44731 |
2021-06-08 10:02
|
BLI_0617851034.exe 5346c6935008b47b700b97482463099c SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Malicious Traffic Check memory Checks debugger unpack itself Check virtual network interfaces IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
4
freegeoip.app(172.67.188.154) checkip.dyndns.org(216.146.43.70) 172.67.188.154 131.186.161.70
|
4
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain ET POLICY External IP Lookup - checkip.dyndns.org ET POLICY DynDNS CheckIp External IP Address Server Response SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.2 |
M |
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44732 |
2021-06-08 10:00
|
spc 0600368dd5cd4cf1fc90f41827518b29 AntiDebug AntiVM ELF VirusTotal Email Client Info Stealer Malware Code Injection Check memory Checks debugger unpack itself Browser Email DNS |
|
|
|
|
4.4 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44733 |
2021-06-08 10:00
|
BTL_01880433.exe bdccbcaabf832a0a2b0f74afcc3ba8a1 SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Malicious Traffic Check memory Checks debugger unpack itself Check virtual network interfaces VMware IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
4
freegeoip.app(172.67.188.154) checkip.dyndns.org(216.146.43.71) 172.67.188.154 131.186.161.70
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY External IP Lookup - checkip.dyndns.org ET POLICY DynDNS CheckIp External IP Address Server Response ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
|
|
10.0 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44734 |
2021-06-08 09:55
|
br.exe 1c85f40e4abe47f93982099c8d9753c1 AsyncRAT backdoor PWS .NET framework Anti_VM Malicious Library DGA DNS SMTP Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection Internet API ScreenShot Downloader AntiDebug AntiVM PE File .NET EXE PE32 Malware download NetWireRC VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW Ransomware BitRAT Windows ComputerName DNS Cryptographic key keylogger |
|
1
79.134.225.73 - mailcious
|
1
ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
|
|
13.4 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44735 |
2021-06-08 09:55
|
RFL_06601287.exe d87d1faa4c23aa64e915d4d4f269e105 SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Check memory Checks debugger unpack itself Windows ComputerName DNS crashed |
|
|
|
|
4.8 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44736 |
2021-06-08 09:32
|
dootakim.vbs 7bf15c10dd4e523a1338d054c0ace9d9Malware Malicious Traffic buffers extracted WMI wscript.exe payload download Creates shortcut Creates executable files ICMP traffic Tofsee Windows ComputerName DNS |
2
https://www.daum.net/favicon.ico
http://alyssalove.getenjoyment.net/0423/v.php?ki87ujhy=C:\Program%20Files%20(x86)&rdxvdw=C:\Program%20Files%20(x86)
|
4
www.daum.net(203.133.167.16)
alyssalove.getenjoyment.net(185.176.43.98) - mailcious 203.133.167.81
185.176.43.98 - mailcious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration
|
|
6.8 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44737 |
