No | Date | Request | Urls | Hosts | IDS | Rule | Score | Zero | VT | Player | Etc | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | 2023-06-05 08:04 |
setup.EXE 426937c153dd506951c7f40a94094c48Gen1 Emotet PWS .NET framework RAT njRAT backdoor UPX Malicious Library CAB PE64 PE File PNG Format OS Processor Check .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer Email Client Info Stealer Malware AutoRuns PDB suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications Check virtual network interfaces AppData folder WriteConsoleW installed browsers check Tofsee Windows Browser Email ComputerName Remote Code Execution DNS Cryptographic key DDNS Software crashed |
1
|
6 | 4 | 10.6 | M | ZeroCERT | ||||||||||||||||
|