5566 |
2021-03-03 09:58
|
new.bat 588fec39cf540c4cb8290588ea68510c Malware powershell AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger WMI Creates shortcut unpack itself Windows utilities Disables Windows Security powershell.exe wrote Check virtual network interfaces suspicious process malicious URLs WriteConsoleW Windows ComputerName DNS Cryptographic key |
2
http://hpsj.firewall-gateway.net/view/TEST22-PC-DBKTS http://hpsj.firewall-gateway.net/login
|
2
hpsj.firewall-gateway.net(18.189.43.84) - mailcious 18.189.43.84 - mailcious
|
2
ET INFO PowerShell DownloadString Command Common In Powershell Stagers SURICATA HTTP Request unrecognized authorization method
|
|
10.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5567 |
2021-03-03 10:00
|
NewBSPlink Document.doc e582f3f495cbd17ca0c4a63e3ee8d7db Vulnerability VirusTotal Malware unpack itself malicious URLs |
1
http://159.89.238.15/new.bat
|
|
|
|
3.8 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5568 |
2021-03-03 10:13
|
QS.exe 8843f7bcc17f04613cb0b97181b60b8d Check memory Creates executable files unpack itself AppData folder malicious URLs |
|
|
|
|
3.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5569 |
2021-03-03 10:15
|
R.exe f454674192c23053843a3b493b3d0e7f VirusTotal Malware AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger WMI Creates shortcut Creates executable files unpack itself Windows utilities malicious URLs AntiVM_Disk sandbox evasion WriteConsoleW VM Disk Size Check installed browsers check Windows Browser ComputerName Trojan Banking DNS |
2
http://rmansys.ru/utils/inet_id_notify.php - rule_id: 324 http://rmansys.ru/utils/inet_id_notify.php?test=1 - rule_id: 324
|
4
rms-server.tektonit.ru(185.175.44.167) - mailcious rmansys.ru(31.31.198.18) - mailcious 185.175.44.167 31.31.198.18
|
|
2
http://rmansys.ru/utils/inet_id_notify.php http://rmansys.ru/utils/inet_id_notify.php
|
11.0 |
M |
54 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5570 |
2021-03-03 10:23
|
setup_2-2-1.exe 2aaad863fd1f461ad37fab75511ad094 VirusTotal Malware Malicious Traffic Check memory Checks debugger unpack itself malicious URLs Tofsee Windows DNS |
3
http://edgedl.gvt1.com/edgedl/release2/update2/ALmnr7lDhOvozdF08iOk7Ks_1.3.36.72/GoogleUpdateSetup.exe https://update.googleapis.com/service/update2 https://update.googleapis.com/service/update2?cup2key=10:2604977300&cup2hreq=4b7bcbf74d43b02f5b5b89134dc2da69dc1e258c0d62b4c126ec12983e3e5f27
|
2
edgedl.gvt1.com(142.250.34.2) 142.250.34.2
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO EXE - Served Attached HTTP ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
|
|
4.4 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5571 |
2021-03-03 10:23
|
setup_2-2.exe 0d93d4c4e466675bca3fb9705654e9c7 VirusTotal Malware suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files unpack itself malicious URLs AntiVM_Disk suspicious TLD VM Disk Size Check installed browsers check Tofsee Ransomware Browser ComputerName DNS |
1
|
4
giddosdownload.github.io(185.199.108.153) yip.su(88.99.66.31) - mailcious 88.99.66.31 - mailcious 185.199.111.153 - malware
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET DNS Query for .su TLD (Soviet Union) Often Malware Related
|
|
7.8 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5572 |
2021-03-03 10:33
|
six.exe 535d5361da7c8a874b28cbd77cc5dac4 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself malicious URLs Ransomware Windows Tor ComputerName Cryptographic key crashed |
|
|
|
|
11.0 |
M |
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5573 |
