If you like the project, please consider:
- Giving it a star ⭐
- Invite to a coffee ☕
2023-07-19 16:37:51 (UTC) | |||
---|---|---|---|
Today | Last 7 days | Last 30 days | Last 365 days |
📋 Today (raw) | 📋 Week (raw) | 📋 Month (raw) | 📋 Year (raw) |
Date (UTC) | SourceUser | Type | Value | Tags | Tweet |
---|---|---|---|---|---|
2021-08-14 02:26:32 | phishunt_io | url | https://netflix.us2.cards/ | #phishing #scam | https://twitter.com/phishunt_io/status/1426369619422502917 |
2021-08-17 12:15:00 | TheDFIRReport | ip | 185.56.76.94 | #Trickbot | https://twitter.com/TheDFIRReport/status/1427604874053578756 |
Type | Today | Week | Month | Year |
---|---|---|---|---|
🔗 URLs | 9 | 356 | 5181 | 147944 |
🌐 Domains | 1 | 29 | 367 | 29444 |
🚩 IPs | 7 | 307 | 3326 | 46307 |
🔢 SHA256 | 7 | 20 | 229 | 4292 |
🔢 MD5 | 1 | 47 | 330 | 10384 |
Tag | Today | Week | Month | Year |
---|---|---|---|---|
#phishing | 5 | 355 | 5060 | 153550 |
#scam | 5 | 65 | 824 | 42918 |
#malware | 1 | 22 | 318 | 41798 |
#maldoc | 0 | 0 | 8 | 180 |
#ransomware | 0 | 4 | 17 | 1545 |
#banker | 0 | 0 | 0 | 66 |
#AgentTesla | 0 | 0 | 11 | 359 |
#Alienbot | 0 | 0 | 0 | 10 |
#AsyncRAT | 0 | 0 | 13 | 88 |
#Batloader | 0 | 0 | 0 | 7 |
#BazarLoader | 0 | 0 | 0 | 7 |
#CobaltStrike | 8 | 209 | 2333 | 21260 |
#Dcrat | 0 | 5 | 36 | 147 |
#Emotet | 0 | 0 | 0 | 270 |
#Follina | 0 | 0 | 0 | 40 |
#Formbook | 0 | 0 | 3 | 277 |
#GootLoader | 0 | 2 | 17 | 182 |
#GuLoader | 0 | 0 | 2 | 106 |
#IcedID | 0 | 3 | 39 | 510 |
#Lazarus | 0 | 0 | 6 | 180 |
#Lokibot | 0 | 2 | 3 | 230 |
#log4j | 0 | 0 | 0 | 26 |
#Log4shell | 0 | 0 | 0 | 9 |
#Njrat | 0 | 3 | 67 | 327 |
#Qakbot | 0 | 23 | 357 | 1276 |
#Raccoon | 0 | 0 | 1 | 185 |
#RedLine | 0 | 8 | 41 | 580 |
#Remcos | 1 | 9 | 45 | 387 |
#RaspberryRobin | 0 | 0 | 0 | 23 |
#Spring4Shell | 0 | 0 | 0 | 2 |
#SocGolish | 0 | 0 | 0 | 7 |
#Ursnif | 0 | 0 | 8 | 314 |
Number | User | IOCs |
---|---|---|
#1 | [Response(data=, includes={}, errors=[], meta={})](https://twitter.com/Response(data=, includes={}, errors=[], meta={})) | 5 |
#2 | [Response(data=, includes={}, errors=[], meta={})](https://twitter.com/Response(data=, includes={}, errors=[], meta={})) | 2 |
#3 | [Response(data=, includes={}, errors=[], meta={})](https://twitter.com/Response(data=, includes={}, errors=[], meta={})) | 1 |
#4 | cyb3rops | 2 |
#5 | JRoosen | 1 |
#6 | shotgunner101 | 1 |
#7 | - | 0 |
#8 | - | 0 |
#9 | - | 0 |
#10 | - | 0 |
Search tweets that contain certain tags or that are posted by certain infosec people.
