home.social

#castleloader β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #castleloader, aggregated by home.social.

  1. Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

    Aliases for Stealc: win.stealc
    Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
    Aliases for CASTLELOADER: win.castleloader
    Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
    Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
    Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

    #Stealc #CASTLELOADER #NightshadeC2

    Aliases provided by Malpedia.

  2. Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

    Aliases for Stealc: win.stealc
    Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
    Aliases for CASTLELOADER: win.castleloader
    Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
    Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
    Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

    #Stealc #CASTLELOADER #NightshadeC2

    Aliases provided by Malpedia.

  3. Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

    Aliases for Stealc: win.stealc
    Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
    Aliases for CASTLELOADER: win.castleloader
    Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
    Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
    Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

    #Stealc #CASTLELOADER #NightshadeC2

    Aliases provided by Malpedia.

  4. Mentioned Malware Families: Stealc, CASTLELOADER, NightshadeC2

    Aliases for Stealc: win.stealc
    Malpedia link for Stealc: malpedia.caad.fkie.fraunhofer.
    Aliases for CASTLELOADER: win.castleloader
    Malpedia link for CASTLELOADER: malpedia.caad.fkie.fraunhofer.
    Aliases for NightshadeC2: win.nightshade_c2, CastleRAT
    Malpedia link for NightshadeC2: malpedia.caad.fkie.fraunhofer.

    #Stealc #CASTLELOADER #NightshadeC2

    Aliases provided by Malpedia.

  5. Here's the full infection chain:

    • 198.211.110.107:79 finger connects to finger[.]cloudyape[.]com
    • 172.67.190.68:80 curl tries cloudyape[.]com/uvey.php?holt=2 but server responds with '301 Moved Permanently' and redirects to HTTPS
    • 172.67.190.68:443 dropper download
    • 172.67.190.68:80 curl gets cloudyape[.]com/uvey.php?holt=1 server redirects to HTTPS
    • 172.67.190.68:443 dropper download
    • 170.130.165.201:80 Download of file4.bin (#StealC) with fake GoogeBot user agent
    • 170.130.165.201:80 #StealC v2 C2 / exfiltration
    • 170.130.55.38:80 #CastleLoader traffic
    • 194.76.227.242:9999 #CastleRAT C2 traffic