Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
3436 2024-06-07 09:37 Tlcf4ubbOhvrFYkon.exe  

9c4b350eb7315c2f6f4b2eb64bccd918


Formbook Malicious Library AntiDebug AntiVM PE64 PE File FormBook Malware download VirusTotal Malware Buffer PE suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process Windows DNS Cryptographic key crashed
6 8 2 10.8 M 43 ZeroCERT

3437 2024-06-07 09:36 lionsarekingofthejunglewhotrul...  

c5af2617421f885a9772a4b51b80cb2a


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic exploit crash unpack itself Tofsee Exploit DNS crashed
2 3 2 4.2 38 ZeroCERT

3438 2024-06-07 09:34 Update.exe  

4c6f04a706e2ca2a0b722336675318da


Malicious Library Downloader UPX PE File PE32 MZP Format OS Processor Check Malware download Amadey VirusTotal Malware AutoRuns Malicious Traffic unpack itself AppData folder Windows Remote Code Execution DNS
2 3 1 6.2 49 ZeroCERT

3439 2024-06-07 09:34 john.scr  

280899776fbfcf98c505bf8efe0bbb5e


Generic Malware Malicious Library .NET framework(MSIL) AntiDebug AntiVM PE File .NET EXE PE32 DLL Browser Info Stealer VirusTotal Malware Buffer PE Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder Browser DNS
18 20 12.0 M 23 ZeroCERT

3440 2024-06-07 09:34 envio.js  

0eea6ce45e121ed22b89a006b3a4c1c3


Generic Malware Antivirus Hide_URL AntiDebug AntiVM PowerShell VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger Creates shortcut unpack itself suspicious process WriteConsoleW Windows ComputerName Cryptographic key
1 6.6 M 21 ZeroCERT

3441 2024-06-07 09:33 john.doc  

da2543ed3a6567896c950bfeb597814b


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware exploit crash unpack itself suspicious TLD Tofsee Exploit DNS crashed
25 25 2 4.4 M 33 ZeroCERT

3442 2024-06-07 09:33 lenin.exe  

fb2f90584265d465b4046c9a4e7c9bfa


UPX PE File PE32 ZIP Format Browser Info Stealer Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency AutoRuns MachineGuid Check memory Checks debugger buffers extracted unpack itself Windows utilities Checks Bios Collect installed applications Detects VMWare suspicious process AntiVM_Disk sandbox evasion WriteConsoleW VMware anti-virtualization IP Check VM Disk Size Check installed browsers check Tofsee Ransomware Windows Browser RisePro Email ComputerName DNS Software crashed
1 5 9 16.0 M 38 ZeroCERT

3443 2024-06-07 09:29 xxun.exe  

3311b8c3707f75831aa443db406c71e0


AntiDebug AntiVM PE File PE32 VirusTotal Malware AutoRuns Code Injection Check memory RWX flags setting unpack itself Windows utilities suspicious process AppData folder Windows DNS
1 6.8 M 62 ZeroCERT

3444 2024-06-06 14:51 com.wag.walker_2.74.1.apk  

54be4e2a316b871562c40088db968778


ZIP Format ftp Word 2007 file format(docx) OS Processor Check
guest

3445 2024-06-06 14:27 SetupTools.exe  

5ec12277c0679d4761d265dd821f674f


Generic Malware Malicious Library UPX Antivirus PE File PE32 .NET EXE OS Processor Check VirusTotal Malware Cryptocurrency wallets Cryptocurrency powershell Telegram AutoRuns suspicious privilege MachineGuid Check memory Checks debugger Creates shortcut Creates executable files unpack itself Windows utilities powershell.exe wrote Check virtual network interfaces suspicious process AppData folder AntiVM_Disk WriteConsoleW VM Disk Size Check Tofsee Ransomware Windows ComputerName DNS Cryptographic key
2 4 11.4 56 guest

3446 2024-06-05 23:26 ICARUS.Setup.exe  

225fcf1e03e30b492bd0aef35969329b


Emotet Gen1 NSIS Generic Malware Malicious Library UPX Malicious Packer Anti_VM Javascript_Blob PE File PE32 DLL PE64 OS Processor Check DllRegisterServer dll BMP Format Lnk Format GIF Format icon VirusTotal Malware AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files ICMP traffic unpack itself Windows utilities Auto service Check virtual network interfaces AppData folder AntiVM_Disk sandbox evasion VM Disk Size Check Tofsee Ransomware GameoverP2P Interception Zeus Windows ComputerName Trojan Banking
3 9 2 13.0 1 guest

3447 2024-06-05 09:27 Auto%20R.exe  

351650a422e427140d74d8c68185fa24


Formbook Gen1 Process Kill Generic Malware Suspicious_Script_Bin Malicious Library FindFirstVolume Cry FormBook Browser Info Stealer Malware download VirusTotal Malware Checks debugger buffers extracted Creates executable files unpack itself AppData folder Browser DNS
19 20 3 18 6.6 M 22 ZeroCERT

3448 2024-06-05 09:26 dion.hta  

24be5183dd56c3d08bae8625fba83aaa


Formbook Gen1 Generic Malware Suspicious_Script_Bin Process Kill Antivirus Malicious Library FindFirstVolume CryptGenKey UPX Malicious Packer PowerShell PE File DLL PE32 Device_File_Check OS Processor Check FormBook Browser Info Stealer Malware download Malware powershell suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted heapspray Creates shortcut Creates executable files RWX flags setting unpack itself powershell.exe wrote Check virtual network interfaces suspicious process AppData folder WriteConsoleW Windows Browser ComputerName DNS Cryptographic key crashed
4 4 5 2 13.4 M ZeroCERT

3449 2024-06-05 09:23 lionsarekingofthejunglewhichcr...  

96094535fe4ae7ea46eb3df5e0b45231


MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Tofsee Exploit DNS crashed
2 3 3 1 4.2 M 39 ZeroCERT

3450 2024-06-05 09:20 lionsarekingofthejunglewhorule...  

c5858e4c690557b5240597db6e4d88c9


MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Windows Exploit DNS crashed
1 2 5 4.2 M 38 ZeroCERT