9076 |
2023-11-07 07:52
|
jucostam2.1.exe 1f6a213c979c6adff88e31e059d2825d Formbook NSIS Malicious Library UPX PE File PE32 FormBook Malware download Malware suspicious privilege Malicious Traffic Check memory Creates executable files unpack itself |
3
http://www.zg9tywlubmftzw5ldzmzmzk.com/ju29/?BZR8DR=eJVNysqPhL/uaCM5mmKlDkK99NL0wUK/QD98X4Xi+tSElCareFrH+cf4EbqdkZtA1uTt8AGh&VRKt=vBZhWH98eHJDbf http://www.klxcv.xyz/ju29/?BZR8DR=4JvfAS1R38BLVmeFk9DSiCnJ91CcqWw5bF+8iYbx752X4gk0kHBYwToCGZXoT3c/qcFpSYl1&VRKt=vBZhWH98eHJDbf http://www.xpermate.com/ju29/?BZR8DR=YSdUgFSDvDomRrfxRTc82IB8KvEz5Cudp7FBenL6bBiUULPv2hucH8VGw3UW6gX6WzIP7l0c&VRKt=vBZhWH98eHJDbf - rule_id: 37946
|
8
www.zg9tywlubmftzw5ldzmzmzk.com(103.224.212.216) www.klxcv.xyz(198.177.124.40) www.xpermate.com(77.245.157.73) - mailcious www.jokergiftcard.buzz() www.merchascarpamici.com() 198.177.124.40 - mailcious 103.224.212.216 - mailcious 77.245.157.73 - mailcious
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
1
http://www.xpermate.com/ju29/
|
3.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9077 |
2023-11-07 07:51
|
putty.exe cf3bc964f791ee22366b3277ee099329 Malicious Library UPX PE File PE32 OS Processor Check unpack itself |
|
|
|
|
0.8 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9078 |
2023-11-07 07:49
|
xinchao.exe 18e92e00cd0e14cee7e4448e8fa476ef Malicious Library Malicious Packer PE File PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer Malware Microsoft suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
2
194.49.94.80 91.235.128.141
|
4
ET INFO Microsoft net.tcp Connection Initialization Activity ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) ET MALWARE Redline Stealer TCP CnC Activity - MSValue (Outbound) ET MALWARE Redline Stealer Activity (Response)
|
|
5.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9079 |
2023-11-07 07:48
|
123.exe ceac8d319a011ba082cf1ab197d328e9 PE File PE32 .NET EXE Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9080 |
2023-11-07 07:47
|
arinzezx.exe 0fbfa908ef2e4abb29788d67bcc9c736 .NET framework(MSIL) PWS SMTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer Email Client Info Stealer PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee Browser Email ComputerName Software crashed |
|
2
cp5ua.hyperhost.ua(91.235.128.141) 91.235.128.141
|
2
SURICATA Applayer Detect protocol only one direction SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
10.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9081 |
2023-11-07 07:46
|
Services.exe d9ce98a0b0029d26876ac86409bac27e UPX VMProtect PE File PE32 Malware download Malware MachineGuid Malicious Traffic Check memory buffers extracted unpack itself Check virtual network interfaces IP Check PrivateLoader Tofsee DNS crashed |
9
http://91.92.243.151/api/tracemap.php - rule_id: 37889 http://94.142.138.131/api/tracemap.php - rule_id: 28311 http://apps.identrust.com/roots/dstrootcax3.p7c http://www.maxmind.com/geoip/v2.1/city/me http://94.142.138.131/api/firecom.php - rule_id: 36179 https://sso.passport.yandex.ru/push?uuid=17ee63be-a01d-4351-b836-3f7809d3449d&retpath=https%3A%2F%2Fdzen.ru%2F%3Fyredirect%3Dtrue https://dzen.ru/?yredirect=true https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self https://db-ip.com/
|
24
db-ip.com(172.67.75.166) www.maxmind.com(104.18.146.235) ipinfo.io(34.117.59.81) twitter.com(104.244.42.1) telegram.org(149.154.167.99) yandex.ru(5.255.255.70) api.db-ip.com(104.26.4.15) dzen.ru(62.217.160.2) ironhost.io(104.21.57.237) sso.passport.yandex.ru(213.180.204.24) 149.154.167.99 - mailcious 213.180.204.24 172.67.75.166 172.67.193.129 104.18.146.235 94.142.138.131 - mailcious 121.254.136.18 62.217.160.2 91.92.243.151 - mailcious 34.117.59.81 104.244.42.1 - suspicious 104.26.5.15 5.255.255.70 125.253.92.50
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) ET INFO TLS Handshake Failure
|
3
http://91.92.243.151/api/tracemap.php http://94.142.138.131/api/tracemap.php http://94.142.138.131/api/firecom.php
|
5.6 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9082 |
2023-11-07 07:46
