40516 |
2021-10-18 09:44
|
Update-KB4524143.ps1 ef3cff5072eb2e63a67c32f6ff699afb Generic Malware Antivirus VirusTotal Malware Check memory Checks debugger unpack itself ComputerName crashed |
|
|
|
|
2.4 |
M |
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40517 |
2021-10-18 09:42
|
1324516478.exe fd7d8966e180f5100abeebc7e7d13257 RAT Generic Malware AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted ICMP traffic unpack itself Collect installed applications Check virtual network interfaces suspicious TLD installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed |
1
|
3
gdv.federguda.ru(81.177.141.85) 80.89.234.187 81.177.141.85 - mailcious
|
|
|
13.0 |
M |
44 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40518 |
2021-10-18 09:40
|
lv.exe 3eceac4a10a0ab1d4d87b8801eeb29c1 Themida Packer PE64 PE File VirusTotal Malware Windows crashed |
|
|
|
|
2.2 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40519 |
2021-10-18 09:38
|
1527052794.exe e7d3f7d73daf1510524df4500970d48e RAT Generic Malware task schedule AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware AutoRuns Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process WriteConsoleW Windows ComputerName Cryptographic key |
|
|
|
|
9.8 |
|
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40520 |
2021-10-18 09:36
|
customer50.exe 5fc5f085acfa0071db7d7ecaca696650 ASPack Malicious Library UPX PE64 PE File OS Processor Check Browser Info Stealer VirusTotal Malware PDB Malicious Traffic Check memory Check virtual network interfaces IP Check Browser RCE |
3
http://staticimg.youtuuee.com/api/fbtime - rule_id: 6464 http://staticimg.youtuuee.com/api/?sid=669873&key=a53835fb03e9db9fd734c3e314bbcc07 - rule_id: 5258 http://ip-api.com/json/
|
4
ip-api.com(208.95.112.1) staticimg.youtuuee.com(45.136.151.102) - mailcious 45.136.151.102 - mailcious 208.95.112.1
|
1
ET POLICY External IP Lookup ip-api.com
|
2
http://staticimg.youtuuee.com/api/fbtime http://staticimg.youtuuee.com/api/
|
4.2 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40521 |
2021-10-18 09:36
|
2103609787.exe 4058a27cf325710ab5a9020fe95e57f7 Admin Tool (Sysinternals etc ...) PE File PE32 VirusTotal Malware Check memory Checks debugger unpack itself crashed |
|
|
|
|
2.6 |
|
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40522 |
2021-10-18 09:34
|
search_hyperfs_212.exe 816fb2a92609e69e339ee9677647b7f8 Malicious Library UPX Create Service DGA Socket Steal credential DNS Internet API Code injection Sniff Audio HTTP KeyLogger FTP Escalate priviledges Downloader ScreenShot Http API P2P AntiDebug AntiVM PE File OS Processor Check PE32 DLL VirusTotal Malware PDB suspicious privilege Code Injection Check memory WMI unpack itself Windows utilities suspicious process AppData folder AntiVM_Disk WriteConsoleW VM Disk Size Check Windows ComputerName RCE |
|
|
|
|
6.8 |
|
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40523 |
2021-10-18 09:34
|
491302577.exe e7302252512b968f8b082e3a22ecca23 RAT Generic Malware AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted ICMP traffic unpack itself Collect installed applications Check virtual network interfaces suspicious TLD installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
2
http://apps.identrust.com/roots/dstrootcax3.p7c https://d.ckauni.ru/
|
5
apps.identrust.com(222.122.182.200) d.ckauni.ru(81.177.141.85) 185.183.32.227 81.177.141.85 - mailcious 121.254.136.57
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
13.0 |
|
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40524 |
2021-10-18 09:32
|
DownFlSetup155.exe 7d09810664be0b0d9dab03e6652cfb26 RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE Browser Info Stealer VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications Check virtual network interfaces AppData folder installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key crashed |
10
