30886 |
2022-05-20 17:39
|
REvup c3cf7d4fab7e7ea5a5adfabd4f77f0b4 Malicious Library DLL PE File PE64 VirusTotal Malware AutoRuns Checks debugger unpack itself Auto service suspicious process AntiVM_Disk sandbox evasion VM Disk Size Check Windows ComputerName crashed |
|
|
|
|
5.2 |
|
7 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30887 |
2022-05-20 17:37
|
cc.exe 25d86a1736a06b7f5ec097b0f633276c PWS[m] Generic Malware UPX Malicious Library Admin Tool (Sysinternals etc ...) Antivirus Create Service DGA Socket ScreenShot DNS Internet API Code injection Sniff Audio HTTP Steal credential KeyLogger P2P Downloader Escalate priviledges FTP Http API Anti Emotet VirusTotal Malware powershell Buffer PE suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities suspicious process WriteConsoleW Tofsee Windows Discord ComputerName RCE DNS Cryptographic key crashed |
1
https://cdn.discordapp.com/attachments/964171298836201475/964172624857014292/Fgeucneenbplvlfnstfehoecovzrdgj
|
2
cdn.discordapp.com(162.159.130.233) - malware 162.159.130.233 - malware
|
3
ET INFO Observed Discord Domain (discordapp .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Discord Domain in DNS Lookup (discordapp .com)
|
|
13.2 |
|
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30888 |
2022-05-20 17:37
|
winlog.exe 7212de5b3965d87dc138a6741329d6f4 UPX Malicious Library PE32 OS Processor Check PE File VirusTotal Malware PDB unpack itself |
|
|
|
|
2.2 |
|
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30889 |
2022-05-20 17:35
|
Ffzhofyh.exe b5680d05c29db4aaac268573cd17a09b PWS[m] RAT SMTP KeyLogger AntiDebug AntiVM PE32 .NET EXE PE File VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger unpack itself WriteConsoleW Windows ComputerName DNS crashed |
1
http://195.133.18.171/Ffzhofyh_Iqnkawoa.png
|
1
|
|
|
6.0 |
|
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30890 |
2022-05-20 17:34
|
PAGO111.exe a976de15c5149e328122fba6ca13a0b7 Formbook RAT PWS .NET framework AntiDebug AntiVM PE32 .NET EXE PE File FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted ICMP traffic unpack itself |
7
http://www.936699.com/cshi/?x48hFDZp=3DIaoCeg6YT8U97L8oAeQfYWUz18VtEIcPrxCYjzzMzfdM1oYDAPe69e2pg1YFa08AAoZY3N&CR=Cr-8QJE http://www.fa88play.vin/cshi/?x48hFDZp=lQaKgKWSyDpq88zOCo78hT6GeVAw9ljx0eapgKG38ITut3Szr6vGeAAQp2SpxjISA8RxI3xg&CR=Cr-8QJE http://www.katoenlombok.com/cshi/?x48hFDZp=d1RJKdX/n4WPF+gaj5wl2UCnzczpg8YczlMyZdEMCzExmtPC7J9MlwFS9xPaDp8oAIwdr/uX&CR=Cr-8QJE http://www.natureshopy.com/cshi/?x48hFDZp=sWUOFzCIq5SBasuk4aR/YkEJNryH9KaStLMe1mitJK0+zfmzzLke3nsrzWekoFtMB/Xqltld&CR=Cr-8QJE http://www.mazakoba.com/cshi/?x48hFDZp=cDdEA/qLa2dhuLMAjy+Hol7M+Nf9rDepx1Cg79NFiLj5JoV3rfmQYm1mrBinP6hBC9O8/6wa&CR=Cr-8QJE http://www.sulstore.site/cshi/?x48hFDZp=JIZsEJjePCAMhM8ivwO8s3qLETFUliUhOQxal3M1f84+b2i9pVDcsxugm+X6cP8073PhO6mc&CR=Cr-8QJE http://www.continue-notice.com/cshi/?x48hFDZp=5a6D6NXd/9qeL4hynmMFZU7GVq4qrv8D5mc6xRChA8gCyV2qJQZHlNxCRjQ2YBhVZUBYspIB&CR=Cr-8QJE
|
19
www.mazakoba.com(34.117.168.233) www.continue-notice.com(18.118.148.24) www.bittel.group() www.2tx2v4y2jdqfv.xyz() www.katoenlombok.com(156.67.215.156) www.936699.com(104.143.9.111) www.janitorialcleaningsolutions.com() www.uniquepropertyfunding.com() www.fa88play.vin(172.67.176.233) www.natureshopy.com(208.91.197.91) www.sulstore.site(83.220.172.127) www.dorriswalkertaylor.com() 34.117.168.233 - mailcious 104.21.67.134 83.220.172.127 156.67.215.156 104.143.9.111 18.118.148.24 208.91.197.91 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.0 |
|
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30891 |
2022-05-20 17:34
|
vbc.exe 2033987c1b1a62b5c6e4fe2ffe1960b6 Malicious Library PE32 PE File VirusTotal Malware PDB unpack itself RCE |
|
|
|
|
2.2 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30892 |
2022-05-20 17:33
|
