Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   73032

*Warning* Check Your Silverbullet Configs Before Running

by Gearlt - 28 November, 2023 - 06:14 PM
This post is by a banned member (lakersfan381) - Unhide
137
Posts
0
Threads
1 Year of service
#17
ty
This post is by a banned member (TonyM3) - Unhide
TonyM3  
287
Posts
0
Threads
1 Year of service
#18
DANESDSA
This post is by a banned member (Killerk420) - Unhide
36
Posts
2
Threads
1 Year of service
#19
Thanks a lot for looking for people
This post is by a banned member (Gearlt) - Unhide
Gearlt  
Supreme
376
Posts
65
Threads
3 Years of service
Bumped #20
This is a bump
This post is by a banned member (Gearlt) - Unhide
Gearlt  
Supreme
376
Posts
65
Threads
3 Years of service
Bumped #21
This is a bump
This post is by a banned member (abdelouaheb) - Unhide
This post is by a banned member (hamed_mrad) - Unhide
89
Posts
0
Threads
#23
(28 November, 2023 - 06:14 PM)Gearlt Wrote: Show More
New malicious Backdoor Configs are Floating around Again and Here Is What They Look Like .


[Image: Screenshot-6.png]

[Image: Screenshot-7.png]
[Image: Screenshot-8.png]
[Image: Screenshot-9.png]
[Image: Screenshot-10.png]
%USERPROFILE%\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScHoster.exe.log

%USERPROFILE%\AppData\Roaming\dabbj

%USERPROFILE%\AppData\Roaming\dabbj\ehac.exe



malware changes the victim clipboarded Bitcoin address

reads numerous files containing system information


logs the victim IP address and sends the stolen data to a Telegram bot

Permission is granted through a task on the Windows Task Scheduler.


[Image: smart.gif]

Hackerman u sheepe
This post is by a banned member (mbappe82) - Unhide
mbappe82  
Registered
63
Posts
0
Threads
#24
(28 November, 2023 - 06:14 PM)Gearlt Wrote: Show More
New malicious Backdoor Configs are Floating around Again and Here Is What They Look Like .


[Image: Screenshot-6.png]

[Image: Screenshot-7.png]
[Image: Screenshot-8.png]
[Image: Screenshot-9.png]
[Image: Screenshot-10.png]
%USERPROFILE%\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScHoster.exe.log

%USERPROFILE%\AppData\Roaming\dabbj

%USERPROFILE%\AppData\Roaming\dabbj\ehac.exe



malware changes the victim clipboarded Bitcoin address

reads numerous files containing system information


logs the victim IP address and sends the stolen data to a Telegram bot

Permission is granted through a task on the Windows Task Scheduler.


[Image: smart.gif]

great job bro this is ok

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 6 Guest(s)