7891 |
2023-10-10 07:40
|
shekinga2.1.exe 4018b3beefce0db09ca018c8d99262e3 NSIS Malicious Library UPX PE File PE32 OS Processor Check Remcos VirusTotal Malware AutoRuns Malicious Traffic Check memory Creates executable files unpack itself AppData folder Windows DNS DDNS |
1
http://geoplugin.net/json.gp
|
4
geoplugin.net(178.237.33.50) sheddy1122.ddns.net(103.212.81.158) - mailcious 178.237.33.50 103.212.81.158
|
2
ET POLICY DNS Query to DynDNS Domain *.ddns .net ET JA3 Hash - Remcos 3.x TLS Connection
|
|
5.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7892 |
2023-10-10 02:05
|
gate9_pass1234.7z fb744c58353b153a548fd04fd959b232 AntiDebug AntiVM Email Client Info Stealer suspicious privilege Checks debugger Creates shortcut unpack itself installed browsers check Browser Email ComputerName |
|
|
|
|
3.4 |
M |
|
ticklesc
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7893 |
2023-10-09 17:59
|
http://192.168.8.1 Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File PNG Format JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
5.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7894 |
2023-10-09 13:23
|
helpscientistpro.exe f54931aaae6cff496f607d6991cc1437 Gen1 Emotet Malicious Library UPX Http API ScreenShot PWS Internet API AntiDebug AntiVM PE File PE64 CAB Browser Info Stealer Malware download Malware Cryptocurrency wallets Cryptocurrency Buffer PE AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces suspicious TLD sandbox evasion Ransomware Lumma Stealer Windows Browser ComputerName Remote Code Execution DNS Cryptographic key |
3
http://manguvorpmi.pw/api http://172.86.98.101/xs12pro/Akdvsmkkbhu.pdf - rule_id: 37111 http://manguvorpmi.pw/
|
3
manguvorpmi.pw(104.21.95.127) 172.86.98.101 - mailcious 172.67.144.245
|
5
ET DNS Query to a *.pw domain - Likely Hostile ET INFO Dotted Quad Host PDF Request ET INFO HTTP Request to a *.pw domain ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration
|
1
http://172.86.98.101/xs12pro/
|
15.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7895 |
2023-10-09 13:21
|
cutarise.exe 71c3e327a97a8836a70a129d1c547670 PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger unpack itself Check virtual network interfaces Tofsee |
1
https://i.ibb.co/kgZ7SgM/Graphics-Card-PCB-Assembly-Final.jpg
|
2
i.ibb.co(104.194.8.143) - mailcious 104.194.8.143 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
2.4 |
|
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7896 |
2023-10-09 13:20
|
differentdatabase.exe 3f0ca10225ca292ea31be0d292dcfb70 UPX .NET framework(MSIL) ScreenShot PWS AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check Malware Buffer PE AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Windows DNS Cryptographic key |
1
http://172.86.98.101/xs12pro/Awwxxzzg.vdf - rule_id: 37111
|
1
172.86.98.101 - mailcious
|
|
1
http://172.86.98.101/xs12pro/
|
10.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7897 |
2023-10-09 13:20
|
discoversophisticatedpro.exe 79de5ff2273d613a14ca4c8edff7d5ec Gen1 Emotet Generic Malware Malicious Library UPX .NET framework(MSIL) Http API ScreenShot Internet API AntiDebug AntiVM PE File PE64 CAB PE32 .NET EXE OS Processor Check Malware download Malware Buffer PE AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder Lumma Stealer Windows Remote Code Execution DNS Cryptographic key crashed |
3
http://172.86.98.101/xs12pro/Gpflofkmce.dat - rule_id: 37111 http://firmpanacewa.fun/api http://172.86.98.101/xs12pro/Rglrwzz.vdf - rule_id: 37111
|
3
firmpanacewa.fun(172.67.181.9) - mailcious 172.86.98.101 - mailcious 172.67.181.9 - mailcious
|
1
ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In
|
2
http://172.86.98.101/xs12pro/ http://172.86.98.101/xs12pro/
|
13.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7898 |
2023-10-09 13:19
|
helpscientistpro.exe f54931aaae6cff496f607d6991cc1437 Gen1 Emotet Malicious Library UPX .NET framework(MSIL) PE File PE64 CAB PE32 .NET EXE OS Processor Check Malware Buffer PE AutoRuns PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder Windows Remote Code Execution DNS Cryptographic key |
2
http://172.86.98.101/xs12pro/Htjxmgd.pdf - rule_id: 37111 http://172.86.98.101/xs12pro/Akdvsmkkbhu.pdf - rule_id: 37111
|
1
172.86.98.101 - mailcious
|
1
ET INFO Dotted Quad Host PDF Request
|
2
http://172.86.98.101/xs12pro/ http://172.86.98.101/xs12pro/
|
11.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7899 |
2023-10-09 13:19
|
