8326 |
2023-12-18 09:53
|
updater.exe eba1a3fb09c1fc6b8d987d176ab9575e Gen1 RedLine stealer NSIS Downloader Generic Malware Malicious Library UPX Malicious Packer Javascript_Blob Anti_VM PE32 PE File ftp DLL OS Processor Check PE64 MSOffice File VirusTotal Malware suspicious privilege Check memory Checks debugger Creates executable files RWX flags setting unpack itself AppData folder Ransomware |
|
|
|
|
3.8 |
M |
10 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8327 |
2023-12-18 09:53
|
rise.exe b5d5c6670a9986cba2e170ef7ad519b6 Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check DNS |
|
1
193.233.132.51 - mailcious
|
|
|
1.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8328 |
2023-12-18 09:50
|
film.exe fe9d5f33dabac2b6601cd86f4519f5bc PE32 PE File .NET EXE VirusTotal Malware Buffer PE PDB Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces DNS |
|
2
transfer.sh(144.76.136.153) - malware 144.76.136.153 - mailcious
|
2
ET POLICY Observed DNS Query to File Transfer Service Domain (transfer .sh) ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in DNS Lookup)
|
|
4.8 |
|
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8329 |
2023-12-18 09:48
|
qwe.exe 9f497e5418aaf7b8f15b92535de3c0d9 PE32 PE File VirusTotal Malware DNS crashed |
|
1
|
|
|
1.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8330 |
2023-12-18 09:48
|
microsoftprofilehandledbycooki... d268713168844021d6ef5d210a9eb234 MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic buffers extracted exploit crash unpack itself Windows Exploit DNS crashed |
1
http://91.92.253.11/thursdayexploitxla.exe
|
1
|
5
ET INFO Executable Download from dotted-quad Host ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
4.6 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8331 |
2023-12-18 09:46
|
v2.exe cf8a20b11ce9cf757bfaf49bd93ac524 RedLine stealer Admin Tool (Sysinternals etc ...) .NET framework(MSIL) UPX Malicious Library ScreenShot PWS AntiDebug AntiVM PE32 PE File .NET EXE OS Processor Check DLL Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware Microsoft Buffer PE PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications AppData folder installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
5
ET INFO Microsoft net.tcp Connection Initialization Activity ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization) ET MALWARE Redline Stealer TCP CnC - Id1Response ET MALWARE Redline Stealer Family Activity (Response)
|
|
12.8 |
|
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8332 |
2023-12-18 09:46
|
microsoftdecidedtodeleteentire... 066232099ba8df43942395e4ebfa39a2 MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic buffers extracted RWX flags setting exploit crash Tofsee Windows Exploit DNS crashed |
1
http://172.245.208.4/3456/wlanext.exe
|
3
www.synergyinnovationgroup.com(65.60.36.22) - mailcious 65.60.36.22 - mailcious
172.245.208.4 - mailcious
|
7
ET INFO Executable Download from dotted-quad Host ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.6 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8333 |
2023-12-18 08:00
|
rise.exe 4e4e4a779e9e0e970184db551ec00e5a Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check DNS |
|
2
193.233.132.51 - mailcious 107.172.31.178
|
|
|
1.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8334 |
2023-12-18 07:59
|
wlanext.exe 91e0e276bfd12c96de9bf398f410bfb3 Browser Login Data Stealer Generic Malware Malicious Library Malicious Packer Downloader UPX ScreenShot AntiDebug AntiVM PE32 PE File OS Processor Check Browser Info Stealer Remcos Email Client Info Stealer Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself AntiVM_Disk sandbox evasion VM Disk Size Check human activity check Browser Email ComputerName DNS DDNS |
1
http://geoplugin.net/json.gp
|
4
geoplugin.net(178.237.33.50) remcosmonitor.duckdns.org(107.172.31.178) 178.237.33.50 107.172.31.178
|
3
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain ET INFO DYNAMIC_DNS Query to *.duckdns. Domain ET JA3 Hash - Remcos 3.x TLS Connection
|
|
10.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8335 |
2023-12-18 07:56
|
marcopack2.1.exe f525808e3a1d0040b3c60e5940f250fe NSIS Malicious Library UPX Downloader PE32 PE File OS Processor Check AutoRuns Check memory Creates executable files unpack itself AppData folder Windows DNS DDNS |
|
3
mcwillis.duckdns.org(91.92.251.22) 91.92.251.22 131.153.76.130 - mailcious
|
2
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
|
|
5.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8336 |
2023-12-18 07:56
|
3535.exe 138b15b9fcd21533b3ca0193893053cf Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check Browser Info Stealer RedLine Malware download FTP Client Info Stealer Malware Microsoft suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
2
176.123.10.211 - mailcious 91.92.243.245
|
3
ET INFO Microsoft net.tcp Connection Initialization Activity ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization) ET MALWARE Redline Stealer Family Activity (Response)
|
|
5.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8337 |
2023-12-18 07:55
|
updater.exe 6f0e94c80d8b9c98ea75bff456eff5a2 Gen1 Generic Malware UPX Antivirus Malicious Library PE32 PE File ftp DLL PE64 OS Processor Check ZIP Format Cryptocurrency Miner Malware Cryptocurrency powershell suspicious privilege Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself powershell.exe wrote suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key CoinMiner |
1
http://94.156.71.160/carsalepanel/api/endpoint.php - rule_id: 38536
|
7
xmr.2miners.com(162.19.139.184) - mailcious pool.hashvault.pro(125.253.92.50) - mailcious pastebin.com(104.20.68.143) - mailcious 162.19.139.184 - mailcious 131.153.76.130 - mailcious 94.156.71.160 - mailcious 104.20.67.143 - mailcious
|
3
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) ET COINMINER Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner)
|
1
http://94.156.71.160/carsalepanel/api/endpoint.php
|
6.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8338 |
2023-12-18 07:54
|
konordbox2.1.exe a458d02487805c29b7e6b7ee09d1bee9 NSIS Malicious Library UPX Downloader PE32 PE File OS Processor Check Malware download AveMaria NetWireRC Malware AutoRuns MachineGuid Check memory Creates executable files ICMP traffic unpack itself AppData folder Windows RAT ComputerName DNS DDNS keylogger |
|
2
akcay.duckdns.org(91.92.243.245) 91.92.243.245
|
4
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain ET INFO DYNAMIC_DNS Query to *.duckdns. Domain ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin
|
|
5.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8339 |
2023-12-18 07:52
|
wlanext.exe cae0a2b2c56b394afa087d84a85e1f6b Generic Malware Malicious Library UPX Antivirus PE32 PE File powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Windows utilities powershell.exe wrote suspicious process Windows ComputerName Cryptographic key crashed |
|
|
|
|
6.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8340 |
2023-12-18 07:51
|
thursdayexploitxla.exe cce987d4f92698550805cd361acdab2a .NET framework(MSIL) UPX PE32 PE File .NET EXE OS Processor Check Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|