Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
1 2024-05-31 07:42 5.exe  

58f255cdde1639cac205467621bfcb70


Emotet NSIS Malicious Library UPX PE File DllRegisterServer dll PE32 MZP Format CAB suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files installed browsers check Browser ComputerName DNS
3 3.0 M ZeroCERT

2 2022-08-13 20:43 WW.exe  

1b4fc049d71cc0d02f977f371d551a38


RAT PWS .NET framework PhysicalDrive Generic Malware UPX Malicious Library Admin Tool (Sysinternals etc ...) Downloader Malicious Packer Antivirus Confuser .NET AntiDebug AntiVM PE32 PE File MSOffice File OS Processor Check .NET EXE PNG Format PE64 Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency RecordBreaker Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications Auto service Check virtual network interfaces suspicious process AppData folder AntiVM_Disk sandbox evasion WriteConsoleW anti-virtualization VM Disk Size Check installed browsers check Tofsee Mars Stealer Stealer Windows Exploit Browser Email ComputerName Firmware DNS Cryptographic key Software crashed
12 20 10 6 24.0 M 42 ZeroCERT

3 2022-08-03 09:56 11.exe  

70de51ca375c085e9f7ff666d7860673


RAT PWS .NET framework Gen1 Gen2 Malicious Library UPX Confuser .NET Malicious Packer AntiDebug AntiVM PE32 PE File OS Processor Check .NET EXE MSOffice File PNG Format DLL JPEG Format Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency RecordBreaker suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications Check virtual network interfaces AppData folder sandbox evasion anti-virtualization installed browsers check Tofsee Mars Stealer Stealer Windows Exploit Browser Email ComputerName DNS Cryptographic key Software crashed
15 13 14 1 17.8 M 34 ZeroCERT

4 2022-07-31 13:53 JOB.exe  

c0ea08a163298e0493d9cb9d9f6881d1


RAT PWS .NET framework Malicious Library UPX Confuser .NET Admin Tool (Sysinternals etc ...) Malicious Packer AntiDebug AntiVM PE32 PE File MSOffice File OS Processor Check .NET EXE PNG Format JPEG Format Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Mars Stealer Stealer Windows Exploit Browser Email ComputerName DNS Cryptographic key Software crashed
12 13 9 5 20.6 M 48 ZeroCERT

5 2022-07-27 09:06 EU.exe  

f052acab310330627d5e20b1107b9d76


RAT PWS .NET framework Malicious Library UPX Confuser .NET Admin Tool (Sysinternals etc ...) Malicious Packer AntiDebug AntiVM PE32 PE File OS Processor Check .NET EXE PNG Format MSOffice File JPEG Format Browser Info Stealer Password Stealer Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications sandbox evasion anti-virtualization installed browsers check Tofsee Stealer Windows Exploit Browser Email ComputerName DNS Cryptographic key Software crashed
8 12 6 18.8 M 43 ZeroCERT

6 2022-07-18 10:05 1.exe  

8a2467bc20879ad5029d61f2801fbc38


RAT PWS .NET framework Emotet UPX Malicious Library Confuser .NET AntiDebug AntiVM PE32 PE File MSOffice File PNG Format OS Processor Check .NET EXE JPEG Format Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications Check virtual network interfaces AntiVM_Disk VM Disk Size Check installed browsers check Tofsee Windows Exploit Browser ComputerName DNS Cryptographic key Software crashed
2 13 4 14.2 M 41 ZeroCERT

7 2022-07-18 09:45 namdoitntn.exe  

ce2126d6ce78ff9697fb56967d1b8774


PWS[m] RedLine stealer[m] RAT Emotet UPX Malicious Library AntiDebug AntiVM PE32 PE File .NET EXE PNG Format MSOffice File JPEG Format Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications human activity check installed browsers check Tofsee Windows Exploit Browser ComputerName DNS Cryptographic key Software crashed
3 4 16.8 M 36 ZeroCERT

8 2022-07-18 09:45 22.exe  

2f7dfe9a88a2197d3c36c5427778585c


RAT PWS .NET framework AgentTesla(IN) Emotet UPX Malicious Library Confuser .NET Malicious Packer AntiDebug AntiVM PE32 PE File PNG Format OS Processor Check .NET EXE MSOffice File JPEG Format Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications AntiVM_Disk VM Disk Size Check installed browsers check Tofsee Windows Exploit Browser ComputerName DNS Cryptographic key Software crashed
6 4 14.8 M 35 ZeroCERT

