Фильтр публикаций


Hello everyone! We were absent for a few days due to personal matters, and our bots were experiencing some issues. The bots are now back to normal. We kindly ask for your patience and cooperation as we respond and provide support one by one. Due to the backlog of requests, it may take up to 24 hours to get to you, so please don’t worry—just wait, and we will address each case individually.


Репост из: Threat


Репост из: Threat
GhostSpy C2 Panel: The domain https://storeappweb.com/ hosts a C2 control panel for GhostSpy.
Open Directory of APK Samples: On the same domain, there is an accessible directory at https://storeappweb.com/uploads/ with over 50 APK samples, likely all or mostly related to GhostSpy.

#Obfuscated #ELF: An ELF file was found that appears to be a variant of the #Mirai malware.
Malware URLs:
http://185.196.10.215:12234/mips.bin
http://185.196.10.215:12234/x86_64.bin

They made an attempt to hide by using port 12234 and the .bin file extension.


Репост из: Threat
FOFA as always supporting our threat intelligence work effectively:

1. GhostSpy operating in LATAM (Brazil) focused on banking fraud:

191.96.78.250
37.60.233.14:3000
mt2gm.org

GhostSpy revealed—it’s GoatRAT/FantasyMW.

Tools Used: Jadx, FOFA, ipinfo

FOFA Link




Репост из: Threat
certificado.apk detected from Spain:
Hash: e9f2f6e47e071ed2a0df5c75e787b2512ba8a601e55c91ab49ea837fd7a0fc85
Source:
https://app-aeat.com/tributaria/loading.php

https://app-aeat.com/tributaria/certificado.apk








Репост из: 安卓APP管理系统
安卓APP管理系统

安卓APP管理系统
应用下载

账号: AppMgmtSystem337
密码: AppMgmtSystem337


售后/商务洽谈:@AppMgmtSystem337_bot


Репост из: PEGASUS
Видео недоступно для предпросмотра
Смотреть в Telegram
A new powerful update will be available soon. I’m still working on developing an automatic wallet drainer PEGASUS accesses the wallet, activates the black screen, and makes an automatic withdrawal to your wallet.


Репост из: Black Plague [.exe Installs]
Umbrella Installs – By Threat

Guaranteed installs for your Botnet or RAT [.exe] only.

Pricing:
100 installs – 200 USDT
500 installs – 1000 USDT
1000 installs – 2000 USDT

2 USDT per install – Fast & Reliable

Want to test? We offer 5 test installs for 10 USDT – just 2 USDT per install.

To get started, send a message to our bot @ThreatCommunity_bot, request the test, and let us know which software your stub .exe is from and if it’s obfuscated.

Contact: @ThreatCommunity_bot


You can access logs stolen by well-known stealers such as:
• Vidar Stealer
• Raccoon Stealer
• Rhadamanthys Stealer
• RedLine Stealer
• XWorm.
• Venom, among others.

Simply locate the stub being spread, deobfuscate it, extract the bot token and chat ID, and insert them into the tool. All logs captured by the bot will be redirected and leaked to you.

The script has been modified by us and optimized for compatibility with most stealers and RATs.

The script costs 300$.


Our bots are experiencing issues, and many of our messages are not being delivered to clients. We haven’t been able to use them normally, which is why we’re undergoing maintenance. If you have any pending services, please message our backup bot @threatbackup_bot.


Репост из: Threat Cloud


Репост из: Threat Cloud
Видео недоступно для предпросмотра
Смотреть в Telegram
A brief video review of one of our log databases.

🟠Vidar Stealer log files
🟠Raccoon Stealer log files
🟠Rhadamanthys Stealer log files
🟠RedLine Stealer log files
🟠Venom log files


We create custom checkers on demand. Send a message to our support bot.


Office 365 HyperChecker


Exodus Multi-Chain Seed Phrase Tester


Crypto Flash PRO - 400USDT

Показано 20 последних публикаций.