iplaynice

@iplaynice@infosec.exchange
69 Followers
89 Following
317 Posts
Just trying to find where I fit into all of this.
@malwaretechblog You had a question about the "Alien tech" reveal lol Thought I'd fill you in. https://youtu.be/kaPakQN3hUQ?t=1081
Subcommittee on National Security, the Border, and Foreign Affairs Holds UAP Hearing

YouTube

hxxp://54.177.246[.]246/t[.]msi

Lots of stuff bundled here..

hxxp://185.254.198[.]187/ransomware[.]exe

hxxp://185.254.198[.]187/stealer[.]exe

UwU What could they be?

https://www.cyberark.com/resources/blog/zero-days-in-rgb-keyboards-top-did-network-exposed-at-intent-threat-research-summit This really should've made much bigger headlines. Good thing nvidia/intel/amd were doing releases to cover it up.
Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit

Data breach headlines are daily reminders that cyberattackers keep innovating. While constant research to uncover threats and share crucial intelligence with defenders is far less visible, the...

hxxp://1.15.143[.]227:8080/BlackMoon[.]dll

Some of the samples I'm uploading now may not be there any more but if they are I would extreme caution as always. This one is ransomware for sure.

hxxp://118.31.43[.]129:8888/killProcess_show[.]exe The rest of this dir has more malware too

hxxp://177.142.134[.]10:8000

* [a.bat](a.bat)
* [caddy.bat](caddy.bat)
* [caddy.exe](caddy.exe)
* [Caddyfile](Caddyfile)
* [gdfgd](gdfgd)
* [gfs.txt](gfs.txt)
* [hidden.vbs](hidden.vbs)

Merry Christmas!
hxxp://46.27.153[.]138:9000/tpn6534[.]exe
hxxp://46.27.153[.]138:9000/4[.]exe
hxxp://46.27.153[.]138:9000/1[.]exe

hxxp://59.110.219.204:8081/Cobalt_Strike_4.7[.]zip

http://59.110.219.204:8081/K8_CS_4.4[.]zip

hxxp://59.110.219.204:8081/TeamServer[.]zip

Not sure what you'll find in the last one but worth a look.

Remember to do all work in a VM!