Details

_id 5efa64ba353352821661a08e
reference ['https://www.virustotal.com/gui/url/43ec75d4f12bd141ad6e69842e391c516298cdfa55cee1dcdfe1432676cb4fe3/details']
md5 []
sha1 []
sha256 ['43ec75d4f12bd141ad6e69842e391c516298cdfa55cee1dcdfe1432676cb4fe3']
mail []
ip ['37.120.140.222', '179.191.51.32']
domain []
url ['http://37.120.140.222/bins/mpsl', 'http://37.120.140.222/bins']
user bad_packets
tweet Active #DDoS malware payload detected: http://37.120.140.222/bins/mpsl ( https://www.virustotal.com/gui/url/43ec75d4f12bd141ad6e69842e391c516298cdfa55cee1dcdfe1432676cb4fe3/details …) http://37.120.140.222/bins/ #opendir Exploit attempt source IP: 179.191.51.32 () Target: Linksys router unauthenticated RCE vulnerability #threatintel pic.twitter.com/GBEIwHOK8W
id 1277634519776948236
retweets 6
favorites 8
link https://twitter.com/bad_packets/status/1277634519776948236
mentions []
hashtags ['#DDoS', '#opendir', '#threatintel']
timestamp 1593446781
date 2020-06-29 18:06:21

Tweet