2021-06-08 09:16
|
https://smyun0272.blogspot.com... aea34c0a7532eeebd2f9d29b312ef6a0 AntiDebug AntiVM PNG Format JPEG Format MSOffice File Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
20
https://smyun0272.blogspot.com/2021/06/dootakim.html https://www.blogger.com/static/v1/jsbin/1114208092-comment_from_post_iframe.js https://www.blogger.com/dyn-css/authorization.css?targetBlogID=1123379356337220779&zx=f4a55f5c-7d5f-4b40-a696-2966a6b96cc7 https://resources.blogblog.com/img/anon36.png https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/comment-iframe.g?blogID%3D1123379356337220779%26postID%3D4374038993998500594%26skin%3Dcontempo%26blogspotRpcToken%3D4078526%26bpli%3D1&followup=https://www.blogger.com/comment-iframe.g?blogID%3D1123379356337220779%26postID%3D4374038993998500594%26skin%3Dcontempo%26blogspotRpcToken%3D4078526%26bpli%3D1&passive=true&go=true https://resources.blogblog.com/blogblog/data/res/3088200718-indie_compiled.js https://themes.googleusercontent.com/image?id=L1lcAxxz0CLgsDzixEprHJ2F38TyEjCyE3RSAjynQDks0lT1BDc1OxXKaTEdLc89HPvdB11X9FDw&options=w1600 https://smyun0272.blogspot.com/responsive/sprite_v1_6.css.svg https://www.gstatic.com/external_hosted/clipboardjs/clipboard.min.js https://www.blogblog.com/indie/mspin_black_large.svg https://resources.blogblog.com/img/blank.gif https://www.google.com/js/bg/KXZ4XaGXoMSmLwd6kqoCTLNJyJzwIGNCSAOuAZeGnUo.js https://www.blogger.com/static/v1/widgets/3098431828-widgets.js https://www.blogger.com/img/blogger_logo_round_35.png https://smyun0272.blogspot.com/favicon.ico https://www.blogger.com/comment-iframe-bg.g?bgresponse=js_disabled&iemode=9&bgint=KXZ4XaGXoMSmLwd6kqoCTLNJyJzwIGNCSAOuAZeGnUo https://www.blogger.com/static/v1/jsbin/1938999652-cmt__ko.js https://www.blogger.com/comment-iframe.g?blogID=1123379356337220779&postID=4374038993998500594&skin=contempo&blogspotRpcToken=4078526&bpli=1 https://www.blogger.com/img/responsive/sprite_comment_v1.css.svg https://www.blogger.com/comment-iframe.g?blogID=1123379356337220779&postID=4374038993998500594&skin=contempo&blogspotRpcToken=4078526
|
16
resources.blogblog.com(172.217.25.105) www.google.com(142.250.196.132) www.gstatic.com(172.217.25.99) themes.googleusercontent.com(216.58.197.193) smyun0272.blogspot.com(172.217.174.97) - mailcious accounts.google.com(172.217.31.141) www.blogblog.com(172.217.25.105) www.blogger.com(172.217.25.105) 172.217.31.225 142.250.66.132 216.58.200.73 142.250.66.141 172.217.174.201 142.250.204.73 172.217.161.131 142.250.204.65 - mailcious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44738 |
2021-06-08 09:04
|
vbc.exe 5313f320a680a992243c59f38561ba9a PWS .NET framework Admin Tool (Sysinternals Devolutions inc) Malicious Library DNS Socket Sniff Audio KeyLogger Code injection AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key keylogger |
2
http://www.iptrackeronline.com/ https://www.iptrackeronline.com/
|
4
www.iptrackeronline.com(172.67.74.63) immzonenorthbellmorexxx.mangospot.net(194.5.97.61) - mailcious 194.5.97.61 - mailcious 172.67.74.63
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
