low detection games. py
bcb29a2360358f3facb63b498d566c8b2e789927
#ModeloRAT
C2 hardcoded
"138.68.15.116",
"67.217.228.8",
"45.59.114.38"
1
11
TrendAI Vision One™ MDR observed an active KongTuke campaign using compromised WordPress sites and fake CAPTCHA/CrashFix lures to deliver the Python-based modeloRAT, which performs reconnaissance,...
From hendryadrian.comMicrosoft disclosed a new ClickFix variant that tricks users into running nslookup via the Windows Run dialog and cmd.exe to perform DNS-based staging and fetch a second-stage payload. The chain...
From hendryadrian.com