And i was right and now i have the evidence that its a Fake Ann with an Fake Webpage and Malware Wallet download for [LNGC] Longcoin !
The Fake Github is only 4 days old.
Fake Github :
github.com/long-networkFake Webpage and Fake Wallet download Link there :https://long-network.com/
https://services-long-network-com.preview-domain.com/wp-content/uploads/2024/12/longcoin.7z
https://services-long-network-com.preview-domain.com/wp-content/uploads/2024/12/longcoin-qt-linux.tar.gz
Zenbox flags this file as: MALWARE TROJAN EVADER RATDrops script at startup location
Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Dot net compiler compiles file from suspicious location
Suspicious DNS Query for IP Lookup Service APIs
PowerShell Script Run in AppData
Startup Folder File Write
SSLBL: Traffic to malicious host (likely QuasarRAT C&C traffic)
ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
ET MALWARE Generic AsyncRAT Style SSL Cert
ET INFO Observed DNS Query to Commonly Abused Preview Domain (preview-domain .com)
ET INFO External IP Lookup Domain in DNS Lookup (ipwho .is)
SSLBL: Malicious SSL certificate detected (QuasarRAT C&C)
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
C:\Users\user\AppData\Local\Temp\RegAsm.exe
C:\Users\user\Documents\20241226\PowerShell_transcript.019635._nBkIR+H.20241226130004.txt
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tempup.url
Win64:Evo-gen [Trj]
Source :
https://www.virustotal.com/gui/file/ef27c49ed817f7b8f55dfbe4accd1493473004dbcda3ea699b10a2ea6f855e12/behaviorAccount :
long-network <--- Please ban or Lock that Account and delete the ThreadThe Account is just 3 Days old
Fake Ann Thread : [ANN] [LNGC] Longcoin: Empowering Global Collaboration and InnovationThe Fake Ann is also self-moderated as always from the Hackers.
[LNGC] Longcoin:
https://long-network.com
https://long-network.com/#wallets
https://github.com/long-network/core
This post is also a reference for the Github Report !