https://iplogger.org/1qads7 https://online-stock-solutions.com/ https://iplogger.org/1qsds7 https://niemannbest.me/?username=p15_6 - rule_id: 6275 https://niemannbest.me/?username=p15_7 - rule_id: 6275 https://niemannbest.me/?username=p15_4 - rule_id: 6275 https://niemannbest.me/?username=p15_5 - rule_id: 6275 https://niemannbest.me/?username=p15_2 - rule_id: 6275 https://niemannbest.me/?username=p15_3 - rule_id: 6275 https://niemannbest.me/?username=p15_1 - rule_id: 6275
|
7
topniemannpickshop.cc() online-stock-solutions.com(104.21.71.122) niemannbest.me(104.21.51.48) - mailcious iplogger.org(88.99.66.31) - mailcious 104.21.71.122 88.99.66.31 - mailcious 104.21.51.48 - mailcious
|
2
ET DNS Query for .cc TLD SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
7
https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/
|
9.4 |
M |
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40525 |
2021-10-18 09:32
|
customer6.exe 807f55cee679ba76724aee80756a0c4f ASPack Malicious Library UPX PE64 PE File OS Processor Check Browser Info Stealer VirusTotal Malware PDB Malicious Traffic Check memory Check virtual network interfaces IP Check Browser RCE |
3
http://staticimg.youtuuee.com/api/?sid=664553&key=e31e220fe7337c68de757dbfab9338d2 - rule_id: 5258 http://staticimg.youtuuee.com/api/fbtime - rule_id: 6464 http://ip-api.com/json/
|
4
ip-api.com(208.95.112.1) staticimg.youtuuee.com(45.136.151.102) - mailcious 45.136.151.102 - mailcious 208.95.112.1
|
1
ET POLICY External IP Lookup ip-api.com
|
2
http://staticimg.youtuuee.com/api/ http://staticimg.youtuuee.com/api/fbtime
|
4.4 |
M |
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40526 |
2021-10-18 09:31
|
DownFlSetup166.exe 9f34928ecd64f71c6f2a7cdd85740586 RAT PWS .NET framework Generic Malware Themida Packer Admin Tool (Sysinternals etc ...) Anti_VM Malicious Library UPX PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces AppData folder VMware anti-virtualization installed browsers check Tofsee Windows Browser Email ComputerName Firmware DNS Cryptographic key Software crashed |
9
http://apps.identrust.com/roots/dstrootcax3.p7c https://iplogger.org/1IXpS https://iplogger.org/1qdds7 https://groo.extralive.site/ https://niemannbest.me/?username=p16_1 - rule_id: 6275 https://niemannbest.me/?username=p16_3 - rule_id: 6275 https://niemannbest.me/?username=p16_5 - rule_id: 6275 https://niemannbest.me/?username=p16_7 - rule_id: 6275 https://niemannbest.me/?username=p16_6 - rule_id: 6275
|
16
online-stock-solutions.com(172.67.144.208) groo.extralive.site(45.130.41.15) speeddatingstudio.com(104.21.94.228) - mailcious iplogger.org(88.99.66.31) - mailcious querahinor.xyz(45.129.99.59) niemannbest.me(104.21.51.48) - mailcious apps.identrust.com(222.122.182.200) topniemannpickshop.cc() 45.129.99.59 172.67.144.208 88.99.66.31 - mailcious 104.21.94.228 172.67.221.103 188.68.201.6 121.254.136.57 45.130.41.15
|
2
ET DNS Query for .cc TLD SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
5
https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/
|
17.2 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40527 |
2021-10-18 09:30
|
Dv31BrowInst.exe 592bff278b2bf2551ca505447229c399 RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder suspicious TLD Tofsee Windows DNS |
9
https://iplogger.org/1aFhd7 https://niemannbest.me/?username=david_us2 - rule_id: 6275 https://niemannbest.me/?username=david_us3 - rule_id: 6275 https://niemannbest.me/?username=david_us1 - rule_id: 6275 https://niemannbest.me/?username=david_us6 - rule_id: 6275 https://niemannbest.me/?username=david_us7 - rule_id: 6275 https://niemannbest.me/?username=david_us4 - rule_id: 6275 https://niemannbest.me/?username=david_us5 - rule_id: 6275 https://iplogger.org/1aHhd7
|
5
topniemannpickshop.cc() niemannbest.me(172.67.221.103) - mailcious iplogger.org(88.99.66.31) - mailcious 172.67.221.103 88.99.66.31 - mailcious
|
2
ET DNS Query for .cc TLD SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
7
