15136 |
2023-03-05 06:01
|
https://vk.com/doc139074685_65... 34daad1fd1ce289c4996dde10e3b7fdc AntiDebug AntiVM MSOffice File Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
48
https://st6-22.vk.com/dist/web/ui_common.84e2442a05004320e11f.js?6245ba39b63448019203f2729b74d21f https://vk.com/dist/web/language.13cbd4193255cbaaab3a.js?c9e9113960ae98d68204079f43f790dd https://st6-22.vk.com/dist/web/polyfills/canvas_to_blob.e77dcc6129127456cc4f.js?6a4a06039f2295cdc4f936f4051ae4d3 https://st6-22.vk.com/dist/web/polyfills/array_functions.5ed53e616feed60bc4e8.js?53b5630d9d361c93a7d8a918fd06d21d https://st6-22.vk.com/dist/react.6d787991b51243317269.js?cb151ae0d77e1fe8ca23 https://vk.com/doc139074685_656680554?hash=yY1sPUcjN3fGmqZ844TVD9WvQoAIhjEaUgzVKOrN00g&dl=GEZTSMBXGQ3DQNI:1677236009:4ErQ7QWZfsFdaktvsBf6rtQK93SwnryL8MXAe6MiXqs&api=1&no_preview=1 https://vk.com/js/lang17_0.js?27966054 https://st6-22.vk.com/css/al/uncommon.431a60ba5d2797d2fdb1.css https://st6-22.vk.com/css/al/fonts_cnt.a289ed70815ffbd082ae.css https://st6-22.vk.com/dist/vkcom-kit.a7d2347300fcdde7314f.js? https://st6-22.vk.com/css/al/ui_common.0a29c544720bdcf89154.css https://st6-22.vk.com/dist/web/polyfills/other_functions.4de689b5f53cdbdebf7d.js?8c0d070969c2bdddf902 https://st6-22.vk.com/dist/state-management.a54b236ef99f71c730de.js?503a0b3068ebfc42423d https://st6-22.vk.com/dist/web/unauthorized.b7057b2c97d6727decd8.js?e26656d2ddb168519bdb1f04edf58369 https://st6-22.vk.com/dist/web/polyfills/string_functions.d2f7aff1dc899fb950c4.js?06c31459c645dd6049c4d07642d01d54 https://st6-22.vk.com/dist/common.ca1f22646967566b8a79.js?313ec3f775a31892f568f1d https://vk.com/js/lib/px.js?ch=2 https://vk.com/js/lib/px.js?ch=1 https://st6-22.vk.com/dist/web/polyfills/resize_observer.233e96db629d43de3623.js?685418a51d9509d705d3 https://st6-22.vk.com/css/al/base.1c25eeb7ac42cd36d08a.css https://st6-22.vk.com/dist/web/polyfills/intersection_observer.0062cad0ff26ba906a55.js?3651dae73da1d676cd37 https://st6-22.vk.com/dist/web/page_layout.5672d3fc73a320a2be06.js?f032491390251591131dd5c0659e5ead https://st6-22.vk.com/css/al/common.a393edc4164b1b81495c.css https://st6-22.vk.com/dist/vkcom-kit.1681489e5ef06505d479.css https://st6-22.vk.com/dist/web/common_web.3a98749ca45868f84306.css https://st6-22.vk.com/css/al/fonts_utf.2546d253c69649b0561c.css https://st6-22.vk.com/dist/web/performance_observers.2498c067f2dd4f142b98.js?39ba189ff3c74982dba3105279a1e431 https://st6-22.vk.com/dist/web/polyfills/element_functions.7f6f4401ad09c642705f.js?f88d496bc9aa020bbceb949a351fa85a https://st6-22.vk.com/dist/audioplayer.a025fbbc26f0baaf6890.js?31337e095824bcf8034a4f5 https://vk.com/badbrowser_stat.php?act=track&event=showAlert_atom https://st6-22.vk.com/dist/web/polyfills/promise_functions.66c5719129d3a45c5b29.js?c08a609e174e79347eaf8c692cf63cf3 https://st6-22.vk.com/dist/web/docs.6d9ff04ed31e8fa804a8.js?cca036aa8769d40ddfa14e3fbd15949c https://st6-22.vk.com/images/upload.gif https://st6-22.vk.com/dist/polyfills.1881adbf36454e07c9c6.js?a69ef34dc1979f8d5126 https://st6-22.vk.com/dist/web/css_types.9345eb394b7d4d7e68a9.js?f6dbdbc1de537596e14e https://st6-22.vk.com/dist/web/polyfills/object_functions.06c76fa223949a027bf2.js?e8b681406f943258346d7925b82e6243 https://st6-22.vk.com/images/backlink.gif?4 https://st6-22.vk.com/dist/web/common_web.c98533736ab3d5f6f60d.js? https://st6-22.vk.com/dist/palette.28ed80ebcd89c370bca4.js?ceacf32c0417ea87ee9e https://st6-22.vk.com/css/al/vkui.9a6b5aa7dbb00c120b74.css https://st6-22.vk.com/dist/web/jobs_devtools_notification.eafd4d4aa0ae5bbfd7e6.js?a73adfb8fd6e0413085d78a67df5c20f https://st6-22.vk.com/dist/vkui.e4d670f36de4368e7b1a.js?53396daa49f4462b4a11 https://vk.com/js/loader_nav20746467872_17.js https://vk.com/badbrowser_stat.php?act=nomodule https://st6-22.vk.com/dist/web/grip.16ff158c2e1e11fd3b80.js?28c136bb922051f2f6b95a6a08ccc41f https://st6-22.vk.com/dist/web/polyfills/cookie_manager.8cfe6896e33857a19781.js?0afee3c7b5f648f55648a21de4cfaae9 https://vk.com/images/icons/favicons/fav_logo.ico?6 https://st6-22.vk.com/dist/web/likes.5170c24445a69da4da21.js?ec4d1f4027dfa57b38816d57a184cf8d
