TwizAdmin -- Multi-Stage Crypto Clipper, Infostealer & Ransomware Operation
TLP: WHITE Date: 2026-04-03 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime -- Multi-Function Malware-as-a-Service (MaaS) Source: @malwrhunterteam -- "TwizAdmin panel here" (2026-04-03) Status: INFRASTRUCTURE LIVE AT TIME OF ANALYSIS
Executive Summary
A fully exposed TwizAdmin C2 panel at 103.241.66[.]238:1337 was identified hosting a sophisticated multi-stage malware operation combining cryptocurrency clipboard hijacking (clipper), BIP-39 seed phrase theft, browser cookie/credential exfiltration, a ransomware module ("crpx0"), and a Java RAT builder -- all managed through a FastAPI-based panel with a license key system. The operation targets both Windows and macOS using social engineering lures themed as FedEx shipping documents and OnlyFans account dumps. The threat actor operates through the domain fanonlyatn[.]xyz with complete open directory exposure of all source code, payloads, and builder scripts. The ransomware component communicates with three Russian .ru domains (all resolving to 31.31.198[.]206 at REG.RU hosting) and uses the ransomware-as-a-service identity "DataBreachPlus" with Telegram, qTox, and ProtonMail contact channels. Ten cryptocurrency wallet addresses spanning Bitcoin, Ethereum, Tron, Dogecoin, Litecoin, Solana, Ripple, and Bitcoin Cash were extracted from the stealer configuration.
Key Findings
- LIVE C2 panel at
103.241.66[.]238:1337running FastAPI/Uvicorn with Swagger docs (/docs) publicly accessible -- full API schema exposed - Complete source code for stealer (v1.21, 115KB), scanner (v2.2, 37KB), ransomware crypter (3.7MB), and 7+ macOS builder scripts downloaded from open directory at
fanonlyatn[.]xyz/files/and/builds/ - 10 crypto clipper wallet addresses extracted (BTC Legacy, BTC P2SH, BTC Bech32, ETH, TRX, DOGE, LTC, SOL, XRP, BCH)
- Ransomware module "crpx0" using Fernet (AES-128-CBC) encryption, drops ransom notes in English, Russian, and Chinese
- Three Russian C2 domains for ransomware (
caribb[.]ru,mekhovaya-shuba[.]ru,beboss34[.]ru) -- all resolving to31.31.198[.]206(REG.RU shared hosting) - Social engineering lures: FedEx shipping details (bundle ID
com.fedex.delivery.details) and OnlyFans account dumps (bundle IDcom.onlyfans.secure.access) - macOS persistence via LaunchAgent (
com.sys32.data.plistandcom.cryptoprice.guard.plist) - Windows persistence via
%APPDATA%\sys32data\with portable Python 3.11.5 + embedded pip - API secret leaked:
26i$MyYe@r(used for dashboard authentication via Bearer token) - License key system with 3-day, weekly, monthly, and lifetime tiers -- indicates MaaS operation
- Ransomware operator identity: "DataBreachPlus" --
@DataBreachPluson Telegram,databreachplus@proton[.]me, qTox ID17EB54B8455144E088C7E77F88A97221C319F0CFE4FE306853EEB113EE8DB5607BB6EE481C7C
What Was Found vs. What Was Known
| Aspect | Prior Reporting | Our Findings |
|---|---|---|
| Infrastructure | One IP (panel) | Panel IP + delivery domain + 3 Russian ransomware C2s + shared hosting IP |
| Malware Family | "TwizAdmin panel" (name only) | Full source: clipper + seed scanner + infostealer + ransomware + RAT builder |
