Details

_id 603437e4b888741299179403
reference ['https://analyze.intezer.com/analyses/83b57df7-a937-4d2c-b900-8ab5fb825975#ttp-section', 'https://bazaar.abuse.ch/sample/9b33ec7f5e615a6556f147b611425d3ca4a8879ce746d4a8cb62adf4c7f76029/', 'https://twitter.com/0xthreatintel/status/1363986040046817281/photo/1', 'https://bazaar.abuse.ch/sample/68b2524160410a18cd61ba66d9699cdfde6a4c7ffc207667d20c90fa84a03a87/']
md5 []
sha1 []
sha256 ['9b33ec7f5e615a6556f147b611425d3ca4a8879ce746d4a8cb62adf4c7f76029', '68b2524160410a18cd61ba66d9699cdfde6a4c7ffc207667d20c90fa84a03a87']
mail []
ip []
domain []
url []
user 0xthreatintel
tweet (Unpacked) 64-bit #Trojan from #Polyglot Duke now available in malware store @abuse_ch . KInda have unique code as per @IntezerLabs analysis. Original Sample: https://bazaar.abuse.ch/sample/9b33ec7f5e615a6556f147b611425d3ca4a8879ce746d4a8cb62adf4c7f76029/ Unpacked Sample: https://bazaar.abuse.ch/sample/68b2524160410a18cd61ba66d9699cdfde6a4c7ffc207667d20c90fa84a03a87/ IntezarLabs: https://analyze.intezer.com/analyses/83b57df7-a937-4d2c-b900-8ab5fb825975#ttp-section 1/2 https://twitter.com/0xthreatintel/status/1363986040046817281/photo/1
id 1363986040046817281
retweets 0
link https://twitter.com/0xthreatintel/status/1363986040046817281
mentions ['@abuse_ch', '@IntezerLabs']
hashtags ['#Trojan', '#Polyglot', '#ttp']
date 2021-02-22 22:56:28
timestamp 1614030988

Tweet