1891 |
2025-02-19 11:42
|
blaq.exe 7176873d83d97247c18a9037ffa5964f Generic Malware Malicious Library UPX PE File PE32 DLL Browser Info Stealer buffers extracted Creates executable files unpack itself AppData folder Browser |
12
http://www.zkplant.xyz/t2z5/?wHwUOH=8VSe6D3+FdM96toYTkKYm4RfQN80B92Wswse+lRCZ5nd7JghEm3UVr0Q9u8PqQyGlh2BEZGJRS/hf5/2khKxbH6/CmdYSP+iYipsDo45rax8LzXX361i2DUedI4l6JslNrlk314=&li8B=Uh_aOYB7iOocT0e http://www.sfrouter.express/f0c8/?wHwUOH=AHWHpIA83/7LQm5yWEptZovqcpfzyuCrVryDOXq41boPuGcZhCFYx0rfPVc+QU4vzPoFex3ntizgmAr9Oi8RON6E+Z9iOl73gIFM5BR9EAZ97ZYdmY/eiK7meSUUDtSRRtG1C5s=&li8B=Uh_aOYB7iOocT0e http://www.meacci.xyz/ieqn/ http://www.trosky.lol/o88r/?wHwUOH=ziUBiNnCPTx0D233h1ca1hydMmiXXNXHNMEY4JnQ/dp2McfnObELxA6oJBnFDOsWb/bM3s4W56oDTG7CCmWbz1/lpBHwSztieMVQct0KvuNR8Sztn05hRZ1RNhlgsM5Legpcclw=&li8B=Uh_aOYB7iOocT0e http://www.trosky.lol/o88r/ http://www.adventurerepair24.live/gc4d/?wHwUOH=LebFdeUSCMRA/h5sT7+2M2f/vQ1SufiCCUGQxkTYOySh8g+yOOCA1ht778Ujr70KVg4fy0FUcNIIjE4P2FpJife2AASvW/TiUzxRyQ9XEF5r5nlv8N9vw4E60m8WiXkOYycYg/o=&li8B=Uh_aOYB7iOocT0e http://www.adventurerepair24.live/gc4d/ http://www.zkplant.xyz/t2z5/ http://www.meacci.xyz/ieqn/?wHwUOH=TXRwMNvNe7nWWxt2VYpYoe82JcF/DsRex1DbWUgtb2d4F8KnEpYV4uyghREjRYGlO9HLzYmvfgx+GjFyjye3bAwXsHcICLs5dZyytw3BsbuHZoaHGoXRgZC8N0lOdICFON5OFP4=&li8B=Uh_aOYB7iOocT0e http://www.sfrouter.express/f0c8/ http://www.xiuqicloud.website/g63r/ http://www.sqlite.org/2017/sqlite-dll-win32-x86-3170000.zip
|
13
www.adventurerepair24.live() - www.sfrouter.express() - www.trosky.lol() - www.xiuqicloud.website() - www.meacci.xyz() - www.zkplant.xyz() - 45.33.6.223 - 199.59.243.228 - 76.223.54.146 - 13.248.169.48 - 106.54.8.254 - 172.67.143.33 - 172.67.204.50 -
|
|
|
5.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1892 |
2025-02-19 11:41
|
minddd.exe cae5f3774bbda4a4fa5f58e42395829a PE File PE64 MachineGuid Check memory Checks debugger unpack itself Check virtual network interfaces DNS |
|
1
|
|
|
3.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1893 |
2025-02-19 11:40
|
edd.exe 28be9bba86fa8a13cc6cf36724d28589 PE File PE64 Check memory Checks debugger unpack itself Check virtual network interfaces DNS |
|
1
|
|
|
2.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1894 |
2025-02-19 11:40
|
ed.ps1 7a20a5ebf46ab756a3781ce55fc8bb63 Hide_EXE Generic Malware UPX Malicious Library Malicious Packer Confuser .NET Antivirus AntiDebug AntiVM PE File DLL PE32 .NET EXE FormBook Browser Info Stealer Malware download Malware powershell Buffer PE Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself powershell.exe wrote AppData folder Browser |
