Pages:
Author

Topic: Report Malware and Suspicious Links here so Mods can take Action ! - page 3. (Read 36997 times)

legendary
Activity: 3136
Merit: 3213
We have again an Fake Ann Thread with the Fake Github Malware download Link for Mulierum!

Fake Github : github.com/mulierum
The Wallet File there was just uploaded 40 Min ago with an size of 116 MB
Source : https://www.virustotal.com/gui/file/b1acdc009df8f2af7e45b6216fd94179d05d1b335f4cdbc146a72e3e37d98a53/detection

If you install that Fake Wallet file and starting it it will be a remote desktop access program be installed
Code:
Processes created
"C:\Users\\AppData\Roaming\rustdesk.exe"
C:\Users\\AppData\Roaming\Zlvmon_v3\rustdesk.exe
Sorce : https://www.virustotal.com/gui/file/b1acdc009df8f2af7e45b6216fd94179d05d1b335f4cdbc146a72e3e37d98a53/behavior

Account : CCMS  <--- Please ban or Lock that Account and delete the Thread
Last post from that Account was August 14, 2024 , so its freshly hacked or sold.

Fake Ann Thread : [ANN] Mulierum | POW | GhostRider
As always the Thread is self moderated from the hackers.

Wallet:
Code:
Windows: https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
Linux: https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz

And another User posted it also
Account : Cholidm  <--- Please ban or Lock that Account and delete the Thread

Wallet:
Code:
https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz]


This post is also a reference for the Github Report !
legendary
Activity: 2394
Merit: 1049
Smart is not enough, there must be skills
Full member users who just woke up/hacked back are spreading the virus with two threads at once, please be careful.

Account: BlueStone This user recently woke up from a long period of inactivity. - Please Ban
Fake ANN: ANN] Mulierum | POW | GhostRider

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz

Fake ANN: [ANN][SSPOS] CodeBlock Blockchain: Welcome to a New Era

Code:
https://github.com/CodeBlockMainnet/CodeBlock/releases/download/1.3.1/CodeBlock-wallet_v1.3.1.zip
member
Activity: 205
Merit: 43
✔️ Telegram @miningrelease
Account: DareToken  <= Please Banned
Fake Ann topic: [ANN] Mulierum | POW | GhostRider


Wallet:

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz

legendary
Activity: 2394
Merit: 1049
Smart is not enough, there must be skills
The hacked Hero Member account last posted in 2015 and is now actively spreading the virus via Github.

Account: Herbert This user recently woke up from a long period of inactivity. - Please Ban
Fake ANN: ANN] Mulierum | POW | GhostRider

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz
legendary
Activity: 3136
Merit: 3213
Yeb its again a Fake Ann with Malware download Link from there Webpage this time for Aldibi

Fake download Wallet File on the Webpage:
Code:
download.aldibi.com/files/aldibi-qt-windows.zip

Also there is a Fake Github Link on there Page that is already deleted.
Fake Github : github.com/aldibi-coin/core

The sandbox CAPE Sandbox flags this file as: MALWARE RAT
The sandbox Zenbox flags this file as: MALWARE EVADER
Code:
Drops script at startup location
ET MALWARE Common RAT Connectivity Check Observed
ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
Source : https://www.virustotal.com/gui/file/7fb14f997b1c92cc4d7a70db91657fc01f5feba66c9dd1e1b918567280218e37/behavior

Account : qiqikesfket  <--- Please ban or Lock that Account and delete the Thread
This user recently woke up from a long period of inactivity.
Registered since October 04, 2021 , Hacked or sold Account

Fake Ann Thread:  [ANN] Aldibi: Empowering the Next Era of Global Transactions

Aldibi (ALDB)
Code:
https://aldibi.com/
member
Activity: 450
Merit: 10
Trojan in the Windows binary available for download from their website: https://aldibi.com/

https://bitcointalksearch.org/topic/--5506809
member
Activity: 205
Merit: 43
✔️ Telegram @miningrelease
Account: Tam.Shams  <= Please Banned
Fake Ann topic: [ANN] Mulierum | POW | GhostRider


