586 |
2024-08-27 13:49
|
66cc394a4818a_vlawg.exe#space be02035f9559cf4aba601b45a1677d92 Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
2
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
https://t.me/jamelwt
|
5
t.me(149.154.167.99) - mailcious
steamcommunity.com(23.59.200.146) - mailcious 149.154.167.99 - mailcious
184.26.241.154 - mailcious
94.130.188.148
|
3
ET INFO Observed Telegram Domain (t .me in TLS SNI) ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://steamcommunity.com/profiles/76561199761128941
|
15.8 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
587 |
2024-08-27 13:49
|
V1.1.exe 7b1d21282a65bac0410541f7466c7038 Generic Malware Malicious Library Downloader Malicious Packer ASPack UPX PE File PE32 OS Processor Check PNG Format MZP Format JPEG Format Malware download VirusTotal Malware AutoRuns Check memory Creates executable files ICMP traffic RWX flags setting unpack itself AppData folder suspicious TLD sandbox evasion Tofsee Interception Windows Remote Code Execution DNS crashed |
2
http://qqqmy.com/360.exe http://www.qqqmy.com/GMBuild/bb.html
|
11
google.com(142.251.42.142) qqqmy.com(8.217.48.27) fget-career.com(34.253.216.9) - mailcious aaaa.qqqmy.com(8.217.48.27) lqwljs.cn() - mailcious sjlwql.top() www.qqqmy.com(8.217.48.27) - mailcious 34.253.216.9 172.217.24.238 8.217.48.27 - mailcious 1.15.110.72
|
7
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET MALWARE Win32/Ramnit Checkin ET DNS Query to a *.top domain - Likely Hostile ET POLICY Unsupported/Fake Windows NT Version 5.0 ET INFO Packed Executable Download ET POLICY PE EXE or DLL Windows file download HTTP
|
|
11.0 |
M |
59 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
588 |
2024-08-27 13:48
|
66ccd175ef453_crypted.exe#1 cd1dd0289c092923eb8985e8d86d215f RedLine stealer Antivirus ScreenShot PWS AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware Microsoft PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted WMI unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
6
ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Microsoft net.tcp Connection Initialization Activity ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) ET MALWARE Redline Stealer TCP CnC - Id1Response ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)
|
|
12.8 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
589 |
2024-08-27 13:48
|
iniupdateion.hta 6c8ac4c656d98ff4280887b23258ecd6 Generic Malware Antivirus AntiDebug AntiVM PE File DLL PE32 .NET DLL MSOffice File VirusTotal Malware powershell suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files exploit crash unpack itself Windows utilities powershell.exe wrote suspicious process AppData folder Tofsee Windows Exploit ComputerName DNS Cryptographic key crashed |
1
http://192.3.193.155/xampp/meu/createdbeautyinbuttersochbiscut.tIF
|
1
192.3.193.155 - mailcious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
11.2 |
|
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
590 |
2024-08-27 13:46
|
k.vsdx 2a6b595d602bc312ec253b1fc5574ee6 AntiDebug AntiVM Word 2007 file format(docx) ZIP Format Email Client Info Stealer suspicious privilege Checks debugger Creates shortcut unpack itself installed browsers check Browser Email ComputerName DNS |
|
2
176.126.167.7 - mailcious 172.217.24.238
|
|
|
4.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
591 |
2024-08-27 13:43
|
nikmok1.exe 27058f6c310e29963251df57e752456a AsyncRAT task schedule Downloader Malicious Packer .NET framework(MSIL) UPX Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PE File VirusTotal Malware AutoRuns Code Injection Windows utilities suspicious process AppData folder WriteConsoleW Windows ComputerName |
|
|
|
|
5.2 |
M |
63 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
592 |
2024-08-27 13:43
|
%E6%8B%8D%E7%89%8C%E4%B8%93%E4... ddce1d8422132feb58ce06d08e4dd570 Generic Malware Malicious Library UPX ASPack PE File PE32 OS Processor Check DLL DllRegisterServer dll PNG Format JPEG Format VirusTotal Malware PDB suspicious privilege Malicious Traffic Check memory buffers extracted WMI Creates executable files Windows utilities AppData folder WriteConsoleW Windows Browser ComputerName Remote Code Execution Alibaba DNS |
24
http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok3.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel3.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ppjl_update.html http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice.bmp http://ppjl-plantwo.oss-cn-shanghai.aliyuncs.com/libeay32.dll http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/getyzm.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/moni.bmp
|
4
ppjl-plantwo.oss-cn-shanghai.aliyuncs.com(106.14.228.176) ppjl-ini.oss-cn-shanghai.aliyuncs.com(139.196.119.74) 106.14.228.176 139.196.119.74 - mailcious
|
2
ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com) ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
|
|
8.8 |
M |
62 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
593 |
2024-08-27 13:43
|
ERAB.exe dfa3bc45245a6f8f6c7085e625afbb99 Emotet Downloader Generic Malware [C] All Process Malicious Library Malicious Packer UPX PE File MSOffice File PE32 OS Processor Check PNG Format icon JPEG Format DLL Creates executable files unpack itself AppData folder Tofsee Windows keylogger |
