We found an open directory on Proton66 that a TheGentlemen ransomware affiliate forgot to close 🕵️
We pivoted on TheGentlemen ransomware IOCs and landed on an open directory on Proton66 with 126 files inside.
Full pre-encryption toolkit. Mimikatz logs with victim NTLM hashes.kens. All sitting unauthenticated on a Russian bulletproof host.
No custom malware. No zero-days. Just dual-use and off-the-shelf offensive tools in the right sequence, which is exactly why this is hard to catch.
Full breakdown, IOCs, and detection guidance:hunt.io/blog/thegentle…e
#ThreatHunting #Ransomware #ThreatIntelligence #DFIR #BlueTeam #TheGentlemen
♦️ Exposed #opendir on 187.77.173[.]118 port 8080 hosting AI-generated tools to analyze CVE-2025-6218 and test bypass variants against the official patch for WinRAR(?).
The environment includes progress tracking and references to a business model aligned with 0-day development iple .bin files and "loaders" flagged as possible Meterpreter.
[+]bazaar.abuse.ch/sample/3404b9e…V
/ @malwrhunterteam @HackingLZ @UK_Daniel_Card
Why does this Russian support technician want to disable my antivirus?
Well, I'll leave it at that.
telegram bot token: 8617483102:AAGkFE-x8Z81Ex-PtnzkMURy1-1CI3KGpdU
$CHAT_ID = "-5185728008"
bazaar.abuse.ch/sample/d756d1e…#opendir
hxxp[://]188[.]137[.]224[.]103:80 #opendir
Distributed by the HTA file with the purpose of executing the binary “digest.bin,” which contains stealer functions.
#Stealer