Advertised as free mint. Malicious actor constantly changes username and tweets to lure potential victims.
First I've seen extracting malicious actor's receiver wallet from GitHub's gist: gist[.]githubusercontent[.]com/sign-eth-wallet/4379f93f73fa6e6cd5ba07a8cb5cf841/raw/9d66fd4ab87f1746672778fc7a4f9f82b02d56b1/gistfile1.txt