45076 |
2021-05-28 08:09
|
ConsoleApp10.exe d2470e33e04e12bdc2acf475f40da080 AsyncRAT backdoor PWS .NET framework SMTP KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Malicious Traffic Check memory Checks debugger unpack itself Check virtual network interfaces VMware IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
4
freegeoip.app(104.21.19.200) checkip.dyndns.org(162.88.193.70) 131.186.113.70 104.21.19.200
|
4
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain ET POLICY External IP Lookup - checkip.dyndns.org SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY DynDNS CheckIp External IP Address Server Response
|
|
9.6 |
|
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45077 |
2021-05-28 08:07
|
336601.7z f958bdca722740cdb24e86b349be4f96 Escalate priviledges KeyLogger AntiDebug AntiVM VirusTotal Malware suspicious privilege Check memory Checks debugger unpack itself DNS |
|
|
|
|
3.2 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45078 |
2021-05-28 08:06
|
PKL.exe b375d47d63b41b7e1aca548742b01382 PE File PE32 VirusTotal Malware RWX flags setting unpack itself anti-virtualization crashed |
|
|
|
|
2.6 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45079 |
2021-05-27 17:42
|
relese.exe 67c0f9f7a63db607929cfbae83442911 AsyncRAT backdoor NPKI Gen2 AntiDebug AntiVM PE File OS Processor Check PE32 DLL .NET DLL PNG Format JPEG Format MSOffice File .NET EXE PE64 VirusTotal Malware PDB Code Injection buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Windows utilities AppData folder Tofsee Windows Exploit RCE DNS crashed |
3
http://cacerts.digicert.com/DigiCertGlobalRootG2.crt http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.6.1&processName=Svc_host.exe&platform=0009&osver=5&isServer=0 https://go.microsoft.com/fwlink/?linkid=850289&tfm=.NETFramework,Version=v4.6.1&processName=Svc_host.exe&platform=0009&osver=5&isServer=0
|
5
cacerts.digicert.com(104.18.10.39) dotnet.microsoft.com(13.107.213.49) 104.18.11.39 13.107.246.49 104.18.10.39
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
|
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45080 |
2021-05-27 17:41
|
file.exe 7a2f5bc93c259322c16e5a94f7139031 PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself Windows crashed |
|
|
|
|
3.0 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45081 |
2021-05-27 13:48
|
vbc.exe 6adc941dcd82ed0869059fbdb520fc0a AsyncRAT backdoor PWS .NET framework Malicious Library SMTP KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName DNS Cryptographic key crashed |
|
|
|
|
9.4 |
|
17 |
Kim.GS
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45082 |
2021-05-27 10:28
|
file21.exe f9003a4991f68b4b07e73ac1e89cf374 PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself Windows crashed |
|
|
|
|
3.0 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45083 |
2021-05-27 10:27
|
AwSetp.exe 77a3dd75a7400c15f9a95929f2f76df6 AsyncRAT backdoor Gen1 .NET EXE PE File PE32 DLL OS Processor Check Browser Info Stealer FTP Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications Check virtual network interfaces AppData folder installed browsers check Tofsee Ransomware Windows Browser ComputerName Software crashed |
11
https://iplogger.org/1v9Fz7 https://iphonemail.xyz/ https://iplogger.org/1e9Ut7 https://news-systems.xyz/?user=aws2 - rule_id: 1515 https://news-systems.xyz/?user=aws3 - rule_id: 1515 https://news-systems.xyz/?user=aws1 - rule_id: 1515 https://news-systems.xyz/?user=aws6 - rule_id: 1515 https://news-systems.xyz/?user=aws4 - rule_id: 1515 https://news-systems.xyz/?user=aws5 - rule_id: 1515 https://iphonemail.xyz/api.php?getusers https://iphonemail.xyz/api.php
|
6
news-systems.xyz(104.21.33.129) - mailcious iphonemail.xyz(104.21.40.195) iplogger.org(88.99.66.31) - mailcious 172.67.188.69 88.99.66.31 - mailcious 104.21.33.129 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
6
https://news-systems.xyz/ https://news-systems.xyz/ https://news-systems.xyz/ https://news-systems.xyz/ https://news-systems.xyz/ https://news-systems.xyz/
|
10.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45084 |
2021-05-27 10:27
|
Setup2.exe 138f1e886df537f014b2d4a74efb57d3 Emotet Generic Malware VMProtect PE File PE32 DLL GIF Format Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder AntiVM_Disk IP Check VM Disk Size Check installed browsers check Browser ComputerName DNS crashed |
3
http://ol.gamegame.info/report7.4.php - rule_id: 1518 http://ip-api.com/json/?fields=8198 http://iw.gamegame.info/report7.4.php - rule_id: 1517
|
8
email.yg9.me(198.13.62.186) iw.gamegame.info(172.67.200.215) - mailcious ol.gamegame.info(172.67.200.215) - mailcious ip-api.com(208.95.112.1) 172.67.200.215 104.21.21.221 - mailcious 208.95.112.1 198.13.62.186
|
2
ET DNS Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set ET POLICY External IP Lookup ip-api.com
|
2
http://ol.gamegame.info/report7.4.php http://iw.gamegame.info/report7.4.php
|
6.8 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45085 |
2021-05-27 10:26
|
BBQbrowser.exe 81189d695443fc7f2a0adab7a6957d89 AsyncRAT backdoor BitCoin AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces suspicious TLD installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key crashed |
