Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
4141 2024-05-10 10:04 setup_1715277229.6072824.exe  

e3e2300616cc1112ffe8fae1901eff5c


Generic Malware Malicious Library Malicious Packer UPX AntiDebug AntiVM PE File .NET EXE PE32 DLL OS Processor Check Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware Microsoft suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications Check virtual network interfaces AppData folder suspicious TLD WriteConsoleW installed browsers check Tofsee Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed
1 4 6 14.2 M 38 ZeroCERT

4142 2024-05-10 10:01 pojgysef.exe  

d4f738f4e3787ef0b31891e446919aa8


Generic Malware Downloader Malicious Library UPX VMProtect Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PE File PE32 OS Processo VirusTotal Malware PDB Code Injection Creates executable files unpack itself AppData folder Remote Code Execution
4.8 36 ZeroCERT

4143 2024-05-10 09:59 build.exe  

7b207a5aba4025733f54ea5185f1f1cb


RedLine Infostealer RedLine stealer RedlineStealer Malicious Library .NET framework(MSIL) UPX PE File .NET EXE PE32 OS Processor Check Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces IP Check installed browsers check Tofsee Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed
2 8 8 8.0 M 62 ZeroCERT

4144 2024-05-10 09:59 udated.exe  

fecabb1640f8768ff0b10ea4186724b7


Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself crashed
2.2 51 ZeroCERT

4145 2024-05-10 09:18 1.exe  

3be9e476da2e99adbc49591cbc94b4d9


Generic Malware Malicious Library UPX PE64 PE File OS Processor Check VirusTotal Malware unpack itself Remote Code Execution
1.8 15 ZeroCERT

4146 2024-05-10 09:16 current.exe  

6cacf1262591bf7eb7c5882d47a1c8a8


Generic Malware Malicious Library PE File PE32 VirusTotal Malware
1.6 27 ZeroCERT

4147 2024-05-10 09:14 beautifulthingstohappeningwhen...  

13d24d0ebfb462fa27ab6815086eb3df


MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Windows Exploit DNS crashed Downloader
1 3 8 5.0 35 ZeroCERT

4148 2024-05-10 09:14 up2date.exe  

cda96eb769b520de195cae37c842c8f3


Generic Malware Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself crashed
2.0 38 ZeroCERT

4149 2024-05-09 11:08 5.hta  

0864405d81d8ab37b43868a26748f57a


Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell Lnk Format GIF Format ZIP Format Vulnerability VirusTotal Malware powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key keylogger
2 1 2 13.0 M 24 ZeroCERT

4150 2024-05-09 11:08 rakshasa.exe  

653247865f2d222abc8ad696d6e756e3


Malicious Library Malicious Packer UPX PE64 PE File VirusTotal Malware Check virtual network interfaces WriteConsoleW
2.0 M 18 ZeroCERT

4151 2024-05-09 11:06 beautifulgirlsarerememberingth...  

5e1a930f016dadf045d8962abfc13581


MS_RTF_Obfuscation_Objects RTF File doc FormBook Malware download VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Windows Exploit DNS crashed Downloader
6 13 7 5.4 M 34 ZeroCERT

4152 2024-05-09 11:06 1.hta  

cc022fea5d0660e1e221b02d2c55553b


Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell ZIP Format Lnk Format GIF Format Vulnerability VirusTotal Malware powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key
2 1 2 12.4 M 24 ZeroCERT

4153 2024-05-09 11:05 4.hta  

1e5a563b24dd2e44b449042b69ddbd7c


Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell Lnk Format GIF Format ZIP Format VirusTotal Email Client Info Stealer Malware powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Check virtual network interfaces suspicious process WriteConsoleW Windows Exploit Email ComputerName DNS Cryptographic key crashed
2 1 2 12.4 M 24 ZeroCERT

4154 2024-05-09 11:05 3.hta  

4ab94c892e634430c8eabae82af4d875


Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell Lnk Format GIF Format ZIP Format Vulnerability VirusTotal Malware powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key
2 1 2 12.4 M 24 ZeroCERT

4155 2024-05-09 11:02 2.hta  

bb537c9f88a70e710c5993e3fe383bb6


Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell Lnk Format GIF Format ZIP Format VirusTotal Email Client Info Stealer Malware powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Check virtual network interfaces suspicious process WriteConsoleW Windows Exploit Email ComputerName DNS Cryptographic key crashed
2 1 2 12.4 M 24 ZeroCERT