#dailyopendir #susp #redteam 172.178.44[.]139/stager/
#dailyopendir #malware onedrive[.]to/Documents/
#dailyopendir #crimeware infinityhaulerz[.]com/panel/doc/
"sorry, we havent written any linux malware yet!"
#dailyopendir 2oomw0rk[.]run
#dailyopendir #malware howwasthetea.ddns[.]net
#dailyopendir 212.227.245.12
Оплата_документи.accdb 6ea31e8fa244e26b552320114ff75130 -> monopoliafromyou[.]ru #dailyopendir #malware
#dailyopendir pic.jpg.lnk f2593352479a0dae786c2180fc200f73 #malware
#dailyopendir #malware 193.222.96[.]124:7287
phish action=post to #dailyopendir on wehaveitsure[.]ro
#dailyphish #dailyopendir leveraging cloudflare https://moment-clubs-re-fans.trycloudflare[.]com
#dailyopendir github hosting phishin payloads https://github[.]com/uy7t6rfgv/
fun one. 服务器清单列表.docx b0e698d2c388d879ae4330b067a64a6f starts with GCP (hello #dailyopendir), heads to AWS for c2 18.162.124[.]3:8855
#dailyopendir #malware 45.133.1[.]53/6X/
#dailyopendir #malware 159.89.238[.]15
#dailyopendir "uac_bypass.vbs" https://callonenergy[.]com/swap/
#dailyopendir i dont know who this red teamer is but they use a ton of IATA theme'd stuff (BSP link is an airline tool) iatassl-telechargementsecurity[.]duckdns[.]org/ssl/secure/