| Victims | Unknown | License key system indicates multiple buyers/operators |
| Attribution | Unknown | Russian-speaking actor using REG.RU, Navicosoft registrar, ProtonMail, qTox |
| Capabilities | Unknown | 8-chain crypto clipper, BIP-39 scanner, Fernet ransomware, macOS/Windows dual-platform |
Attack Chain
DELIVERY EXPLOITATION PERSISTENCE
[Social Eng Lure] ------> [Mac .app / Win .cmd] ------> [LaunchAgent / Registry]
FedEx / OnlyFans curl | bash com.sys32.data.plist
Portable Python %APPDATA%\sys32data
|
v
INSTALLATION
[call2.py orchestrator]
Downloads + patches:
- sys32.py (clipper)
- finder.py (scanner)
|
+---------------+---------------+
| | |
CLIPPER SCANNER TASKING
[sys32.py v1.21] [finder.py v2.2] [C2 check_tasks]
Clipboard monitor BIP-39 seed Download & exec
Crypto addr swap File scanning crypter.py
8 chains (BTC, Upload seeds (on demand)
ETH, TRX, DOGE, to C2 |
LTC, SOL, XRP, v
BCH) RANSOMWARE
| | [crpx0 module]
v v Fernet encrypt
C2 EXFIL C2 EXFIL Drop ransom note
fanonlyatn.xyz fanonlyatn.xyz (EN/RU/ZH)
/api.php /api.php caribb.ru / etc
Infrastructure Analysis
Network Infrastructure
| IP | ASN | Provider | Ports | Services | Status | Role |
|---|---|---|---|---|---|---|
| 103.241.66[.]238 | Unknown (APNIC->RIPE transfer) | Unknown | 1337/tcp | FastAPI/Uvicorn | LIVE | C2 Panel |
| 172.67.147[.]155 | AS13335 (Cloudflare) | Cloudflare | 80,443 | LiteSpeed + Cloudflare | LIVE | Payload delivery |
| 104.21.28[.]214 | AS13335 (Cloudflare) | Cloudflare | 80,443 | LiteSpeed + Cloudflare | LIVE | Payload delivery |
| 31.31.198[.]206 | REG.RU | REG.RU shared hosting | 80,443 | PHP backend | LIVE | Ransomware C2 |
Domain Infrastructure
| Domain | Registrar | Created | NS | Purpose |
|---|---|---|---|---|
| fanonlyatn[.]xyz | Navicosoft Pty Ltd (IANA 4147) | 2026-03-12 | beth.ns.cloudflare.com / devin.ns.cloudflare.com | Primary C2 + payload delivery |
| caribb[.]ru | REGRU-RU | 2025-11-14 | ns1.hosting.reg.ru / ns2.hosting.reg.ru | Ransomware C2 |
| mekhovaya-shuba[.]ru | REGRU-RU | 2026-01-06 | ns1.hosting.reg.ru / ns2.hosting.reg.ru | Ransomware C2 |
| beboss34[.]ru | REGRU-RU | 2025-07-11 | ns1.hosting.reg.ru / ns2.hosting.reg.ru | Ransomware C2 |
Certificate Analysis
All certificates for fanonlyatn[.]xyz issued on 2026-03-13 (one day after domain registration):
- Let's Encrypt R13 (www.fanonlyatn[.]xyz)
- Let's Encrypt R12 (www.fanonlyatn[.]xyz)
- Let's Encrypt E7 (fanonlyatn[.]xyz)
- Sectigo DV E36 (fanonlyatn[.]xyz)
Multiple CAs on the same day suggests Cloudflare Universal SSL + origin server cert setup.
Web Server Stack
The payload delivery server runs LiteSpeed Web Server behind Cloudflare with autoindex enabled (full directory listing). The C2 panel runs FastAPI 0.1.0 on Uvicorn (Python ASGI).
Malware Analysis
Component Overview
| Component | File | Size | Version | SHA256 | Purpose |
|---|---|---|---|---|---|
| Stealer/Clipper | v1.1.py | 115KB | v1.21 | f7ddba605e3d04e06d2f7b0fc4a38027ae58ca65a69d800dd2f43c8e94ca8396 | Crypto clipper + dashboard logging |
| Seed Scanner | finder.py | 37KB | v2.2_ULTRA_STRICT | 9d9783f57fd543043e0792d125831883259c823a5eaa69211e5254db4db4eaec | BIP-39 seed phrase scanner |
