48751 |
2024-10-12 09:32
|
0a839761915d.exe da1302fbc2573f8bfda7691a95babfaa Generic Malware Malicious Library UPX ScreenShot AntiDebug AntiVM PE File PE32 OS Processor Check Code Injection buffers extracted unpack itself crashed |
|
|
|
|
6.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48752 |
2024-10-12 09:32
|
67065a0933c9e_UUESUpdater.exe 0e926b28fc49f6259a70c032ae83cd14 Malicious Library PE File .NET EXE PE32 Lnk Format GIF Format VirusTotal Malware AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder Windows ComputerName |
|
|
|
|
6.6 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48753 |
2024-10-12 09:35
|
aeGTitPRCz9BKKQ.exe 0d1ae777c0410769dae40033758321b9 Generic Malware Malicious Library .NET framework(MSIL) Antivirus PWS SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Telegram suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
2
http://checkip.dyndns.org/ https://reallyfreegeoip.org/xml/175.208.134.152
|
6
api.telegram.org(149.154.167.220) - mailcious reallyfreegeoip.org(104.21.67.152) checkip.dyndns.org(193.122.130.0) 193.122.130.0 172.67.177.134 149.154.167.220 - mailcious
|
9
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) ET INFO TLS Handshake Failure ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) ET POLICY External IP Lookup - checkip.dyndns.org ET INFO 404/Snake/Matiex Keylogger Style External IP Check ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI ET HUNTING Telegram API Domain in DNS Lookup
|
|
16.0 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48754 |
2024-10-12 09:36
|
tIelklVKfumqUfa.exe 75893771b8664b9e896e38274c6a052d Generic Malware Malicious Library .NET framework(MSIL) Antivirus PWS SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Telegram suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
2
http://checkip.dyndns.org/ https://reallyfreegeoip.org/xml/175.208.134.152
|
6
api.telegram.org(149.154.167.220) - mailcious reallyfreegeoip.org(104.21.67.152) checkip.dyndns.org(132.226.247.73) 132.226.8.169 104.21.67.152 149.154.167.220 - mailcious
|
9
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) ET HUNTING Telegram API Domain in DNS Lookup ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) ET POLICY External IP Lookup - checkip.dyndns.org ET INFO 404/Snake/Matiex Keylogger Style External IP Check
|
|
14.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48755 |
2024-10-12 09:39
|
1654365431.exe 31d649663149dabd99c51b71e60a4a91 Malicious Library Admin Tool (Sysinternals etc ...) UPX PE File PE64 MZP Format OS Processor Check VirusTotal Malware suspicious privilege unpack itself DNS |
|
1
146.70.24.213 - mailcious
|
|
|
2.6 |
M |
12 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48756 |
2024-10-12 09:41
|
amd64.exe 35b5a66be6e3bcfbf109f19ceac7cbb1 Malicious Library Malicious Packer UPX PE File PE64 VirusTotal Malware DNS |
|
1
|
|
|
1.8 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48757 |
2024-10-12 11:29
|
Um9L61WgOApLFKJ.exe 3f6058dbb64084df7f3da0a1cb23a872 Generic Malware Malicious Library .NET framework(MSIL) Antivirus DNS AntiDebug AntiVM PE File .NET EXE PE32 Malware download Nanocore Cobalt Strike NetWireRC VirusTotal Malware Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities suspicious process WriteConsoleW human activity check Windows RAT ComputerName DNS Cryptographic key DDNS |
|
2
blv23728.ddns.net(103.151.125.139) 103.151.125.139
|
5
ET POLICY DNS Query to DynDNS Domain *.ddns .net ET MALWARE NanoCore RAT CnC 7 ET MALWARE NanoCore RAT Keep-Alive Beacon (Inbound) ET MALWARE NanoCore RAT Keepalive Response 3 ET MALWARE NanoCore RAT Keepalive Response 1
|
|
13.4 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48758 |
2024-10-12 11:30
|