7
http://www.childhealth.pro/b0vh/?Gy99=QUBVmFKdBNxds9OiApRhVsAj+ScDRPHeUPya3YpvxKMFpoL0UXIizO+2Knd5vz9rSJ99vd1oMGbpKodYFcGso7ng1PXq6kPJUf/keZz2BFmCSPb1BPLSFhWLkB5VTYfkmDPjYsE=&A97DD=dIkYLZ1GahSa http://www.vivamente.shop/p4iy/ http://www.childhealth.pro/b0vh/ http://www.partflix.net/t94t/ http://www.partflix.net/t94t/?Gy99=6wcCudhLkH0VejVFRrMKOuT81SneVTs21TOXThNHeftxWAPzww3VNZ/fA4UNu8KULkzvL+qpdGK+6ln1YlZUcKuT272xiEUSQXi3WiUcrBFdZosaj7GWSIfDKBhRZwCKqwkunqw=&A97DD=dIkYLZ1GahSa http://www.sqlite.org/2017/sqlite-dll-win32-x86-3200000.zip http://www.vivamente.shop/p4iy/?Gy99=SRywWHlJneqGbgnZMnkP75yQY1jNoV+uUvrvQ9vwHOg3gIy7AYQSo7rFsMjmhZA0ylqE+AAlROwVtLWgpormrByiUeawEdhj2T0RPVxTjD2FTpAWFNeIi4haYWVZYJq3iwiPjnM=&A97DD=dIkYLZ1GahSa
|
7
www.partflix.net() - www.childhealth.pro() - www.vivamente.shop() - 45.33.6.223 - 84.32.84.32 - 66.33.60.194 - 162.213.251.166 -
|
1
ET MALWARE FormBook CnC Checkin (GET) M5
|
|
11.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1895 |
2025-02-19 11:38
|
Devil.exe eb6beba0181a014ac8c0ec040cb1121a Generic Malware Malicious Packer PE File PE32 Browser Info Stealer FTP Client Info Stealer Email Client Info Stealer suspicious privilege MachineGuid Check memory AntiVM_Disk VM Disk Size Check installed browsers check Browser Email ComputerName Software |
|
1
|
|
|
5.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1896 |
2025-02-19 11:38
|
MAGNIFICENT_MAILBOX.exe a1d8035b93923215c7d7cbc17e735deb Malicious Packer UPX PE File PE64 Checks debugger DNS |
|
1
|
|
|
3.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1897 |
2025-02-19 11:36
|
main_mpsl e9bcd0799cdb5a780356507ecb0461ff AntiDebug AntiVM ELF Email Client Info Stealer Code Injection Check memory Checks debugger unpack itself installed browsers check Browser Email |
|
|
|
|
3.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1898 |
2025-02-19 11:35
|
ikpo.ps1 d8ed066f1231767464642fe846f37d99 Hide_EXE Generic Malware UPX Antivirus Malicious Library Malicious Packer Confuser .NET AntiDebug AntiVM PE File DLL PE32 .NET EXE Browser Info Stealer Phishing powershell Buffer PE Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself powershell.exe wrote AppData folder Browser DNS |
15