| Orchestrator | call2.py | 10KB | - | (from server) | Download, patch, persistence, launch |
| Ransomware | crypter.py | 3.7MB | - | (from server) | File encryption (.crpx0), ransom note |
| Win Launcher | launcher.cmd | 2.6KB | - | 584796212f99efc7ac765d6048913fe34e46a64b13a8a78fb3a465b8c61f3527 | Windows portable Python setup |
| Mac Loader | mac_loader.sh | 1.2KB | - | 3fcd267e811d9b83cafa3d8d6932fa1c56f4fd8dcf46f9ec346e0689439532d4 | macOS Python setup + exec |
Extracted Configuration
API Configuration:
- C2 Domain:
hxxps://fanonlyatn[.]xyz - Dashboard API:
hxxps://fanonlyatn[.]xyz/api.php - Address Match API:
hxxps://fanonlyatn[.]xyz/api_address_match.php - Dropper Log API:
hxxps://fanonlyatn[.]xyz/api_dropper_log.php - API Secret:
26i$MyYe@r - Bearer Token: Base64 of API secret
Crypto Clipper Replacement Addresses:
| Code | Chain | Replacement Address |
|---|---|---|
| A1 | BTC Legacy | 1KC2kXDeyBH9yocYSQy6DQ1ou5hRRRBtpZ |
| A2 | BTC P2SH | 3887CPBvo96AZAm5Gn339isJTXVjdaFogR |
| A3 | BTC Bech32 | bc1qhwxpvjpdlyz7ekmjq6y67t2m2m2e5jq62ykfl4 |
| B | Ethereum | 0x835270cEd14bfdAaeF8F8Fa0e532A244cfDe8b52 |
| C | Tron | TDtxY9ZHNffj14Ci9qhBjkpR2AAhCaHuXs |
| D | Dogecoin | D91Sb1JyWoLb43F2XHFjUL9QJj7iLm6cUR |
| E | Litecoin | ltc1qadnhqpyj97wjhv2e502n3w207zy2r30pgejq8p |
| F | Solana | FQPxYxm4y7D6PFjFcGeKcPe42kUfbDnbRsaeLoPYmxYQ |
| G | Ripple | rBuqUShtAdijJxchFaEXcMij1VVRMY2JWY |
| H | Bitcoin Cash | qrl73me6ndr7a5sxuyxgn5aflrefyu4c6uzamhu9ar |
Additional BTC address from API response: bc1qs24qevh60nv3r5aqt8ssh7wettczjagz24vest
Ransomware Configuration:
- Encrypted extension:
.crpx0 - Encryption: Python
cryptography.fernet.Fernet(AES-128-CBC with HMAC) - Recovery note:
HOW TO RECOVER.txt(English, Russian, Chinese versions) - Ransom note C2 domains:
hxxps://caribb[.]ru/crpx0/notify.phphxxps://mekhovaya-shuba[.]ru/crpx0/notify.phphxxps://beboss34[.]ru/crpx0/notify.php
- Contact channels:
- Telegram:
@DataBreachPlus/hxxps://t[.]me/DataBreachPlus - Email:
databreachplus@proton[.]me - qTox:
17EB54B8455144E088C7E77F88A97221C319F0CFE4FE306853EEB113EE8DB5607BB6EE481C7C
- Telegram:
Persistence Mechanisms:
- macOS:
~/Library/LaunchAgents/com.sys32.data.plist(RunAtLoad + KeepAlive) - macOS:
~/Library/LaunchAgents/com.cryptoprice.guard.plist(alternate) - Windows: Registry Run key
CryptoGuard->pythonw.exe sys32.py - Windows: Scheduled Task
CryptoUpdate->pythonw.exe sys32.py - Working directory:
~/.sys32data(macOS),%APPDATA%\sys32data(Windows)
Social Engineering Lures
Two primary lure themes with native macOS app bundles:
-
FedEx Shipping Details (
Shipping_Details.app):- Bundle ID:
com.fedex.delivery.details - Access key prompt:
pass2021# - Decoy: Fake FedEx tracking document
- Uses system ClippingText.icns as spoofed icon
- Bundle ID:
-
OnlyFans Account Dump (
OnlyFansAccounts.app):- Bundle ID:
com.onlyfans.secure.access - Access key prompt:
pass2021# - Decoy: Fake list of 50 OnlyFans email/password combos
- Connects to fake CDN:
secure-shard-091.of-cdn.com
- Bundle ID:
Both build as Universal Binaries (ARM64 + x86_64) via C stub + lipo.
