50581 |
2020-11-18 18:19
|
OSW.exe db4fc561ac6d5394b38a7700964cd82c VirusTotal Malware AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs IP Check Windows Cryptographic key |
1
|
2
api.ipify.org(54.243.164.148) 54.235.142.93
|
1
ET POLICY External IP Lookup api.ipify.org
|
|
10.2 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50582 |
2020-11-18 18:14
|
OGtxupQ48uyfia3.exe 78f9fe744846ebeb2d2e7224af27f02c Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
6
orisinlog.com(104.219.248.45) - mailcious freegeoip.app(104.28.5.151) checkip.dyndns.org(216.146.43.70) 131.186.113.70 104.28.5.151 104.219.248.45 - suspicious
|
5
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain ET POLICY External IP Lookup - checkip.dyndns.org ET POLICY DynDNS CheckIp External IP Address Server Response SURICATA Applayer Detect protocol only one direction SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
13.2 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50583 |
2020-11-18 18:14
|
nass.exe d9e4ff69934ce995feaa9e54e0d5ad07 VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger ICMP traffic unpack itself Windows utilities malicious URLs Windows |
2
http://www.callcarri.com/egem/?nH=NWnZQTcna5t/nu/s4oAMHWg35JQ/oazXNtvv6n8CBIs34q2zeQzOTrxFh3/C8ftYbUtDquhk&GFQL8=6l8PHnrP1P7h8H4 http://www.466o.com/egem/?nH=zhi8JGSS0t6QUFlLBd2AqNgZCfa2cfNrEF16BKrlBOX4Q8uao6ZrdVOGbDUCKS3eeocsMxaX&GFQL8=6l8PHnrP1P7h8H4
|
5
www.callcarri.com(31.220.21.150) www.466o.com(3.12.202.18) www.kooka-burra.com() 3.138.72.189 31.220.21.150
|
|
|
6.6 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50584 |
2020-11-18 18:10
|
emthree.exe b017a31549aa5edeccecab2f3e717d1b VirusTotal Malware Buffer PE suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder malicious URLs Windows DNS Cryptographic key |
|
|
|
|
10.4 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50585 |
2020-11-18 18:10
|
ebyjon.exe 7e0601f46369fa6ad8d291b1205068d5 VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder malicious URLs Windows ComputerName Cryptographic key crashed |
|
|
|
|
12.2 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50586 |
2020-11-18 18:03
|
abw.exe 678dac5fc4c6a55f032ba40698895e6a Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW human activity check Windows ComputerName Cryptographic key crashed |
|
2
swryijgrvcsgkopnmcdertvgdswbvmophtfdczxs.ydns.eu(192.253.246.142) - mailcious 192.253.246.142
|
|
|
15.6 |
M |
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50587 |
2020-11-18 18:03
|
eic.exe 665bfadaa21dc3f298b0c886b6867cd1 VirusTotal Malware AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs IP Check Windows DNS crashed |
1
|
2
api.ipify.org(54.204.14.42) 54.243.164.148
|
1
ET POLICY External IP Lookup api.ipify.org
|
|
10.8 |
M |
48 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50588 |
2020-11-18 13:43
|
ebyjon.exe 7e0601f46369fa6ad8d291b1205068d5 VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder malicious URLs Windows ComputerName Cryptographic key crashed |
|
|
|
|
12.0 |
|
22 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50589 |
2020-11-18 12:32
|
ebyjon.exe 7e0601f46369fa6ad8d291b1205068d5 VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder malicious URLs Ransomware Windows Tor ComputerName Cryptographic key crashed |
|
|
|
|
13.2 |
|
22 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50590 |
2020-11-18 10:28
|
ebyjon.exe 7e0601f46369fa6ad8d291b1205068d5 VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself AppData folder malicious URLs Ransomware Windows Tor ComputerName Cryptographic key crashed |
|
|
|
|
13.2 |
|
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50591 |
2020-11-18 10:27
|
eic.exe 665bfadaa21dc3f298b0c886b6867cd1 VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger unpack itself malicious URLs Windows DNS crashed |
|
|
|
|
7.2 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50592 |
2020-11-18 09:37
|
document1.doc f9a6dc3c7aa957c70e4f539d72e54c4f Malware download Azorult VirusTotal Malware Malicious Traffic exploit crash unpack itself malicious URLs Zeus Windows Exploit DNS crashed |
|
3
hgygbgfazoruthyshbcfzjzkdgbzbdzzsddfxfsa.ydns.eu(151.80.14.230) - mailcious 151.80.14.230 - suspicious 151.80.8.30 - suspicious
|
7
ET INFO Executable Download from dotted-quad Host ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE AZORult v3.3 Server Response M3 ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
|
|
5.6 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50593 |
2020-11-18 09:37
|
document.doc 41820dc68297b85f7dc85540a3423c1d VirusTotal Malware Malicious Traffic exploit crash unpack itself malicious URLs Windows Exploit DNS crashed Downloader |
1
http://151.80.8.30/abw.exe
|
3
swryijgrvcsgkopnmcdertvgdswbvmophtfdczxs.ydns.eu(192.253.246.140) - mailcious 192.253.246.140 151.80.8.30 - suspicious
|
6
ET INFO Executable Download from dotted-quad Host ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
6.2 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50594 |
2020-11-18 09:33
|
CKC.exe d54d01d0a3a073d1d2a3b70e0d9852cc VirusTotal Malware AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs IP Check Windows Cryptographic key |
1
|
2
api.ipify.org(54.235.182.194) 54.243.161.145
|
1
ET POLICY External IP Lookup api.ipify.org
|
|
10.4 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50595 |
2020-11-18 09:30
|
3MLDad2sFoYnTE9.exe 8849ec79aac67ee11e47fca7938ccfb5 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW IP Check Tofsee Windows Browser ComputerName Software crashed keylogger |
2
http://icanhazip.com/ https://raw.githubusercontent.com/pandalog/nothing/master/john.txt
|
6
orisinlog.com(104.219.248.45) - mailcious icanhazip.com(147.75.47.199) raw.githubusercontent.com(151.101.192.133) - malware 147.75.47.199 104.219.248.45 - suspicious 151.101.76.133 - suspicious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY IP Check Domain (icanhazip. com in HTTP Host) SURICATA Applayer Detect protocol only one direction
|
|
11.2 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|