Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
43546 2024-03-20 08:17 HeaderFinder.exe  

5f3c52c804bf6adadac97e2e53179bee


PE File PE32 .NET EXE VirusTotal Malware PDB suspicious privilege Check memory Checks debugger unpack itself
3.0 M 40 ZeroCERT

43547 2024-03-20 14:38 HeaderFinder.exe  

5f3c52c804bf6adadac97e2e53179bee


Icarus Stealer PE File .NET EXE PE32 VirusTotal Malware PDB suspicious privilege Check memory Checks debugger unpack itself
3.0 M 40 r0d

43548 2024-03-20 16:30 HxD32.exe  

804f06b24fba7ba4e1122faf2b119a2b


Emotet PhysicalDrive Malicious Library Admin Tool (Sysinternals etc ...) Malicious Packer UPX PE File PE32 MZP Format OS Processor Check VirusTotal Malware Checks debugger unpack itself crashed
2.0 1 guest

43549 2024-03-21 07:17 risepro67.exe  

f1e9663c2a81ddbf2b94ad43072a954a


Craxs RAT PE File .NET EXE PE32 PDB Check memory Checks debugger unpack itself WriteConsoleW ComputerName
1.8 M ZeroCERT

43550 2024-03-21 07:19 random.exe  

2e9936ceff7cb899d72ae573cb8ca876


CryptBot PE File PE32 Malware download Malware AutoRuns MachineGuid unpack itself Windows utilities Checks Bios Detects VirtualBox Detects VMWare suspicious process WriteConsoleW VMware anti-virtualization IP Check Tofsee Windows RisePro ComputerName DNS crashed
2 8 4 9.8 M ZeroCERT

43551 2024-03-21 07:19 timeSync.exe  

287c0ab11acffca7b5ce14f4d8ae3f4d


Malicious Library UPX PE File PE32 OS Processor Check unpack itself
0.4 M ZeroCERT

43552 2024-03-21 07:20 devon.exe  

371a4e1549f6661f09384749a9926a4d


CryptBot Amadey Themida Packer Generic Malware Admin Tool (Sysinternals etc ...) Malicious Library UPX Antivirus Socket ScreenShot Steal credential DNS Code injection Anti_VM AntiDebug AntiVM PE File PE32 OS Processor Check ZIP Format MSOffice File icon Browser Info Stealer Malware download Amadey FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency powershell AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Checks Bios Collect installed applications Detects VirtualBox Detects VMWare powershell.exe wrote suspicious process AppData folder malicious URLs AntiVM_Disk sandbox evasion WriteConsoleW VMware anti-virtualization IP Check VM Disk Size Check installed browsers check Tofsee Ransomware Windows Exploit Browser RisePro Email ComputerName DNS Cryptographic key Software crashed Downloader
15 18 16 1 29.4 M 24 ZeroCERT

43553 2024-03-21 07:20 ohara.exe  

282dedc28c435180f5cf202ed21d8360


Malicious Library Malicious Packer UPX PE File PE32 OS Processor Check Malware download Malware AutoRuns MachineGuid Windows utilities suspicious process WriteConsoleW IP Check Tofsee Windows RisePro ComputerName DNS
2 7 6 4.4 M ZeroCERT

43554 2024-03-21 07:21 crypted.exe  

9b5a036b6c0ad4683c19fd0a5737d296


Craxs RAT ScreenShot AntiDebug AntiVM PE File .NET EXE PE32 PDB Code Injection Check memory Checks debugger buffers extracted unpack itself crashed
6.4 M ZeroCERT

43555 2024-03-21 07:23 rty45.exe  

a3cc4a0054f5c47f3513117efaf2f335


Generic Malware Malicious Packer UPX PE64 PE File VirusTotal Malware PDB unpack itself Check virtual network interfaces Tofsee Remote Code Execution DNS
1 5 1 3.6 M 36 ZeroCERT

43556 2024-03-21 07:24 control.exe  

1c35fbe0502a246c9e89d91c80ab65f6


Malicious Library .NET framework(MSIL) UPX PE File .NET EXE PE32 OS Processor Check VirusTotal Malware Check memory Checks debugger unpack itself
2.0 M 58 ZeroCERT

43557 2024-03-21 07:26 cry.exe  

960eb4d74f0f0c05c4c43ce1e98bf571


Client SW User Data Stealer LokiBot Craxs RAT ftp Client info stealer Http API PWS Code injection AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself malicious URLs Tofsee ComputerName DNS crashed
1 5 3 11.4 M 51 ZeroCERT

43558 2024-03-21 07:26 june.exe  

0f12e18f3a4da6647273810de0ac63a0


Emotet Gen1 Malicious Library UPX Antivirus PE File PE32 MZP Format PE64 OS Processor Check DllRegisterServer dll DLL VirusTotal Malware Check memory Checks debugger Creates executable files unpack itself AppData folder Windows ComputerName crashed
3.6 M 6 ZeroCERT

43559 2024-03-21 07:28 may.exe  

0510338646cc1ba136cc3f6ebed04a0e


Emotet Gen1 Malicious Library UPX Antivirus PE File PE32 MZP Format DllRegisterServer dll OS Processor Check PE64 DLL VirusTotal Malware Check memory Checks debugger Creates executable files unpack itself AppData folder Windows ComputerName crashed
4.2 M 5 ZeroCERT

43560 2024-03-22 02:26 https://share.icloud.com/photo...  

6b54bfe28a2bb2f88cdff2a6c550aee4


Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format JPEG Format MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed
1 4 3 4.2 guest