Panel API Endpoints (from OpenAPI schema)
Payload/C2 Endpoints (no auth required for most):
POST /build-jar-- Build Java RAT payloadGET /download-jar/{userid}-- Download built JARGET /payload?userid=-- Get payload for userGET /verify-key?userid=-- License key verificationGET /api/verify/{key}-- License verification (payload startup check)POST /send-discord-- Exfiltrate Discord tokensPOST /send-token-- Exfiltrate tokensPOST /send-info-- Exfiltrate system infoPOST /send-cookies-- Exfiltrate browser cookiesPOST /send-operagx-- Exfiltrate Opera GX dataPOST /send-opera-- Exfiltrate Opera dataPOST /send-wallets-auth-- Exfiltrate wallet credentialsPOST /send-telegram-- Exfiltrate Telegram dataPOST /send-minecraft-- Exfiltrate Minecraft credentialsPOST /send-steam-- Exfiltrate Steam credentialsPOST /send-v20-cookies-- Exfiltrate Chrome v20 cookiesPOST /send-backup-codes-- Exfiltrate 2FA backup codesPOST /send-screenshot-- Upload victim screenshotPOST /send-logs-- Upload log filesPOST /send-progress-- Report task progressPOST /upload-- Generic file uploadGET /download-cookies-- Returnsoutput.exe not found(binary builder)
Admin Endpoints (Bearer auth required):
GET /api/stats-- Victim count, active users, pending keysGET /api/victims-- Full victim logGET /api/keys-- License key listPOST /api/keys-- Generate new license keyDELETE /api/keys/{key}-- Delete license keyPOST /login-- Admin authentication
Code Quality / OPSEC Analysis
The source code reveals an actor who:
- Uses AI-assisted development (BACKGROUND_B64 in crypter.py has C2PA content provenance metadata from ChatGPT/GPT-4 + Truepic Lens CLI -- the wallpaper image was generated by AI)
- Has moderate Python skills but makes amateur mistakes (syntax errors that call2.py has to patch, disabling pyautogui because it doesn't work headlessly)
- Actively iterates and debugs the malware (old/ directory with previous versions, debug logging, env checks)
- Targets multiple platforms (Windows + macOS) with growing sophistication (evolved from AppleScript to native C stub universal binaries)
- Operates a license-based distribution model with buyer management
Threat Actor Profile
Attribution Assessment
- Confidence: MEDIUM-HIGH
- Country/Region: Russia / Russian-speaking
- Evidence:
- All three ransomware C2 domains are
.ruTLD, registered via REGRU-RU - Domain name
mekhovaya-shuba.rutranslates to "fur coat" in Russian - Ransom notes include native Russian translations (not machine-translated -- uses proper legal terminology, idiomatic phrasing)
- Chinese translation also provided (suggests targeting Chinese-speaking victims)
caribb.rusuggests "Caribbean" theme (common in Russian underground naming)beboss34.ru-- "be boss" -- aspirational operator name
- All three ransomware C2 domains are
- Motivation: Financial -- cryptocurrency theft via clipper + ransomware extortion
- Sophistication: MODERATE -- custom-built tools, multi-platform, but amateur OPSEC (open directories, exposed API docs, leaked API secrets)
- Ransomware Identity: "DataBreachPlus" -- possible emerging RaaS brand
Actor Timeline
| Date | Event |
|---|---|
| 2025-07-11 | beboss34.ru registered (earliest known infrastructure) |
| 2025-11-14 | caribb.ru registered |
| 2026-01-06 | mekhovaya-shuba.ru registered |
| 2026-02-08 | launcher.cmd created (Windows variant) |
| 2026-03-12 | fanonlyatn.xyz domain registered (Navicosoft/Cloudflare) |
| 2026-03-13 | SSL certificates issued for fanonlyatn.xyz |
| 2026-03-13 | call1.py (v1 orchestrator) |
| 2026-03-15 | py.txt uploaded (14.5MB -- portable Python?) |
| 2026-03-16 | launchertracking.vbs created, launcher.vbs updated |
| 2026-03-17 | v1.0.py -> v1.1.py stealer evolution (same day), call2.py updated |
| 2026-03-17 | finder.py scanner created, finderx.zip / last.zip packed |
| 2026-03-18 | All macOS builder scripts created (app, pkg, pro, ultimate, vault, accounts, stealth) |
