James_inthe_box

589 Followers
179 Following
1,052 Posts
For a good time, just strings that malicious msi you found (https:// oanapolis .com.br/Receipt_9334.msi)..if it's #screenconnect c2 info is at the end...you don't even need to extract or run the thing.
Analysis eStatement472047204_pdf.exe (MD5: 01CD1FE8ACC99E7BD2D7D35C5978A577) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

A csv formatted list of #malspam campaigns that crossed my path in February to include subjects, #malware type, hashes, c2's, and email exfil addresses:

https://gist.github.com/silence-is-best/49cbc51145478ed68d06e02e14ddc135

#retrohunt

c2: funsunmexicobizz.top

Malicious #simplehelp #rmm #opendir at:

https://katz.adv\.br/dhl/

#reverseloader #xworm #opendir at:

http://158.94.211\.63/dealer/