9 2022-07-18 09:44 tag12312341.exe  

01e48b3b61d25f3a10a7dc0a06e4eb17


PWS[m] RedLine stealer[m] RAT Emotet UPX Malicious Library AntiDebug AntiVM PE32 PE File PNG Format MSOffice File JPEG Format Browser Info Stealer FTP Client Info Stealer VirusTotal Malware Buffer PE suspicious privilege Code Injection Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications AntiVM_Disk VM Disk Size Check installed browsers check Tofsee Windows Exploit Browser ComputerName DNS Cryptographic key Software crashed
4 4 15.4 M 35 ZeroCERT

10 2022-07-18 09:36 vidar.exe  

a6a51c63436cab71241f89451ebe0ac8


Emotet UPX Malicious Library AntiDebug AntiVM PE32 PE File PNG Format MSOffice File JPEG Format OS Processor Check VirusTotal Malware suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities human activity check installed browsers check Tofsee Windows Exploit Browser ComputerName DNS crashed
1 6 4 11.0 50 ZeroCERT

11 2022-07-18 09:32 F0geI.exe  

de7f65eb86210a7be6f62dfdab90a900


Emotet UPX Malicious Library Code injection AntiDebug AntiVM PE32 PE File PNG Format MSOffice File OS Processor Check JPEG Format Malware download VirusTotal Malware RecordBreaker Buffer PE suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities WriteConsoleW installed browsers check Tofsee Windows Exploit Browser ComputerName DNS crashed
1 3 6 14.6 M 48 ZeroCERT

12 2021-10-26 09:43 FastPC.exe  

575dfecf7e2f126bd44b67256f066794


RAT Gen1 Gen2 PWS .NET framework Emotet Generic Malware Antivirus Malicious Library UPX Admin Tool (Sysinternals etc ...) Malicious Packer Anti_VM Escalate priviledges AntiDebug AntiVM PE File PE32 PNG Format .NET EXE DLL OS Processor Check PE64 Browser Info Stealer Malware download FTP Client Info Stealer VirusTotal Malware AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder suspicious TLD sandbox evasion WriteConsoleW human activity check installed browsers check Tofsee GameoverP2P Zeus Windows Browser ComputerName Trojan Banking Amazon DNS Cryptographic key Software crashed Downloader
3 17 8 16.8 32 ZeroCERT

13 2021-10-07 16:44 Setup12.exe  

f80a018bd3f70c14370944063f413f73


RAT Gen2 Emotet Generic Malware UPX Malicious Library ASPack PE File PE32 .NET EXE PE64 OS Processor Check Browser Info Stealer VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself Check virtual network interfaces AntiVM_Disk IP Check VM Disk Size Check installed browsers check Browser ComputerName DNS
3 11 1 2 9.8 M 46 ZeroCERT

14 2021-09-17 10:57 Setup12.exe  

e0ef2cfe575206c8a60ddba16c3be2f5


Gen2 Emotet UPX Malicious Library ASPack PE File PE32 OS Processor Check PE64 Browser Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself Check virtual network interfaces AntiVM_Disk IP Check VM Disk Size Check installed browsers check Tofsee Interception Browser ComputerName DNS crashed
5 7 2 1 9.6 M 51 ZeroCERT

15 2021-09-12 14:52 SmartPDF.exe  

e180347578de3564e7dea536a9af509b


Emotet NPKI Gen2 Gen1 RAT PWS .NET framework Generic Malware UPX Malicious Library PE File PE32 PE64 OS Processor Check .NET EXE DLL Browser Info Stealer FTP Client Info Stealer VirusTotal Malware Buffer PE AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder AntiVM_Disk suspicious TLD WriteConsoleW IP Check VM Disk Size Check human activity check installed browsers check Tofsee Windows Browser ComputerName Amazon DNS Cryptographic key Software crashed
9 19 7 1 19.0 M 28 ZeroCERT

  • First
  • 1
  • 2
  • Last
  • Total : 29cnts