| 2026-03-26 | crypter.py ransomware module uploaded |
| 2026-04-03 | Panel exposed by @malwrhunterteam, LIVE at time of our analysis |
OPSEC Failures
- FastAPI /docs endpoint exposed -- full API schema publicly accessible without authentication
- Open directory listing on LiteSpeed server -- all source code, payloads, and scripts downloadable
- API secret hardcoded in multiple source files:
26i$MyYe@r - Development artifacts retained -- old/ directory with previous versions, debug logging enabled
- AI-generated content with provenance metadata -- BACKGROUND_B64 contains C2PA metadata identifying ChatGPT/GPT-4 as the generator and Truepic Lens CLI as the signing tool
- Consistent infrastructure patterns -- all Russian domains on same registrar, same hosting IP, same nameservers
pass2021#hardcoded as the lure access key -- possibly a reused personal password or year reference
MITRE ATT&CK Mapping
| Tactic | Technique | ID | Application |
|---|---|---|---|
| Initial Access | Phishing: Spearphishing Link | T1566.002 | FedEx/OnlyFans lure distribution |
| Execution | Command and Scripting Interpreter: Unix Shell | T1059.004 | bash one-liner -> curl -> bash |
| Execution | Command and Scripting Interpreter: Python | T1059.006 | All payloads are Python scripts |
| Execution | Command and Scripting Interpreter: Visual Basic | T1059.005 | VBS launchers for Windows |
| Persistence | Boot or Logon Autostart Execution: Launch Agent | T1547.011 | com.sys32.data.plist |
| Persistence | Boot or Logon Autostart Execution: Registry Run Keys | T1547.001 | CryptoGuard run key |
| Persistence | Scheduled Task/Job: Scheduled Task | T1053.005 | CryptoUpdate task |
| Defense Evasion | Masquerading: Match Legitimate Name | T1036.005 | sys32data, com.fedex.delivery.details |
| Defense Evasion | Obfuscated Files: Software Packing | T1027.002 | Base64 encoded bash in loader scripts |
| Defense Evasion | Indicator Removal: File Deletion | T1070.004 | Cleanup of download artifacts |
| Defense Evasion | Hide Artifacts: Hidden Files and Directories | T1564.001 | ~/.sys32data hidden directory |
| Credential Access | Credentials from Password Stores | T1555 | Browser cookies, saved passwords |
| Credential Access | Steal Application Access Token | T1528 | Discord tokens, Telegram sessions, Steam |
| Collection | Clipboard Data | T1115 | Crypto address clipboard monitoring |
| Collection | Data from Local System | T1005 | BIP-39 seed phrase file scanning |
| Collection | Screen Capture | T1113 | /send-screenshot endpoint |
| Exfiltration | Exfiltration Over C2 Channel | T1041 | HTTP POST to fanonlyatn.xyz |
| Impact | Data Encrypted for Impact | T1486 | crpx0 Fernet encryption |
| Impact | Financial Theft | T1657 | Crypto clipper address substitution |
IOC Summary
Network Indicators
C2 Panel:
103.241.66[.]238:1337(FastAPI/Uvicorn TwizAdmin panel)
Payload Delivery:
fanonlyatn[.]xyz(Cloudflare: 172.67.147[.]155, 104.21.28[.]214)hxxps://fanonlyatn[.]xyz/files/hxxps://fanonlyatn[.]xyz/builds/hxxps://fanonlyatn[.]xyz/api.phphxxps://fanonlyatn[.]xyz/api_address_match.phphxxps://fanonlyatn[.]xyz/api_dropper_log.php
Ransomware C2:
caribb[.]ru(31.31.198[.]206)mekhovaya-shuba[.]ru(31.31.198[.]206)beboss34[.]ru(31.31.198[.]206)hxxps://caribb[.]ru/crpx0/notify.phphxxps://mekhovaya-shuba[.]ru/crpx0/notify.phphxxps://beboss34[.]ru/crpx0/notify.php
Contact Channels:
- Telegram:
@DataBreachPlus/hxxps://t[.]me/DataBreachPlus - Email:
databreachplus@proton[.]me - qTox:
17EB54B8455144E088C7E77F88A97221C319F0CFE4FE306853EEB113EE8DB5607BB6EE481C7C
File Indicators
| Hash (SHA256) | Filename | Type |
|---|---|---|
f7ddba605e3d04e06d2f7b0fc4a38027ae58ca65a69d800dd2f43c8e94ca8396 | v1.1.py (stealer) | Python |
9d9783f57fd543043e0792d125831883259c823a5eaa69211e5254db4db4eaec | finder.py (scanner) | Python |
