Details

_id 5e7be2f811acca7063dbbca5
reference ['https://www.virustotal.com/gui/url/77293a7b4770b7bf1b7950a7405357a979aa62003302dc9fd23d237227ce8575/details']
md5 ['cda6b1f77a9cc278a0f32979a4e41e3b', 'cda6b1f77a9cc278a0f32979a4e41e3b']
sha1 ['8e0ecd21e887baf086072556dbb2eebbb65fbb1c', '8e0ecd21e887baf086072556dbb2eebbb65fbb1c']
sha256 ['a4377fb86fc8514736e22ae86099cb00844b0429ee43c763f7872a9f215ec2b7', '77293a7b4770b7bf1b7950a7405357a979aa62003302dc9fd23d237227ce8575']
mail []
ip ['185.172.110.224', '80.82.65.234']
domain []
url ['http://185.172.110.224/uc/arm7']
user bad_packets
tweet Active DDoS malware payload detected: http://185.172.110.224/uc/arm7 () a4377fb86fc8514736e22ae86099cb00844b0429ee43c763f7872a9f215ec2b7 https://www.virustotal.com/gui/url/77293a7b4770b7bf1b7950a7405357a979aa62003302dc9fd23d237227ce8575/details … Exploit attempt source IP: 80.82.65.234 () Vulnerability exploited: MVPower DVR (JAWS web server) RCE #threatintel pic.twitter.com/E7AdXSpoxh
id 1242651743906713605
retweets 8
favorites 10
link https://twitter.com/bad_packets/status/1242651743906713605
mentions []
hashtags ['#threatintel']
timestamp 1585106237
date 2020-03-25 04:17:17

Tweet