6151 |
2024-08-27 13:46
|
k.vsdx 2a6b595d602bc312ec253b1fc5574ee6 AntiDebug AntiVM Word 2007 file format(docx) ZIP Format Email Client Info Stealer suspicious privilege Checks debugger Creates shortcut unpack itself installed browsers check Browser Email ComputerName DNS |
|
2
176.126.167.7 - mailcious 172.217.24.238
|
|
|
4.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6152 |
2024-08-27 13:43
|
nikmok1.exe 27058f6c310e29963251df57e752456a AsyncRAT task schedule Downloader Malicious Packer .NET framework(MSIL) UPX Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PE File VirusTotal Malware AutoRuns Code Injection Windows utilities suspicious process AppData folder WriteConsoleW Windows ComputerName |
|
|
|
|
5.2 |
M |
63 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6153 |
2024-08-27 13:43
|
%E6%8B%8D%E7%89%8C%E4%B8%93%E4... ddce1d8422132feb58ce06d08e4dd570 Generic Malware Malicious Library UPX ASPack PE File PE32 OS Processor Check DLL DllRegisterServer dll PNG Format JPEG Format VirusTotal Malware PDB suspicious privilege Malicious Traffic Check memory buffers extracted WMI Creates executable files Windows utilities AppData folder WriteConsoleW Windows Browser ComputerName RCE Alibaba DNS |
24
http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok3.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/time2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ok1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/range1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/cancel3.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/ppjl_update.html http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice.bmp http://ppjl-plantwo.oss-cn-shanghai.aliyuncs.com/libeay32.dll http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/getyzm.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/addbtn2.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/lowprice1.bmp http://ppjl-ini.oss-cn-shanghai.aliyuncs.com/moni.bmp
|
4
ppjl-plantwo.oss-cn-shanghai.aliyuncs.com(106.14.228.176) ppjl-ini.oss-cn-shanghai.aliyuncs.com(139.196.119.74) 106.14.228.176 139.196.119.74 - mailcious
|
2
ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com) ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
|
|
8.8 |
M |
62 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6154 |
2024-08-27 13:43
|
ERAB.exe dfa3bc45245a6f8f6c7085e625afbb99 Emotet Downloader Generic Malware [C] All Process Malicious Library Malicious Packer UPX PE File MSOffice File PE32 OS Processor Check PNG Format icon JPEG Format DLL Creates executable files unpack itself AppData folder Tofsee Windows keylogger |
42
http://asurastrike.de/ERAB/rename1.png http://asurastrike.de/ERAB/splash.jpg http://asurastrike.de/ERAB/LBnet.png http://asurastrike.de/ERAB/LBnet1.png http://asurastrike.de/ERAB/AddonsList.ERAB http://asurastrike.de/ERAB/EZAB.ico http://asurastrike.de/ERAB/backup.png http://asurastrike.de/ERAB/notify_start.wav http://asurastrike.de/ERAB/backup1.png http://asurastrike.de/ERAB/backup2.png http://asurastrike.de/ERAB/LEpic1.png http://asurastrike.de/ERAB/delete1.png http://asurastrike.de/ERAB/LUplay1.png http://asurastrike.de/ERAB/autobackup.png http://asurastrike.de/ERAB/LEpic.png http://asurastrike.de/ERAB/notify_save.wav http://asurastrike.de/ERAB/LOP-WinGDK-Shipping.exe.ico http://asurastrike.de/ERAB/version2.txt http://asurastrike.de/ERAB/CoOp.ico http://asurastrike.de/ERAB/GAMELIST.ERAB http://asurastrike.de/ERAB/EZAB_count.ico http://asurastrike.de/ERAB/cpu.png http://asurastrike.de/ERAB/EZAB_inactive.ico http://asurastrike.de/ERAB/files.txt http://asurastrike.de/ERAB/default.png http://asurastrike.de/ERAB/delete.png http://asurastrike.de/ERAB/LUplay.png http://asurastrike.de/ERAB/notify_restore.wav http://asurastrike.de/ERAB/autobackup1.png http://asurastrike.de/ERAB/new.png http://asurastrike.de/ERAB/EZAB_active.ico http://asurastrike.de/ERAB/notify_backup.wav http://asurastrike.de/ERAB/rename.png http://asurastrike.de/ERAB/update.png http://asurastrike.de/ERAB/default1.png http://asurastrike.de/ERAB/default2.png http://asurastrike.de/ERAB/bugs.png http://asurastrike.de/ERAB/LSteam.png http://asurastrike.de/ERAB/LSteam1.png http://asurastrike.de/ERAB/notify_pause.wav http://asurastrike.de/ERAB/restore.png http://asurastrike.de/ERAB/info.png
