39946 |
2021-10-29 09:54
|
FiCas AG Job Description.lnk 3c324706e3bae0b7187b134a813011cb Generic Malware Create Service DGA Socket Steal credential DNS Internet API Code injection Sniff Audio HTTP KeyLogger FTP Escalate priviledges Downloader ScreenShot Http API P2P AntiDebug AntiVM GIF Format VirusTotal Malware Code Injection Check memory Creates shortcut RWX flags setting Check virtual network interfaces suspicious process malicious URLs Tofsee Interception |
2
http://apps.identrust.com/roots/dstrootcax3.p7c https://note.onedocshare.com/seZlG2VYJ6l05Yn4tvYj93t9eK3OX72pIMiW95JlhDY=
|
4
note.onedocshare.com(149.28.162.113) apps.identrust.com(23.216.159.81) 149.28.162.113 - mailcious 23.65.188.19
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.0 |
|
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39947 |
2021-10-29 09:53
|
loader1.exe d2664cef24240dc8eb16f39c37228757 NSIS Generic Malware Malicious Library UPX PE File PE32 DLL FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Creates executable files unpack itself AppData folder suspicious TLD DNS |
26
http://www.egyptian-museum.com/ga6b/ http://www.acacave.com/ga6b/ http://www.afghantattoos.com/ga6b/ http://www.qqcx666888.top/ga6b/ http://www.szkoleniawcag.online/ga6b/ http://www.soulwinningministry.com/ga6b/ http://www.mystudentregistration.com/ga6b/ http://www.infinityrope.store/ga6b/?lDKXxv3=L/c9eZQCXLd/YVoAQOP3tZ3B8nNkn+pww7YQb0Xhol9/59b8TqV7CKFWTb/5H/3WmVOflfic&Kzux=PnjtLHyHSr http://www.onra.top/ga6b/?lDKXxv3=oElzuWp1f34WuFFQH0ElFrJlzB2XRtqeKiQMWTUoMD39vhgZ+y+e3BJkM1IQMs1XY69eCkQ6&Kzux=PnjtLHyHSr http://www.onra.top/ga6b/ http://www.mystudentregistration.com/ga6b/?lDKXxv3=FVoCe1A8hVjRCYMBrNnCX0kDnu+C161o3wWxJxzL6alfMQ3NhDSyui/P1g/HSSLfHx6+Mmre&Kzux=PnjtLHyHSr http://www.corvusexpeditii.xyz/ga6b/ http://www.qqcx666888.top/ga6b/?lDKXxv3=eIOqojsK4xpnapytTTDNeQQlEQNyaN45Mu2frT25CMa88Pt4x/OA2saBEpBSOPq2dGKSSZM3&Kzux=PnjtLHyHSr http://www.nobodybutgod.com/ga6b/ http://www.belledescontos.com/ga6b/ http://www.szkoleniawcag.online/ga6b/?lDKXxv3=gnsA4ZbKwcCBT4B1BZOwnz85wF4eeNbRrbSFWu41EJQIcvRDWo1d+7UOhMG+MofppSWBY2n5&Kzux=PnjtLHyHSr http://www.infinityrope.store/ga6b/ http://www.gritzcharlestonluxuryinn.store/ga6b/?lDKXxv3=I7+lOFJZANFPU21x37A527c95H/aJlATolxoDPbL88ZB7wUaWO1fPidq8y9dbqc40d5vraaW&Kzux=PnjtLHyHSr http://www.belledescontos.com/ga6b/?lDKXxv3=jgYBUTBv6juzDCabe4OWCqutfSnVgXfaFkkijkSn/1f1jJLEA2ITjcU5AEV22xDLWIcCZZOm&Kzux=PnjtLHyHSr http://www.soulwinningministry.com/ga6b/?lDKXxv3=QlWlhrdmA38F39wdH59qDKgCLzke0jtbLkghOfWKUCAF1Rx/+ASUr0tJhxHvOSZs2DWzt0F9&Kzux=PnjtLHyHSr http://www.corvusexpeditii.xyz/ga6b/?lDKXxv3=7T8vebYEf2GnHvqeOh/0TgFFgNzfckxTcBNzZeSGzjlNLlbJ9NDPNSTqSdLNqh5j9wLWy4Dd&Kzux=PnjtLHyHSr http://www.acacave.com/ga6b/?lDKXxv3=LZj7dIufhWlgov4/daUw8E4ZVYKGDHaQ4e5klmj4Sj863sAeUYBdGT0Z9uhDs1Zyx3HrxG1c&Kzux=PnjtLHyHSr http://www.afghantattoos.com/ga6b/?lDKXxv3=2Ru1HfNJkzg9zqDfItmBkvjjxlVS0LNfThNY9X9fgrCeE16wu3v6AqM2D0FDDG0AnjNX5uQ/&Kzux=PnjtLHyHSr http://www.gritzcharlestonluxuryinn.store/ga6b/ http://www.nobodybutgod.com/ga6b/?lDKXxv3=BS+Mkr60hnaz2VUqn6F4jElENEwbATWztr1txOlCDy4YTJ8rldrX7GuvTHEqc04l9LT0WVoV&Kzux=PnjtLHyHSr http://www.egyptian-museum.com/ga6b/?lDKXxv3=CYKd0A9ffzzmh+HMixfnmJt+Ibe3PgwQT1IowcrJSMkSzDwRXwABXy8G05QumwrEDOfj2gVO&Kzux=PnjtLHyHSr