3fcd267e811d9b83cafa3d8d6932fa1c56f4fd8dcf46f9ec346e0689439532d4 | mac_loader.sh | Bash |
584796212f99efc7ac765d6048913fe34e46a64b13a8a78fb3a465b8c61f3527 | launcher.cmd | Batch |
74ab520e94b2f3b8915ec7b47abab7a2d7e9759add5aa195af7edf0ffa5b4150 | mac_pro_builder.sh | Bash |
aa11f154b17a4f81f951dbeaab78b58ea012f5b6ea16e4f894bd90971e01bae4 | mac_app_builder.sh | Bash |
06299676b43749b8477c4bc977c09512957fc9b66fd5030c1874069632ce6092 | payload_last.zip | ZIP |
Behavioral Indicators
Persistence Artifacts:
~/Library/LaunchAgents/com.sys32.data.plist~/Library/LaunchAgents/com.cryptoprice.guard.plist~/.sys32data/(macOS hidden directory)%APPDATA%\sys32data\(Windows)%APPDATA%\sys32data\bin\python.exe(portable Python)- Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\CryptoGuard - Scheduled Task:
CryptoUpdate
File Artifacts:
sys32.py-- main stealer payloadfinder.py-- seed phrase scannercall2.py-- orchestratorcall2_debug.txt-- execution logpayload_err.txt-- error log.hwid-- hardware ID persistence filedropper_state.json-- dropper state fileHOW TO RECOVER.txt-- English ransom noteHOW TO RECOVER_RU.txt-- Russian ransom note (inferred)HOW TO RECOVER_ZH.txt-- Chinese ransom note (inferred)scan_report.json-- ransomware file inventory*.crpx0-- encrypted file extension
Network Artifacts:
- User-Agent:
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 - Bearer token: Base64 of
26i$MyYe@r - Python downloaded from:
github.com/indygreg/python-build-standalone(legitimate project abused)
Cryptocurrency Indicators
| Chain | Address | Purpose |
|---|---|---|
| BTC (Legacy) | 1KC2kXDeyBH9yocYSQy6DQ1ou5hRRRBtpZ | Clipper replacement |
| BTC (P2SH) | 3887CPBvo96AZAm5Gn339isJTXVjdaFogR | Clipper replacement |
| BTC (Bech32) | bc1qhwxpvjpdlyz7ekmjq6y67t2m2m2e5jq62ykfl4 | Clipper replacement |
| Ethereum | 0x835270cEd14bfdAaeF8F8Fa0e532A244cfDe8b52 | Clipper replacement |
| Tron | TDtxY9ZHNffj14Ci9qhBjkpR2AAhCaHuXs | Clipper replacement |
| Dogecoin | D91Sb1JyWoLb43F2XHFjUL9QJj7iLm6cUR | Clipper replacement |
| Litecoin | ltc1qadnhqpyj97wjhv2e502n3w207zy2r30pgejq8p | Clipper replacement |
| Solana | FQPxYxm4y7D6PFjFcGeKcPe42kUfbDnbRsaeLoPYmxYQ | Clipper replacement |
| Ripple | rBuqUShtAdijJxchFaEXcMij1VVRMY2JWY | Clipper replacement |
| Bitcoin Cash | qrl73me6ndr7a5sxuyxgn5aflrefyu4c6uzamhu9ar | Clipper replacement |
| BTC (Bech32) | bc1qs24qevh60nv3r5aqt8ssh7wettczjagz24vest | API match response |
Recommended Actions
Immediate (24-48 hours)
- Block all IOC domains and IPs at perimeter firewalls
- Search for
com.sys32.data.plist,com.cryptoprice.guard.plist,.sys32data/,sys32data\across endpoints - Search for
.crpx0file extensions (ransomware indicator) - Monitor for clipboard monitoring processes
- Check for portable Python installations in
%APPDATA%\sys32data\ - Report
fanonlyatn[.]xyzto Cloudflare abuse and Navicosoft registrar - Report
caribb.ru,mekhovaya-shuba.ru,beboss34.ruto REG.RU abuse
Short-term (1-2 weeks)
- Submit samples to MalwareBazaar with "TwizAdmin" tag
- Submit C2 indicators to ThreatFox
- Monitor the 10 cryptocurrency addresses for transaction activity
- Report
@DataBreachPlusTelegram channel - Check
bc1qhwxpvjpdlyz7ekmjq6y67t2m2m2e5jq62ykfl4and other wallets on blockchain explorers for victim funds
Medium-term (1-3 months)
- Monitor for domain rotation (actor registration patterns: Navicosoft + Cloudflare NS)
- Track the "DataBreachPlus" ransomware brand for leak site emergence
- Correlate
31.31.198[.]206REG.RU shared hosting for additional campaigns
References
- @malwrhunterteam tweet (2026-04-03): "TwizAdmin panel here"
- FastAPI documentation auto-generated at
hxxp://103.241.66[.]238:1337/docs - All source code retrieved from open directory at
fanonlyatn[.]xyz - Ransom note content extracted from
crypter.py
GHOST -- Breakglass Intelligence "One indicator. Total infrastructure."