50101 |
2020-11-24 10:42
|
presh.doc 04fb044011085bc906ede48c396020c5 VirusTotal Malware Malicious Traffic exploit crash unpack itself malicious URLs Windows Exploit DNS crashed |
2
http://www.findingthefaceofgod.com/glt/?t6Ad=rJECXYm6hAAuPN6r9R2oMRy4nctwrgC2r4/OPXpATQOWGd6USqGA0A5FGF323nrIqdxeyTN+&9r4l2=xPGtQhiHB http://www.active-connector.xyz/glt/?t6Ad=4CvC+Bo6kfUKXuwYzILrtBr0b7aZwszRqfgMH+f0xR1MXxCmIMo9FWQq0U2yxu0mLsT+gC4z&9r4l2=xPGtQhiHB
|
5
www.active-connector.xyz(198.54.117.217) www.findingthefaceofgod.com(34.102.136.180) 103.207.38.170 - suspicious 34.102.136.180 - suspicious 198.54.117.217 - suspicious
|
5
ET INFO Executable Download from dotted-quad Host ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
5.2 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50102 |
2020-11-24 10:33
|
Ohms.exe 3070eba41971269de72494cb416f60cf VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW Ransomware Windows Tor ComputerName DNS crashed |
|
|
|
|
14.8 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50103 |
2020-11-24 10:33
|
li.exe 59dbb16e78443176b4411b03e2e4598a Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted ICMP traffic unpack itself Check virtual network interfaces malicious URLs IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
1
http://checkip.dyndns.org/
|
4
mail.sapgroup.com.pk(95.215.225.23) checkip.dyndns.org(162.88.193.70) 162.88.193.70 95.215.225.23
|
5
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain SURICATA Applayer Detect protocol only one direction SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY External IP Lookup - checkip.dyndns.org ET POLICY DynDNS CheckIp External IP Address Server Response
|
|
14.8 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50104 |
2020-11-24 10:10
|
in.exe a1fe6cc921fb6ac3c10d11c4ed1a0b01 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself malicious URLs DNS |
|
|
|
|
8.2 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50105 |
2020-11-24 10:09
|
ewa.exe 80c6700fc3546cb510e5cd7497d13d7a VirusTotal Malware Check memory Checks debugger unpack itself |
|
|
|
|
2.2 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50106 |
2020-11-24 10:02
|
ewa.exe 80c6700fc3546cb510e5cd7497d13d7a VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW Ransomware Windows Tor ComputerName DNS crashed |
|
|
|
|
15.2 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50107 |
2020-11-24 10:00
|
app.exe 9664af963ef2d8889eeadd49c4b097e7 VirusTotal Malware unpack itself malicious URLs |
|
|
|
|
2.4 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50108 |
2020-11-24 09:26
|
RL Simple Replay Editor.exe 834d1178ddb53a4d76ad9ef05ec67f20 VirusTotal Malware Checks debugger unpack itself crashed |
|
|
|
|
1.6 |
|
3 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50109 |
2020-11-24 08:03
|
https://d3727mhevtk2n4.cloudfr... 66bb8e74def01a190673f6ea71c102ca Code Injection unpack itself Windows utilities Tofsee Windows |
1
https://d3727mhevtk2n4.cloudfront.net/srv-stg-agent
|
2
d3727mhevtk2n4.cloudfront.net(54.192.60.132) 99.86.149.108
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
2.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50110 |
2020-11-24 07:59
|
https://d3727mhevtk2n4.cloudfr... 66bb8e74def01a190673f6ea71c102ca Code Injection unpack itself Windows utilities Tofsee Windows |
1
https://d3727mhevtk2n4.cloudfront.net/srv-stg-agent
|
2
d3727mhevtk2n4.cloudfront.net(54.192.60.170) 99.86.149.108
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
2.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50111 |
2020-11-24 07:51
|
https://thebabsite.com/app/app... 5fc0b6da6d40f975a057a5cb9fa33bf5 Dridex VirusTotal Malware Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities AppData folder malicious URLs Tofsee Windows Exploit DNS crashed |
1
https://thebabsite.com/app/app.exe
|
2
thebabsite.com(104.18.60.27) 104.18.60.27
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET JA3 Hash - Possible Malware - Unknown traffic associated with Dridex
|
|
5.4 |
|
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50112 |
2020-11-23 15:55
|
5.exe f139bcd08ad8da406f7dd25411d1c9b3 VirusTotal Malware unpack itself malicious URLs |
|
|
|
|
2.8 |
M |
60 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50113 |
2020-11-23 14:43
|
5.exe f139bcd08ad8da406f7dd25411d1c9b3 VirusTotal Malware unpack itself malicious URLs |
|
|
|
|
2.8 |
M |
60 |
admin
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50114 |
2020-11-23 14:26
|
document.doc d188556b8782a4594736c1aeef79f2f5 VirusTotal Malware Malicious Traffic ICMP traffic exploit crash unpack itself malicious URLs Tofsee Windows Exploit crashed |
5
http://fancy-yoron-0802.boyfriend.jp/ABW.exe https://hastebin.com/raw/apafuxemog https://hastebin.com/raw/geyeqisopu https://hastebin.com/raw/ubatuvicif https://hastebin.com/raw/amuxobebix
|
6
fancy-yoron-0802.boyfriend.jp(163.44.185.233) swryijgrvcsgkopnmcdertvgdswbvmophtfdczxs.ydns.eu(192.253.246.142) - mailcious hastebin.com(104.24.127.89) - mailcious 163.44.185.233 104.24.126.89 - suspicious 192.253.246.142
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY PE EXE or DLL Windows file download HTTP
|
|
6.4 |
|
24 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50115 |
2020-11-23 14:23
|
5.exe f139bcd08ad8da406f7dd25411d1c9b3 VirusTotal Malware unpack itself malicious URLs |
|
|
|
|
2.8 |
M |
60 |
admin
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|