|
27
www.belledescontos.com(23.227.38.74) www.szkoleniawcag.online(89.191.148.30) www.find0utnowfy.info() www.egyptian-museum.com(143.95.1.174) www.acacave.com(23.230.206.51) www.qqcx666888.top(43.129.169.28) www.corvusexpeditii.xyz(88.214.207.96) www.nobodybutgod.com(34.98.99.30) www.gritzcharlestonluxuryinn.store(34.102.136.180) www.infinityrope.store(23.227.38.74) www.onra.top(104.233.161.7) www.afghantattoos.com(3.64.163.50) www.theselectdifference.com() www.soulwinningministry.com(3.223.115.185) www.mystudentregistration.com(107.180.0.6) 43.129.169.28 104.233.161.7 34.102.136.180 - mailcious 107.180.0.6 3.64.163.50 - mailcious 88.214.207.96 - mailcious 23.230.206.51 3.223.115.185 - mailcious 23.227.38.74 - mailcious 89.191.148.30 34.98.99.30 - phishing 143.95.1.174
|
5
ET MALWARE FormBook CnC Checkin (GET) ET DNS Query to a *.top domain - Likely Hostile ET INFO HTTP Request to a *.top domain ET HUNTING Request to .TOP Domain with Minimal Headers ET HUNTING Request to .XYZ Domain with Minimal Headers
|
|
6.8 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39948 |
2021-10-29 09:53
|
Declaration of Asset.pdf.lnk 47fe3905ba9f09a7b2d4fee3981e9f87 NPKI Generic Malware AntiDebug AntiVM GIF Format Code Injection Check memory buffers extracted Creates shortcut RWX flags setting unpack itself Check virtual network interfaces suspicious process AntiVM_Disk VM Disk Size Check Tofsee Interception DNS |
2
http://apps.identrust.com/roots/dstrootcax3.p7c https://ministryofinterior.fileserve.work/189/1/431/2/0/0/1817120272/n6hq7TuwvcKAP8AQky5iyUDRHxTFwXg9RNVSr5Qd/files-ea38b848/hta
|
4
apps.identrust.com(23.216.159.9) ministryofinterior.fileserve.work(155.94.160.234) 155.94.160.234 121.254.136.57
|
2
ET INFO Observed DNS Query to .work TLD SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39949 |
2021-10-29 09:48
|
xso.exe 257679d1ffeaa47dcea2491b13637e50 RAT Generic Malware UPX AntiDebug AntiVM PE File OS Processor Check PE32 .NET EXE FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself ComputerName |
3
http://www.buildstarconst.com/sl4w/?6l8P=rWwJ7ET0sHd4gGkB9dVKIEIoJ+RqQrFmVMEdCyZm6skUMbIw/1NiBsgVzJPxFFkOUojtFvF6&mlvx=fZU8pTY0MT2trP http://www.roxytocin.art/sl4w/?6l8P=EubUdb3A3+v3zBAO2yMZszRUAX6MySP9IuHIW5t779IK3kZlpI6b33bDf1ILvDReab3Uu77l&mlvx=fZU8pTY0MT2trP http://www.getgoldwithmrsbest.com/sl4w/?6l8P=1JDKyruM/74jwNm/2X+0t2d5cjjeO1YF2ZZr07xm6iLte28LljOvl4p69ACcbMMjDgnwMGvg&mlvx=fZU8pTY0MT2trP
|
7
www.roxytocin.art(198.54.117.210) www.getgoldwithmrsbest.com(198.54.117.215) www.buildstarconst.com(66.96.162.129) www.susu521.com() 198.54.117.211 - phishing 66.96.162.129 198.54.117.216 - phishing
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
8.2 |
|
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39950 |
2021-10-29 09:47
|
os.exe 95ba9d5a5cd05fec041a876e1e2b66b2 Malicious Library UPX PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself RCE |
|
|
|
|
2.0 |
|
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39951 |