lastsciiencepro.exe 81d34d81c4b40ba209760c61baaad458 Gen1 Emotet Malicious Library UPX .NET framework(MSIL) Http API ScreenShot PWS Internet API AntiDebug AntiVM PE File PE64 CAB PE32 .NET EXE OS Processor Check Malware download VirusTotal Malware Buffer PE AutoRuns PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder Lumma Stealer Windows Remote Code Execution DNS Cryptographic key crashed |
3
http://blessdeckite.fun/ http://blessdeckite.fun/api http://172.86.98.101/xs12pro/Czbzftdagy.mp4 - rule_id: 37111
|
3
blessdeckite.fun(172.67.176.124) 172.86.98.101 - mailcious 104.21.31.117
|
1
ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In
|
1
http://172.86.98.101/xs12pro/
|
14.6 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7900 |
2023-10-09 13:17
|
watchprevailing.exe 0a258548c05c1f8baded9ccfbd4b6896 UPX .NET framework(MSIL) ScreenShot PWS AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check VirusTotal Malware Buffer PE AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Windows DNS Cryptographic key |
1
http://172.86.98.101/xs12pro/Kmztlc.vdf - rule_id: 37111
|
1
172.86.98.101 - mailcious
|
|
1
http://172.86.98.101/xs12pro/
|
11.0 |
M |
19 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7901 |
2023-10-09 12:57
|
Steal_BrowserPassword.ps1 781f2735b980b567aa07fec41e6d4422 Generic Malware Antivirus Check memory unpack itself WriteConsoleW Windows Cryptographic key |
1
https://github.com/atomiczsec/My-Payloads/blob/main/Assets/browser.exe?raw=true
|
|
|
|
1.0 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7902 |
2023-10-09 12:57
|
browser.exe c86277ab02da0abcf91b0109a0bc28ea Generic Malware Malicious Library UPX Malicious Packer PE File PE64 OS Processor Check VirusTotal Malware crashed |
|
|
|
|
1.4 |
|
52 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7903 |
2023-10-09 12:42
|
minda.exe c7f2b50a51b84d1108430e3fb119d0d4 Gen1 Emotet Malicious Library UPX Malicious Packer Confuser .NET Admin Tool (Sysinternals etc ...) .NET framework(MSIL) AntiDebug AntiVM PE File PE32 .NET EXE OS Processor Check DLL MZP Format PE64 CHM Format DllRegisterServer dll Browser Info Stealer Malware download VirusTotal Email Client Info Stealer Cryptocurrency Miner Malware c&c suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder sandbox evasion WriteConsoleW anti-virtualization installed browsers check Tofsee Stealc Stealer Windows Browser Email ComputerName DNS crashed plugin CoinMiner |
8
http://5.42.65.39/a03c8956ff198333/softokn3.dll http://5.42.65.39/bed95ea4798a5204.php http://5.42.65.39/a03c8956ff198333/mozglue.dll http://5.42.65.39/a03c8956ff198333/msvcp140.dll http://5.42.65.39/a03c8956ff198333/nss3.dll http://5.42.65.39/a03c8956ff198333/vcruntime140.dll http://5.42.65.39/a03c8956ff198333/sqlite3.dll http://5.42.65.39/a03c8956ff198333/freebl3.dll
|
8
xmr-eu1.nanopool.org(51.68.143.81) - mailcious pastebin.com(104.20.68.143) - mailcious iplogger.com(148.251.234.93) - mailcious 148.251.234.93 - mailcious 163.172.154.142 212.47.253.124 5.42.65.39 - mailcious 104.20.67.143 - mailcious
|
20
ET INFO TLS Handshake Failure ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) ET MALWARE Win32/Stealc Requesting browsers Config from C2 ET MALWARE Win32/Stealc Active C2 Responding with browsers Config ET MALWARE Win32/Stealc Requesting plugins Config from C2 ET MALWARE Win32/Stealc Active C2 Responding with plugins Config ET MALWARE Win32/Stealc Submitting System Information to C2 ET INFO Dotted Quad Host DLL Request ET HUNTING HTTP GET Request for sqlite3.dll - Possible Infostealer Activity ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner) ET HUNTING HTTP GET Request for freebl3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for nss3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for softokn3.dll - Possible Infostealer Activity ET HUNTING HTTP GET Request for vcruntime140.dll - Possible Infostealer Activity
|
|
17.6 |
|
42 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7904 |
2023-10-09 12:41
|
AIMP2.eXe 62b71a7a5a313f5144b7bf45b7fcf87a Gen1 Malicious Library UPX Malicious Packer PE File PE64 OS Processor Check VirusTotal Malware PDB Check memory Checks debugger unpack itself DNS |
|
1
|
|
|
2.2 |
|
4 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7905 |
2023-10-09 12:32
|
baf652ff4cb5f03754c0156583578c... baf652ff4cb5f03754c0156583578c3a MSOffice File VirusTotal Malware exploit crash unpack itself suspicious TLD Exploit crashed |
1
http://encyclopedia83.samiseto.ru/HOME-PC/registry/sorry/amiable/amiable/amiable.83glf
|
2
encyclopedia83.samiseto.ru(185.39.207.104) - mailcious 185.39.207.104
|
|
|
4.0 |
|
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|