6511 |
2024-08-19 10:50
|
explorer.exe d08504a4718a999e104aef407bb43123 HermeticWiper Gen1 Emotet PhysicalDrive Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check PDB RCE |
|
|
|
|
0.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6512 |
2024-08-19 10:50
|
WLive48x48.png 346e52bacfe42b2d4541fcc62e9d452f PNG Format |
|
|
|
|
|
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6513 |
2024-08-18 14:21
|
dl af0ebffab2ca7cffdc8a6aba7021e347 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.2 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6514 |
2024-08-18 14:21
|
youngjuan.vbs 4ff4cc2242c1e40ba40b21e322494800 Generic Malware Antivirus Hide_URL PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
|
2
ia803104.us.archive.org(207.241.232.154) - malware 207.241.232.154 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
M |
2 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6515 |
2024-08-18 14:19
|
Images.exe 544fb98f86fbbbfe6adc50a62772df10 Emotet Gen1 Generic Malware Malicious Library Malicious Packer UPX Admin Tool (Sysinternals etc ...) Downloader Anti_VM AntiDebug AntiVM PE File PE32 OS Processor Check DLL .NET DLL DllRegisterServer dll VirusTotal Malware AutoRuns Code Injection Check memory Checks debugger Creates executable files unpack itself suspicious process AppData folder malicious URLs WriteConsoleW Windows ComputerName |
1
http://www.heyderw.de/gpg/mpc-us.php
|
6
github.com(20.200.245.247) - mailcious raw.githubusercontent.com(185.199.109.133) - malware www.heyderw.de(92.205.208.182) - mailcious 92.205.208.182 20.200.245.247 - malware 185.199.109.133 - mailcious
|
1
ET POLICY Python-urllib/ Suspicious User Agent
|
|
6.8 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6516 |
2024-08-18 14:17
|
dl c110bf099b4b7f2591ba377488be0bf4 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6517 |
2024-08-18 14:17
|
Channel1.exe c0b1bacf44892b96abd3564716a2b4ee Generic Malware Malicious Library Malicious Packer Antivirus UPX AntiDebug AntiVM PE File PE64 OS Processor Check PowerShell PE32 VirusTotal Malware powershell AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities Disables Windows Security Checks Bios Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization Tofsee Windows Discord ComputerName RCE DNS Cryptographic key |
6
http://58yongzhe.com/parts/setup1.exe - rule_id: 42034 http://194.58.114.223/d/385104 - rule_id: 41929 https://pastebin.com/raw/E0rY26ni - rule_id: 37702 https://yip.su/RNWPd.exe - rule_id: 37623 https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& https://iplogger.com/1lyxz - rule_id: 41935
|
12
iplogger.com(172.67.188.178) - mailcious 58yongzhe.com(62.133.62.93) - malware pastebin.com(104.20.4.235) - mailcious yip.su(172.67.169.89) - mailcious cdn.discordapp.com(162.159.133.233) - malware 104.20.3.235 - malware 91.121.59.207 162.159.130.233 - malware 172.67.188.178 - mailcious 62.133.62.93 194.58.114.223 - mailcious 172.67.169.89
|
10
ET DNS Query for .su TLD (Soviet Union) Often Malware Related SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) ET INFO Packed Executable Download ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) ET HUNTING Redirect to Discord Attachment Download
|
5
http://58yongzhe.com/parts/setup1.exe http://194.58.114.223/d/385104 https://pastebin.com/raw/E0rY26ni https://yip.su/RNWPd.exe https://iplogger.com/1lyxz
|
19.4 |
M |
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6518 |
2024-08-18 14:14
|
3546345.exe fd2defc436fc7960d6501a01c91d893e Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32 Browser Info Stealer Malware download VirusTotal Malware Malicious Traffic Check memory buffers extracted unpack itself Collect installed applications suspicious TLD anti-virtualization installed browsers check CryptBot Browser ComputerName DNS |
1
http://thizx13vt.top/v1/upload.php
|
2
thizx13vt.top(195.133.48.136) 195.133.48.136
|
3
ET DNS Query to a *.top domain - Likely Hostile ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 ET INFO HTTP Request to a *.top domain
|
|
6.2 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6519 |
2024-08-18 10:30
|
https://lula.com.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
2
https://lula.com.br/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8b4e1e744dbd7c6d https://lula.com.br/
|
2
lula.com.br(172.67.213.24) 104.21.69.207
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6520 |
2024-08-18 10:30
|
https://pt.org.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
2
pt.org.br(140.238.238.160) 146.235.40.229
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6521 |
2024-08-18 10:28
|
https://casa13.pt.org.br/ AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
2
casa13.pt.org.br(140.238.238.160) 168.75.82.220
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6522 |
2024-08-18 10:21
|
https://x.com/ 1911a4b09af1e5212912f6e1115e5306 Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format VirusTotal Malware Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
2
x.com(104.244.42.129) - compromised 104.244.42.65 - suspicious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6523 |
2024-08-18 10:17
|
msedge.exe 30e74327b4f7bc2e556ac0a6d8e02dd2 Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check PDB RCE |
|
|
|
|
0.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6524 |
2024-08-18 10:15
|
W10DigitalActivation_x64.iso 89bd10832539a85ef8557b8976a38207 AntiDebug AntiVM Check memory Checks debugger unpack itself |
|
|
|
|
1.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6525 |
2024-08-18 10:08
|
L3250_L3251_Lite_LA.exe 23b9be57494e761584989265e5a2dcf3 Emotet Gen1 Schwerer Generic Malware Malicious Library UPX Malicious Packer Admin Tool (Sysinternals etc ...) PE File PE32 MZP Format PNG Format DLL OS Processor Check JPEG Format icon PE64 Malware Malicious Traffic Check memory Checks debugger RWX flags setting unpack itself AppData folder Tofsee ComputerName DNS |
1
https://download.ebz.epson.net/dsc/du/01/DriverUpdateInfo?PR=SW&CTI=61&LG2=E2
|
6
download.ebz.epson.net(23.210.36.144) files.support.epson.com(45.60.49.158) plg3-research.epson.biz(54.192.175.13) 54.192.175.13 45.60.49.158 23.36.220.145
|
3
ET INFO Observed DNS Query to .biz TLD SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.4 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|