12.6 |
|
16 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44739 |
2021-06-08 09:02
|
Inv%20799146.xls c72b5321c62c54829b3300ee5d9441e1 VBA_macro MSOffice File VirusTotal Malware unpack itself Tofsee Windows crashed |
1
https://main.bgsr.site/wp-includes/sodium_compat/src/Core32/ChaCha20/d68Tou3ui1RoUA.php
|
2
main.bgsr.site(185.150.189.217) 185.150.189.217
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.8 |
|
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44740 |
2021-06-07 21:06
|
vbc.exe 64eaf97106ba76288f92396de46f322c Generic Malware Malicious Packer PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself Windows RCE crashed |
|
|
|
|
3.0 |
|
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44741 |
2021-06-07 19:03
|
v.wbk ca7ed32ac5a746dcf9529229d0b3e45d RTF File doc AntiDebug AntiVM FormBook Malware download Malware MachineGuid Malicious Traffic Check memory Checks debugger exploit crash unpack itself Windows Exploit DNS crashed Downloader |
5
http://www.ssgasija.com/c244/?YBZHFj1P=1UEpKLTt4QCUN7dly3YYx1Ln0IJ9pULFw4EMyobuyiHAVQXIWWeIlN7lkqW9Njq/8ZVNfV/E&or=3f5pirXxs http://172.245.119.81/cmd/vbc.exe http://www.topadofa.com/c244/?YBZHFj1P=qeChhMOfYvnl0PXCDzRjRRhOtO2nNoYpDTUe0DB4uPkyEbfjAkUDN6NItkMguLPHgH+vbofp&or=3f5pirXxs http://www.sundarsheni.com/c244/?YBZHFj1P=mbkFMVPWhR+tZRX4rclLJAmyl87dYViyU5hS5arKfa65zwaBWGStyCVF+Gfu+Qj8vRfmY0NP&or=3f5pirXxs http://www.houseofkabbalah.com/c244/?YBZHFj1P=XPvNybHH7rgCxFJYRFG/RwSGjSr1r69FwQbdepF5Smm0gc4giR3ejrYBsuZqfuQgCgtkh94S&or=3f5pirXxs
|
9
www.sundarsheni.com(157.90.225.61) www.houseofkabbalah.com(184.168.131.241) www.topadofa.com(103.8.25.88) www.ssgasija.com(34.102.136.180) 184.168.131.241 - mailcious 157.90.225.61 34.102.136.180 - mailcious 172.245.119.81 103.8.25.88
|
8
ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET INFO Packed Executable Download ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE FormBook CnC Checkin (GET)
|
|
4.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44742 |
2021-06-07 18:07
|
max.exe c93c429db9152f674a7980fb8935ab63 Admin Tool (Sysinternals Devolutions inc) Malicious Library SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName Cryptographic key crashed |
|
|
|
|
10.4 |
M |
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44743 |
2021-06-07 18:07
|
loader1.exe f20a27b803bf2a57928f87af2d954ed3 PE File PE32 DLL FormBook Malware download VirusTotal Malware suspicious privilege Malicious Traffic Check memory Creates executable files unpack itself Windows utilities AppData folder Windows |
24
http://www.mikefling.com/bp3i/?aly=f27qp7/R6CZrnMp6oNXdq9Y/KtHj1P3jBiclukrifcB8XGjpBfn1+hX4ohrLtpRG7MloXyWU&Qzr=L6h0-t409Z0T http://www.motivactivewear.com/bp3i/?aly=zzYPr0OCNAmsWBGG6HNOV25V/HRJbXLG3dsQYpoWqUnjOdCdFgLO0pBdP9GuYgb2I6ZBWy1X&Qzr=L6h0-t409Z0T - rule_id: 1842 http://www.8ballsportsbook.com/bp3i/?aly=gjFnan4TrQKOg8ZjrlmR1QzcuvPcCC3H+6BcJPnwL0iBWFeal2Pt92AvNwoqJbCv415raDkr&Qzr=L6h0-t409Z0T http://www.mutanterestaurante.com/bp3i/ http://www.harchain.com/bp3i/ http://www.xrglm.com/bp3i/?aly=xMDqH4a+vCHDCbuVO13XyDZVG6j1EFAtLRtYRpk6XGTZrxVbebO3K0k3rVQvQOaGm3M5SJ2K&Qzr=L6h0-t409Z0T http://www.xrglm.com/bp3i/ http://www.accelerator.sydney/bp3i/?aly=5pzeLuL3qyMdskDBx9eOPWveezrEwfwg/RcpCnMq22iE3aWrSKVhMe7FGWAUc7no09HPCT8S&Qzr=L6h0-t409Z0T http://www.canyoufindme.info/bp3i/?aly=e2VJG+Lcx7VSbdL14USV1xN8uNXyZXDRnrSwfEhZz66rekGJ4QZce75cN095gYEegJMFoXe1&Qzr=L6h0-t409Z0T http://www.mutanterestaurante.com/bp3i/?aly=E7M2l69EyzvhFvWLOXHGh6mx//FtP199Dhi65SsF5ast/kZirdIyqjMG5gfZUQ9nw2mvCBz5&Qzr=L6h0-t409Z0T http://www.8ballsportsbook.com/bp3i/ http://www.harchain.com/bp3i/?aly=kxk0NbaHO4yIkj1wfo8io1FtN07ZZqi5OjBsK/wODYnSlOXK6b3QjT8lScoOBuxZVKRNIX71&Qzr=L6h0-t409Z0T http://www.oakandivywedding.com/bp3i/ http://www.vitali-tea.online/bp3i/?aly=JjYTrkfG77F8bUXkU6JoVgxF8TEXmubcrTtV4gqmnXtNkOLaqYf90HU35bx2Au0Vfe6i64Uc&Qzr=L6h0-t409Z0T http://www.canyoufindme.info/bp3i/ http://www.oceancollaborative.com/bp3i/ - rule_id: 1845 http://www.glavstore.com/bp3i/?aly=VbVpRlTVBrVMlxRx3rx4hyeBTnrnrkzttoX5qgHEHXM9HbDzwhueMyTNA/VppR571T5z6sbD&Qzr=L6h0-t409Z0T http://www.mikefling.com/bp3i/ http://www.accelerator.sydney/bp3i/ http://www.oakandivywedding.com/bp3i/?aly=R6TUBIKrpE3/BLbDdKKJC0IQVvnsRE4fuaWXZMME6o5MuJnPfN7odmfSfLArY93nzsP/JzNO&Qzr=L6h0-t409Z0T http://www.motivactivewear.com/bp3i/ - rule_id: 1842 http://www.oceancollaborative.com/bp3i/?aly=+tA82degRgcQ4mmnQvXabF4qHjy6FJLdLGPOjGCu1vH9ecmhDfriaGule7Kf6ooavhCfc5XG&Qzr=L6h0-t409Z0T - rule_id: 1845 http://www.vitali-tea.online/bp3i/ http://www.glavstore.com/bp3i/
|
26
www.harchain.com(13.59.53.244) www.mutanterestaurante.com(50.87.146.99) www.motivactivewear.com(34.102.136.180) www.8ballsportsbook.com(198.54.117.211) www.canyoufindme.info(62.171.185.90) www.oceancollaborative.com(184.168.131.241) www.trickshow.club() www.mikefling.com(34.102.136.180) www.glavstore.com(213.189.196.123) www.accelerator.sydney(198.54.117.216) www.oakandivywedding.com(34.80.190.141) www.vitali-tea.online(87.236.16.18) www.laurenamason.com() www.reufhroir.com() www.xrglm.com(156.238.87.233) 184.168.131.241 - mailcious 198.54.117.212 - mailcious 34.102.136.180 - mailcious 156.238.87.233 198.54.117.216 - phishing 87.236.16.18 - phishing 13.59.53.244 34.80.190.141 - mailcious 62.171.185.90 50.87.146.99 213.189.196.123
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
4
http://www.motivactivewear.com/bp3i/ http://www.oceancollaborative.com/bp3i/ http://www.motivactivewear.com/bp3i/ http://www.oceancollaborative.com/bp3i/
|
6.6 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44744 |
2021-06-07 18:02
|
bin-01.exe 89ceaf750a8de940686e838bef97b893 Admin Tool (Sysinternals Devolutions inc) AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
|
|
|
|
7.4 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44745 |
2021-06-07 18:01
|
qTRPobspXvlwT1l.exe 4a814df442bac80adc95a552acfe9cce PWS .NET framework Admin Tool (Sysinternals Devolutions inc) Anti_VM Malicious Library PE File .NET EXE PE32 VirusTotal Malware Check memory Checks debugger unpack itself Windows DNS Cryptographic key |
|
|
|
|
2.8 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|