Details

_id 5e4726ecff3a68ada2cde28d
reference ['https://kb.cert.org/vuls/id/582384/', 'https://www.virustotal.com/gui/url/b92a38836d4070d880f4a62a62ec00afcc55b5143c90261690f327c5618ffbdb/details']
md5 ['635d926cace851bef7df910d8cb5f647']
sha1 ['543282811f7ec6ab8743f5ab877c040b16ed9a10']
sha256 ['b92a38836d4070d880f4a62a62ec00afcc55b5143c90261690f327c5618ffbdb', 'bba18438991935a5fb91c8f315d08792c2326b2ce19f2be117f7dab984c47bdf']
mail []
ip ['112.17.78.146']
domain []
url ['http://112.17.78.146:47371/Mozi.m']
user bad_packets
tweet Active DDoS malware payload detected: http://112.17.78.146:47371/Mozi.m ( https://www.virustotal.com/gui/url/b92a38836d4070d880f4a62a62ec00afcc55b5143c90261690f327c5618ffbdb/details …) bba18438991935a5fb91c8f315d08792c2326b2ce19f2be117f7dab984c47bdf Exploit attempt source IP: 112.17.78.146 () Target: Netgear router RCE ( https://kb.cert.org/vuls/id/582384/ ) #threatintel pic.twitter.com/LsvWn2q7lm
id 1228430532188372992
retweets 5
favorites 5
link https://twitter.com/bad_packets/status/1228430532188372992
mentions []
hashtags ['#threatintel']
timestamp 1581715636
date 2020-02-14 22:27:16

Tweet