http://www.birbacher.online/os5r/?y_h6A2=231uHx8vc2OXjfRp9MqGfmAfw0ORoc0FHs1yPQI+Y8FHV11jaHQ2ftygF7Z20+LhG+hwvpvPffWcTqqpG/gNLui17mhEo7YUi96xAksmd+3++erClo3DLaj5tFD9ebrkUZzk9Dk=&60In=7wl5r0kQG9G http://www.blissfuljo.life/p8fe/ http://www.blissfuljo.life/p8fe/?y_h6A2=nweR1c0XBtkzZggi0v3dr9kB4xCEwoCGMBQNH/aYwX8LuhjLbL5HUgqXwTet0aQ44oxYgp72GiDpetq5GT3VFYsxr5RBWjhs308QLFo3+dsZTQkp8hunF2AzxzIui5HbDfaQI0w=&60In=7wl5r0kQG9G http://www.zkderby.xyz/bqyq/ http://www.rds845.shop/h0nr/ http://www.82765.ltd/59d5/ http://www.rds845.shop/h0nr/?y_h6A2=5SMA7S/38P4RaRgCp3VO1tw2rROs9wah4HH5Q6yYr3Nu4ZqcK75SUzG8TXPdlVkL75Uc/7uyt+ZBxF8Sx8kUuaqQBEx7a3bwhtWi8pbBN6KWtUApBidRHQ/G3KkasTH6o4wmaSg=&60In=7wl5r0kQG9G http://www.zkderby.xyz/bqyq/?y_h6A2=Z6W2Due/iFNSY6roA058AuqdLgygAHlj29B3DLhDfw5gzakQrGCVCfu5pLO3yHC2Q5prfxENXL60nad/MKUoC8UQrxa2M0+WRd3DYf4bgsYWClNewfklrWL3J7GXJ+tZq73l4I4=&60In=7wl5r0kQG9G http://www.birbacher.online/os5r/ http://www.82765.ltd/59d5/?y_h6A2=qiWz9HwqJLKnYi7JlC6qkRM9oNVOe4dAvB5Yj2dX6M9d0oXA3FTQuLckJRO7ZlKIhJbHCMmlfOuDN9YpFc7H3lclNb/Uy7Zdu1Mg4MyeDmJL6C9SantxWX3ypDcfwQ2eRaZ57U8=&60In=7wl5r0kQG9G http://www.031234103.xyz/6gd2/ http://www.031234103.xyz/6gd2/?y_h6A2=eDwP/8dm6CwnhXuB5IJF6tcmrP8qMyRusivP8vJ/CAl0CGhAGK7mzvA4v30eghRxdOMQU1afgYEQdjgAooUx1K4I/phOYtNowfmzMvro50gabBLkO4mInrSdt2aBNeYGRLrQQ4U=&60In=7wl5r0kQG9G http://www.bjogo.top/0ekp/?y_h6A2=pV4l2sJ5SKTfO2UKe3vpYQms7oDV9Z1ZTd//bSk12oBNtulDh+GDNLKspI2ybbM6Ulb9MujLBOrC2bz5gPibbXkxWVg5NcqV4sd6rfkPD23v8QrCPt85paxIo96ZJG6eSxv1+xA=&60In=7wl5r0kQG9G http://www.bjogo.top/0ekp/ http://www.sqlite.org/2021/sqlite-dll-win32-x86-3360000.zip
|
15
www.82765.ltd() - www.bjogo.top() - www.031234103.xyz() - www.blissfuljo.life() - www.zkderby.xyz() - www.rds845.shop() - www.birbacher.online() - 156.224.194.237 - 144.76.229.203 - 217.160.0.24 - 43.251.56.161 - 148.72.247.70 - 162.0.225.218 - 13.248.169.48 - 45.33.6.223 -
|
5
ET INFO HTTP Request to Suspicious *.life Domain ET DNS Query to a *.top domain - Likely Hostile ET INFO Observed DNS Query to .life TLD ET INFO HTTP Request to a *.top domain ET HUNTING HTTP POST to XYZ TLD Containing Pass - Possible Phishing
|
|
11.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1899 |
2025-02-19 11:33
|
mtyihjksfda.exe eb12e94f260c4e66eb2dbc74bc44bb84 PE File PE32 unpack itself ComputerName crashed |
|
|
|
|
1.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1900 |
2025-02-19 11:33
|
1358.exe a060b37c0ef63cafec92efde7fc6eeb9 Generic Malware Malicious Library .NET framework(MSIL) UPX ScreenShot Escalate priviledges Code injection AntiDebug AntiVM PE File PE32 OS Processor Check .NET EXE PDB suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates executable files ICMP traffic unpack itself Windows utilities suspicious process WriteConsoleW Windows RCE DNS |