2021-03-03 10:34
|
6jhfa478.exe 77be0dd6570301acac3634801676b5d7 VirusTotal Malware ICMP traffic malicious URLs IP Check DNS |
1
http://api.ipify.org/?format=xml
|
4
sweyblidian.com(185.100.65.29) - mailcious api.ipify.org(54.225.129.141) 185.100.65.29 - mailcious 50.19.252.36
|
1
ET POLICY External IP Lookup (ipify .org)
|
|
6.2 |
M |
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5574 |
2021-03-03 11:05
|
c09c6ebebf311bbe3ac421d286f419... b2eeba64441b3b35e9df5c31ed9bb7ca Malware download GandCrab VirusTotal Malware AutoRuns Check memory unpack itself Windows utilities Check virtual network interfaces malicious URLs AntiVM_Disk sandbox evasion anti-virtualization VM Disk Size Check Ransomware Windows ComputerName DNS Cryptographic key |
|
7
dns1.soprodns.ru() nomoreransom.bit() - mailcious nomoreransom.coin() - mailcious dns2.soprodns.ru() ipv4bot.whatismyipaddress.com(66.171.248.178) gandcrab.bit() - mailcious 66.171.248.178
|
4
ET HUNTING Observed DNS Query for EmerDNS TLD (.coin) ET INFO DNS Query Domain .bit ET MALWARE Likely GandCrab Ransomware Domain in HTTP Host M2 ET MALWARE Observed GandCrab Domain (gandcrab .bit)
|
|
6.2 |
M |
60 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5575 |
2021-03-03 11:41
|
2200.dll 649b5c913739cea195c7662ff412b8ce VirusTotal Malware PDB unpack itself |
|
|
|
|
1.6 |
M |
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5576 |
2021-03-03 11:43
|
8.buddy.exe 25396a0ab1c93e8505b3f7e56ba2f0e1 Dridex TrickBot VirusTotal Malware Report suspicious privilege Malicious Traffic Checks debugger buffers extracted RWX flags setting unpack itself Check virtual network interfaces malicious URLs Kovter ComputerName DNS crashed |
1
https://103.76.20.226/rob21/TEST22-PC_W617601.B27B775F5B31B63B7A1BFF26BFFB7CBB/5/kps/
|
8
179.191.108.58 154.79.252.132 117.212.193.62 103.76.20.226 103.91.244.102 187.190.116.59 - mailcious 45.234.248.66 108.170.20.72 - mailcious
|
7
ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) ET CNC Feodo Tracker Reported CnC Server group 7 ET CNC Feodo Tracker Reported CnC Server group 3 ET CNC Feodo Tracker Reported CnC Server group 2 ET CNC Feodo Tracker Reported CnC Server group 17 ET CNC Feodo Tracker Reported CnC Server group 1
|
|
8.0 |
M |
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5577 |
2021-03-03 12:18
|
654323456787654.exe 81cc05d2d17bca90456864988fe08d46 VirusTotal Malware suspicious privilege Check memory buffers extracted Creates executable files unpack itself AppData folder malicious URLs IP Check Windows keylogger |
1
|
4
ipinfo.io(216.239.32.21) u.teknik.io(5.79.72.163) - malware 216.239.38.21 - phishing 5.79.72.163 - malware
|
1
ET POLICY Possible External IP Lookup ipinfo.io
|
|
8.0 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5578 |
2021-03-03 12:23
|
best4.exe ca0dcea34a0dec6c6ff25abab4a460fd Browser Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself malicious URLs Ransomware Windows Browser Tor Email ComputerName Cryptographic key crashed |
|
|
|
|
13.6 |
M |
44 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5579 |
2021-03-03 12:28
|
dated.exe d6bd50d16f46bae3c01d6d0ae51cb9e1 VirusTotal Malware unpack itself malicious URLs crashed |
|
|
|
|
4.0 |
M |
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5580 |
2021-03-03 13:19
|
eni4.exe 7879ad6172d23092b29031d2bccaba26 Browser Info Stealer VirusTotal Email Client Info Stealer Malware suspicious privilege Check memory Checks debugger unpack itself Windows Browser Email ComputerName Cryptographic key crashed |
|
|
|
|
5.4 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|