Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
6346 2024-01-13 18:51 costa.exe  

623e41eaeb69f117691080e4ac4cd1bc


PE32 PE File .NET EXE Check memory Checks debugger unpack itself ComputerName
1.4 ZeroCERT

6347 2024-01-13 02:03 PtzObsPluginInstaller.exe  

cdad3cdfd93b23b07ad59be8cf406af6


Malicious Library UPX PE File PE64 OS Processor Check VirusTotal Malware PDB Check memory Remote Code Execution crashed
2.0 32 guest

6348 2024-01-12 15:59 InstallSetup8.exe  

90c84cef9f4f1a5eb8d0393904f508da


NPKI HermeticWiper NSIS Generic Malware Suspicious_Script Malicious Library UPX Antivirus Admin Tool (Sysinternals etc ...) Malicious Packer Anti_VM Javascript_Blob PE32 PE File PNG Format JPEG Format OS Processor Check MZP Format ZIP Format icon BMP For VirusTotal Malware Malicious Traffic Check memory Creates executable files unpack itself AppData folder AntiVM_Disk IP Check VM Disk Size Check Tofsee Ransomware Windows DNS
3 6 10 1 9.4 M 50 ZeroCERT

6349 2024-01-12 15:58 love.exe  

d84ddf7e3d38eb30d74875aef7bdf829


Emotet Gen1 EnigmaProtector Malicious Library UPX Malicious Packer AntiDebug AntiVM PE32 PE File CAB PNG Format MSOffice File JPEG Format OS Processor Check VirusTotal Malware AutoRuns PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Disables Windows Security AppData folder AntiVM_Disk anti-virtualization VM Disk Size Check Tofsee Windows Update Exploit ComputerName Remote Code Execution DNS crashed
2 3 2 12.4 M 48 ZeroCERT

6350 2024-01-12 15:56 ppt1.hta  

5b96beafe91b18688f3a3da85ab1627a


Generic Malware Antivirus UPX Hide_URL PowerShell PE File PE64 Lnk Format GIF Format ZIP Format VirusTotal Email Client Info Stealer Malware powershell suspicious privilege MachineGuid Check memory Checks debugger buffers extracted heapspray Creates shortcut Creates executable files RWX flags setting exploit crash unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW Windows Exploit Email ComputerName DNS Cryptographic key crashed
1 1 6 14.4 M 25 ZeroCERT

6351 2024-01-12 15:55 qfqe.docx  

8972149b5dabf81f7a446a230aac0c96


ZIP Format Word 2007 file format(docx) VirusTotal Malware unpack itself
1.6 1 ZeroCERT

6352 2024-01-12 15:54 docx1.hta  

f57918785e7cd4f430555e6efb00ff0f


Generic Malware Antivirus UPX Hide_URL PowerShell PE File PE64 ZIP Format Word 2007 file format(docx) Lnk Format GIF Format VirusTotal Email Client Info Stealer Malware powershell suspicious privilege MachineGuid Check memory Checks debugger buffers extracted heapspray Creates shortcut Creates executable files RWX flags setting unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW installed browsers check Windows Browser Email ComputerName DNS Cryptographic key
1 1 6 14.0 M 25 ZeroCERT

6353 2024-01-12 15:53 adb.dll  

335b8d0ffa6dffa06bce23b5ad0cf9d6


Malicious Packer PE File DLL PE64 VirusTotal Malware PDB
1.4 M 41 ZeroCERT

6354 2024-01-12 08:05 tuc5.exe  

eb7073f79738bc3871d8fdcdda2f6d07


Emotet Gen1 Generic Malware Malicious Library UPX Confuser .NET Malicious Packer Admin Tool (Sysinternals etc ...) PE32 PE File MZP Format DLL DllRegisterServer dll OS Processor Check PE64 ZIP Format VirusTotal Malware suspicious privilege Check memory Checks debugger Creates executable files unpack itself Windows utilities AppData folder WriteConsoleW Windows ComputerName DNS crashed
1 5.6 M 25 ZeroCERT

6355 2024-01-12 08:05 plugins.exe  

d1a6f9be6f046fcdd20d871cec0e1a42


Client SW User Data Stealer LokiBot ftp Client info stealer Malicious Library Admin Tool (Sysinternals etc ...) .NET framework(MSIL) UPX Http API PWS Code injection AntiDebug AntiVM PE32 PE File .NET EXE DLL OS Processor Check VirusTotal Malware Telegram Buffer PE PDB MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself AppData folder malicious URLs Tofsee Windows ComputerName DNS Cryptographic key crashed
2 5 3 13.0 M 34 ZeroCERT

6356 2024-01-12 08:05 leru.exe  

099556734bde76d46c677c726cbf2538


Generic Malware Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check ZIP Format Browser Info Stealer Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency AutoRuns MachineGuid Check memory Windows utilities Disables Windows Security suspicious process AntiVM_Disk sandbox evasion WriteConsoleW anti-virtualization IP Check VM Disk Size Check Tofsee Ransomware Windows Browser RisePro Email ComputerName DNS Software crashed
1 6 7 11.6 M 48 ZeroCERT

6357 2024-01-12 08:02 cryptedgoldqwesasd.exe  

f1a9f0cd8b3aa83f0843360c8647cca1


ScreenShot AntiDebug AntiVM PE32 PE File .NET EXE VirusTotal Malware PDB Code Injection Check memory Checks debugger buffers extracted unpack itself Windows
9.0 M 48 ZeroCERT

6358 2024-01-12 08:01 11.exe  

2f1d3f866fde60fc8337a92dce82e15b


Emotet Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check BMP Format DLL VirusTotal Malware Check memory Creates shortcut Creates executable files RWX flags setting unpack itself AntiVM_Disk sandbox evasion VM Disk Size Check Browser ComputerName Remote Code Execution
1 2 3 6.4 27 ZeroCERT

6359 2024-01-12 08:00 dwm2.exe  

cdb5da91ed9624691148563d0c234e06


Malicious Library Antivirus UPX PE32 PE File OS Processor Check VirusTotal Malware PDB
2.2 42 ZeroCERT

6360 2024-01-12 07:59 love.exe  

d3420ffb07677d83ab1fd50b1c45c96d


Emotet Gen1 EnigmaProtector Malicious Library UPX Malicious Packer AntiDebug AntiVM PE32 PE File CAB OS Processor Check PNG Format MSOffice File JPEG Format VirusTotal Malware AutoRuns PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Disables Windows Security AppData folder AntiVM_Disk anti-virtualization VM Disk Size Check Tofsee Windows Update Exploit ComputerName Remote Code Execution DNS crashed
2 3 2 12.4 M 45 ZeroCERT