2021-10-29 09:45
|
set.exe 4d1524f643dfdc491de426572a7d38e6 NSIS Malicious Library UPX PE File PE32 OS Processor Check DLL Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Creates executable files unpack itself AppData folder AntiVM_Disk VM Disk Size Check installed browsers check Browser Email ComputerName DNS Software crashed |
1
http://63.250.40.204/~wpdemo/file.php?search=719442 - rule_id: 6600
|
1
63.250.40.204 - mailcious
|
6
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
|
1
http://63.250.40.204/~wpdemo/file.php
|
11.4 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39952 |
2021-10-29 09:45
|
eo.exe fb0d1d127da05d102f94ef77ab205875 PWS Loki[b] Loki.m RAT Generic Malware Socket DNS Internet API HTTP KeyLogger ScreenShot Http API AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs Browser ComputerName DNS |
1
http://45.133.1.13/xsaz/index.php
|
1
|
1
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
|
|
9.6 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39953 |
2021-10-29 09:45
|
loader2.exe 25f27297055176dde7fb735ee70eaa8f NSIS Generic Malware Malicious Library UPX PE File PE32 DLL FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Creates executable files ICMP traffic unpack itself AppData folder |
12
http://www.canopuslector.com/o2go/?Dxlpd=ZAUpSgkpEDg8niFzuNKe6gEWnHhBWtidA2LwxNth08Qz4PbCXRD40C59E3bfaaHzXCIDtzc4&mnSh=TxlhkdU http://www.daybydayneeds.com/o2go/ http://www.fanaticscardgroup.com/o2go/ http://www.cfaatampa.com/o2go/ http://www.koltemp.com/o2go/?Dxlpd=d/I/y4E919y90/NgD6lGRdsG+efKLObNvHJeST29zYsXDGROtBHMrcb1ki8bN5CEtxKsUn6o&mnSh=TxlhkdU http://www.canopuslector.com/o2go/ http://www.expatriatecafe.com/o2go/ http://www.daybydayneeds.com/o2go/?Dxlpd=/FrPOgiDhDip/ySNZI8OLKS5OxIhXPdMrfM/1s/okw0wECr+nAKcZ38irIHgJAMCO3WjHnMc&mnSh=TxlhkdU http://www.cfaatampa.com/o2go/?Dxlpd=Pl/Ol+nOsw6/w/y+aU9P1RKojiUc7vyeNPaxTQPmfD352vP1/9QBqpNGE02dwnx78NU/bhk7&mnSh=TxlhkdU http://www.expatriatecafe.com/o2go/?Dxlpd=+cW4o3L1nfvEkkPOkZGTjQfjWekF/hM2MaTEXDdcC09Onuz+XEMDyox0luu0PClFcWinXzsf&mnSh=TxlhkdU http://www.fanaticscardgroup.com/o2go/?Dxlpd=8H0rDLcccfrSnzJo6xqaIh8cFRP5shFVfEo30ND+W3j0LJ9pYzmIPxBjjF03wuELOtv43EjU&mnSh=TxlhkdU http://www.koltemp.com/o2go/
|
22
www.bizz-connects.com() www.diyetema.xyz() www.contactcenter9.email() www.beijingrongfeng.com(23.110.124.89) www.fanaticscardgroup.com(198.54.117.211) www.sanchalanprokashon.com() www.macadamangel.com() www.daewon-talks.net() www.helcarpostos.com() www.daybydayneeds.com(23.227.38.74) www.vezmnmnr.xyz() www.expatriatecafe.com(154.64.119.157) www.canopuslector.com(76.223.34.22) www.cfaatampa.com(34.80.190.141) www.koltemp.com(199.59.242.153) 34.80.190.141 - mailcious 23.110.124.89 199.59.242.153 - mailcious 198.54.117.216 - phishing 13.248.160.216 154.64.119.157 23.227.38.74 - mailcious
|
2
ET MALWARE FormBook CnC Checkin (GET) SURICATA HTTP Unexpected Request body
|
|
7.0 |
|
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39954 |
2021-10-29 09:44
|
vx.exe b8b06e334cfa1e325851a840065b6aa1 RAT Generic Malware AntiDebug AntiVM PE File PE32 .NET EXE FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself ComputerName |