https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/ https://niemannbest.me/
|
8.2 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40528 |
2021-10-16 13:40
|
Tax Payment Challan.exe 9c3259f246b2cd7518816219582660e6 Antivirus Admin Tool (Sysinternals etc ...) UPX PE File PE32 PNG Format JPEG Format VirusTotal Malware Check memory RWX flags setting unpack itself suspicious process WriteConsoleW Interception ComputerName RCE crashed |
|
|
|
|
4.2 |
|
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40529 |
2021-10-16 13:40
|
DOCS-20211510-VP-KMC022021.scr bc87c171c5e5c075ebcb336ca4518452 Generic Malware UPX Antivirus DNS AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware powershell Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote suspicious process WriteConsoleW human activity check Windows ComputerName DNS Cryptographic key |
|
1
185.140.53.75 - mailcious
|
|
|
17.4 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
40530 |
2021-10-16 13:37
|
zoo.exe 2c2811633faebf78e7bdefb5e8867faf PWS .NET framework Generic Malware AntiDebug AntiVM PE File PE32 .NET EXE FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself |
11
http://www.44mpt.xyz/ef6c/?FTRPbxU=jKy9H8VqZwiUle4gjb+CLEX9fpBCwuv2o754Pr7fJKTzkjLdsKrrwvS2m3F+8CxbXLoYiDn1&DxoHR=VDKPcJchZl9tJT - rule_id: 5869 http://www.gaminghallarna.net/ef6c/?FTRPbxU=klh7vGPfywtzHDqBe0mXtw9R4RUvLJCc3Nh/2lv7lW0muO/R44RuNcsYgcRk+/HbCIQeLGan&DxoHR=VDKPcJchZl9tJT - rule_id: 5824 http://www.fis.photos/ef6c/?FTRPbxU=iVGcxgJZg7dDdqnpGvHyDNlE3XmNDIFvU6VDaZ8nDL6WJmv+1asF/xEbeuA1UUYS6lydoag+&DxoHR=VDKPcJchZl9tJT - rule_id: 5835 http://www.ahljsm.com/ef6c/?FTRPbxU=IVc4rtgM9gra+fG0jQBU9em9uNea1MXNkTy/UnYOuL+WBS8ayE+K1GAK8aa2SvCjoWspa1ZS&DxoHR=VDKPcJchZl9tJT - rule_id: 5838 http://www.ambrandt.com/ef6c/?FTRPbxU=LpvmmmP8130l+/J4QjVaSApGnUfMJ5/j1z/KRz5qiZs92IprYNoIBOkfulD2ZI4sCy4j1IwA&DxoHR=VDKPcJchZl9tJT - rule_id: 5836 http://www.discovercotswoldcottages.com/ef6c/?FTRPbxU=BIDo9GBbq26+tRTULeHAa20kRn4DZ7/ZgIW2IC+7vRIIeELykZIx4inPOl/SIZLSvHjtcUe3&DxoHR=VDKPcJchZl9tJT - rule_id: 6105 http://www.freekagyans.com/ef6c/?FTRPbxU=kpxr/bFC7l3rMl6oOTLL9yT8CLcAAaNLZTC+YQJe+DOZzjEQ9TLw2kEJrxZCMv5aVRwmFn5W&DxoHR=VDKPcJchZl9tJT http://www.shacksolid.com/ef6c/?FTRPbxU=JeohSOzV/eF3b++alSWyFy7AWxQU0a2IMxUYSulMFNSbZpwQl2hdImGcJZ3OYLlpDcL1Ncux&DxoHR=VDKPcJchZl9tJT - rule_id: 5818 http://www.kinglot2499.com/ef6c/?FTRPbxU=qvbt8KP2xJHnSv2agWrG6RDVV6/Qaw5OSzzUHxaBtBqMEVf61rcn+NRYzRRlOu08cWsbP+g5&DxoHR=VDKPcJchZl9tJT - rule_id: 5829 http://www.narbaal.com/ef6c/?FTRPbxU=Qfq1eVj1tbY6wk2fC6TNcABTYUkfKUx3lN3xLkopolv8k3yEzrfjTRmV/Ar6z0XOJR0dF2R8&DxoHR=VDKPcJchZl9tJT - rule_id: 5815 http://www.restaurant-utopia.xyz/ef6c/?FTRPbxU=QQd8BU9Fy5B/Jf1+m4pKDxcRFm34j4nz3hSoRKYyqec7FRTFu3B5N5pbbojH/ir2XBTcopEK&DxoHR=VDKPcJchZl9tJT - rule_id: 5839
|
24
www.freekagyans.com(46.17.172.173) www.44mpt.xyz(23.225.32.156) www.ahljsm.com(45.39.212.162) www.ambrandt.com(156.234.138.25) www.shacksolid.com(64.190.62.111) www.restaurant-utopia.xyz(172.67.213.229) www.gaminghallarna.net(194.9.94.86) www.discovercotswoldcottages.com(91.136.8.131) www.narbaal.com(198.54.117.212) www.instatechnovelz.com() www.geniuseven.net() - mailcious www.fis.photos(192.0.78.25) www.kinglot2499.com(34.102.136.180) 172.67.213.229 - mailcious 91.136.8.131 - mailcious 198.54.117.212 - mailcious 34.102.136.180 - mailcious 156.234.138.25 - mailcious 64.190.62.111 - mailcious 23.225.32.156 - mailcious 192.0.78.25 - mailcious 46.17.172.173 194.9.94.86 - mailcious 45.39.212.162 - mailcious
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
10
http://www.44mpt.xyz/ef6c/ http://www.gaminghallarna.net/ef6c/ http://www.fis.photos/ef6c/ http://www.ahljsm.com/ef6c/ http://www.ambrandt.com/ef6c/ http://www.discovercotswoldcottages.com/ef6c/ http://www.shacksolid.com/ef6c/ http://www.kinglot2499.com/ef6c/ http://www.narbaal.com/ef6c/ http://www.restaurant-utopia.xyz/ef6c/
|
8.0 |
M |
16 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|