49696 |
2020-12-29 13:05
|
Arcserve_Unified_Data_Protecti... d41d8cd98f00b204e9800998ecf8427e |
|
|
|
|
0.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49697 |
2020-12-29 12:31
|
ask.exe 08ce06744e5fa947d7639cf606c4ff5c VirusTotal Malware DNS |
|
|
|
|
1.8 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49698 |
2020-12-29 12:30
|
apdf.exe 4091edb6fc4ddec9dc69a3a6dd60d929 VirusTotal Malware powershell AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut Creates executable files unpack itself powershell.exe wrote suspicious process malicious URLs AntiVM_Disk WriteConsoleW VM Disk Size Check Windows ComputerName Cryptographic key |
|
|
|
|
12.0 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49699 |
2020-12-29 12:26
|
apdf.exe 4091edb6fc4ddec9dc69a3a6dd60d929 Browser Info Stealer VirusTotal Malware powershell AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files unpack itself powershell.exe wrote suspicious process malicious URLs AntiVM_Disk WriteConsoleW VM Disk Size Check Windows Browser ComputerName DNS Cryptographic key |
|
1
|
|
|
15.6 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49700 |
2020-12-29 12:25
|
add.exe e6731de795cc99d6186f1d94ff5a03e6 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns suspicious privilege Check memory Checks debugger Creates executable files unpack itself Windows utilities suspicious process AppData folder malicious URLs WriteConsoleW Ransomware Windows Browser Tor Email ComputerName Cryptographic key Software crashed keylogger |
|
|
|
|
12.6 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49701 |
2020-12-29 12:11
|
0QD13JK5BSW67X42.doc a31982ecb88498bb30b0c1a289d82c6b Vulnerability VirusTotal Malware Malicious Traffic ICMP traffic unpack itself malicious URLs Windows DNS |
3
http://memoria.od.ua/wp-admin/GbLB2/ http://24.231.88.85/mx099cdjvh4mju6/rzkb3row8mhu63wem/ http://helionspharmaceutical.com/wp-admin/Yg/
|
5
helionspharmaceutical.com(104.24.121.146) - malware memoria.od.ua(185.104.45.30) - mailcious 185.104.45.30 - mailcious 24.231.88.85 172.67.189.103
|
3
ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO EXE - Served Attached HTTP
|
|
6.0 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49702 |
2020-12-29 12:11
|
YZ3CK00V3KVPD.doc a31982ecb88498bb30b0c1a289d82c6b Vulnerability VirusTotal Malware Malicious Traffic unpack itself malicious URLs Windows DNS |
3
http://memoria.od.ua/wp-admin/GbLB2/ http://helionspharmaceutical.com/wp-admin/Yg/ http://24.231.88.85/z4fgh5l/lv1gww7ii/sh5b52ak9qgbj7nsi5/k5qt3r51rboei665f/uh7o7dlj3m/laq17f1k6idubxm/
|
5
helionspharmaceutical.com(104.24.121.146) - malware memoria.od.ua(185.104.45.30) - mailcious 185.104.45.30 - mailcious 24.231.88.85 172.67.189.103
|
3
ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO EXE - Served Attached HTTP
|
|
5.2 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49703 |
2020-12-29 11:13
|
111.doc 3de02c4740511692cdc896dbbd4f7648 Vulnerability VirusTotal Malware Malicious Traffic unpack itself malicious URLs Windows DNS |
3
http://memoria.od.ua/wp-admin/GbLB2/ http://24.231.88.85/0k2eoofk47/ http://helionspharmaceutical.com/wp-admin/Yg/
|
5
helionspharmaceutical.com(172.67.189.103) - malware memoria.od.ua(185.104.45.30) - mailcious 185.104.45.30 - mailcious 104.24.120.146 - malware 24.231.88.85
|
3
ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO EXE - Served Attached HTTP
|
|
5.0 |
|
15 |
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49704 |
2020-12-27 15:03
|
Doc1.dotm 1a575a4cbc7fa8faba585373c44e3edb VirusTotal Malware Code Injection unpack itself malicious URLs DNS |
2
http://47.101.57.72:8001/AIlf http://47.101.57.72:8001/pixel