|
6
st6-22.vk.com(95.142.206.2) vk.com(93.186.225.194) login.vk.com(87.240.129.135) 93.186.225.194 87.240.129.181 95.142.206.2
|
3
ET INFO URL Shortening Service Domain in DNS Lookup (vk .com) ET INFO Observed URL Shortening Service Domain (vk .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15137 |
2023-03-05 06:01
|
http://182.56.164.253:47818/bi... PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15138 |
2023-03-05 05:58
|
http://61.3.107.49:49400/bin.s... PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15139 |
2023-03-05 05:57
|
http://117.252.175.175:60430/b... AntiDebug AntiVM PNG Format JPEG Format MSOffice File Code Injection ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Windows Exploit DNS crashed |
|
1
|
|
|
5.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15140 |
2023-03-05 05:56
|
http://117.216.30.103:38210/i AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Windows Exploit DNS crashed |
|
1
|
|
|
4.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15141 |
2023-03-05 05:55
|
http://183.4.2.79:43008/bin.sh PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
6.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15142 |
2023-03-05 05:54
|
http://182.112.101.197:58946/i AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Windows Exploit DNS crashed |
|
1
182.112.101.197 - malware
|
|
|
5.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15143 |
2023-03-05 05:54
|
http://136.175.70.129:45330/mo... 59ce0baba11893f90527fc951ac69912 PWS[m] Mozi Botnet IoT Downloader UPX Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM MSOffice File ELF Code Injection exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET POLICY Executable and linking format (ELF) file download
|
|
4.4 |
M |
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15144 |
2023-03-05 05:53
|
http://119.179.250.217:40315/i PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
119.179.250.217 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
6.2 |
M |
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15145 |
2023-03-05 05:52
|
http://221.214.163.162:42177/i AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
1
221.214.163.162 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
5.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15146 |
2023-03-05 05:51
|
http://wp.banjaro.de/Requestpo... PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
1
http://wp.banjaro.de/Requestpollcpu.php
|
2
wp.banjaro.de(85.13.154.196) 85.13.154.196
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15147 |
2023-03-05 05:51
|
http://23.155.129.116:42552/mo... a73ddd6ec22462db955439f665cad4e6 AntiDebug AntiVM Code Injection unpack itself Windows utilities Windows DNS |
|
1
|
1
ET POLICY Executable and linking format (ELF) file download
|
|
3.4 |
M |
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15148 |
2023-03-05 05:51
|
https://vk.com/doc488335869_65... 718e2ff226bc5880a0de2bd29e1e01d3 AntiDebug AntiVM MSOffice File Code Injection Creates executable files ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
48
https://st6-22.vk.com/dist/web/ui_common.84e2442a05004320e11f.js?6245ba39b63448019203f2729b74d21f https://vk.com/dist/web/language.13cbd4193255cbaaab3a.js?c9e9113960ae98d68204079f43f790dd https://st6-22.vk.com/dist/web/polyfills/canvas_to_blob.e77dcc6129127456cc4f.js?6a4a06039f2295cdc4f936f4051ae4d3 https://st6-22.vk.com/dist/web/polyfills/array_functions.5ed53e616feed60bc4e8.js?53b5630d9d361c93a7d8a918fd06d21d https://vk.com/js/lib/px.js?ch=2 https://st6-22.vk.com/css/al/uncommon.431a60ba5d2797d2fdb1.css https://st6-22.vk.com/css/al/fonts_cnt.a289ed70815ffbd082ae.css https://st6-22.vk.com/dist/vkcom-kit.a7d2347300fcdde7314f.js? https://st6-22.vk.com/css/al/ui_common.0a29c544720bdcf89154.css https://st6-22.vk.com/dist/web/polyfills/other_functions.4de689b5f53cdbdebf7d.js?8c0d070969c2bdddf902 