41281 |
2021-09-22 22:42
|
download.php f00246dd362f2c57a69b82099bf4e4ea VirusTotal Malware |
|
|
|
|
0.8 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41282 |
2021-09-22 22:41
|
softedont.exe 271dd1b7b71a59842bac41e1be96b697 Malicious Library PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself RCE DNS |
|
1
|
|
|
3.0 |
M |
52 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41283 |
2021-09-22 22:40
|
243234193.exe 358af97491dd7d9191744789b0f9e87f RAT PWS .NET framework Generic Malware PE File OS Processor Check .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
1
|
3
api.ip.sb(172.67.75.172) 104.26.12.31 80.87.192.137
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.0 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41284 |
2021-09-22 22:38
|
PBrowFile11.exe 4a0f9d7e858b278ed038fc3b303d61f7 RAT Generic Malware Malicious Packer PE File OS Processor Check .NET EXE PE32 VirusTotal Malware suspicious privilege MachineGuid Check memory Checks debugger unpack itself |
|
|
|
|
2.6 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41285 |
2021-09-22 22:38
|
vbc.exe d362ffc6b594c617852f20b87ab4bbef RAT PWS .NET framework Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself ComputerName |
8
http://www.youcanaskmeto.review/nthe/?sXUXkXC=ctP9xmzI7lxydl9Y/YLT6bX/j9MPsOdNwwipT7HjIg8o+wS2Lz1BcfNN8PnCTvuZYgy3g6FL&C8bDp=9rCl-NqhJxSHIVX http://www.overseaexpert.com/nthe/?sXUXkXC=adxOK3g9xsmhNSl6zOCArJK3IjARKLYzTcZUoFouid4O6Rc3eBhLcBKKwAzfnZ9D6vACWWi7&C8bDp=9rCl-NqhJxSHIVX http://www.groundedheavens.com/nthe/?sXUXkXC=jMh6XVcpP4sc/0PftgVatAqq1KiqQ/Stgmq51Wal6sqYysHl9H3jG9aEYQHs+6lqbRvbBIdu&C8bDp=9rCl-NqhJxSHIVX http://www.omelhorcurso-online.com/nthe/?sXUXkXC=+G+47tg96cSZsPTY4vQ6+M2bANvEiiHc3iFTamgPVtuV9OX9HGHgOIGgcb7RmpWuhV230ped&C8bDp=9rCl-NqhJxSHIVX http://www.dindigulvysya.com/nthe/?sXUXkXC=+/hswLtkVvxszb1LNJLvqPb4ftc8Z6fRWBGZvwAoEVOzYphMk7n88H70z+5DzUEh7x+oQhg1&C8bDp=9rCl-NqhJxSHIVX http://www.authorjameswshepherdonline.com/nthe/?sXUXkXC=enVshZ5pBP6SFOr7VKthUFU7GSCP6zpooNwVCr/P0s5BKPQIOoeKpqOeleCJ7dZ6IlpMeU4S&C8bDp=9rCl-NqhJxSHIVX http://www.hiphopventuresllc.com/nthe/?sXUXkXC=51bJujFLc20tCGhu7cUDilKkV4KkFhJHHXn1Y5i26+oUR3M5D54rlSoo8Sdfyw6fYNd6zl42&C8bDp=9rCl-NqhJxSHIVX http://www.yourdoor.pro/nthe/?sXUXkXC=Dq5BsXUmPYRXCS8xthBTWjkRhfDO71d0Wvsss7JChqmMe/U7sfw/yBC80fv6eqyp12jevQhj&C8bDp=9rCl-NqhJxSHIVX
|
17
www.hiphopventuresllc.com(184.168.131.241) www.indianajones.club() www.groundedheavens.com(45.84.204.115) www.authorjameswshepherdonline.com(34.102.136.180) www.omelhorcurso-online.com(108.179.193.173) www.overseaexpert.com(34.98.99.30) www.youcanaskmeto.review(99.83.154.118) - mailcious www.urfavvpimp.com() www.dindigulvysya.com(142.111.57.185) www.yourdoor.pro(34.98.99.30) 108.179.193.173 - mailcious 184.168.131.241 - mailcious 34.102.136.180 - mailcious 99.83.154.118 - mailcious 142.111.57.185 45.84.204.115 - mailcious 34.98.99.30 - phishing
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.4 |
M |
44 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41286 |
2021-09-22 22:36
|
buildcpils.exe 26b9716419a2eac7f4b367e6cc06a946 RAT Generic Malware PE64 PE File OS Processor Check PNG Format VirusTotal Malware AutoRuns suspicious privilege MachineGuid Check memory Checks debugger Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AntiVM_Disk WriteConsoleW VM Disk Size Check Tofsee Windows ComputerName DNS |
|
3
api.telegram.org(149.154.167.220) 104.26.12.31 149.154.167.220
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.2 |
M |
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41287 |
2021-09-22 22:35
|
new.exe e1c271fec5a9b690482b700d4ed8316b PWS Loki[b] Loki.m Generic Malware DNS Socket AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs AntiVM_Disk VM Disk Size Check installed browsers check Browser Email ComputerName DNS Software crashed |
1
http://136.243.159.53/~element/page.php?id=491 - rule_id: 5135
|
1
136.243.159.53 - mailcious
|
6
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
|
1
http://136.243.159.53/~element/page.php
|
13.8 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41288 |
2021-09-22 22:34
|
PublicDwlBrowser1100.exe 94c17903ebb08d6e352dccce353d95d4 RAT Generic Malware Malicious Packer PE File .NET EXE PE32 VirusTotal Malware suspicious privilege MachineGuid Check memory Checks debugger unpack itself |
|
|
|
|