6
http://www.mundodeplantasyjardineria.com/sl4w/?8pgTVrp0=Sz5F0hhTWuyLbGbdNo38kMXFARIiPeqFV1F4heNNKyhjPcCKin5OaBV6KiN8coe95ElLHQtU&BZO034=x4X4gd9xi http://www.thelittlebee.store/sl4w/?8pgTVrp0=pW5BymMniPuDIyN4h+/Cz1WSn7yQSodoDHF2TCguXWUv3BV+yCeJLr00BNyz4gz0G3lbCgUH&BZO034=x4X4gd9xi http://www.trustedfurnituretransport.net/sl4w/?8pgTVrp0=SU6djegnNokhXatHD0Zt/RgvM6Zh0SA/H/J8xjjIneGyQtz5eA+PvmJcxeEsuLxakaSqDUJr&BZO034=x4X4gd9xi - rule_id: 6984 http://www.trustedfurnituretransport.net/sl4w/?8pgTVrp0=SU6djegnNokhXatHD0Zt/RgvM6Zh0SA/H/J8xjjIneGyQtz5eA+PvmJcxeEsuLxakaSqDUJr&BZO034=x4X4gd9xi http://www.mdnnoeli.xyz/sl4w/?8pgTVrp0=BnibipHhyvNw3vhe0wol5AOubF0kupJ2VzFkU7RNVxyixZjYoFLSjqlJrzgQ4EYImPmVYZaY&BZO034=x4X4gd9xi http://www.ageddspa.xyz/sl4w/?8pgTVrp0=f46LrelELX9mofNZRi7HKbB3Rg7KLVb8n8zQ7/tWSKeE1yI39pJIaGNnJqKkvfeCu6od+paJ&BZO034=x4X4gd9xi
|
10
www.thelittlebee.store(23.227.38.74) www.ageddspa.xyz(172.67.157.106) www.mdnnoeli.xyz(104.21.39.187) www.trustedfurnituretransport.net(202.124.241.178) www.mundodeplantasyjardineria.com(156.67.74.29) 104.21.39.187 172.67.157.106 156.67.74.29 202.124.241.178 - mailcious 23.227.38.74 - mailcious
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
1
http://www.trustedfurnituretransport.net/sl4w/
|
8.4 |
|
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39955 |
2021-10-29 09:43
|
fed.exe e574ad4af9b6fc033fdf0b54ca7bf014 PWS Loki[b] Loki.m RAT Gen1 Gen2 Generic Malware Malicious Packer Malicious Library UPX Socket DNS Internet API HTTP KeyLogger ScreenShot Http API AntiDebug AntiVM PE File PE32 .NET EXE DLL OS Processor Check Browser Info Stealer Malware download FTP Client Info Stealer Azorult VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Collect installed applications suspicious process AppData folder malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Ransomware Zeus Windows Browser Email ComputerName DNS Software |
1
http://45.133.1.13/xsaz/index.php
|
1
|
3
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 ET MALWARE AZORult v3.3 Server Response M1 ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
|
|
18.0 |
|
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39956 |
2021-10-29 09:40
|
vbc.exe ff1c94584214d5eef525a0d3ff196a8b RAT PWS .NET framework Generic Malware DNS AntiDebug AntiVM PE File PE32 .NET EXE FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself suspicious TLD DNS |
16
http://www.primetire.net/mwev/ http://www.qask.top/mwev/?jPg8=qE5bhU2rfuvSOEXtbyOfkgx1PC6A3veX4X/KGzMuR23PBBsMnLebpzO3NVDHSa/lfKHUqBlj&P0D=AdsxIRr http://www.bjxxc.com/mwev/?jPg8=+cHbYlIGBAVtPctvPq0XFGSuGYhOa/tdOYBt8plfdlvFl5TaVW10KRWwk6BFStBsG9BoFguW&P0D=AdsxIRr http://www.tikomobile.store/mwev/ http://www.primetire.net/mwev/?jPg8=zbuTtjHTIyJcCQ75HIAcR70VDcSt4ckw8+YdHRNR49yiTDLEDqTCZoacxt1ESzoNMak3RFV3&P0D=AdsxIRr http://www.yourvirtualevent.services/mwev/?jPg8=59U8lBHLMKGMdVSWzB48AOW2YGIcffBPT8arLkbScMsXjSC3N75m4hpfWCyrNOJOTjkR8L4e&P0D=AdsxIRr http://www.tikomobile.store/mwev/?jPg8=/zd6oxG8a93jjpS0cHlZDp/zFP0nYcFn0Ybx4g9INNSWAcHaWI/47spAy4WNZohH37cV8MZ6&P0D=AdsxIRr http://www.bjxxc.com/mwev/ http://www.schooldiry.com/mwev/ http://www.schooldiry.com/mwev/?jPg8=JT891w3mrETFXfIgInRhQPqJo7rQZ+TJMvuUzR4wisAtM3CriaBxHCyk2U+JdJFKluARD6VQ&P0D=AdsxIRr http://www.thegurusigavebirthto.com/mwev/?jPg8=6Sc3LlBJxZZC4+mEboPE99cD6wuRe5iQ+Pzmr10Fl76FDXQrWG9i3gEbb3AnXvsJeMTBS4sp&P0D=AdsxIRr - rule_id: 6986 http://www.thegurusigavebirthto.com/mwev/?jPg8=6Sc3LlBJxZZC4+mEboPE99cD6wuRe5iQ+Pzmr10Fl76FDXQrWG9i3gEbb3AnXvsJeMTBS4sp&P0D=AdsxIRr http://www.yourvirtualevent.services/mwev/ http://www.qask.top/mwev/ http://www.thegurusigavebirthto.com/mwev/ - rule_id: 6986 http://www.thegurusigavebirthto.com/mwev/
|
17
www.schooldiry.com(103.224.182.246) www.qask.top(104.233.161.201) www.mrteez.club() www.primetire.net(213.190.6.117) www.fourthandwhiteoak.com() www.bjxxc.com(156.239.98.158) www.tikomobile.store(87.236.16.208) www.yourvirtualevent.services(34.102.136.180) www.thegurusigavebirthto.com(192.0.78.24) 195.2.93.45 213.190.6.117 34.102.136.180 - mailcious 156.239.98.158 104.233.161.201 103.224.182.246 - suspicious 192.0.78.25 - mailcious 87.236.16.208 - mailcious
|
4
ET INFO HTTP Request to a *.top domain ET DNS Query to a *.top domain - Likely Hostile ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .TOP Domain with Minimal Headers
|
2
http://www.thegurusigavebirthto.com/mwev/ http://www.thegurusigavebirthto.com/mwev/
|
9.4 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39957 |
2021-10-29 09:40
|
kontrol.exe ae2ab79ae3a03b8af8ca9aa7a3e9d445 NSIS Generic Malware Malicious Library UPX PE File PE32 DLL Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger Creates executable files unpack itself AppData folder Windows Browser Email ComputerName Cryptographic key Software crashed keylogger |
|
1
www.meadow-spring.com(79.170.40.4)
|
|
|
10.0 |
|
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39958 |
2021-10-29 09:38
|
ens.exe e38e18c6b8fc1f9abd0ed7ce9aa45fda Malicious Library UPX PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself RCE |
|
|
|
|
2.4 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39959 |
2021-10-29 09:37
|
EgAXWEL.exe a21083e3799762685013f624ef688c60 Emotet NPKI Malicious Library UPX Anti_VM Create Service DGA Socket Steal credential DNS Internet API Hijack Network Code injection Sniff Audio HTTP KeyLogger FTP Escalate priviledges Downloader ScreenShot Http API P2P persistence AntiDebug AntiVM PE File Browser Info Stealer Malware download VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces AppData folder malicious URLs AntiVM_Disk WriteConsoleW VM Disk Size Check installed browsers check SectopRAT Windows Browser Backdoor ComputerName RCE DNS Cryptographic key crashed |
1
|
4
eth0.me(5.132.162.27) MhwAjjBLPUoogFMX.MhwAjjBLPUoogFMX() 195.2.93.45 5.132.162.27
|
1
ET MALWARE Arechclient2 Backdoor CnC Init
|
|
16.6 |
|
16 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
39960 |
2021-10-29 09:36
|
A540bo3mQDlYqpH30620D.exe 781fb23a988efab21e4ab321aa932b09 RAT Generic Malware PE File PE32 .NET EXE VirusTotal Malware suspicious privilege Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
2.4 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|