8821 |
2023-10-16 11:22
|
anykmc.txt.vbs 02de2b9fc44bc82bf8e627cca8058f0f Generic Malware Antivirus PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://raw.githubusercontent.com/drax2020/drax/main/invkmc.jpg
|
2
raw.githubusercontent.com(185.199.108.133) - malware 185.199.110.133 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.0 |
|
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8822 |
2023-10-16 11:21
|
x8.x8.x8.x0x0.doc c8dfd87f05e2744967e74f93a605827e MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Exploit DNS crashed |
1
http://107.175.3.22/8w8/sihost.exe
|
1
|
1
ET INFO Executable Download from dotted-quad Host
|
|
4.2 |
|
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8823 |
2023-10-16 11:20
|
fronttechnologicalprores.exe 5a0d618b0f8ed5b550a811e4b1afdf48 Lumma Gen1 Emotet Malicious Library .NET framework(MSIL) UPX Http API ScreenShot Internet API AntiDebug AntiVM PE File PE64 CAB MSOffice File PNG Format .NET EXE JPEG Format PE32 Browser Info Stealer Malware download VirusTotal Malware Cryptocurrency wallets Cryptocurrency AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder sandbox evasion WriteConsoleW installed browsers check Tofsee Ransomware Lumma Stealer Windows Exploit Browser ComputerName Remote Code Execution Firmware DNS Cryptographic key crashed |
3
http://manguvorpmi.pw/api - rule_id: 37127 http://172.86.98.101/xs12pro/Chogy.vdf - rule_id: 37111 http://172.86.98.101/xs12pro/Qtpdugpzq.mp3 - rule_id: 37111
|
5
manguvorpmi.pw(104.21.95.127) - mailcious iplogger.com(148.251.234.93) - mailcious 172.86.98.101 - mailcious 148.251.234.93 - mailcious 104.21.95.127 - mailcious
|
8
ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration ET INFO HTTP Request to a *.pw domain ET INFO TLS Handshake Failure ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In ET DNS Query to a *.pw domain - Likely Hostile
|
3
http://manguvorpmi.pw/api http://172.86.98.101/xs12pro/ http://172.86.98.101/xs12pro/
|
22.2 |
M |
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8824 |
2023-10-16 11:16
|
ns3.jpg f394ecfbd02494369cd4cca7a70059fa ELF VirusTotal Malware |
|
|
|
|
1.0 |
|
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8825 |
2023-10-16 11:15
|
build.exe f6d470bdfc5dd8dd800580cfa71d1837 Malicious Library PE File PE32 VirusTotal Malware PDB unpack itself |
|
|
|
|
2.0 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8826 |
2023-10-16 11:12
|
clip64.dll ed15379ed0c9f2e2cc0c105fc8f08896 Amadey Malicious Library UPX PE File DLL PE32 OS Processor Check VirusTotal Malware PDB Malicious Traffic Checks debugger unpack itself DNS |
1
http://77.91.97.162/g93kdwj3S/index.php
|
2
74.207.245.195 77.91.97.162
|
|
|
3.8 |
|
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8827 |
2023-10-16 11:12
|
RBY2.exe d334fdbe7080a9e36d94001903199491 Amadey Generic Malware UPX Malicious Library Malicious Packer Antivirus PE File PE32 .NET EXE OS Processor Check JPEG Format DLL PE64 Malware download Amadey VirusTotal Cryptocurrency Miner Malware AutoRuns MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AppData folder suspicious TLD WriteConsoleW Tofsee Windows ComputerName DNS Downloader CoinMiner |
10
http://85.217.144.143/files/My2.exe - rule_id: 34643 http://193.42.32.29/9bDc8sQ/index.php - rule_id: 36909 http://193.42.32.29/9bDc8sQ/index.php?scr=1 - rule_id: 36909 http://guboh2p.top/build.exe http://apps.identrust.com/roots/dstrootcax3.p7c http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 https://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 https://logicmouse.net/6779d89b7a368f4f3f340b50a9d18d71.exe https://pastebin.com/raw/V6VJsrV3 https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe - rule_id: 36783
|
27
thegrandduck.org(104.21.79.27) yip.su(148.251.234.93) - mailcious guboh2p.top(185.154.192.128) martvl.com(69.48.143.183) laubenstein.space(45.130.41.101) pastebin.com(172.67.34.170) - mailcious flyawayaero.net(172.67.216.81) - malware net.geo.opera.com(107.167.110.216) logicmouse.net(104.21.1.34) potatogoose.com(172.67.180.173) lycheepanel.info(104.21.32.208) - malware pool.hashvault.pro(125.253.92.50) - mailcious 107.167.110.211 148.251.234.93 - mailcious 85.217.144.143 - malware 45.130.41.101 193.42.32.29 - malware 69.48.143.183 172.67.187.122 - malware 104.21.93.225 - phishing 104.21.79.27 185.154.192.128 104.20.68.143 - mailcious 172.67.186.120 121.254.136.9 104.21.35.235 131.153.76.130 - mailcious
