𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
banner
netresec.infosec.exchange.ap.brid.gy
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@netresec.infosec.exchange.ap.brid.gy
Experts in Network Forensics and Network Security Monitoring. Creators of #NetworkMiner, #CapLoader, #PolarProxy and #RawCap.

#PCAP or it didn't happen!

🌉 bridged from ⁂ https://infosec.exchange/@netresec, follow @ap.brid.gy to interact
The technical detail in this PureRAT analysis by Heejae Hwang (황희재) is fantastic! The analyzed #purerat sample looks very similar to the one James Northey recently blogged about for @huntress. It even uses the same C2 server 157.66.26.209:56001.
October 16, 2025 at 9:44 AM
Here are the decoded/decompressed HTTP/2 headers from Nezha. It's using gRPC, or more specifically the (grpc-go)[https://github.com/grpc/grpc-go] library.
October 9, 2025 at 9:31 AM
The use of TLS is pretty much mandatory for HTTP/2, yet this #nezha backoor POSTS HTTP/2 data over TCP port 80 without encryption!
🔥 172.245.52[.]169:80
🔥 c.mid[.]al:80
https://tria.ge/251009-j26bgacj7s
https://app.any.run/tasks/952bf595-caf6-4445-b302-513295214e76
October 9, 2025 at 8:48 AM
NetworkMiner actually extracts the whole X.509 certificate from the PCAP on ANY-RUN
August 27, 2025 at 7:48 AM
Google’s report on #unc6384 lists this certificate as being used in C2 comms by Sogu (#plugx variant):
eca96bd74fb6b22848751e254b6dc9b8e2721f96

Here’s an @anyrun_app execution, of AdobePlugins.​exe on May 19, which runs CANONSTAGER as well as SOGU.​SEC […]

[Original post on infosec.exchange]
August 27, 2025 at 7:36 AM
Google’s report on #unc6384 lists this certificate as being used in C2 comms by Sogu (#plugx variant):
eca96bd74fb6b22848751e254b6dc9b8e2721f96

Here’s a sandbox execution, of AdobePlugins.​exe on May 19, which runs CANONSTAGER as well as SOGU.​SEC […]

[Original post on infosec.exchange]
August 27, 2025 at 7:34 AM
UPDATE: Turns out the whole /wp-admin/js/ directory on Västkupan's website allows directory listing. Among the files in that directory is "New PO 102456688.exe", which drops #purelogs.
🔥 MD5: b2647b263c14226c62fe743dbff5c70a
🔥 C2: 147.124.219.201:65535
https://netresec.com/?b=257eead
July 30, 2025 at 10:02 PM
Do #purelogs Stealer and #purecrypter use the same C2 protocol, or is there some way to tell the C2 protocols apart?
C2 servers:
🔥 45.141.233.100:7708
🔥 144.172.91.74:7709
🔥 62.60.235.100:9100
🔥 65.108.24.103:62050
🔥 91.92.120.102:62050
🔥 192.30.240.242:62520
July 21, 2025 at 5:17 PM
Qlwxqgsag.dat is a DLL with reversed content.
July 16, 2025 at 8:05 PM
Cxqyoub.dat is decrypted by XOR-ing with "414".
July 16, 2025 at 8:05 PM
Why does CloudFlare insist on forwarding abuse reports to hosting providers and website owners? This makes no sense if the website operators and possibly also hosting providers are the criminals you're trying to stop!
June 25, 2025 at 9:10 AM
Researchers uncover how the Facebook app used localhost STUN communication with the browser to track visited websites in Covert Web-to-App Tracking via Localhost on Android. This trick works even if the user browses in incognito mode and uses a VPN.

> The […]

[Original post on infosec.exchange]
June 11, 2025 at 6:45 AM
Thank you CISA, NCSC, @bsi et al. for publishing the advisory on Russian GRU Targeting Western Logistics Entities and Technology Companies. This list of mocking services is great for threat hunting!
#threathunting #threatintel
May 22, 2025 at 4:56 PM
DoJ, Dutch National Police and FBI have dismantled a botnet that was used to run Anyproxy and 5socks proxy networks.
https://www.theregister.com/2025/05/10/router_botnet_crashed/
May 12, 2025 at 6:19 AM
@andreasdotorg That CVE GitHub backup looks shady. Do you trust the "GulfOfAmerica" GitHub account who created this mitre-cve-database repo?
April 16, 2025 at 12:18 PM
StealC v2 and Aurotun Stealer seem to be interconnected. They are sometimes deployed as part of the same infection chain and share C2 infrastructure. Like in this malware run:
https://tria.ge/250411-f3d2tszyhy/behavioral1
👾 StealC v2: 62.60.226.114:80
👾 […]

[Original post on infosec.exchange]
April 16, 2025 at 8:16 AM
C2 servers of newly discovered Aurotun Stealer:
👾 45.227.252.199:7712
👾 46.4.119.125:7712
👾 62.60.226.101:40101
👾 62.60.226.101:40105
👾 62.60.226.114:40101
👾 146.190.108.105:7712
👾 155.138.150.12:7712
👾 198.251.84.107:7712
#aurotunstealer #threatintel
April 16, 2025 at 7:36 AM