6691 |
2024-08-12 10:04
|
file2.exe ab3fa476538f4a3561a1bbb6258b7d94 Generic Malware Malicious Library .NET framework(MSIL) Antivirus Malicious Packer UPX AntiDebug AntiVM PE File .NET EXE PE32 PowerShell OS Processor Check VirusTotal Malware powershell AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities Disables Windows Security Checks Bios Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization Tofsee Windows Discord ComputerName DNS Cryptographic key |
7
http://cacerts.digicert.com/DigiCertGlobalRootG2.crt http://194.58.114.223/d/385121 - rule_id: 41936 http://58yongzhe.com/parts/setup1.exe https://pastebin.com/raw/xYhKBupz - rule_id: 36780 https://cdn.discordapp.com/attachments/992447897431978184/1272110855789609012/setup.exe?ex=66b9c90e&is=66b8778e&hm=e8455d1fc18777dd82c36c2f38f2ff7183f2d98ce3885f05b556912b31748099& https://yip.su/RNWPd.exe - rule_id: 37623 https://github.com/evan9908/Setup/raw/main/222fastsetup.exe
|
15
raw.githubusercontent.com(185.199.111.133) - malware github.com(20.200.245.247) - mailcious 58yongzhe.com(178.22.31.113) pastebin.com(104.20.4.235) - mailcious yip.su(172.67.169.89) - mailcious cdn.discordapp.com(162.159.134.233) - malware cacerts.digicert.com(152.195.38.76) 104.20.3.235 - malware 162.159.133.233 - malware 185.199.111.133 - mailcious 152.195.38.76 178.22.31.113 194.58.114.223 - mailcious 172.67.169.89 20.200.245.247 - malware
|
7
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) ET DNS Query for .su TLD (Soviet Union) Often Malware Related ET HUNTING Redirect to Discord Attachment Download ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
|
3
http://194.58.114.223/d/385121 https://pastebin.com/raw/xYhKBupz https://yip.su/RNWPd.exe
|
21.0 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6692 |
2024-08-12 10:00
|
Run1.exe 76eb776b3942bec9baccd967eb8a39fe Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32 Browser Info Stealer Malware download VirusTotal Malware Malicious Traffic Check memory buffers extracted Collect installed applications suspicious TLD anti-virtualization installed browsers check CryptBot Browser ComputerName DNS |
1
http://tvez20pt.top/v1/upload.php
|
2
tvez20pt.top(185.68.93.115) 185.68.93.115
|
4
ET DROP Spamhaus DROP Listed Traffic Inbound group 31 ET DNS Query to a *.top domain - Likely Hostile ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 ET INFO HTTP Request to a *.top domain
|
|
6.0 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6693 |
2024-08-12 09:58
|
Meetings.exe 209ae4a712ada48aa2d5fba027ed58b6 Generic Malware Malicious Library WinRAR UPX Malicious Packer PE File PE32 OS Processor Check PNG Format icon VirusTotal Malware PDB Creates executable files unpack itself Windows utilities AppData folder Windows RCE DNS |
|
1
193.117.208.148 - malware
|
|
|
5.4 |
M |
58 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6694 |
2024-08-12 09:57
|
Z2.dll 35d97fe4def32490e580b328c39beaa7 Generic Malware Malicious Library UPX PE File DLL PE32 OS Processor Check VirusTotal Malware Checks debugger unpack itself Firmware |
|
|
|
|
2.0 |
M |
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6695 |
2024-08-12 09:57
|
ramos.exe 83847cf6a192b9983d7a07be74cdab7b Amadey Stealc Client SW User Data Stealer ftp Client info stealer Socket Http API ScreenShot Escalate priviledges HTTP Code injection Internet API KeyLogger PWS AntiDebug AntiVM PE File PE32 Browser Info Stealer Malware download Amadey Vidar VirusTotal Malware c&c AutoRuns Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Checks Bios Collect installed applications Detects VMWare malicious URLs sandbox evasion VMware anti-virtualization installed browsers check Ransomware Stealc Stealer Windows Exploit Browser ComputerName DNS crashed plugin |
13