Wallet:

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz
member
Activity: 205
Merit: 43
✔️ Telegram @miningrelease
Account: pedpedped101  <= Please Banned
Fake Ann topic: [ANN] Mulierum | POW | GhostRider

Wallet:

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz
legendary
Activity: 2394
Merit: 1049
Smart is not enough, there must be skills
Another hacked account spreading the virus via a Github link

Account: ikanunaki accounnt hacked and please ban
Fake ANN: [ANN] Mulierum | POW | GhostRider

Code:
[b]Windows: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
[b]Linux: [/b] https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz
legendary
Activity: 3136
Merit: 3213
And again we have a new Fake Ann Thread with an Fake Github Account and Malware download Link for Mulierum !

The Fake Github was just created 1 Hour ago.

Fake Github : github.com/mulierum

The Download Wallet File is 100 MB big and the same as we got already in the past.

Code:
[code]
C:\Users\\AppData\Roaming\ObjectDock.exe"
C:\Users\\AppData\Roaming\tg_Sync\ObjectDock.exe
C:\Windows\system32\SecurityHealthService.exe
C:\Windows\system32\WerFault.exe -u -p 636 -s 504
[/code]
Source : https://www.virustotal.com/gui/file/b6761479c00cffc7e99e820060518b12024e533fbc908da116ecce2a4cb2759d/behavior

Account : havi agasa  <--- Please ban or Lock that Account and delete the Thread
This user recently woke up from a long period of inactivity.
Registered since June 08, 2017 , and the last post from that User was back in July 04, 2021 , Hacked or sold Account

Fake Ann Thread :  [ANN] Mulierum | POW | GhostRider

Mulierum
Wallet:
Code:
https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-win.x64-QT-v.2.0.1-1.zip
https://github.com/mulierum/mulierum-core/releases/download/2.0.1/mulierum-linux-QT-v.2.0.1-1.tar.gz

This post is also a reference for the Github Report !
copper member
Activity: 3948
Merit: 2201
Verified awesomeness ✔
If anyone has more experience with analyzing obfuscated javascript code and is willing to try, it would be interesting to find out what the script actually does.


I tried using some online tools: https://private.coinsofnakamoto.com/?b4527618e0f7c407#2jRhaSBjdSStxKnJApfAMhszgfJM3mLJv4giXjN94UGz (do not run this, obv).

They seem to pick a random BTC address from the list, replace the one on the page (including the QR code) and then do a call to pipedream with some basic description (which seems to return 204). Very basic stuff honestly.
legendary
Activity: 1624
Merit: 2594
Top Crypto Casino
A potential scam unfolding in the "Question about selling free giftcards" thread - [https://bitcointalk.org/index.php?topic=5505793.0]

Here's what we know:

A new member, Revaniz, claims to have found a method for free gift cards and offers to sell them.
Another new member, WARtoze99, suggested a platform for selling the gift cards only twenty seconds later, then asked for the method to obtain them.
Revaniz provides a Google Drive link claiming to be the exploit method.

Code:
https://drive.google.com/file/d/1Mzn6o3n5xIhN6nueBAl3YTzyb27ZgMrD/view?OAxXtfCKIY

The fake exploit method they promote involves installing a greasemonkey/tampermonkey script into the user's browser. The script is heavily obfuscated and undoubtedly contains a malicious payload designed to steal your crypto or worse.

Code:
Link #1 https://paste.sh/7vnaa5T9#rnL_3Gbklz9HKMIUKuPPG3yf
Link #2 (backup) https://files.catbox.moe/1evss2.txt

If anyone has more experience with analyzing obfuscated javascript code and is willing to try, it would be interesting to find out what the script actually does.
hero member
Activity: 1036
Merit: 933
Find your Digital Services at- cryptolibrary.pro
And we  got the next Fake Ann Thread with an already used Fake Github Account with Malware , this time for Binarium!
<✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂✂>

Fake Ann Thread :  [ANN] Binarium | POW | GhostRider
owh gosh they are fake !!!

