1 |
2021-11-16 13:34
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Socket DNS Internet API HTTP KeyLogger ScreenShot Http API Steal credential AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
22.8 |
|
42 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2 |
2021-11-15 18:03
|
asdfg.exe 6966182dd20351152ea815d31e735067 RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Steal credential ScreenShot Http API AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications suspicious process AppData folder WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
10
http://colonna.ac.ug/nss3.dll http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
9
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
1
|
21.8 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3 |
2021-11-15 17:56
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Socket DNS Internet API HTTP KeyLogger ScreenShot Http API Steal credential AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
22.0 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4 |
2021-11-15 17:49
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Steal credential ScreenShot Http API Socket DNS Internet API HTTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE JPEG Format OS Processor Check DLL Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
22.6 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
2021-11-15 17:43
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Steal credential ScreenShot Http API Socket DNS Internet API HTTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
22.2 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6 |
2021-11-15 17:38
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Steal credential ScreenShot Http API Socket DNS Internet API HTTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
23.0 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 |
2021-11-15 17:33
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Socket DNS Internet API HTTP KeyLogger ScreenShot Http API AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check OskiStealer Stealer Windows Chrome Browser Email ComputerName Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
3
colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 185.215.113.77 - malware
|
6
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
20.8 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8 |
2021-11-15 17:18
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Socket DNS Internet API HTTP KeyLogger ScreenShot Http API Steal credential AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
23.0 |
|
39 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9 |
2021-11-15 09:52
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Generic Malware UPX Malicious Library Malicious Packer Socket DNS Internet API HTTP KeyLogger ScreenShot Http API Steal credential AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL JPEG Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files ICMP traffic unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key crashed Password |
12
http://colonna.ac.ug/nss3.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll
|
10
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 185.215.113.77 - malware 74.119.192.122
|
8
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO TLS Handshake Failure ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ug/index.php http://colonna.ac.ug/
|
22.4 |
|
27 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10 |
2021-11-14 18:59
|
asdfg.exe 6966182dd20351152ea815d31e735067 PWS Loki[b] Loki.m RAT Gen1 Gen2 [m] Generic Malware Generic Malware task schedule UPX Malicious Packer Malicious Library Socket DNS Internet API HTTP KeyLogger ScreenShot Http API Steal credential AntiDebug AntiVM PE File PE32 .NET EXE DLL OS Processor Browser Info Stealer Malware download FTP Client Info Stealer Vidar Azorult VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files ICMP traffic RWX flags setting unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Ransomware Zeus OskiStealer Stealer Windows Chrome Browser Email ComputerName DNS Cryptographic key Software crashed Downloader Password |
15
http://colonna.ac.ug/ - rule_id: 7517 http://colonna.ac.ug/ http://colonna.ac.ug/nss3.dll http://colonna.ug/pm.exe http://colonna.ac.ug/softokn3.dll http://colonna.ac.ug/msvcp140.dll http://colonna.ug/index.php - rule_id: 7513 http://colonna.ug/index.php http://colonna.ug/cc.exe http://colonna.ac.ug/mozglue.dll http://colonna.ac.ug/vcruntime140.dll http://colonna.ac.ug/main.php http://colonna.ac.ug/freebl3.dll http://colonna.ac.ug/sqlite3.dll https://cdn.discordapp.com/attachments/909035193627705347/909036151287971850/Egfckkoxgosufdyqxdmlgfdwpjkldcw
|
13
t.me(149.154.167.99) colonna.ac.ug(185.215.113.77) colonna.ug(185.215.113.77) cdn.discordapp.com(162.159.135.233) - malware 149.154.167.99 91.219.236.162 185.163.47.176 - mailcious 193.38.54.238 91.219.236.240 162.159.135.233 - malware 82.146.43.67 185.215.113.77 - malware 74.119.192.122
|
11
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET MALWARE AZORult v3.3 Server Response M3 ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) ET HUNTING Suspicious Zipped Filename in Outbound POST Request (Chrome_Default.txt)
|
2
http://colonna.ac.ug/ http://colonna.ug/index.php
|
27.8 |
|
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|