Shadow Posted Saturday at 11:11 PM Report Posted Saturday at 11:11 PM Hi, does anyone have MZPack 3.18.28 or above? (Not 3.18.8 as this is a much older version) It includes individual profile splitting, and so much more orderflow additions etc. Super super good TPO so is much superior to others shared here. If anyone could Edu or share it would be extremely appreciated! Thanks for all the help. @apmoo @kimsam
hammyy2k Posted 12 hours ago Report Posted 12 hours ago Here is 3.18.31 EDU included MZpack.NT8 3.18.31.rar ⭐ ralph kabota, Traderbeauty, ⭐ vinko and 9 others 10 2
Shadow Posted 12 hours ago Author Report Posted 12 hours ago 18 minutes ago, hammyy2k said: Here is 3.18.31 EDU included MZpack.NT8 3.18.31.rar 14.92 MB · 6 downloads @hammyy2k You are amazing brother! Thank you 🙂
hakuthedog Posted 2 hours ago Report Posted 2 hours ago Attention, everyone! Virus Total recognizes it as a Trojan, but the situation is much more complicated than that: this file is a virus, I performed an analysis using a memory dump and by analyzing netstat. Type: RAT, VMProtect 3.x packer. Injected shellcode, in‑process execution. SetWindowsHookEx → keylogger. There are 4 ESTABLISHED connections active from the malware process. It uses ANTI evasion techniques. VMProtect 3.x packing → code obfuscation Process injection → runs inside a legitimate process WebSocket encryption → TLS 1.3 to hide traffic Cloud infrastructure → appears legitimate Custom binary protocol → not recognized by IDS Registry hooking → persistence after reboot LoneBladeRGC 1
TRADER Posted 1 hour ago Report Posted 1 hour ago https://workupload.com/file/tyLznxxAF4R LoneBladeRGC 1
TRADER Posted 1 hour ago Report Posted 1 hour ago 56 minutes ago, hakuthedog said: Attention, everyone! Virus Total recognizes it as a Trojan, but the situation is much more complicated than that: this file is a virus, I performed an analysis using a memory dump and by analyzing netstat. Type: RAT, VMProtect 3.x packer. Injected shellcode, in‑process execution. SetWindowsHookEx → keylogger. There are 4 ESTABLISHED connections active from the malware process. It uses ANTI evasion techniques. VMProtect 3.x packing → code obfuscation Process injection → runs inside a legitimate process WebSocket encryption → TLS 1.3 to hide traffic Cloud infrastructure → appears legitimate Custom binary protocol → not recognized by IDS Registry hooking → persistence after reboot bro chech this link this file is clean LoneBladeRGC 1
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now