I just visited their thread  and I was also looking at their officials representative social handles for offering  some business  Tongue .

Anyway bad luck for those scammers thanks again for the catch.
legendary
Activity: 3136
Merit: 3213
And we  got the next Fake Ann Thread with an already used Fake Github Account with Malware , this time for Binarium!

The Fake Github was already used for NOTPOW.

Fake Github :
github.com/NOTPOW/NOTPOW-frens
github.com/NOTPOW/Binarium

The Malware File was just uploaded 50 Min ago.

Account : nosmis  <--- Please ban or Lock that Account and delete the Thread
Registered since July 11, 2017, Hacked or sold Account
Last post was back in May 11, 2021

Fake Ann Thread :  [ANN] Binarium | POW | GhostRider

Binarium is our first major blockchain project.
Windows:
Code:
https://github.com/NOTPOW/Binarium/releases/download/1.0.3/Binarium-win64-v.1.0.1.zip

This post is also a reference for the Github Report !
hero member
Activity: 1036
Merit: 933
Find your Digital Services at- cryptolibrary.pro
Yes its a Fake Ann again with the same sheme as the others , this time its Liaron Coin (LRN)
Good catch dude!

Here I found kinda same before I have reported some that show how to exploit the gambling site and they put the google drive link and using pdf file and put those phisy links on there and as well as the fishy method. And they also use their alt account to shows some positive touch and they also the locked the topic so that no one can say anything negative about them.

Now they have brought little changed in their plan they try to use now amazon exploit method .



https://www.virustotal.com/gui/url/7e77225a88bab643cce7f1b795e3064937af1bed4708fbfd54c7f8b5342e8791


Account: Revaniz (need to be ban ASAP)
Try to Phishing people by Site Exploit Method



Hey guys, so I came around a method for free giftcards today, I used it and got 2x $500 Amazon giftcards.

I'm kinda scared to use them myself on my Amazon profile becuase I have my real data here, so I'm worried if the store could know this giftcard is from an exploit and then charge the money from me.

So the question is - Do you know how I can quickly sell these giftcards for Bitcoins or Cashapp?

Or maybe any of u guys want to buy 2x$500 Amazon cards for 600$ for both? This is proof that I got them : https://i.imgur.com/APZsWNs.png

We can use middleman ofc since I am not trusted here, let me know if u know any way to sell them or if u wanna buy them

View Archive

Code:
[size=5pt]https://drive .google. com/file/d/ 1Mzn6o3n5xIhN6nueBAl3YTzyb27ZgMrD/view?OAxXtfCKIY

that's the method bro, but dont use it with more than 1000$, they will block the payment.

I will try paxful, thanks btw

closed for now, if I have any more questions i will let u know guys ! love u[/size]


View Archive

legendary
Activity: 3136
Merit: 3213
Yes its a Fake Ann again with the same sheme as the others , this time its Liaron Coin (LRN)

The Fake Github was just created yesterday

Fake Github : github.com/liaron-coin

Fake Webpage :
Code:
https://liaron.com/

When downloading the file from there or from the Webpage i getting instant a warning from Windows that the File is an Virus or Malware.

Account :  pevirtiunes  <--- Please ban or Lock that Account and delete the Thread
This user recently woke up from a long period of inactivity.
Registered since October 04, 2021, Hacked or sold Account

Fake Ann Thread : [ANN] 💥 Liaron Coin (LRN) – Your Ticket to the Future of Digital Currency!💥

Thanks to MiningCoinsPool



And we have another new Fake Ann Thread with Malware download Link for NOTPOW !