|
4
reshade.me(217.160.0.130) asurastrike.de(146.247.97.33) - mailcious 217.160.0.130 146.247.97.33 - mailcious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET USER_AGENTS Suspicious User-Agent (AutoHotkey)
|
|
3.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6155 |
2024-08-27 13:42
|
66ccafcac5016_vgrne.exe#space bdd1a2649b702efd40ea75b287c7823f Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 23.36.106.129 - mailcious 94.130.188.148
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Telegram Domain (t .me in TLS SNI) ET INFO TLS Handshake Failure
|
1
https://steamcommunity.com/profiles/76561199761128941
|
17.0 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6156 |
2024-08-27 13:42
|
sostener.vbs d69aba37148168650f4980f77a45239eComputerName |
|
|
|
|
0.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6157 |
2024-08-27 13:41
|
zx.exe f2b9c2a610af9cfb62abcdd5b850b320 Gen1 Generic Malware Malicious Library ASPack UPX Anti_VM PE File PE64 OS Processor Check DLL ZIP Format Check memory Checks debugger Creates executable files unpack itself |
|
|
|
|
1.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6158 |
2024-08-27 13:40
|
66ccafcd67f82_smfd.exe#space 291f4077c8a105916adfca7fd93db28f Stealc Client SW User Data Stealer LokiBot Gen1 ftp Client info stealer Generic Malware Downloader Antivirus Malicious Library UPX Malicious Packer ScreenShot Http API PWS Create Service Socket DGA Escalate priviledges Steal credential Sniff Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware c&c Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Stealc Stealer Windows Browser Email ComputerName DNS Software plugin |
12
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll http://46.8.231.109/c4754d4f680ead72.php - rule_id: 42211 http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll http://147.45.44.104/prog/66cd1d485d44c_lsfjf3n.exe http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll http://147.45.44.104/prog/66cd1d4315e2e_vokfw.exe http://46.8.231.109/ - rule_id: 42142 http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
7
t.me(149.154.167.99) - mailcious steamcommunity.com(23.59.200.146) - mailcious 149.154.167.99 - mailcious 147.45.44.104 - malware 94.130.188.148 184.26.241.154 - mailcious 46.8.231.109 - mailcious
|
21
ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Executable Download from dotted-quad Host ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1
|
3
http://46.8.231.109/c4754d4f680ead72.php http://46.8.231.109/ https://steamcommunity.com/profiles/76561199761128941
|
17.6 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6159 |
2024-08-27 13:35
|
66cc385ebf359_vwern.exe#d12 87e99ab17b577782dee5cfb83f678b21 Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 184.26.241.154 - mailcious 94.130.188.148
|
3
ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
1
https://steamcommunity.com/profiles/76561199761128941
|
15.0 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6160 |
2024-08-27 13:34
|
SaphireSkins.exe e31988b2c4f91978565a3f40e2f8268d UPX PE File ftp PE32 OS Processor Check VirusTotal Malware |
|
|
|
|
1.4 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6161 |
2024-08-27 13:32
|
66cccdba20cab_vkweo15.exe#d15 47234273933c5f95321da395270d3843 Stealc Client SW User Data Stealer LokiBot ftp Client info stealer Antivirus Malicious Library Http API PWS HTTP Code injection Internet API AntiDebug AntiVM PE File .NET EXE PE32 FTP Client Info Stealer VirusTotal Malware Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Windows Browser ComputerName DNS Software |
1
https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
5