|
18
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure ET DNS Query for .su TLD (Soviet Union) Often Malware Related ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET INFO Packed Executable Download ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET DNS Query to a *.top domain - Likely Hostile ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 ET INFO HTTP Request to a *.top domain ET HUNTING Request to .TOP Domain with Minimal Headers ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) ET HUNTING Possible EXE Download From Suspicious TLD ET MALWARE Amadey CnC Check-In ET MALWARE Win32/Amadey Bot Activity (POST) M2 ET MALWARE Amadey Bot Activity (POST) M1
|
4
http://85.217.144.143/files/My2.exe http://193.42.32.29/9bDc8sQ/index.php http://193.42.32.29/9bDc8sQ/index.php https://flyawayaero.net/baf14778c246e15550645e30ba78ce1c.exe
|
9.8 |
M |
59 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8828 |
2023-10-16 11:11
|
laplas03.exe 14817abceacc2869286157bc5198ba30 PE File PE64 VirusTotal Malware crashed |
|
|
|
|
2.2 |
|
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8829 |
2023-10-16 11:10
|
schtasks.exe 72aa1d054af015d3b90588e9e0cf04ae AsyncRAT UPX Malicious Packer .NET framework(MSIL) PE File PE32 .NET EXE OS Processor Check |
|
2
itskmc.run.place(74.207.245.195) 74.207.245.195
|
|
|
|
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8830 |
2023-10-16 11:10
|
audiodgse.exe be17427d37337c71ac701effd983f143 LokiBot Generic Malware Antivirus PWS SMTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware powershell PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key Software crashed |
|
5
api.ipify.org(64.185.227.156) 185.154.192.128 193.42.32.29 - malware 64.185.227.156 131.153.76.130 - mailcious
|
4
ET INFO TLS Handshake Failure ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
13.4 |
|
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8831 |
2023-10-16 11:08
|
cred64.dll 7d6c819c7accbd9abe8f6c4eb087eea2 Browser Login Data Stealer Malicious Library UPX PE File DLL PE64 OS Processor Check VirusTotal Malware PDB Checks debugger installed browsers check Browser ComputerName crashed |
|
|
|
|
2.4 |
|
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8832 |
2023-10-16 11:06
|
timeSync.exe 03a76b21baa5f39e5f592ad2e11a6336 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware PDB unpack itself |
|
|
|
|
2.0 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8833 |
2023-10-16 11:05
|
humblezx.exe 9db0aa4d2c28205d89536de9244cb7e8 AgentTesla SMTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Tofsee Browser Email ComputerName DNS crashed |
|
2
api.ipify.org(64.185.227.156) 64.185.227.156
|
4
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup ET INFO TLS Handshake Failure ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
9.6 |
|
56 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8834 |
2023-10-16 11:04
|
gffdgfdgfdg.msi d5e7a19ebeaa041c09162cac95747cd1 Malicious Library MSOffice File CAB OS Processor Check VirusTotal Malware suspicious privilege Check memory Checks debugger unpack itself AntiVM_Disk VM Disk Size Check ComputerName |
|
|
|
|
2.8 |
|
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8835 |
2023-10-16 11:03
|
source2.exe f7f4c10dd56dd175ed57b936d3ae87d1 UPX Admin Tool (Sysinternals etc ...) .NET framework(MSIL) Http API ScreenShot Internet API AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer Malware download VirusTotal Malware Cryptocurrency wallets Cryptocurrency PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications sandbox evasion installed browsers check Ransomware Lumma Stealer Windows Browser ComputerName Firmware Cryptographic key |
1
http://allcentrlizeqweq.fun/api
|
2
allcentrlizeqweq.fun(104.21.16.241) 104.21.16.241
|
2
ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration
|
|
14.8 |
|
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|