Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
5881 2024-02-05 07:51 gzz.exe  

7d9c852903de2a824aa3f80dd1ab2b89


UPX PE File PE64 unpack itself DNS
4 2.0 M ZeroCERT

5882 2024-02-05 07:49 32.exe  

9f0408f176f9f9d3095be30eaf39f08f


Generic Malware Malicious Library Malicious Packer Antivirus UPX Anti_VM PE32 PE File OS Processor Check Malware download NetWireRC Malware GhostRAT PDB Check memory AntiVM_Disk sandbox evasion anti-virtualization VM Disk Size Check Browser
2 1 2.6 ZeroCERT

5883 2024-02-05 07:49 lux32.exe  

2d129049627290cb0ece76e92a8643aa


Generic Malware Malicious Library Malicious Packer Antivirus UPX Anti_VM PE32 PE File OS Processor Check PDB DNS
1 2.4 ZeroCERT

5884 2024-02-05 07:47 dota.exe  

efc03ba934fc40778b5ad928025b9ba3


Themida Packer Malicious Library UPX Malicious Packer Anti_VM AntiDebug AntiVM PE32 PE File MSOffice File OS Processor Check ZIP Format .NET EXE Browser Info Stealer Malware download FTP Client Info Stealer Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Disables Windows Security Checks Bios Collect installed applications Detects VirtualBox Detects VMWare suspicious process AppData folder AntiVM_Disk sandbox evasion WriteConsoleW VMware anti-virtualization IP Check VM Disk Size Check installed browsers check Tofsee Ransomware Windows Update Exploit Browser RisePro Email ComputerName DNS Software crashed Downloader
13 14 13 2 23.2 M ZeroCERT

5885 2024-02-05 07:47 admin.exe  

cf9517248d87d99d6a04d7247c9a96d2


Malicious Library PE File PE64 RWX flags setting DNS
1 2.0 ZeroCERT

5886 2024-02-05 07:47 321.exe  

f50536d2ac683c7edc8706198103ccb8


PE32 PE File .NET EXE PDB Check memory Checks debugger unpack itself
1.4 M ZeroCERT

5887 2024-02-05 07:43 Intelligence.exe  

205557b4a34f1c6ed8fac7abf5282870


North Korea Malicious Library UPX PE32 PE File .NET EXE OS Processor Check PDB Check memory Checks debugger unpack itself ComputerName Remote Code Execution
1.8 ZeroCERT

5888 2024-02-04 17:26 may.exe  

3d7038e19336d8021079d081b3968c97


Emotet Gen1 Malicious Library UPX Anti_VM PE32 PE File MZP Format OS Processor Check DllRegisterServer dll PE64 DLL ftp VirusTotal Malware Check memory Checks debugger Creates executable files unpack itself AppData folder Windows ComputerName DNS crashed
1 4.8 M 9 ZeroCERT

5889 2024-02-04 17:22 Ipotrb.exe  

e0deb2fc7bb606d0f2b1ef5f3ca8a857


Generic Malware Antivirus PE32 PE File .NET EXE Malware download AsyncRAT NetWireRC VirusTotal Malware Cryptocurrency wallets Cryptocurrency powershell AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut unpack itself powershell.exe wrote suspicious process WriteConsoleW Ransomware Windows ComputerName DNS Cryptographic key
1 4 8.8 M 55 ZeroCERT

5890 2024-02-04 17:20 studycomputingpro.exe  

2b43471ea8864a15a49f4203aa2a4bc9


PE File PE64 .NET EXE VirusTotal Malware MachineGuid Check memory Checks debugger unpack itself
2.2 M 54 ZeroCERT

5891 2024-02-04 17:20 LoTR.exe  

496ce3c7173dc70d020beb2fe1c25f3b


Generic Malware Antivirus PE32 PE File .NET EXE Malware download AsyncRAT NetWireRC VirusTotal Malware Cryptocurrency wallets Cryptocurrency AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut unpack itself suspicious process WriteConsoleW Ransomware Windows ComputerName DNS Cryptographic key
1 4 9.8 M 46 ZeroCERT

5892 2024-02-04 17:18 x.......x.......x.......x.doC  

30776225f54785b7099a83401ad50a2a


MS_RTF_Obfuscation_Objects RTF File doc FormBook Malware download VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Windows Exploit DNS crashed
4 8 6 4.2 M 32 ZeroCERT

5893 2024-02-04 17:18 V-12.exe  

a0da1a1c992508b1eee2c766af8d161e


Generic Malware Antivirus PE32 PE File .NET EXE Malware download AsyncRAT NetWireRC VirusTotal Malware Cryptocurrency wallets Cryptocurrency powershell AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut unpack itself powershell.exe wrote suspicious process WriteConsoleW Ransomware Windows ComputerName DNS Cryptographic key
3 4 10.2 M 46 ZeroCERT

5894 2024-02-04 17:18 ladas.exe  

131e1852763515da84f38dc27d08d2e2


RedLine Infostealer RedlineStealer RedLine stealer Amadey UltraVNC NSIS Themida Packer Admin Tool (Sysinternals etc ...) Malicious Library UPX .NET framework(MSIL) Malicious Packer Anti_VM AntiDebug AntiVM PE32 PE File ZIP Format OS Processor Browser Info Stealer RedLine Malware download Amadey FTP Client Info Stealer VirusTotal Email Client Info Stealer Cryptocurrency Miner Malware Cryptocurrency wallets Cryptocurrency Microsoft AutoRuns suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Disables Windows Security Checks Bios Collect installed applications Detects VirtualBox Detects VMWare suspicious process AppData folder AntiVM_Disk sandbox evasion WriteConsoleW VMware anti-virtualization IP Check VM Disk Size Check installed browsers check Tofsee Ransomware Stealer Windows Update Exploit Browser RisePro Email ComputerName Trojan DNS Cryptographic key Software crashed Downloader CoinMiner
23 27 27 12 28.4 M 46 ZeroCERT

5895 2024-02-04 17:16 r.exe  

b3db8db328d89d5d301bdabd65901c33


Malicious Library PE32 PE File VirusTotal Malware PDB unpack itself Remote Code Execution
2.4 M 57 ZeroCERT