1 |
2024-07-02 07:58
|
svchost.exe ad8b93be8ce15ff47c2c079201bd17c9 Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check VirusTotal Malware Check memory Checks debugger unpack itself |
|
|
|
|
2.0 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2 |
2024-07-02 07:55
|
asec.exe 8962b367891c933d896bc4ed9c2cffba Generic Malware UPX Antivirus PE File PE32 PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Windows utilities Disables Windows Security suspicious process WriteConsoleW Windows Update ComputerName Cryptographic key |
|
|
|
|
9.0 |
M |
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3 |
2024-07-02 07:51
|
csrss.exe a273d142217177ab8013d6ebeafbc22f Malicious Library Malicious Packer Antivirus UPX PE File PE64 OS Processor Check PDB Check memory Checks debugger ComputerName Remote Code Execution |
|
|
|
|
1.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4 |
2024-07-01 15:33
|
tsjtmfdm.pkg.exe 98cc12248c1dfc68103dd9fc4d959f68 Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware PDB unpack itself |
|
|
|
|
1.6 |
|
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
2024-07-01 11:03
|
Hooks.jpg.exe 422f3763021f8f9bfc31a9a7e4b049f9 Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) Downloader Malicious Packer .NET framework(MSIL) UPX Antivirus PE File PE32 DLL OS Processor Check VirusTotal Malware powershell AutoRuns suspicious privilege Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself Windows utilities powershell.exe wrote suspicious process AppData folder Windows ComputerName DNS Cryptographic key |
2
http://download.microsoft.com/download/E/4/1/E4173890-A24A-4936-9FC9-AF930FE3FA40/NDP461-KB3102436-x86-x64-AllOS-ENU.exe http://43.198.152.240:8080/api/node/ip_validate
|
18
gtxvdqvuweqs.com(16.162.201.176) - mailcious ipv6-api.iproyal.com() down.ftp21.cc(119.203.212.165) - malware download.microsoft.com(23.207.40.161) api6.my-ip.io() www.362-com.com(1.226.84.135) www.4i7i.com(1.226.84.135) api.iproyal.com(193.228.196.69) worldtimeapi.org(213.188.196.246) 23.45.52.224 93.189.62.83 213.188.196.246 193.228.196.69 51.161.196.188 43.198.152.240 16.162.201.176 - mailcious 1.226.84.135 119.203.212.165 - malware
|
4
ET DNS Query for .cc TLD ET HUNTING Suspicious EXE Download Content-Type image/jpeg ET INFO SSH-2.0-Go version string Observed in Network Traffic ET INFO External IP Lookup Domain DNS Lookup (my-ip .io)
|
|
11.2 |
M |
60 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6 |
2024-07-01 11:02
|
64.jpg.exe 72762b7ac7c6dfdc7b1c3b3a5171103a UPX PE File PE64 VirusTotal Malware Check memory unpack itself ComputerName Firmware |
|
3
xmr.330com.com(211.108.74.247) 211.108.74.247 62.48.34.99
|
|
|
3.4 |
M |
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 |
2024-07-01 10:46
|
wmi.jpg.exe 3d3aedfaeaf39544ff74fe6fe4541fc2 UPX PE File PE32 VirusTotal Malware AutoRuns Check memory Creates executable files RWX flags setting Windows utilities WriteConsoleW Firewall state off Windows |
|
2
www.4i7i.com(1.226.84.135) 1.226.84.135
|
|
|
6.0 |
M |
60 |
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8 |
2024-07-01 09:42
|
rise2806.exe 97768ab0a4837757b74de2ae892badab Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself crashed |
|
|
|
|
2.2 |
M |
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9 |
2024-07-01 09:38
|
vidar2806.exe f88272ea7674d3acedd8adcf7643c598 Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself crashed |
|
|
|
|
2.4 |
|
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10 |
2024-07-01 09:38
|
lumma2806.exe 0309dd0131150796ea99b30a62194fae Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself crashed |
|
|
|
|
2.2 |
|
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11 |
2024-07-01 09:26
|
1.exe 07c1efc472c5c8424d6a4e529abc63c5 UPX PE File PE64 OS Processor Check VirusTotal Malware |
|
|
|
|
1.2 |
|
16 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12 |
2024-07-01 09:23
|
TQ.jpg.exe f9f5342074462fa1048fea806eef535f Emotet Generic Malware Malicious Library Downloader Malicious Packer Antivirus UPX PE File PE32 OS Processor Check DLL PE64 Malware download VirusTotal Malware SMB Traffic Potential Scan Malicious Traffic Creates executable files ICMP traffic Disables Windows Security AppData folder sandbox evasion Windows DNS DDNS Downloader |
8