|
1
|
|
|
8.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1901 |
2025-02-19 11:31
|
coddee.exe 3226cbb0e99af57d6574e04c76364877 PE File PE64 Check memory Checks debugger unpack itself Check virtual network interfaces DNS |
|
1
|
|
|
2.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1902 |
2025-02-19 11:31
|
ik.exe 40a3b67a99299a4f0f3a352b4f7739c9 Generic Malware Malicious Library UPX PE File PE32 DLL Browser Info Stealer Phishing buffers extracted Creates executable files unpack itself AppData folder suspicious TLD Browser DNS |
15
http://www.blissfuljo.life/p8fe/ http://www.bjogo.top/0ekp/?Rmyfu=pV4l2sJ5SKTfO2UKe3vpYQms7oDV9Z1ZTd//bSk12oBNtulDh+GDNLKspI2ybbM6Ulb9MujLBOrC2bz5gPibbXkxWVg5NcqV4sd6rfkPD23v8QrCPt85paxIo96ZJG6eSxv1+xA=&3K=dJI58bJxQ http://www.zkderby.xyz/bqyq/ http://www.rds845.shop/h0nr/ http://www.82765.ltd/59d5/ http://www.birbacher.online/os5r/?Rmyfu=231uHx8vc2OXjfRp9MqGfmAfw0ORoc0FHs1yPQI+Y8FHV11jaHQ2ftygF7Z20+LhG+hwvpvPffWcTqqpG/gNLui17mhEo7YUi96xAksmd+3++erClo3DLaj5tFD9ebrkUZzk9Dk=&3K=dJI58bJxQ http://www.031234103.xyz/6gd2/ http://www.birbacher.online/os5r/ http://www.sqlite.org/2019/sqlite-dll-win32-x86-3280000.zip http://www.82765.ltd/59d5/?Rmyfu=qiWz9HwqJLKnYi7JlC6qkRM9oNVOe4dAvB5Yj2dX6M9d0oXA3FTQuLckJRO7ZlKIhJbHCMmlfOuDN9YpFc7H3lclNb/Uy7Zdu1Mg4MyeDmJL6C9SantxWX3ypDcfwQ2eRaZ57U8=&3K=dJI58bJxQ http://www.blissfuljo.life/p8fe/?Rmyfu=nweR1c0XBtkzZggi0v3dr9kB4xCEwoCGMBQNH/aYwX8LuhjLbL5HUgqXwTet0aQ44oxYgp72GiDpetq5GT3VFYsxr5RBWjhs308QLFo3+dsZTQkp8hunF2AzxzIui5HbDfaQI0w=&3K=dJI58bJxQ http://www.rds845.shop/h0nr/?Rmyfu=5SMA7S/38P4RaRgCp3VO1tw2rROs9wah4HH5Q6yYr3Nu4ZqcK75SUzG8TXPdlVkL75Uc/7uyt+ZBxF8Sx8kUuaqQBEx7a3bwhtWi8pbBN6KWtUApBidRHQ/G3KkasTH6o4wmaSg=&3K=dJI58bJxQ http://www.bjogo.top/0ekp/ http://www.031234103.xyz/6gd2/?Rmyfu=eDwP/8dm6CwnhXuB5IJF6tcmrP8qMyRusivP8vJ/CAl0CGhAGK7mzvA4v30eghRxdOMQU1afgYEQdjgAooUx1K4I/phOYtNowfmzMvro50gabBLkO4mInrSdt2aBNeYGRLrQQ4U=&3K=dJI58bJxQ http://www.zkderby.xyz/bqyq/?Rmyfu=Z6W2Due/iFNSY6roA058AuqdLgygAHlj29B3DLhDfw5gzakQrGCVCfu5pLO3yHC2Q5prfxENXL60nad/MKUoC8UQrxa2M0+WRd3DYf4bgsYWClNewfklrWL3J7GXJ+tZq73l4I4=&3K=dJI58bJxQ
|
15
www.82765.ltd() - www.bjogo.top() - www.031234103.xyz() - www.blissfuljo.life() - www.zkderby.xyz() - www.rds845.shop() - www.birbacher.online() - 156.224.194.237 - 144.76.229.203 - 76.223.54.146 - 148.72.247.70 - 103.42.144.142 - 162.0.225.218 - 217.160.0.24 - 45.33.6.223 -
|
5