Fake Github : github.com/NOTPOW
Malware Wallet File was uploaded just 50 Min ago

Code:
Win32:Malware-gen
Malware.SwollenFile!1.E38A (CLASSIC)

This Files will be started when you install the file and start it
Code:
C:\Users\\AppData\Roaming\tg_Sync\ObjectDock.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost
C:\Windows\system32\WerFault.exe -u -p 3956 -s 532
C:\Windows\system32\services.exe
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p

https://www.virustotal.com/gui/file/e1452648afbd302b5cc88e540ff23fc806052d7ce9a6f52a23bdd7caff8c714f/detection

Account : Pelunize12  <--- Please ban or Lock that Account and delete the Thread
Registered since August 27, 2016, and last post was back in Jan 2020 , Hacked or sold Account

Fake Ann Thread :  [ANN] NOTPOW | Probably nothing

NOTPOW wallet
Code:
https://github.com/NOTPOW/NOTPOW-frens/releases/download/1.0.1/NOTPOW-frens-v.1.0.1-0.zip

This post is also a reference for the Github Report !
legendary
Activity: 3136
Merit: 3213
And we have again the same Fake Ann as the last time with a Fake Github Account and Malware download Link on the Website for Azlora (AZL).

The Fake Github Account was created 4 days ago and the Malware File uploaded 16 Hours ago.

Fake Github : github.com/Azlora

Also here the sandbox CAPE Sandbox flags this file as: RAT MALWARE
Code:
Drops script at startup location
Suspicious DNS Query for IP Lookup Service APIs
Startup Folder File Write
Usage Of Web Request Commands And Cmdlets - ScriptBlock
RegAsm.EXE Initiating Network Connection To Public IP
Potentially Suspicious CMD Shell Output Redirect
Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
ET MALWARE Common RAT Connectivity Check Observed
A Network Trojan was detected
Source : https://www.virustotal.com/gui/file/0672dfa586109d7b621757ed3e554e97b3cda928797ccf4f07fc192ab43597f7/behavior

Suspicious IP Connection:
Code:
ttasstsat.tech
lifehackov.ru
Source : https://www.virustotal.com/gui/file/0672dfa586109d7b621757ed3e554e97b3cda928797ccf4f07fc192ab43597f7/relations

Account : Zahjejjiko  <--- Please ban or Lock that Account and delete the Thread
This user recently woke up from a long period of inactivity.
Registered since October 04, 2021 , Hacked or sold Account

Fake Ann Thread :
  [ANN] Azlora (AZL) - The Meme Coin That’s Out of This World!
Thread is Self Moderated as always from the hackers and 18 comments already deleted.

Project Name: Azlora   
Code:
https://azlora.com

This post is also a reference for the Github Report !
legendary
Activity: 3136
Merit: 3213
We have a new Fake Ann with an Fake Website that have a Malware download Wallet file from a Fake Github Account for Friemon Coin !

The Fake Github Account was created 4 days ago and the Malware files was uploaded 9 hours ago.

Fake Github : github.com/Friemon

The sandbox CAPE Sandbox flags this file as: RAT MALWARE
Code:
Drops script at startup location
Suspicious DNS Query for IP Lookup Service APIs
Startup Folder File Write
Usage Of Web Request Commands And Cmdlets - ScriptBlock
RegAsm.EXE Initiating Network Connection To Public IP
Potentially Suspicious CMD Shell Output Redirect
ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
INDICATOR-SHELLCODE x86 NOOP
Source : https://www.virustotal.com/gui/file/54138d80e63cbb98ae02c2a806cd8b38824766332c8692c881afdd065514bf85/behavior

Account : uadrenopl  <--- Please ban or Lock that Account and delete the Thread
This user recently woke up from a long period of inactivity.
Registered since October 02, 2021 , Hacked or sold Account

Fake Ann Thread : ANN] Friemon Coin (FRMN) - The Friendliest Meme Coin!

Friemon Coin is an innovative memecoin designed to bring fun and utility to the cryptocurrency world. Focused on community engagement and real-world applications, it aims to revolutionize digital transactions with a friendly twist.
Code:
Website: [url=https://friemon.com]friemon.com[/url]

On top of that the Fake Website is hosted from UK in Manchester

This post is also a reference for the Github Report !
Pages:
Jump to: