101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

474
active users

#jinxloader

0 posts0 participants0 posts today
Freemind<p>The malware pays homage to the League of Legends character Jinx, prominently featuring the character on its advertising poster and command-and-control login panel. JinxLoader’s primary purpose is straightforward – loading malware.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Formbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Formbook</span></a> <a href="https://mastodon.online/tags/JinxLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JinxLoader</span></a> <a href="https://mastodon.online/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.online/tags/Xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xloader</span></a></p><p><a href="https://cybersec84.wordpress.com/2024/01/01/jinxloader-new-malware-front-for-formbook-and-xloader-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2024/</span><span class="invisible">01/01/jinxloader-new-malware-front-for-formbook-and-xloader-attacks/</span></a></p>
Brad<p>When I searched Google for <a href="https://infosec.exchange/tags/JinxLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JinxLoader</span></a>, the top result was a link to the post on hackforums[.]net for this malware service.</p>
Brad<p>From a post I wrote for my employer at <a href="https://www.linkedin.com/posts/unit42_jinxloader-formbook-xloader-activity-7136002703737974786-9y8J" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_jinx</span><span class="invisible">loader-formbook-xloader-activity-7136002703737974786-9y8J</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1730237085246775562" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1730237085246775562</span></a></p><p>2023-11-29 (Wednesday): Email --&gt; <a href="https://infosec.exchange/tags/JinxLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JinxLoader</span></a> --&gt; <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Formbook</span></a>/#XLoader</p><p>IOCs available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2023-11-29-IOCs-for-JinxLoader-to-Formbook-XLoader.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2023-11-29-IOCs-for-JinxLoader-to-Formbook-XLoader.txt</span></a></p><p>Of note, <a href="https://infosec.exchange/tags/JinxLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JinxLoader</span></a> is a relatively new malware service first posted to hackforums[.]net on 2023-04-30.</p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic, copy of the email, and the associated malware/artifacts are available at <a href="https://malware-traffic-analysis.net/2023/11/29/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/11/29/index.html</span></a></p>