|
3.exe 5bf9f652395cac44406e102289501e57 Malicious Library Malicious Packer PE File PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer Malware Microsoft suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
194.169.175.235 - mailcious
|
5
ET INFO Microsoft net.tcp Connection Initialization Activity ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) ET MALWARE Redline Stealer TCP CnC - Id1Response ET MALWARE Redline Stealer Activity (Response)
|
|
5.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9083 |
2023-11-07 07:45
|
build.exe 37e4a5aab62b40cf415b116cb246b2e2 Malicious Library UPX PE File PE32 OS Processor Check PDB unpack itself Remote Code Execution |
|
|
|
|
1.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9084 |
2023-11-07 07:42
|
My2.exe 9873907d252dcecd6baea9a11ac4b0da PE File PE64 Cryptocurrency Miner DNS CoinMiner |
|
2
pool.hashvault.pro(131.153.76.130) - mailcious 125.253.92.50
|
1
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
|
|
0.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9085 |
2023-11-07 07:42
|
Ads.exe 5462d8767b051ba3fc66f78d9ded9f41 PE File PE32 .NET EXE Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9086 |
2023-11-06 18:26
|
nord.exe b3e87b107b029e8c0ab14b095119b263 AsyncRAT Malicious Library UPX Malicious Packer .NET framework(MSIL) PE File PE32 .NET EXE OS Processor Check DNS |
|
1
136.243.151.123 - mailcious
|
|
|
2.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9087 |
2023-11-06 14:17
|
whesilozx.exe a117d7af8f85cacb310671b834482605 AgentTesla .NET framework(MSIL) PWS SMTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer FTP Client Info Stealer Email Client Info Stealer PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee Windows Browser Email ComputerName DNS Software crashed keylogger |
|
3
cp5ua.hyperhost.ua(91.235.128.141) 162.159.134.233 - malware 91.235.128.141
|
2
SURICATA Applayer Detect protocol only one direction SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
11.4 |
|
|
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9088 |
2023-11-06 14:10
|
defounderzx.exe 2ed10c1ecb18c82e28180b08eb96fbc2 AgentTesla .NET framework(MSIL) PWS KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer Email Client Info Stealer Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee Windows Discord Browser Email ComputerName DNS crashed keylogger |
2
https://discordapp.com/api/webhooks/1164197415147020358/r6DHDEdEVlubS99_mqTR2EYAvLqIPvG1AA9kVN_oApRfIgXgxydFAbvOjcrA0W4bxbuR - rule_id: 37996 https://discordapp.com/api/webhooks/1164197415147020358/r6DHDEdEVlubS99_mqTR2EYAvLqIPvG1AA9kVN_oApRfIgXgxydFAbvOjcrA0W4bxbuR
|
3
discordapp.com(162.159.135.233) - mailcious 185.174.174.220 - phishing 162.159.134.233 - malware
|
3
ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://discordapp.com/api/webhooks/1164197415147020358/r6DHDEdEVlubS99_mqTR2EYAvLqIPvG1AA9kVN_oApRfIgXgxydFAbvOjcrA0W4bxbuR
|
11.4 |
|
|
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9089 |
2023-11-06 14:07
|
MKiJjiii77.exe 5aefabd29d2955e7c86c5c6a24f2502b AgentTesla Confuser .NET PWS SMTP KeyLogger AntiDebug AntiVM PE File PE64 Browser Info Stealer Malware download FTP Client Info Stealer Email Client Info Stealer Malware AgentTesla suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Windows Browser Email ComputerName Software crashed keylogger |
|
2
mail.bretoffice.com(185.174.174.220) - mailcious 185.174.174.220 - phishing
|
2
SURICATA Applayer Detect protocol only one direction ET MALWARE AgentTesla Exfil Via SMTP
|
|
9.6 |
|
|
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9090 |
2023-11-06 10:55
|
clips.exe c6ae3bd0ab0e78257468cdab2b867707 Themida Packer Downloader UPX VMProtect Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PE File PE32 AutoRuns Code Injection Check memory Creates executable files unpack itself Windows utilities Checks Bios Detects VirtualBox Detects VMWare suspicious process WriteConsoleW VMware anti-virtualization Windows ComputerName Firmware crashed |
|
|
|
|
9.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|