Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
46 2024-06-28 12:53 sw.w.w.w.www.doc  

80e1ba7b421fd01f5319de00cf5420f7


MS_RTF_Obfuscation_Objects RTF File doc Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Exploit DNS crashed
3 5 2 4.0 M ZeroCERT

47 2024-06-28 12:47 intalls555.exe  

7e30a1a92f86e8e0a25154b1521d0588


Antivirus UPX PE File .NET EXE PE32 OS Processor Check VirusTotal Malware Telegram suspicious privilege MachineGuid Check memory Checks debugger unpack itself Check virtual network interfaces AntiVM_Disk VM Disk Size Check Tofsee Windows ComputerName DNS keylogger
2 4 4.8 M 59 ZeroCERT

48 2024-06-28 12:45 123.exe  

cd581d68ed550455444ee6e099c44266


RedLine stealer RedlineStealer Malicious Library .NET framework(MSIL) UPX AntiDebug AntiVM PE File .NET EXE PE32 OS Processor Check PNG Format MSOffice File JPEG Format Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware Microsoft suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files RWX flags setting unpack itself Windows utilities Collect installed applications Check virtual network interfaces AppData folder installed browsers check Tofsee Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed
3 10 7 1 12.4 M 57 ZeroCERT

49 2024-06-27 17:12 build2.exe  

335a64e110185d35bcfbc3ef86a382e9


Client SW User Data Stealer LokiBot ftp Client info stealer Generic Malware Malicious Library UPX Http API PWS Code injection AntiDebug AntiVM PE File PE32 OS Processor Check FTP Client Info Stealer VirusTotal Malware Telegram MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software
2 5 3 15.8 M 59 ZeroCERT

50 2024-06-27 10:27 hv.exe  

6a1db4f73db4ed058c8cd7e04dfa7cc3


Malicious Library Malicious Packer Admin Tool (Sysinternals etc ...) .NET framework(MSIL) UPX PWS AntiDebug AntiVM PE File .NET EXE PE32 DLL OS Processor Check VirusTotal Malware Buffer PE PDB Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Check virtual network interfaces AppData folder Tofsee Windows ComputerName DNS Cryptographic key crashed
1 3 1 1 12.6 M 54 ZeroCERT

51 2024-06-27 10:16 a.p.l.n.doc  

6e11c40fcc227fab4b32f8c3b275b57c


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Exploit DNS crashed
2 3 3 5.0 M 38 ZeroCERT

52 2024-06-27 10:11 vi.exe  

baa9e1a92bab85279dca0aed641f1fa9


Malicious Library Antivirus UPX PE File PE32 OS Processor Check VirusTotal Malware Malicious Traffic Tofsee crashed
1 4 1 3.4 M 52 ZeroCERT

53 2024-06-27 10:05 b.j.c.c.cc.doc  

809e5331e9ead88825e560d3077cb6da


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Exploit DNS crashed
2 5 3 5.0 M 32 ZeroCERT

54 2024-06-27 04:33 https://t.co/J5c3B3lHDS  

a447b2274aa6e2ebdb080e3def9263db


Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed
2 2 4.2 guest

55 2024-06-26 10:36 av_downloader1.1.exe  

759f5a6e3daa4972d43bd4a5edbdeb11


Generic Malware Malicious Library Malicious Packer UPX Antivirus AntiDebug AntiVM PE File PE32 MSOffice File PNG Format JPEG Format VirusTotal Malware powershell AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Disables Windows Security powershell.exe wrote suspicious process Tofsee Windows Exploit ComputerName DNS Cryptographic key crashed
2 1 12.4 M 57 ZeroCERT

56 2024-06-26 10:18 a.f.f.f.f.fff.doc  

6476133e6fcd5bb5fad7d39d1d214a6a


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Exploit DNS crashed
2 5 2 5.0 M 36 ZeroCERT

57 2024-06-26 10:16 build.exe  

71b44c9a55f3b40681f6a5524ca9821d


[m] Generic Malware Generic Malware Suspicious_Script_Bin task schedule Malicious Library UPX Socket DGA Http API ScreenShot PWS DNS Internet API AntiDebug AntiVM PE File PE32 OS Processor Check Malware download Dridex VirusTotal Malware Microsoft AutoRuns Code Injection Checks debugger buffers extracted Creates executable files ICMP traffic unpack itself Windows utilities AppData folder malicious URLs WriteConsoleW Tofsee Windows ComputerName Remote Code Execution DNS
3 6 9 13.2 M 47 ZeroCERT

58 2024-06-26 10:13 nelb.doc  

6b9167056af49bf702c833ae4f581ef1


MS_RTF_Obfuscation_Objects RTF File doc FormBook Malware download VirusTotal Malware Malicious Traffic exploit crash unpack itself suspicious TLD Tofsee Exploit DNS crashed
4 9 4 4.4 M 33 ZeroCERT

59 2024-06-25 09:12 notorious.doc  

2d1b096a33d1b673fd06db9f3e861761


MS_RTF_Obfuscation_Objects RTF File doc RedLine Malware download VirusTotal Malware RWX flags setting exploit crash suspicious TLD IP Check Tofsee Stealer Exploit Browser DNS crashed
3 10 9 4.8 M 27 ZeroCERT

60 2024-06-25 07:57 Main.exe  

9ec7f08c85bfa1b267761f225b68ab0b


Malicious Library Antivirus UPX PE File PE32 OS Processor Check VirusTotal Malware Telegram MachineGuid Malicious Traffic WMI Tofsee ComputerName DNS crashed
2 5 3 6.2 M 61 ZeroCERT