2.8 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41289 |
2021-09-22 22:33
|
21061736.exe 24a83981517c299c8b10b9dd5ca2620f RAT Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware Code Injection Check memory Checks debugger buffers extracted unpack itself Windows DNS Cryptographic key |
|
1
|
|
|
8.6 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41290 |
2021-09-22 22:32
|
18.exe 5389b036dc60417f5d0df36e82131b63 Gen1 Malicious Library Malicious Packer AntiDebug AntiVM PE File PE32 OS Processor Check DLL Browser Info Stealer Malware download VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency MachineGuid Code Injection Malicious Traffic Check memory Creates executable files unpack itself Windows utilities Collect installed applications suspicious process AppData folder WriteConsoleW anti-virtualization installed browsers check Stealer Windows Browser Email ComputerName DNS |
8
http://87.98.153.120/JWFiKu9bjC.php http://87.98.153.120/public/vcruntime140.dll http://87.98.153.120/public/nss3.dll http://87.98.153.120/public/sqlite3.dll http://87.98.153.120/public/freebl3.dll http://87.98.153.120/public/softokn3.dll http://87.98.153.120/public/msvcp140.dll http://87.98.153.120/public/mozglue.dll
|
1
|
4
ET INFO Dotted Quad Host DLL Request ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET MALWARE Win32/Unk.Lebov Stealer CnC Exfil
|
|
11.2 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41291 |
2021-09-22 22:32
|
vbc.exe f865e60134bf6774d24e03d2907c9791 PWS Loki[b] Loki.m .NET framework Generic Malware DNS AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer LokiBot Malware download FTP Client Info Stealer Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs installed browsers check Browser Email ComputerName DNS Software |
1
http://checkvim.com/ga11/fre.php
|
3
checkvim.com(5.180.136.169) - mailcious 141.8.192.151 - malware 5.180.136.169
|
7
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 ET MALWARE LokiBot Fake 404 Response
|
|
12.4 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41292 |
2021-09-22 22:30
|
10.exe 29f6d019b55cd3ab946ca70651a2bd8c RAT PWS .NET framework Generic Malware Antivirus AntiDebug AntiVM PE File .NET EXE PE32 PE64 Browser Info Stealer Malware download FTP Client Info Stealer VirusTotal Malware powershell suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files unpack itself Collect installed applications powershell.exe wrote Check virtual network interfaces suspicious process malicious URLs suspicious TLD installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed Downloader |
4
http://f0581959.xsph.ru/sss.exe http://ping.pushmon.com/pushmon/ping/eaFnY http://pshmn.com/eaFnY https://api.ip.sb/geoip
|
8
ping.pushmon.com(69.197.158.18) f0581959.xsph.ru(141.8.192.151) pshmn.com(69.197.158.18) api.ip.sb(172.67.75.172) 141.8.192.151 - malware 104.26.12.31 185.213.209.36 69.197.158.18
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
|
|
15.6 |
M |
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41293 |
2021-09-22 22:29
|
863387648.exe 8df6d5b6ce4864ae629684b7566ebaa7 RAT Generic Malware Malicious Packer Antivirus PE64 PE File VirusTotal Malware Check memory Checks debugger unpack itself |
|
|
|
|
2.0 |
M |
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41294 |
2021-09-22 22:28
|
WORD.exe a2f81b2021d159eaf2c7bcac2dfbeacb RAT Generic Malware Antivirus DNS AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware powershell Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW human activity check Tofsee Windows ComputerName DNS Cryptographic key DDNS crashed |
1
https://store2.gofile.io/download/4e000ee8-86dd-407b-8452-140e650fa3e9/Aufvbosfzpz.dll
|
5
cloudhost.myfirewall.org(146.59.132.186) - mailcious store2.gofile.io(31.14.69.10) 31.14.69.10 146.59.132.186 185.163.45.42
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed DNS Query to DDNS Domain .myfirewall .org
|
|
17.4 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
41295 |
2021-09-22 22:27
|
navitas_employee_survey.hta 537363b3738a8e0726ae15e6bc4fc314VirusTotal Malware Check memory unpack itself |
2
http://www.healthsouthdothan.com/tab_home_active http://www.healthsouthdothan.com/components/tab_home.ico
|
2
www.healthsouthdothan.com(13.59.208.38) - mailcious 13.59.208.38 - mailcious
|
|
|
1.8 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|