ET INFO HTTP Request to Suspicious *.life Domain ET DNS Query to a *.top domain - Likely Hostile ET INFO HTTP Request to a *.top domain ET HUNTING HTTP POST to XYZ TLD Containing Pass - Possible Phishing ET INFO Observed DNS Query to .life TLD
|
|
4.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1903 |
2025-02-19 11:29
|
beacon_x64.exe 77bc5d5c49245b9f88fe6bded397108f Malicious Library PE File PE64 RWX flags setting unpack itself ComputerName DNS |
|
1
|
|
|
4.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1904 |
2025-02-19 11:29
|
laserrrrrrrr.ps1 c1a6a13984d7ff91ce8cacc203ad8f99 Formbook Hide_EXE Generic Malware UPX Malicious Library Malicious Packer Confuser .NET Antivirus AntiDebug AntiVM PE File DLL PE32 .NET EXE Browser Info Stealer powershell Buffer PE Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself powershell.exe wrote AppData folder suspicious TLD Browser DNS |
28
http://www.sqlite.org/2022/sqlite-dll-win32-x86-3370000.zip http://www.autonomousrich.xyz/qejj/?U_SFASt=PpgyVvjpBOBybA0SVZi2yvrKre7t887Q7x0KObR0TUF97L5S0+m/kHRYUzTxXAh7Q0WsryaKFlqGhgO6Q/rlmTpzTWQR9SMMEvug4s0M8fRyHCcYi6UU4gQRLfrko3xiwb3FHcs=&67l0=In7T_NX http://www.l63339.xyz/vhr7/?U_SFASt=iaSfD1StI7hDT4qLO8uUiRMZCfzOjk7n7gYmLjmbAGxKTACTDmsojAseBTws2ae3nsJ7oX723eTW3ctEzpxpoAGWw5lYsZyjnFbtqE7RDBWvF3wnDTau3wgNIBcGnVL27k7EtEM=&67l0=In7T_NX - rule_id: 43949 http://www.l63339.xyz/vhr7/?U_SFASt=iaSfD1StI7hDT4qLO8uUiRMZCfzOjk7n7gYmLjmbAGxKTACTDmsojAseBTws2ae3nsJ7oX723eTW3ctEzpxpoAGWw5lYsZyjnFbtqE7RDBWvF3wnDTau3wgNIBcGnVL27k7EtEM=&67l0=In7T_NX http://www.tumbetgirislinki.fit/k566/ - rule_id: 43950 http://www.tumbetgirislinki.fit/k566/ http://www.kjuw.party/e0jv/?U_SFASt=T5a+nPXa7vHYgORbmIzRnsYJn/5yKJpyja1Bw4L97U3J4ftOxLqNjjmK0MbXg0R7zOiA8ZTqxO8XWXqYcYfBl6po+rPbfzDYogoaVOnbbhZcGmBPmnt3DMj2ULUXFIgoaMg3MTM=&67l0=In7T_NX - rule_id: 43957 http://www.kjuw.party/e0jv/?U_SFASt=T5a+nPXa7vHYgORbmIzRnsYJn/5yKJpyja1Bw4L97U3J4ftOxLqNjjmK0MbXg0R7zOiA8ZTqxO8XWXqYcYfBl6po+rPbfzDYogoaVOnbbhZcGmBPmnt3DMj2ULUXFIgoaMg3MTM=&67l0=In7T_NX http://www.lucynoel6465.shop/jgkl/ - rule_id: 43951 http://www.lucynoel6465.shop/jgkl/ http://www.partflix.net/djyl/ http://www.lucynoel6465.shop/jgkl/?U_SFASt=hI+cEEoDMRK5HtHm9IZKcVLqeO4rH3Lo+nuR9x41ri89hVkyLZ4bcwu1mex5brSMZV4GWavlrf0/NsblmXI4eKNzhD3LBC/4pVsqqx1rwhcrHMghz/r2elc8myKvxM7B12e/f+g=&67l0=In7T_NX - rule_id: 43951 http://www.lucynoel6465.shop/jgkl/?U_SFASt=hI+cEEoDMRK5HtHm9IZKcVLqeO4rH3Lo+nuR9x41ri89hVkyLZ4bcwu1mex5brSMZV4GWavlrf0/NsblmXI4eKNzhD3LBC/4pVsqqx1rwhcrHMghz/r2elc8myKvxM7B12e/f+g=&67l0=In7T_NX http://www.sqlite.org/2019/sqlite-dll-win32-x86-3300000.zip