vbc.exe 9b05d8c3314d90122415fc46999d24b9 UPX Malicious Library PE32 PE File Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Creates executable files unpack itself installed browsers check Browser Email ComputerName DNS Software |
1
http://sempersim.su/gg8/fre.php
|
2
sempersim.su(45.10.245.123) - mailcious 45.10.245.123 - mailcious
|
7
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET DNS Query for .su TLD (Soviet Union) Often Malware Related ET MALWARE LokiBot Checkin ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Fake 404 Response
|
|
9.0 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30893 |
2022-05-20 16:15
|
https://malware.me/analysis/up... c406dcffb15cdd25df600f649b97cec4 PWS[m] Anti_VM Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Downloader Escalate priviledges persistence FTP Http API AntiDebug AntiVM BitCoin icon MSOffice File PNG For Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
50
https://malware.me/static/js/cuckoo/analysis_network.js https://malware.me/static/fonts/Roboto_normal_300_default.woff https://malware.me/static/plugins/pace-progress/pace.min.js https://malware.me/static/js/cuckoo/analysis_feedback.js https://malware.me/static/lightslider/lightgallery-all.min.js https://malware.me/static/js/cuckoo/rdp.js https://malware.me/static/js/handlebars-templates.js https://malware.me/static/fonts/fa-solid-900.eot? https://malware.me/static/plugins/bootstrap/js/bootstrap.bundle.min.js https://malware.me/static/fonts/Roboto_normal_400_default.woff https://malware.me/static/js/cuckoo/loader.js https://malware.me/favicon.ico https://malware.me/static/js/cuckoo/analysis_sidebar.js https://malware.me/static/plugins/fontawesome-free/webfonts/fa-regular-400.eot? https://malware.me/static/css/main.css https://malware.me/static/fonts/Roboto_italic_400_default.woff https://malware.me/static/plugins/pace-progress/themes/black/pace-theme-flat-top.css https://malware.me/static/js/hexdump.js https://malware.me/static/lightslider/lightslider.js https://fonts.gstatic.com/s/sourcesanspro/v21/6xKydSBYKcSV-LCoeQqfX1RYOo3ik4zwlxdo.woff https://malware.me/static/custom/js/datepicker-ko.js https://malware.me/static/dist/js/adminlte.js https://malware.me/static/plugins/toastr/toastr.min.css https://malware.me/static/js/cuckoo/submission.js https://fonts.googleapis.com/css?family=Source+Sans+Pro:300,400,400i,700 https://malware.me/static/plugins/fontawesome-free/webfonts/fa-solid-900.eot? https://malware.me/static/dist/css/adminlte.min.css https://malware.me/analysis/upload/ https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css https://malware.me/static/js/cuckoo/process_tree.js https://malware.me/static/fonts/fa-regular-400.eot? https://fonts.gstatic.com/s/sourcesanspro/v21/6xK1dSBYKcSV-LCoeQqfX1RYOo3qPZ7nsDQ.woff https://fonts.gstatic.com/s/sourcesanspro/v21/6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdo.woff https://malware.me/static/js/vendor.js https://malware.me/static/fonts/fa-light-300.eot? https://malware.me/static/js/cuckoo/app.js https://malware.me/static/fonts/Roboto_normal_700_default.woff https://malware.me/static/fonts/Roboto_normal_500_default.woff https://malware.me/static/custom/css/screen_variablilty.css https://malware.me/static/js/cuckoo/sticky.js https://malware.me/static/plugins/fontawesome-free/webfonts/fa-brands-400.eot? https://malware.me/static/custom/js/jquery-ui.min.js https://malware.me/static/custom/js/jquery-1.11.0.min.js https://malware.me/static/plugins/fontawesome-free/css/all.min.css https://malware.me/img/profile/logo.png https://malware.me/static/fonts/fa-brands-400.eot? https://fonts.gstatic.com/s/sourcesanspro/v21/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7j.woff https://malware.me/static/js/cuckoo/recent.js https://malware.me/static/fonts/fontawesome-webfont.eot? https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/fonts/fontawesome-webfont.eot?