42
http://asurastrike.de/ERAB/rename1.png http://asurastrike.de/ERAB/splash.jpg http://asurastrike.de/ERAB/LBnet.png http://asurastrike.de/ERAB/LBnet1.png http://asurastrike.de/ERAB/AddonsList.ERAB http://asurastrike.de/ERAB/EZAB.ico http://asurastrike.de/ERAB/backup.png http://asurastrike.de/ERAB/notify_start.wav http://asurastrike.de/ERAB/backup1.png http://asurastrike.de/ERAB/backup2.png http://asurastrike.de/ERAB/LEpic1.png http://asurastrike.de/ERAB/delete1.png http://asurastrike.de/ERAB/LUplay1.png http://asurastrike.de/ERAB/autobackup.png http://asurastrike.de/ERAB/LEpic.png http://asurastrike.de/ERAB/notify_save.wav http://asurastrike.de/ERAB/LOP-WinGDK-Shipping.exe.ico http://asurastrike.de/ERAB/version2.txt http://asurastrike.de/ERAB/CoOp.ico http://asurastrike.de/ERAB/GAMELIST.ERAB http://asurastrike.de/ERAB/EZAB_count.ico http://asurastrike.de/ERAB/cpu.png http://asurastrike.de/ERAB/EZAB_inactive.ico http://asurastrike.de/ERAB/files.txt http://asurastrike.de/ERAB/default.png http://asurastrike.de/ERAB/delete.png http://asurastrike.de/ERAB/LUplay.png http://asurastrike.de/ERAB/notify_restore.wav http://asurastrike.de/ERAB/autobackup1.png http://asurastrike.de/ERAB/new.png http://asurastrike.de/ERAB/EZAB_active.ico http://asurastrike.de/ERAB/notify_backup.wav http://asurastrike.de/ERAB/rename.png http://asurastrike.de/ERAB/update.png http://asurastrike.de/ERAB/default1.png http://asurastrike.de/ERAB/default2.png http://asurastrike.de/ERAB/bugs.png http://asurastrike.de/ERAB/LSteam.png http://asurastrike.de/ERAB/LSteam1.png http://asurastrike.de/ERAB/notify_pause.wav http://asurastrike.de/ERAB/restore.png http://asurastrike.de/ERAB/info.png
|
4
reshade.me(217.160.0.130) asurastrike.de(146.247.97.33) - mailcious 217.160.0.130 146.247.97.33 - mailcious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET USER_AGENTS Suspicious User-Agent (AutoHotkey)
|
|
3.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
594 |
2024-08-27 13:42
|
66ccafcac5016_vgrne.exe#space bdd1a2649b702efd40ea75b287c7823f Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 23.36.106.129 - mailcious 94.130.188.148
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Telegram Domain (t .me in TLS SNI) ET INFO TLS Handshake Failure
|
1
https://steamcommunity.com/profiles/76561199761128941
|
17.0 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
595 |
2024-08-27 13:42
|
sostener.vbs d69aba37148168650f4980f77a45239eComputerName |
|
|
|
|
0.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
596 |
2024-08-27 13:41
|
zx.exe f2b9c2a610af9cfb62abcdd5b850b320 Gen1 Generic Malware Malicious Library ASPack UPX Anti_VM PE File PE64 OS Processor Check DLL ZIP Format Check memory Checks debugger Creates executable files unpack itself |
|
|
|
|
1.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
597 |
2024-08-27 13:40
|
66ccafcd67f82_smfd.exe#space 291f4077c8a105916adfca7fd93db28f Stealc Client SW User Data Stealer LokiBot Gen1 ftp Client info stealer Generic Malware Downloader Antivirus Malicious Library UPX Malicious Packer ScreenShot Http API PWS Create Service Socket DGA Escalate priviledges Steal credential Sniff Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware c&c Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Stealc Stealer Windows Browser Email ComputerName DNS Software plugin |
12
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll http://46.8.231.109/c4754d4f680ead72.php - rule_id: 42211 http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll http://147.45.44.104/prog/66cd1d485d44c_lsfjf3n.exe http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll http://147.45.44.104/prog/66cd1d4315e2e_vokfw.exe http://46.8.231.109/ - rule_id: 42142 http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
7
t.me(149.154.167.99) - mailcious steamcommunity.com(23.59.200.146) - mailcious 149.154.167.99 - mailcious 147.45.44.104 - malware 94.130.188.148 184.26.241.154 - mailcious 46.8.231.109 - mailcious
|
21
ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Executable Download from dotted-quad Host ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1
|
3
http://46.8.231.109/c4754d4f680ead72.php http://46.8.231.109/ https://steamcommunity.com/profiles/76561199761128941
|
17.6 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
598 |
2024-08-27 13:35
|
66cc385ebf359_vwern.exe#d12 87e99ab17b577782dee5cfb83f678b21 Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 184.26.241.154 - mailcious 94.130.188.148
|
3
ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
1
https://steamcommunity.com/profiles/76561199761128941
|
15.0 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
599 |
2024-08-27 13:34
|
SaphireSkins.exe e31988b2c4f91978565a3f40e2f8268d UPX PE File ftp PE32 OS Processor Check VirusTotal Malware |
|
|
|
|
1.4 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
600 |
2024-08-27 13:32
|
66cccdba20cab_vkweo15.exe#d15 47234273933c5f95321da395270d3843 Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 184.26.241.154 - mailcious 94.130.188.148
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET INFO Observed Telegram Domain (t .me in TLS SNI)
|
1
https://steamcommunity.com/profiles/76561199761128941
|
15.2 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|