Smmestinget143.vbs 0fc9528df599123c95ea5ae0a043f662 Generic Malware Suspicious_Script_Bin Antivirus AntiDebug AntiVM Malware download NetWireRC VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger buffers extracted WMI Creates shortcut unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows RAT ComputerName DNS Cryptographic key |
3
http://ip-api.com/json/ https://filedn.com/lK8iuOs2ybqy4Dz6sat9kSz/Hasselmus.jpb https://filedn.com/lK8iuOs2ybqy4Dz6sat9kSz/QblVUbUiHwTSX245.bin
|
6
filedn.com(74.120.9.25) - malware vshell.io(144.126.151.240) ip-api.com(208.95.112.1) 144.126.151.240 - mailcious 74.120.9.25 - malware 208.95.112.1
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE Common RAT Connectivity Check Observed ET POLICY External IP Lookup ip-api.com ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
|
|
11.6 |
|
1 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48759 |
2024-10-12 18:43
|
67065b4c84713_Javiles.exe 8be8e5e57fc2a177c12ac52d6f71157c Gen1 Generic Malware Malicious Library UPX Malicious Packer PE File .NET EXE PE32 OS Processor Check MZP Format DLL PE64 VirusTotal Malware AutoRuns PDB suspicious privilege MachineGuid Malicious Traffic Check memory Creates executable files Windows utilities AppData folder WriteConsoleW Firewall state off IP Check Windows ComputerName DNS |
2
http://147.45.44.104/prog/66f55533ca7d6_RDPWInst.exe - rule_id: 42153 http://api.ipify.org/
|
3
api.ipify.org(172.67.74.152) 147.45.44.104 - malware 104.26.12.205
|
7
ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Executable Download from dotted-quad Host ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup ET POLICY External IP Lookup api.ipify.org
|
1
|
9.6 |
M |
52 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48760 |
2024-10-12 18:44
|
67081de6be937_ParticlerOps.exe dc724c3aafa18b464c83bd5910407805 Gen1 Generic Malware Malicious Library UPX Malicious Packer ASPack PE File PE32 DLL OS Processor Check VirusTotal Malware Check memory Checks debugger Creates executable files AntiVM_Disk VM Disk Size Check |
|
|
|
|
2.4 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48761 |
2024-10-12 18:45
|
67065227a0640_rrrrrrrr.exe 356279b22763084935165ad080b0ae9a ROMCOM RAT PE File PE64 VirusTotal Cryptocurrency Miner Malware DNS CoinMiner |
|
2
pool.hashvault.pro(131.153.76.130) - mailcious 125.253.92.50 - mailcious
|
1
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
|
|
1.8 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48762 |
2024-10-12 18:46
|
DetahNote_J.jpg.exe 422f46bde8df2dc15a939bdd87d48778 Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 .NET DLL OS Processor Check VirusTotal Malware PDB |
|
|
|
|
1.4 |
|
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48763 |
2024-10-12 18:46
|
333343MPDW-constraints.vbs aaa69be437a05f43d51f62c7aca0210f Generic Malware Antivirus Hide_URL VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
|
2
raw.githubusercontent.com(185.199.111.133) - malware 185.199.110.133 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
M |
5 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48764 |
2024-10-12 18:47
|
tdrp.exe 21b61b3680c5e66f9f7b1f3026327757 UPX PE File PE32 Malware download VirusTotal Malware Malicious Traffic Creates executable files Windows DNS |
1
http://185.215.113.66/tdrpl.exe - rule_id: 39702
|
2
185.215.113.66 - malware 125.253.92.50 - mailcious
|
5
ET INFO Executable Download from dotted-quad Host ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
1
|
3.4 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
48765 |
2024-10-12 18:48
|
nighttttMPDW-constraints.vbs ba21082c47f33b42f6243198bea92684 Generic Malware Antivirus Hide_URL PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
|
2
raw.githubusercontent.com(185.199.108.133) - malware 185.199.109.133 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
M |
5 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|