- #phishing
- #scam
- #malware
- #maldoc
- #ransomware
- #banker
- #AgentTesla
- #Alienbot
- #AsyncRAT
- #BazarLoader
- #Batloader
- #CobaltStrike
- #Dcrat
- #Emotet
- #Follina
- #Formbook
- #GootLoader
- #GuLoader
- #IcedID
- #Lazarus
- #Lokibot
- #log4j
- #Log4shell
- #Njrat
- #Qakbot
- #Raccoon
- #RedLine
- #Remcos
- #RaspberryRobin
- #Spring4Shell
- #SocGholish
- #Ursnif
TweetFeed list
1. Search SHA256
hashes with yearly
tweets feed
let MaxAge = ago(30d);
let SHA256_whitelist = pack_array(
'XXX' // Some SHA256 hash you want to whitelist.
);
let TweetFeed = materialize (
(externaldata(report:string)
[@"https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/year.csv"]
with (format = "txt"))
| extend report = parse_csv(report)
| extend Type = tostring(report[2])
| where Type == 'sha256'
| extend SHA256 = tostring(report[3])
| where SHA256 !in(SHA256_whitelist)
| extend Tag = tostring(report[4])
| extend Tweet = tostring(report[5])
| project SHA256, Tag, Tweet
);
union (
TweetFeed
| join (
DeviceProcessEvents
| where Timestamp > MaxAge
) on SHA256
), (
TweetFeed
| join (
DeviceFileEvents
| where Timestamp > MaxAge
) on SHA256
), (
TweetFeed
| join (
DeviceImageLoadEvents
| where Timestamp > MaxAge
) on SHA256
) | project Timestamp, DeviceName, FileName, FolderPath, SHA256, Tag, Tweet
2. Search IP addresses
with monthly
tweets feed
let MaxAge = ago(30d);
let IPaddress_whitelist = pack_array(
'XXX' // Some IP address you want to whitelist.
);
let TweetFeed = materialize (
(externaldata(report:string)
[@"https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/month.csv"]
with (format = "txt"))
| extend report = parse_csv(report)
| extend Type = tostring(report[2])
| where Type == 'ip'
| extend RemoteIP = tostring(report[3])
| where RemoteIP !in(IPaddress_whitelist)
| where not(ipv4_is_private(RemoteIP))
| extend Tag = tostring(report[4])
| extend Tweet = tostring(report[5])
| project RemoteIP, Tag, Tweet
);
union (
TweetFeed
| join (
DeviceNetworkEvents
| where Timestamp > MaxAge
) on RemoteIP
) | project Timestamp, DeviceName, RemoteIP, Tag, Tweet
3. Search urls
and domains
with weekly
tweets feed
let MaxAge = ago(30d);
let domain_whitelist = pack_array(
'XXX' // Some URL/Domain you want to whitelist.
);
let TweetFeed = materialize (
(externaldata(report:string)
[@"https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/week.csv"]
with (format = "txt"))
| extend report = parse_csv(report)
| extend Type = tostring(report[2])
| where Type in('url','domain')
| extend RemoteUrl = tostring(report[3])
| where RemoteUrl !in(domain_whitelist)
| extend Tag = tostring(report[4])
| extend Tweet = tostring(report[5])
| project RemoteUrl, Tag, Tweet
);
union (
TweetFeed
| join (
DeviceNetworkEvents
| where Timestamp > MaxAge
) on RemoteUrl
) | project Timestamp, DeviceName, RemoteUrl, Tag, Tweet
Please note that all the data is collected from Twitter and sorted/served here as it is on best effort.
I have tried to tune as much as possible the searches trying to collect only valuable info. However please consider making your own analysis before taking any action related to these IOCs.
Anyway feel free to reach me out or to provide any kind of feedback regarding any contribution or suggestion.
By the community, for the community.