47236 |
2024-08-18 10:15
|
W10DigitalActivation_x64.iso 89bd10832539a85ef8557b8976a38207 AntiDebug AntiVM Check memory Checks debugger unpack itself |
|
|
|
|
1.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47237 |
2024-08-18 10:17
|
msedge.exe 30e74327b4f7bc2e556ac0a6d8e02dd2 Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check PDB Remote Code Execution |
|
|
|
|
0.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47238 |
2024-08-18 10:21
|
https://x.com/ 1911a4b09af1e5212912f6e1115e5306 Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format VirusTotal Malware Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
2
x.com(104.244.42.129) - compromised 104.244.42.65 - suspicious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47239 |
2024-08-18 10:28
|
https://casa13.pt.org.br/ AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
2
casa13.pt.org.br(140.238.238.160) 168.75.82.220
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47240 |
2024-08-18 10:30
|
https://pt.org.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
2
pt.org.br(140.238.238.160) 146.235.40.229
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47241 |
2024-08-18 10:30
|
https://lula.com.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
2
https://lula.com.br/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8b4e1e744dbd7c6d https://lula.com.br/
|
2
lula.com.br(172.67.213.24) 104.21.69.207
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47242 |
2024-08-18 14:14
|
3546345.exe fd2defc436fc7960d6501a01c91d893e Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32 Browser Info Stealer Malware download VirusTotal Malware Malicious Traffic Check memory buffers extracted unpack itself Collect installed applications suspicious TLD anti-virtualization installed browsers check CryptBot Browser ComputerName DNS |
1
http://thizx13vt.top/v1/upload.php
|
2
thizx13vt.top(195.133.48.136) 195.133.48.136
|
3
ET DNS Query to a *.top domain - Likely Hostile ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 ET INFO HTTP Request to a *.top domain
|
|
6.2 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47243 |
2024-08-18 14:17
|
Channel1.exe c0b1bacf44892b96abd3564716a2b4ee Generic Malware Malicious Library Malicious Packer Antivirus UPX AntiDebug AntiVM PE File PE64 OS Processor Check PowerShell PE32 VirusTotal Malware powershell AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities Disables Windows Security Checks Bios Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization Tofsee Windows Discord ComputerName Remote Code Execution DNS Cryptographic key |
6
http://58yongzhe.com/parts/setup1.exe - rule_id: 42034 http://194.58.114.223/d/385104 - rule_id: 41929 https://pastebin.com/raw/E0rY26ni - rule_id: 37702 https://yip.su/RNWPd.exe - rule_id: 37623 https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& https://iplogger.com/1lyxz - rule_id: 41935
|
12
iplogger.com(172.67.188.178) - mailcious 58yongzhe.com(62.133.62.93) - malware pastebin.com(104.20.4.235) - mailcious yip.su(172.67.169.89) - mailcious cdn.discordapp.com(162.159.133.233) - malware 104.20.3.235 - malware 91.121.59.207 162.159.130.233 - malware 172.67.188.178 - mailcious 62.133.62.93 194.58.114.223 - mailcious 172.67.169.89
|
10
ET DNS Query for .su TLD (Soviet Union) Often Malware Related SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) ET INFO Packed Executable Download ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) ET HUNTING Redirect to Discord Attachment Download
|
5
http://58yongzhe.com/parts/setup1.exe http://194.58.114.223/d/385104 https://pastebin.com/raw/E0rY26ni https://yip.su/RNWPd.exe https://iplogger.com/1lyxz
|
19.4 |
M |
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47244 |
2024-08-18 14:17
|
dl c110bf099b4b7f2591ba377488be0bf4 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47245 |
2024-08-18 14:19
|
Images.exe 544fb98f86fbbbfe6adc50a62772df10 Emotet Gen1 Generic Malware Malicious Library Malicious Packer UPX Admin Tool (Sysinternals etc ...) Downloader Anti_VM AntiDebug AntiVM PE File PE32 OS Processor Check DLL .NET DLL DllRegisterServer dll VirusTotal Malware AutoRuns Code Injection Check memory Checks debugger Creates executable files unpack itself suspicious process AppData folder malicious URLs WriteConsoleW Windows ComputerName |
1
http://www.heyderw.de/gpg/mpc-us.php
|
6
github.com(20.200.245.247) - mailcious raw.githubusercontent.com(185.199.109.133) - malware www.heyderw.de(92.205.208.182) - mailcious 92.205.208.182 20.200.245.247 - malware 185.199.109.133 - mailcious
|
1
ET POLICY Python-urllib/ Suspicious User Agent
|
|
6.8 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47246 |
2024-08-18 14:21
|
youngjuan.vbs 4ff4cc2242c1e40ba40b21e322494800 Generic Malware Antivirus Hide_URL PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
|
2
ia803104.us.archive.org(207.241.232.154) - malware 207.241.232.154 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
M |
2 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47247 |
2024-08-18 14:21
|
dl af0ebffab2ca7cffdc8a6aba7021e347 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.2 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47248 |
2024-08-19 10:50
|
WLive48x48.png 346e52bacfe42b2d4541fcc62e9d452f PNG Format |
|
|
|
|
|
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47249 |
2024-08-19 10:50
|
explorer.exe d08504a4718a999e104aef407bb43123 HermeticWiper Gen1 Emotet PhysicalDrive Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check PDB Remote Code Execution |
|
|
|
|
0.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47250 |
2024-08-19 11:10
|
DownVerySync.exe a54ca6fc8ecfab0cc46f506d29acfd19 Emotet Generic Malware Malicious Library UPX Malicious Packer PE File PE64 OS Processor Check DLL MSOffice File PE32 VirusTotal Malware suspicious privilege Checks debugger Creates executable files unpack itself AppData folder sandbox evasion WriteConsoleW Windows |
2
http://dl-cn.verysync.com/releases/v2.15.0/verysync-windows-amd64-v2.15.0.zip http://dl-cn.verysync.com/releases/
|
2
dl-cn.verysync.com(104.21.52.166) 104.21.52.166
|
2
ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile ET INFO AutoIt User-Agent Downloading ZIP
|
|
3.8 |
|
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|