|
1
|
|
|
6.8 |
|
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49705 |
2020-12-27 15:01
|
nethelper.dll e835f27f6b6a2b0af42873ce2cc6cc07 VirusTotal Malware unpack itself malicious URLs |
|
|
|
|
2.6 |
|
42 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49706 |
2020-12-26 22:10
|
form.exe c8eeac24eca23bd1df10b02d5430432d Malware PDB Malicious Traffic Check memory buffers extracted WMI Creates executable files unpack itself Check virtual network interfaces AppData folder malicious URLs sandbox evasion anti-virtualization ComputerName DNS Software AnyDesk |
1
http://api.playanext.com/httpapi
|
6
relay-9b8a0681.net.anydesk.com(84.17.34.78) boot-01.net.anydesk.com(49.12.130.237) api.playanext.com(52.89.164.251) 84.17.34.78 52.40.199.242 88.198.34.103
|
1
ET POLICY SSL/TLS Certificate Observed (AnyDesk Remote Desktop Software)
|
|
8.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49707 |
2020-12-26 22:10
|
image.jpg.exe aebeb7b1a23449b44195814dda4fb002 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Buffer PE suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted RWX flags setting unpack itself Check virtual network interfaces malicious URLs IP Check Tofsee Ransomware Interception Windows Browser Tor Email ComputerName Cryptographic key Software crashed |
3
http://crt.comodoca.com/COMODORSAAddTrustCA.crt https://cdn.discordapp.com/attachments/775608373949235243/783377635308601394/Xrwello https://api.ipify.org/
|
8
discord.com(162.159.136.232) api.ipify.org(23.23.100.164) crt.comodoca.com(91.199.212.52) cdn.discordapp.com(162.159.135.233) - malware 91.199.212.52 54.221.253.252 162.159.136.232 162.159.130.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
17.2 |
M |
58 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49708 |
2020-12-26 21:41
|
docs34.xlsx 7c630efe0e3a7059b6ca53c4cc94a1d1 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Buffer PE suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted RWX flags setting unpack itself Check virtual network interfaces malicious URLs IP Check Tofsee Ransomware Interception Windows Browser Tor Email ComputerName DNS Cryptographic key Software crashed |
3
http://crt.comodoca.com/COMODORSAAddTrustCA.crt https://api.ipify.org/ https://cdn.discordapp.com/attachments/775608373949235243/783607745068138526/Qeywerd
|
8
discord.com(162.159.136.232) api.ipify.org(23.21.252.4) crt.comodoca.com(91.199.212.52) cdn.discordapp.com(162.159.134.233) - malware 91.199.212.52 162.159.130.233 - malware 162.159.128.233 54.225.66.103
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
17.4 |
M |
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49709 |
2020-12-26 21:38
|
hgtfQlN8Vz.vx.exe 0dd3a14f922feac556d68299ea87ca26 VirusTotal Malware Check memory unpack itself crashed |
|
|
|
|
2.0 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
49710 |
2020-12-26 18:51
|
customer1.exe c3c1704da6242a52877806e3bde2c46b Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW installed browsers check Windows Exploit Browser ComputerName RCE DNS crashed |
4
http://139.180.207.31:8080/plugin/populationStatistics/work?type=1&ip=175.208.134.150&country=KR http://www.ukndesw19x.com/lqosko/p18j/curl.exe http://139.180.207.31:8070/cookie/useStatistics/count?username=customer1 http://www.ukndesw19x.com/lqosko/p18j/cookie-parse.exe
|
5
www.ukndesw19x.com(45.77.254.200) - malware get.geojs.io(104.26.0.100) 139.180.207.31 45.77.254.200 - malware 104.26.1.100
|
2
ET INFO Packed Executable Download ET POLICY PE EXE or DLL Windows file download HTTP
|
|
13.2 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|