t.me(149.154.167.99) - mailcious steamcommunity.com(173.222.146.99) - mailcious 149.154.167.99 - mailcious 184.26.241.154 - mailcious 94.130.188.148
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET INFO Observed Telegram Domain (t .me in TLS SNI)
|
1
https://steamcommunity.com/profiles/76561199761128941
|
15.2 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6162 |
2024-08-27 13:32
|
XClient.exe bb742b8bbfa3691e17a2fcbc633e6298 Malicious Library .NET framework(MSIL) UPX PE File .NET EXE PE32 OS Processor Check Lnk Format GIF Format VirusTotal Malware AutoRuns PDB suspicious privilege MachineGuid Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder AntiVM_Disk VM Disk Size Check Windows ComputerName DNS crashed |
|
1
|
|
|
6.6 |
M |
55 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6163 |
2024-08-27 13:32
|
popup df72f2df722a840bb4b7bf1d000dd278 UPX PE File PE32 PDB RCE |
|
|
|
|
0.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6164 |
2024-08-27 13:31
|
66cccdb75f6aa_sfsjae.exe#space 5c12433455f9b3542ea76166a0da2ac3 Stealc Client SW User Data Stealer ftp Client info stealer Antivirus Http API PWS AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware c&c PDB Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications sandbox evasion anti-virtualization installed browsers check Stealc Stealer Windows Browser Email ComputerName DNS Software crashed plugin |
10
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll http://46.8.231.109/c4754d4f680ead72.php - rule_id: 42211 http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll http://147.45.44.104/prog/66cd1d4315e2e_vokfw.exe http://46.8.231.109/ - rule_id: 42142 http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll
|
2
147.45.44.104 - malware 46.8.231.109 - mailcious
|
18
ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Executable Download from dotted-quad Host ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity
|
2
http://46.8.231.109/c4754d4f680ead72.php http://46.8.231.109/
|
13.4 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6165 |
2024-08-27 13:31
|
66cd1d45c5699_sjfiwe.exe#space aba62b7df98497b06b9a7262b50649ee Stealc Client SW User Data Stealer LokiBot Gen1 ftp Client info stealer Generic Malware Downloader Antivirus Malicious Library UPX Malicious Packer ScreenShot Http API PWS Create Service Socket DGA Escalate priviledges Steal credential Sniff Browser Info Stealer Malware download FTP Client Info Stealer Vidar VirusTotal Email Client Info Stealer Malware c&c Telegram PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications suspicious process malicious URLs sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Stealc Stealer Windows Browser Email ComputerName DNS Software plugin |
12
http://46.8.231.109/1309cdeb8f4c8736/nss3.dll http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll http://46.8.231.109/1309cdeb8f4c8736/sqlite3.dll http://46.8.231.109/c4754d4f680ead72.php - rule_id: 42211 http://46.8.231.109/1309cdeb8f4c8736/vcruntime140.dll http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll http://147.45.44.104/prog/66cd1d485d44c_lsfjf3n.exe http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll http://147.45.44.104/prog/66cd1d4315e2e_vokfw.exe http://46.8.231.109/ - rule_id: 42142 http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll https://steamcommunity.com/profiles/76561199761128941 - rule_id: 42293
|
7
t.me(149.154.167.99) - mailcious steamcommunity.com(23.59.200.146) - mailcious 149.154.167.99 - mailcious 147.45.44.104 - malware 23.36.106.129 - mailcious 94.130.188.148 46.8.231.109 - mailcious
|
21
ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET DROP Spamhaus DROP Listed Traffic Inbound group 23 ET INFO Executable Download from dotted-quad Host ET INFO TLS Handshake Failure ET INFO Observed Telegram Domain (t .me in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1
|
3
http://46.8.231.109/c4754d4f680ead72.php http://46.8.231.109/ https://steamcommunity.com/profiles/76561199761128941
|
18.0 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|