|
10
fonts.gstatic.com(142.251.42.131) maxcdn.bootstrapcdn.com(104.18.10.207) fonts.googleapis.com(172.217.31.170) malware.me(175.208.134.152) code.ionicframework.com(172.67.69.29) 104.18.11.207 175.208.134.152 172.217.26.227 142.250.199.106 104.26.6.173
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.6 |
|
|
조광섭
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30894 |
2022-05-20 14:23
|
rtst1055.exe b571c79a04b9b7373a9ce17d810a6c47 Malicious Library VMProtect PE File PE64 VirusTotal Malware crashed |
|
|
|
|
2.2 |
|
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30895 |
2022-05-20 14:21
|
winlog.exe 4e63a988f667ac4be9799aed55f5a585 Loki PWS[m] PWS Loki[b] Loki.m North Korea .NET framework Socket DNS AntiDebug AntiVM PE32 .NET EXE PE File Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs AntiVM_Disk VM Disk Size Check installed browsers check Windows Browser Email ComputerName DNS Cryptographic key Software |
1
http://sempersim.su/gf18/fre.php - rule_id: 17809
|
2
sempersim.su(45.10.245.123) - mailcious 45.10.245.123 - mailcious
|
9
ET DNS Query for .su TLD (Soviet Union) Often Malware Related ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Fake 404 Response
|
1
http://sempersim.su/gf18/fre.php
|
14.4 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30896 |
2022-05-20 14:21
|
updated.exe a1128f30ff8209aa2a2d414e6da4076f RAT UPX Malicious Library AntiDebug AntiVM PE32 OS Processor Check PE File VirusTotal Malware Buffer PE Code Injection Check memory Checks debugger buffers extracted unpack itself |
|
|
|
|
7.4 |
|
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30897 |
2022-05-20 14:20
|
vbc.exe 4e59abfcc6537ad26941fa659093991f Loki UPX Malicious Library PE32 PE File Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Creates executable files unpack itself installed browsers check Browser Email ComputerName DNS Software |
1
http://vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php - rule_id: 13544
|
2
vmopahtqdf84hfvsqepalcbcch63gdyvah.ml(172.67.193.224) - mailcious 172.67.193.224
|
8
ET INFO DNS Query for Suspicious .ml Domain ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET INFO HTTP POST Request to Suspicious *.ml Domain ET INFO HTTP Request to a *.ml domain ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Fake 404 Response
|
1
http://vmopahtqdf84hfvsqepalcbcch63gdyvah.ml/BN2/fre.php
|
9.2 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30898 |
2022-05-20 14:19
|
siww1049.exe d8798724e0b6b77ca5bc0a0a8155aac1 Malicious Library VMProtect PE File PE64 VirusTotal Malware crashed |
|
|
|
|
2.2 |
|
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30899 |
2022-05-20 14:19
|
KMSpico.exe a02164371a50c5ff9fa2870ef6e8cfa3 RAT Gen1 PWS .NET framework Emotet Generic Malware Hide_EXE NSIS UPX Malicious Library Admin Tool (Sysinternals etc ...) PE32 PE File PNG Format OS Processor Check GIF Format .NET EXE PE64 DLL .NET DLL VirusTotal Malware AutoRuns MachineGuid Check memory Checks debugger Creates shortcut Creates executable files ICMP traffic unpack itself Windows utilities Auto service Check virtual network interfaces suspicious process AppData folder AntiVM_Disk WriteConsoleW anti-virtualization VM Disk Size Check Windows Browser ComputerName Firmware Cryptographic key crashed |
|
4
3.pool.ntp.org(13.209.84.50) www.google.com(172.217.175.100) 142.250.207.4 121.174.142.81
|
|
|
12.0 |
|
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
30900 |
2022-05-20 14:17
|
5f1.exe 1da551a8f7e1e72fb46c9cc630abb68e Gen2 Gen1 UPX Malicious Library PE32 OS Processor Check PE File VirusTotal Malware |
|
|
|
|
1.4 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|