48691 |
2024-10-08 21:41
|
123123.txt 658d46c7966d6d0e047dce33403a6650 ScreenShot AntiDebug AntiVM |
|
|
|
|
0.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48692 |
2024-10-08 21:44
|
Extension-http.exe 4006811cd7916ac2258c0c81c6e3cf43 Malicious Library Malicious Packer UPX PE File PE32 VirusTotal Malware unpack itself DNS |
|
1
89.197.154.116 - mailcious
|
|
|
4.2 |
M |
61 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48693 |
2024-10-08 21:44
|
Meeting-https.exe 4b61a3d79a892267bf6e76a54e188cc0 Generic Malware Malicious Library WinRAR UPX Malicious Packer PE File PE64 OS Processor Check icon PNG Format PE32 VirusTotal Malware PDB Creates executable files AppData folder Remote Code Execution |
|
|
|
|
2.6 |
M |
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48694 |
2024-10-08 21:47
|
7f3c2473d1e6.exe#sp_vid f31e12f0766f3a345b1a4eddeb3d8307 Client SW User Data Stealer LokiBot Gen1 ftp Client info stealer Generic Malware Malicious Library UPX ASPack Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File PE32 OS Processor Check .NET EXE FTP Client Info Stealer Malware Telegram MachineGuid Code Injection Malicious Traffic Check memory buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software crashed |
1
https://steamcommunity.com/profiles/76561199786602107
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(104.74.170.104) - mailcious 149.154.167.99 - mailcious 104.76.74.15 - mailcious 5.75.211.100
|
3
ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
14.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48695 |
2024-10-08 21:47
|
taskhostw.exe a3939099773cda5b2c94a6f1061ffa19 Generic Malware Malicious Library .NET framework(MSIL) Antivirus PWS SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware powershell Telegram suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities Collect installed applications powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW IP Check installed browsers check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
2
http://checkip.dyndns.org/ https://reallyfreegeoip.org/xml/175.208.134.152
|
8
checkip.dyndns.org(132.226.8.169) smtp.hostinger.com(172.65.255.143) reallyfreegeoip.org(172.67.177.134) api.telegram.org(149.154.167.220) - mailcious 193.122.6.168 172.65.255.143 172.67.177.134 149.154.167.220 - mailcious
|
9
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) ET HUNTING Telegram API Domain in DNS Lookup ET POLICY External IP Lookup - checkip.dyndns.org ET INFO 404/Snake/Matiex Keylogger Style External IP Check
|
|
19.2 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48696 |
2024-10-08 21:48
|
Journal-https.exe 01eec167288db3f18288cc9c88adb3c6 Malicious Library PE File PE64 VirusTotal Malware RWX flags setting unpack itself ComputerName DNS |
|
1
89.197.154.116 - mailcious
|
|
|
5.2 |
M |
60 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48697 |
2024-10-08 21:48
|
BroadcomRetest.exe 6c5058cdea005156044e55525b31a488 Malicious Packer UPX PE File PE32 VirusTotal Malware unpack itself DNS |
|
2
172.65.255.143 89.197.154.116 - mailcious
|
|
|
4.0 |
M |
61 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48698 |
2024-10-08 21:50
|
Session.exe b079e06ca60cf07b35abd19e225d3e1c Malicious Library PE File PE64 VirusTotal Malware RWX flags setting unpack itself ComputerName DNS |
|
1
89.197.154.116 - mailcious
|
|
|
5.2 |
M |
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48699 |
2024-10-08 21:51
|
LoadNew.exe 414753e6caa05ca4a49546cec841ef10 Generic Malware UPX Malicious Library Malicious Packer PE File PE64 DLL PE32 OS Processor Check VirusTotal Malware Malicious Traffic Check memory buffers extracted Creates executable files Windows DNS crashed |
2
http://147.45.116.5/FANTASMA/install_2.exe http://147.45.116.5/FANTASMA/g2m.dll
|
1
|
3
ET INFO Dotted Quad Host DLL Request ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Download from dotted-quad Host
|
|
4.6 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48700 |
2024-10-08 21:53
|
salluireallymissyousallutrulyi... 72dd90d54b9dcfe691ff308a9cacb72f MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic exploit crash unpack itself Tofsee Exploit DNS crashed |
1
http://107.175.242.80/430/sweetbuddygirltodaysherewith.tIF
|
4
ia600100.us.archive.org(207.241.227.240) - mailcious 207.241.227.240 - mailcious
172.67.177.134
107.175.242.80 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.6 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48701 |
2024-10-08 21:53
|
956d73b7f041.exe#default15st a3ad404cc615fc48ddfc3ddba9896dfa Stealc Client SW User Data Stealer Gen1 ftp Client info stealer Generic Malware Malicious Library UPX Http API PWS HTTP Internet API AntiDebug AntiVM PE File PE32 OS Processor Check Malware download Malware c&c Code Injection Malicious Traffic Check memory buffers extracted unpack itself Stealc ComputerName DNS crashed |
2
http://62.204.41.150/ - rule_id: 42951 http://62.204.41.150/edd20096ecef326d.php
|
1
62.204.41.150 - mailcious
|
2
ET DROP Spamhaus DROP Listed Traffic Inbound group 6 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in
|
1
|
8.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48702 |
2024-10-08 21:55
|
am10.exe 934310f719707becac6a69b4579f6fd2 Amadey Generic Malware Malicious Library Malicious Packer UPX Antivirus PE File PE32 OS Processor Check Browser Info Stealer Malware download Amadey VirusTotal Malware powershell AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files exploit crash unpack itself suspicious process AppData folder installed browsers check Windows Exploit Browser ComputerName DNS Cryptographic key crashed |
1
http://31.41.244.10/Dem7kTu/index.php - rule_id: 42202
|
2
31.41.244.10 - malware 185.215.113.103 - mailcious
|
4
ET DROP Spamhaus DROP Listed Traffic Inbound group 32 ET INFO PS1 Powershell File Request ET DROP Spamhaus DROP Listed Traffic Inbound group 2 ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2
|
1
http://31.41.244.10/Dem7kTu/index.php
|
10.8 |
M |
60 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48703 |
2024-10-08 21:55
|
04a4f32fae41.exe#d16 43f5318d55a4c0f947d592a271898ceb Client SW User Data Stealer LokiBot Gen1 ftp Client info stealer Generic Malware Malicious Library UPX ASPack Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File PE32 OS Processor Check .NET EXE FTP Client Info Stealer Malware Telegram MachineGuid Code Injection Malicious Traffic Check memory buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software crashed |
2
https://steamcommunity.com/profiles/76561199786602107
https://t.me/maslengdsa
|
5
t.me(149.154.167.99) - mailcious
steamcommunity.com(104.74.170.104) - mailcious 149.154.167.99 - mailcious
104.74.170.104 - mailcious
5.75.211.100
|
3
ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
14.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48704 |
2024-10-08 21:57
|
CCRNC.txt.exe 1a3fee38ced030e1751a309616c39202 Browser Login Data Stealer Generic Malware Malicious Library Downloader Malicious Packer UPX PE File PE32 OS Processor Check VirusTotal Malware DNS DDNS |
|
2
michelsrmccontrol.duckdns.org(107.175.130.20) 107.175.130.20
|
2
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
|
|
3.8 |
|
61 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48705 |
2024-10-08 21:57
|
g2m.dll e0fa9d4894017e66af927bd72df16793 Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check VirusTotal Malware PDB unpack itself crashed |
|
|
|
|
1.4 |
M |
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|