3
http://87.251.71.193// - rule_id: 1393 https://wlf.gofast24.ru/SystemServiceModelSecureConversationFebStrings25251 https://api.ip.sb/geoip
|
5
wlf.gofast24.ru(217.107.34.191) api.ip.sb(104.26.12.31) 104.26.12.31 87.251.71.193 - mailcious 217.107.34.191 - mailcious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING Suspicious POST With Reference to WINDOWS Folder Possible Malware Infection SURICATA HTTP unable to match response to request
|
1
|
10.8 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45086 |
2021-05-27 10:26
|
WLP_Setup.exe 6bd3098fc75bd4616d1d069b41a366cd AsyncRAT backdoor PWS .NET framework .NET EXE PE File OS Processor Check PE32 Browser Info Stealer FTP Client Info Stealer Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
2
http://45.144.225.163:57433// https://api.ip.sb/geoip
|
7
masterself.world(172.67.134.204) - malware api.ip.sb(172.67.75.172) iplogger.org(88.99.66.31) - mailcious 104.21.25.222 88.99.66.31 - mailcious 104.26.12.31 45.144.225.163
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed DNS Query to .world TLD SURICATA HTTP unable to match response to request
|
|
6.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45087 |
2021-05-27 10:26
|
file18.exe 495214dc4882127b4cf5480510ce440c AsyncRAT backdoor PWS .NET framework BitCoin AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Malware Code Injection Malicious Traffic Check memory Checks debugger buffers extracted ICMP traffic unpack itself Check virtual network interfaces suspicious TLD Tofsee Windows Cryptographic key crashed |
2
http://bargwelahar.xyz// https://jv.inokkr.ru/SystemServiceModelChannelsPeerFlooderSimple47662
|
4
jv.inokkr.ru(195.161.41.50) bargwelahar.xyz(5.44.45.140) 5.44.45.140 195.161.41.50
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
9.8 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45088 |
2021-05-27 10:00
|
Document 70259454.xls fa58cb567a2ffeee77053fadf440a56f VBA_macro MSOffice File VirusTotal Malware unpack itself Tofsee |
10
https://vitiligomatch.com/wpvitiligomatch/wp-includes/css/dist/block-directory/QaLUIUkxomX.php
https://bellaloveboutique.com/wp-content/themes/salient/includes/partials/tgTzKdqzGivuZ9.php
https://ppml.com.kh/ppml.com.kh/sothea.chhem/E7rTEXxjAS.php
https://marcoislandguidebook.com/wp-includes/js/tinymce/plugins/charmap/xltGrJWiK.php
https://ntf.gov.sb/components/com_acysms/views/unsubscribe/tmpl/8Wa80ysYUv6Klh.php
https://bycec.in/wp-includes/js/tinymce/plugins/charmap/1MRWRA8z2S2Ajv.php
https://houzzlink.com/wp-content/plugins/osen-wc-mpesa-master/updates/Puc/KOmZGbynRtPJ.php
https://labrie-sabette.com/wp-includes/sodium_compat/namespaced/Core/ChaCha20/gp5yHrBp.php
https://www.akseral.com/yonetim/vendors/iconfonts/font-awesome/css/wjM7uzNc3U8doR.php
https://alpax.elcanotradingcorp.com/public/bower_components/jquery/src/ajax/oAIZxkctW.php
|
26
ntf.gov.sb(192.185.32.234) - mailcious
labrie-sabette.com(173.230.252.50) - mailcious
alpax.elcanotradingcorp.com(108.167.181.248) - mailcious
www.akseral.com(83.150.213.154)
marcoislandguidebook.com(192.185.79.55) - mailcious
houzzlink.com(148.66.138.194) - mailcious
incoming.telemetry.mozilla.org(52.42.229.170)
definitionupdates.microsoft.com(23.40.44.112)
vitiligomatch.com(192.185.16.122) - mailcious
bycec.in(208.91.198.106) - mailcious
ppml.com.kh(209.188.15.214) - mailcious
bellaloveboutique.com(107.180.58.44) - mailcious
www.microsoft.com(23.212.13.232) 192.185.16.122 - mailcious
192.185.32.234 - mailcious
108.167.181.248 - mailcious
23.40.44.112
35.155.6.125
107.180.58.44 - mailcious
148.66.138.194 - malware
173.230.252.50 - mailcious
208.91.198.106 - malware
209.188.15.214 - mailcious
192.185.79.55 - mailcious
23.212.13.232
83.150.213.154 - mailcious
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure SURICATA TLS invalid record type SURICATA TLS invalid record/traffic
|
|
3.2 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45089 |
2021-05-27 09:56
|
file5.exe c6409dcd1888eed5d528f85c21b89162 Malicious Library PE File PE32 OS Processor Check VirusTotal Malware Checks debugger Creates executable files unpack itself suspicious process AntiVM_Disk WriteConsoleW VM Disk Size Check Tofsee DNS |
3
http://192.168.56.103:2869/upnphost/udhisapi.dll?content=uuid:d96d86f3-ac35-41f2-9523-f4e50073f2f3 http://157.90.238.247:43252// http://192.168.56.103:5357/da8ea474-550f-433d-b444-54d2081d1d24/
|
4
CXGVubAglGFDxYMBdULdcW.CXGVubAglGFDxYMBdULdcW() api.ip.sb(104.26.12.31) 157.90.238.247 104.26.13.31
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
4.2 |
M |
10 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
45090 |
2021-05-27 09:56
|
file20.exe e79511486f15a4f50b215af8440f25f9 AsyncRAT backdoor NPKI PWS .NET framework .NET EXE PE File OS Processor Check PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName RCE Cryptographic key Software crashed |
2
http://mitedaziko.xyz// https://api.ip.sb/geoip
|
4
mitedaziko.xyz(94.140.115.158) api.ip.sb(172.67.75.172) 94.140.115.158 172.67.75.172
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
6.6 |
M |
18 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|