat-...