No | Date | Request | Urls | Hosts | IDS | Rule | Score | Zero | VT | Player | Etc | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | 2023-10-18 09:51 |
Order.pdf.exe 16ef2ceaac7e55803f35f33d84645e31Malicious Library UPX .NET framework(MSIL) PE File PE32 OS Processor Check PNG Format .NET EXE VirusTotal Malware PDB Check memory Checks debugger Creates executable files unpack itself AppData folder Remote Code Execution |
4.2 | 35 | ZeroCERT | |||||||||||||||||||
|
||||||||||||||||||||||||
2 | 2023-10-18 07:49 |
PO.pdf.exe 9d1dfc2adc6e191d54bcf23a43e221f9Malicious Library UPX .NET framework(MSIL) PE File PE32 OS Processor Check .NET EXE PNG Format VirusTotal Malware PDB Check memory Checks debugger Creates executable files unpack itself AppData folder Remote Code Execution |
4.2 | 33 | ZeroCERT | |||||||||||||||||||
|
||||||||||||||||||||||||
3 | 2023-10-17 07:46 |
HQR8391000.pdf.exe dc36e4d8f1c2b8447a5dfb31c6ec9330Generic Malware Malicious Library UPX Malicious Packer .NET framework(MSIL) PE File PE32 OS Processor Check .NET EXE PNG Format PDB Check memory Checks debugger Creates executable files unpack itself AppData folder Remote Code Execution |
3.2 | ZeroCERT | ||||||||||||||||||||
|