http://185.215.113.19/Vi9leo/index.php - rule_id: 41489 http://185.215.113.100/0d60be0de163924d/nss3.dll http://185.215.113.100/0d60be0de163924d/freebl3.dll http://185.215.113.16/num/random.exe - rule_id: 41818 http://185.215.113.100/e2b1563c6670f193.php - rule_id: 41968 http://185.215.113.16/well/random.exe - rule_id: 41492 http://185.215.113.100/0d60be0de163924d/sqlite3.dll http://185.215.113.100/0d60be0de163924d/vcruntime140.dll http://185.215.113.100/ - rule_id: 41969 http://185.215.113.100/0d60be0de163924d/mozglue.dll http://185.215.113.100/0d60be0de163924d/softokn3.dll http://185.215.113.16/steam/random.exe - rule_id: 41792 http://185.215.113.100/0d60be0de163924d/msvcp140.dll
|
3
185.215.113.19 - malware 185.215.113.100 - mailcious 185.215.113.16 - mailcious
|
19
ET DROP Spamhaus DROP Listed Traffic Inbound group 33 ET INFO Executable Download from dotted-quad Host ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config M1 ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity
|
6
http://185.215.113.19/Vi9leo/index.php http://185.215.113.16/num/random.exe http://185.215.113.100/e2b1563c6670f193.php http://185.215.113.16/well/random.exe http://185.215.113.100/ http://185.215.113.16/steam/random.exe
|
20.6 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6696 |
2024-08-12 09:56
|
Driver.bat b576e187cd838f6be64df278f3b35fac Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger Creates shortcut RWX flags setting unpack itself suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key |
|
1
193.117.208.148 - malware
|
|
|
8.2 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6697 |
2024-08-12 09:53
|
Cleanup.vbs afc30ab109d6fa03f5aa7165e732e14f Hide_EXE PE File PE32 VirusTotal Malware Creates executable files AppData folder DNS |
|
1
193.117.208.148 - malware
|
|
|
6.2 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6698 |
2024-08-12 09:52
|
Director.bat 641d4aab4f8fe4e9328dfc54dc158a99 Hide_EXE Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM VirusTotal Malware WriteConsoleW |
|
|
|
|
2.2 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6699 |
2024-08-12 09:51
|
tt11.exe ecc0dee70c6fcd43a006581e69ffe6f2 Malicious Library Antivirus UPX Anti_VM PE File PE64 OS Processor Check VirusTotal Malware |
|
|
|
|
1.0 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6700 |
2024-08-12 09:50
|
66b5b75106ac6_stealc.exe 67d39f0cbbab44b99fffaf3a408b2088 Client SW User Data Stealer ftp Client info stealer Generic Malware Malicious Library .NET framework(MSIL) UPX Http API PWS AntiDebug AntiVM PE File .NET EXE PE32 OS Processor Check VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself DNS |
|
1
|
|
|
10.2 |
|
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6701 |
2024-08-12 09:49
|
sesc16.bat 4b7ebe87da068d04f5d0b0837905e81d Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM PowerShell VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger Creates shortcut RWX flags setting unpack itself suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key |
|
2
193.117.208.148 - malware 131.153.76.130 - mailcious
|
|
|
8.2 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6702 |
2024-08-12 09:48
|
Blogger-http2.vbs b71d3da9f944c2bce3e6c16867607841VirusTotal Malware unpack itself crashed |
|
|
|
|
1.4 |
|
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6703 |
2024-08-12 09:47
|
66b4af430a0a1_files.exe f3d8c82810e55bc012bdeb2557ff13b9 Malicious Library UPX AntiDebug AntiVM PE File .NET EXE PE32 OS Processor Check VirusTotal Malware Buffer PE PDB Code Injection Check memory Checks debugger buffers extracted unpack itself RCE DNS |
|
1
|
|
|
9.6 |
M |
55 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6704 |
2024-08-12 09:47
|
66b331646d2cd_123p.exe 27b14ad026da76c1111174c6b4ba6aba PE File PE64 VirusTotal Cryptocurrency Miner Malware DNS CoinMiner |
|
2
pool.hashvault.pro(131.153.76.130) - mailcious 131.153.76.130 - mailcious
|
1
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
|
|
1.8 |
M |
52 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6705 |
2024-08-12 09:46
|
Blogger-http.bat 760e4992b9a2f60c53b67becaf62f157 Generic Malware Downloader Antivirus Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P Hide_URL AntiDebug AntiVM PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key |
|
1
193.117.208.148 - malware
|
|
|
7.2 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|