http://118.184.169.48/dyndns/getip http://45.113.194.189/api.php?query=175.208.134.152&co=&resource_id=6006&oe=utf8 http://ssl.ftp21.cc/MpMgDLL.jpg http://ssl.ftp21.cc/MpMgSvc.jpg http://down.ftp21.cc/64.jpg http://ssl.ftp21.cc/Hooks.jpg http://download.microsoft.com/download/E/4/1/E4173890-A24A-4936-9FC9-AF930FE3FA40/NDP461-KB3102436-x86-x64-AllOS-ENU.exe http://down.ftp21.cc/Update.txt
|
22
gtxvdqvuweqs.com(16.162.201.176) members.3322.org(118.184.169.48) ipv6-api.iproyal.com() down.ftp21.cc(119.203.212.165) - malware download.microsoft.com(23.199.6.55) www.362-com.com(1.226.84.135) www.4i7i.com(1.226.84.135) opendata.baidu.com(45.113.194.189) web.362-com.com(110.11.158.238) api.iproyal.com(193.228.196.69) ssl.ftp21.cc(31.184.207.62) - malware 23.219.69.110 31.184.207.62 - malware 193.228.196.69 45.113.194.189 16.162.201.176 1.226.84.135 31.222.226.20 18.163.3.159 118.184.169.48 110.11.158.238 119.203.212.165 - malware
|
8
ET DNS Query for .cc TLD ET HUNTING Suspicious EXE Download Content-Type image/jpeg ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 ET MALWARE JS/WSF Downloader Dec 08 2016 M4 ET INFO DYNAMIC_DNS Query to 3322.org Domain ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection ET SCAN Behavioral Unusual Port 1433 traffic Potential Scan or Infection ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection
|
|
9.4 |
M |
55 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13 |
2024-07-01 09:23
|
wmi.jpg.exe 3d3aedfaeaf39544ff74fe6fe4541fc2 PE File PE32 Malware download VirusTotal Malware SMB Traffic Potential Scan AutoRuns Malicious Traffic Check memory Creates executable files ICMP traffic RWX flags setting Windows utilities suspicious TLD WriteConsoleW Firewall state off Windows DNS DDNS Downloader |
10
http://down.ftp21.cc/Update.txt http://ssl.ftp21.cc/445.jpg http://43.198.152.240:8080/api/node/ip_validate http://118.184.169.48/dyndns/getip http://download.microsoft.com/download/E/4/1/E4173890-A24A-4936-9FC9-AF930FE3FA40/NDP461-KB3102436-x86-x64-AllOS-ENU.exe http://hook.ftp21.cc/MpMgSvc.dll http://45.113.194.127/api.php?query=175.208.134.152&co=&resource_id=6006&oe=utf8 http://hook.ftp21.cc/MpMgSvc.jpg http://hook.ftp21.cc/Hooks.jpg http://hook.ftp21.cc/64.jpg
|
28
gtxvdqvuweqs.com(16.162.201.176) members.3322.org(118.184.169.48) ipv6-api.iproyal.com() down.ftp21.cc(119.203.212.165) - malware download.microsoft.com(23.199.6.55) hook.ftp21.cc(211.108.60.155) api6.my-ip.io() unixtime.org(172.67.175.23) www.362-com.com(1.226.84.135) web.362-com.com(110.11.158.238) opendata.baidu.com(45.113.194.127) www.4i7i.com(1.226.84.135) api.iproyal.com(93.189.62.83) ssl.ftp21.cc(31.184.207.62) - malware 172.67.175.23 93.189.62.83 31.184.207.62 - malware 193.228.196.69 211.108.60.155 43.198.152.240 45.113.194.127 16.162.201.176 1.226.84.135 51.161.196.188 104.78.73.222 118.184.169.48 110.11.158.238 119.203.212.165 - malware
|
11
ET INFO Packed Executable Download ET DNS Query for .cc TLD ET HUNTING Suspicious EXE Download Content-Type image/jpeg ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 ET MALWARE JS/WSF Downloader Dec 08 2016 M4 ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection ET INFO DYNAMIC_DNS Query to 3322.org Domain ET SCAN Behavioral Unusual Port 1433 traffic Potential Scan or Infection ET INFO SSH-2.0-Go version string Observed in Network Traffic ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection ET INFO External IP Lookup Domain DNS Lookup (my-ip .io)
|
|
11.2 |
M |
60 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14 |
2024-06-29 15:39
|
amadka.exe 7858fdd5d237ed2531bb9d0ac0a756bc PE File PE32 Malware download Amadey VirusTotal Malware AutoRuns Malicious Traffic Checks debugger unpack itself Checks Bios Detects VMWare AppData folder VMware anti-virtualization Windows DNS crashed |
2
http://77.91.77.82/Hun4Ko/index.php
http://77.91.77.81/stealc/random.exe
|
2
77.91.77.82 - malware
77.91.77.81 - mailcious
|
2
ET DROP Spamhaus DROP Listed Traffic Inbound group 8 ET MALWARE Amadey Bot Activity (POST)
|
|
10.6 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15 |
2024-06-29 15:27
|
XClient1.exe dedb302aba9b69536c287633fbe41f5d Antivirus UPX PE File .NET EXE PE32 OS Processor Check Lnk Format GIF Format VirusTotal Malware AutoRuns suspicious privilege MachineGuid Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder AntiVM_Disk VM Disk Size Check Windows ComputerName keylogger |
|
|
|
|
6.2 |
M |
58 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|