Details

_id 5e45d564ff3a68ada2cde0ca
reference ['https://nvd.nist.gov/vuln/detail/cve-2013-7471', 'https://www.virustotal.com/gui/url/c90993e2234319375e487c3a36a622a55a709feeba663765950a7a2e418cf85b/detail']
md5 ['9a111588a7db15b796421bd13a949cd4']
sha1 ['034c8c51a58be11ca620ce3eb0d43d5a59275d2f']
sha256 ['c90993e2234319375e487c3a36a622a55a709feeba663765950a7a2e418cf85b', 'e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0']
mail []
ip ['49.64.179.198']
domain []
url ['http://49.64.179.198:38519/Mozi.m']
user bad_packets
tweet Active DDoS malware payload detected: http://49.64.179.198:38519/Mozi.m https://www.virustotal.com/gui/url/c90993e2234319375e487c3a36a622a55a709feeba663765950a7a2e418cf85b/detail … e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0 #malware Exploit attempt source IP: 49.64.179.198 () Target: D-Link routers ( https://nvd.nist.gov/vuln/detail/CVE-2013-7471 …) #threatintel pic.twitter.com/QFs05LOBxd
id 1228080694091337728
retweets 7
favorites 6
link https://twitter.com/bad_packets/status/1228080694091337728
mentions []
hashtags ['#malware', '#threatintel']
timestamp 1581632228
date 2020-02-13 23:17:08

Tweet