https://st6-22.vk.com/dist/state-management.a54b236ef99f71c730de.js?503a0b3068ebfc42423d https://st6-22.vk.com/dist/web/unauthorized.b7057b2c97d6727decd8.js?e26656d2ddb168519bdb1f04edf58369 https://st6-22.vk.com/dist/web/polyfills/string_functions.d2f7aff1dc899fb950c4.js?06c31459c645dd6049c4d07642d01d54 https://st6-22.vk.com/dist/common.ca1f22646967566b8a79.js?313ec3f775a31892f568f1d https://st6-22.vk.com/dist/react.6d787991b51243317269.js?cb151ae0d77e1fe8ca23 https://vk.com/js/lib/px.js?ch=1 https://st6-22.vk.com/dist/web/polyfills/resize_observer.233e96db629d43de3623.js?685418a51d9509d705d3 https://st6-22.vk.com/css/al/base.1c25eeb7ac42cd36d08a.css https://st6-22.vk.com/dist/web/polyfills/intersection_observer.0062cad0ff26ba906a55.js?3651dae73da1d676cd37 https://st6-22.vk.com/dist/web/page_layout.5672d3fc73a320a2be06.js?f032491390251591131dd5c0659e5ead https://st6-22.vk.com/css/al/common.a393edc4164b1b81495c.css https://st6-22.vk.com/dist/vkcom-kit.1681489e5ef06505d479.css https://st6-22.vk.com/dist/web/common_web.3a98749ca45868f84306.css https://st6-22.vk.com/css/al/fonts_utf.2546d253c69649b0561c.css https://st6-22.vk.com/dist/web/performance_observers.2498c067f2dd4f142b98.js?39ba189ff3c74982dba3105279a1e431 https://st6-22.vk.com/dist/web/polyfills/element_functions.7f6f4401ad09c642705f.js?f88d496bc9aa020bbceb949a351fa85a https://st6-22.vk.com/dist/audioplayer.a025fbbc26f0baaf6890.js?31337e095824bcf8034a4f5 https://vk.com/badbrowser_stat.php?act=track&event=showAlert_atom https://vk.com/js/lang17_0.js?27966044 https://st6-22.vk.com/dist/web/polyfills/promise_functions.66c5719129d3a45c5b29.js?c08a609e174e79347eaf8c692cf63cf3 https://st6-22.vk.com/dist/web/docs.6d9ff04ed31e8fa804a8.js?cca036aa8769d40ddfa14e3fbd15949c https://st6-22.vk.com/images/upload.gif https://st6-22.vk.com/dist/polyfills.1881adbf36454e07c9c6.js?a69ef34dc1979f8d5126 https://st6-22.vk.com/dist/web/css_types.9345eb394b7d4d7e68a9.js?f6dbdbc1de537596e14e https://st6-22.vk.com/dist/web/polyfills/object_functions.06c76fa223949a027bf2.js?e8b681406f943258346d7925b82e6243 https://st6-22.vk.com/images/backlink.gif?4 https://st6-22.vk.com/dist/web/common_web.c98533736ab3d5f6f60d.js? https://st6-22.vk.com/dist/palette.28ed80ebcd89c370bca4.js?ceacf32c0417ea87ee9e https://st6-22.vk.com/css/al/vkui.9a6b5aa7dbb00c120b74.css https://st6-22.vk.com/dist/web/jobs_devtools_notification.eafd4d4aa0ae5bbfd7e6.js?a73adfb8fd6e0413085d78a67df5c20f https://st6-22.vk.com/dist/vkui.e4d670f36de4368e7b1a.js?53396daa49f4462b4a11 https://vk.com/js/loader_nav20746467872_17.js https://vk.com/badbrowser_stat.php?act=nomodule https://st6-22.vk.com/dist/web/grip.16ff158c2e1e11fd3b80.js?28c136bb922051f2f6b95a6a08ccc41f https://st6-22.vk.com/dist/web/polyfills/cookie_manager.8cfe6896e33857a19781.js?0afee3c7b5f648f55648a21de4cfaae9 https://vk.com/images/icons/favicons/fav_logo.ico?6 https://vk.com/doc488335869_654950454?hash=CozbdqZy3eOUefgKqonEwVjeeilqEcao6ZKYa7F6Du8&dl=GQ4DQMZTGU4DMOI:1676923454:eDT28ZmGn9Q7wS1WkCI5BdPDIeWN4q2BlrBVry3OfgX&api=1&no_preview=1 https://st6-22.vk.com/dist/web/likes.5170c24445a69da4da21.js?ec4d1f4027dfa57b38816d57a184cf8d
|
6
st6-22.vk.com(95.142.206.2) vk.com(87.240.137.164) login.vk.com(87.240.129.181) 87.240.132.72 87.240.129.181 95.142.206.2
|
3
ET INFO URL Shortening Service Domain in DNS Lookup (vk .com) ET INFO Observed URL Shortening Service Domain (vk .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.0 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15149 |
2023-03-05 05:51
|
http://61.53.92.188:41605/bin.... PWS[m] Downloader Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
1
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
5.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15150 |
2023-03-05 05:49
|
http://59.89.225.208:55543/i AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Windows Exploit DNS crashed |
|
1
|
|
|
4.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|