http://www.autonomousrich.xyz/qejj/ http://www.seasay.xyz/c9ts/ http://www.l63339.xyz/vhr7/ - rule_id: 43949 http://www.l63339.xyz/vhr7/ http://www.topitch.top/goj6/ - rule_id: 43958 http://www.topitch.top/goj6/ http://www.partflix.net/djyl/?U_SFASt=x4UYXwVOLjDEdQDSN4yID8sjKcLRjYZuXBbMFKiZ0gPoO4cAuWUlUabLU4j6ldOhDBKNlpcPNJlKLH49k78i4i+oEuF5+HgjB9TsADfOjimoYc7CmuuhR+qQN28W67NMblj9mVM=&67l0=In7T_NX http://www.seasay.xyz/c9ts/?U_SFASt=b2h4705j/BXuiRKuPHFbUdEbqJe1MinMqHSZnAN25/qy/QtrNwJSy3eXSyjtHz4ya5noZxgPZS6U32Ne2lAqUHs60/bVHWYZj4bOBMkEbIDR1pSG2NViohqBC3T6QIxJ3DEBtzU=&67l0=In7T_NX http://www.tumbetgirislinki.fit/k566/?U_SFASt=RARW43WNMKajmHobr0h+FYOVnPeo69WXvXreCHJ6fEp5jkldk9mcfHn6UnU82+9OdsowyVV8wlYPh4e4mYqP64YSjghMuBr0WoXV5avhz1caW9rj8asJcaLGlYzIq2qtHDCYWJw=&67l0=In7T_NX - rule_id: 43950 http://www.tumbetgirislinki.fit/k566/?U_SFASt=RARW43WNMKajmHobr0h+FYOVnPeo69WXvXreCHJ6fEp5jkldk9mcfHn6UnU82+9OdsowyVV8wlYPh4e4mYqP64YSjghMuBr0WoXV5avhz1caW9rj8asJcaLGlYzIq2qtHDCYWJw=&67l0=In7T_NX http://www.kjuw.party/e0jv/ - rule_id: 43957 http://www.kjuw.party/e0jv/ http://www.topitch.top/goj6/?U_SFASt=90Ns8gSHVfuKmwMvqoBDvov0x0TuRSc4CHvhiyRIaCFX9JzO3hXkGdLkIxbX7QQ8WI53tEhNGahKOUZIphRSegDcYcrC0WhrrPS45v/w4f2SjHeENV+PjA2DCpp4ca+uy9lGHYA=&67l0=In7T_NX - rule_id: 43958 http://www.topitch.top/goj6/?U_SFASt=90Ns8gSHVfuKmwMvqoBDvov0x0TuRSc4CHvhiyRIaCFX9JzO3hXkGdLkIxbX7QQ8WI53tEhNGahKOUZIphRSegDcYcrC0WhrrPS45v/w4f2SjHeENV+PjA2DCpp4ca+uy9lGHYA=&67l0=In7T_NX
|
16
www.partflix.net() - www.topitch.top() - www.lucynoel6465.shop() - www.seasay.xyz() - www.l63339.xyz() - www.kjuw.party() - www.tumbetgirislinki.fit() - www.autonomousrich.xyz() - 45.33.6.223 - 13.248.169.48 - 76.76.21.61 - 134.122.135.48 - 162.218.30.235 - 162.0.231.203 - 104.21.16.1 - 103.106.67.112 -
|
4
ET INFO HTTP Request to Suspicious *.fit Domain ET INFO Observed DNS Query to .fit TLD ET INFO HTTP Request to a *.top domain ET DNS Query to a *.top domain - Likely Hostile
|
10
http://www.l63339.xyz/vhr7/ http://www.tumbetgirislinki.fit/k566/ http://www.kjuw.party/e0jv/ http://www.lucynoel6465.shop/jgkl/ http://www.lucynoel6465.shop/jgkl/ http://www.l63339.xyz/vhr7/ http://www.topitch.top/goj6/ http://www.tumbetgirislinki.fit/k566/ http://www.kjuw.party/e0jv/ http://www.topitch.top/goj6/
|
12.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1905 |
2025-02-19 11:27
|
ksdrgewt.exe c86d74db513409a3dc9ac700bd4a33b2 PE File PE32 unpack itself ComputerName crashed |
|
|
|
|
1.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|