946 |
2024-08-19 14:03
|
track523.exe 126d07c834b159e2057a4e431073f948 Generic Malware Malicious Library Downloader UPX PE File PE64 OS Processor Check VirusTotal Malware Check memory Checks debugger Creates executable files unpack itself Tofsee |
1
https://bitbucket.org/fcsdcvscvc/sadcasdv/downloads/MessageBox.exe
|
2
bitbucket.org(104.192.140.24) - malware 104.192.140.26
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
2.0 |
|
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
947 |
2024-08-19 14:02
|
POS_C029.exe d04bc3c3b377d7d6e4285d2d6529a0c7 Malicious Library Admin Tool (Sysinternals etc ...) UPX PE File DllRegisterServer dll PE32 MZP Format VirusTotal Malware unpack itself |
|
|
|
|
1.8 |
|
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
948 |
2024-08-19 14:01
|
POS_C160.exe c44313ce6fe1376b64cb0d38249ccd3d Malicious Library UPX PE File DllRegisterServer dll PE32 MZP Format VirusTotal Malware Check memory unpack itself |
|
|
|
|
2.0 |
|
10 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
949 |
2024-08-19 14:00
|
POS_C161.exe e2f7f7f6f81f4b39cc106356db4b8770 Malicious Library Admin Tool (Sysinternals etc ...) UPX PE File DllRegisterServer dll PE32 MZP Format VirusTotal Malware unpack itself crashed |
|
|
|
|
2.0 |
|
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
950 |
2024-08-19 11:10
|
DownVerySync.exe a54ca6fc8ecfab0cc46f506d29acfd19 Emotet Generic Malware Malicious Library UPX Malicious Packer PE File PE64 OS Processor Check DLL MSOffice File PE32 VirusTotal Malware suspicious privilege Checks debugger Creates executable files unpack itself AppData folder sandbox evasion WriteConsoleW Windows |
2
http://dl-cn.verysync.com/releases/v2.15.0/verysync-windows-amd64-v2.15.0.zip http://dl-cn.verysync.com/releases/
|
2
dl-cn.verysync.com(104.21.52.166) 104.21.52.166
|
2
ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile ET INFO AutoIt User-Agent Downloading ZIP
|
|
3.8 |
|
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
951 |
2024-08-19 10:50
|
explorer.exe d08504a4718a999e104aef407bb43123 HermeticWiper Gen1 Emotet PhysicalDrive Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check PDB Remote Code Execution |
|
|
|
|
0.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
952 |
2024-08-19 10:50
|
WLive48x48.png 346e52bacfe42b2d4541fcc62e9d452f PNG Format |
|
|
|
|
|
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
953 |
2024-08-18 14:21
|
dl af0ebffab2ca7cffdc8a6aba7021e347 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.2 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
954 |
2024-08-18 14:21
|
youngjuan.vbs 4ff4cc2242c1e40ba40b21e322494800 Generic Malware Antivirus Hide_URL PowerShell VirusTotal Malware powershell suspicious privilege Check memory Checks debugger Creates shortcut unpack itself Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
1
https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
|
2
ia803104.us.archive.org(207.241.232.154) - malware 207.241.232.154 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
M |
2 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
955 |
2024-08-18 14:19
|
Images.exe 544fb98f86fbbbfe6adc50a62772df10 Emotet Gen1 Generic Malware Malicious Library Malicious Packer UPX Admin Tool (Sysinternals etc ...) Downloader Anti_VM AntiDebug AntiVM PE File PE32 OS Processor Check DLL .NET DLL DllRegisterServer dll VirusTotal Malware AutoRuns Code Injection Check memory Checks debugger Creates executable files unpack itself suspicious process AppData folder malicious URLs WriteConsoleW Windows ComputerName |
1
http://www.heyderw.de/gpg/mpc-us.php
|
6
github.com(20.200.245.247) - mailcious raw.githubusercontent.com(185.199.109.133) - malware www.heyderw.de(92.205.208.182) - mailcious 92.205.208.182 20.200.245.247 - malware 185.199.109.133 - mailcious
|
1
ET POLICY Python-urllib/ Suspicious User Agent
|
|
6.8 |
M |
14 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
956 |
2024-08-18 14:17
|
dl c110bf099b4b7f2591ba377488be0bf4 Malicious Library UPX PE File PE32 OS Processor Check VirusTotal Malware unpack itself Windows |
|
|
|
|
2.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
957 |
2024-08-18 14:17
|
Channel1.exe c0b1bacf44892b96abd3564716a2b4ee Generic Malware Malicious Library Malicious Packer Antivirus UPX AntiDebug AntiVM PE File PE64 OS Processor Check PowerShell PE32 VirusTotal Malware powershell AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities Disables Windows Security Checks Bios Check virtual network interfaces suspicious process AppData folder malicious URLs WriteConsoleW anti-virtualization Tofsee Windows Discord ComputerName Remote Code Execution DNS Cryptographic key |
6
http://58yongzhe.com/parts/setup1.exe - rule_id: 42034 http://194.58.114.223/d/385104 - rule_id: 41929 https://pastebin.com/raw/E0rY26ni - rule_id: 37702 https://yip.su/RNWPd.exe - rule_id: 37623 https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& https://iplogger.com/1lyxz - rule_id: 41935
|
12
iplogger.com(172.67.188.178) - mailcious 58yongzhe.com(62.133.62.93) - malware pastebin.com(104.20.4.235) - mailcious yip.su(172.67.169.89) - mailcious cdn.discordapp.com(162.159.133.233) - malware 104.20.3.235 - malware 91.121.59.207 162.159.130.233 - malware 172.67.188.178 - mailcious 62.133.62.93 194.58.114.223 - mailcious 172.67.169.89
|
10
ET DNS Query for .su TLD (Soviet Union) Often Malware Related SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) ET INFO Observed Discord Domain (discordapp .com in TLS SNI) ET INFO Packed Executable Download ET INFO External IP Lookup Domain (iplogger .com in DNS lookup) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET INFO External IP Lookup Domain (iplogger .com in TLS SNI) ET HUNTING Redirect to Discord Attachment Download
|
5
http://58yongzhe.com/parts/setup1.exe http://194.58.114.223/d/385104 https://pastebin.com/raw/E0rY26ni https://yip.su/RNWPd.exe https://iplogger.com/1lyxz
|
19.4 |
M |
11 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
958 |
2024-08-18 14:14
|
3546345.exe fd2defc436fc7960d6501a01c91d893e Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32 Browser Info Stealer Malware download VirusTotal Malware Malicious Traffic Check memory buffers extracted unpack itself Collect installed applications suspicious TLD anti-virtualization installed browsers check CryptBot Browser ComputerName DNS |
1
http://thizx13vt.top/v1/upload.php
|
2
thizx13vt.top(195.133.48.136) 195.133.48.136
|
3
ET DNS Query to a *.top domain - Likely Hostile ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 ET INFO HTTP Request to a *.top domain
|
|
6.2 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
959 |
2024-08-18 10:30
|
https://lula.com.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
2
https://lula.com.br/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8b4e1e744dbd7c6d https://lula.com.br/
|
2
lula.com.br(172.67.213.24) 104.21.69.207
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
960 |
2024-08-18 10:30
|
https://pt.org.br/ Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities malicious URLs Tofsee Windows Exploit DNS crashed |
|
2
pt.org.br(140.238.238.160) 146.235.40.229
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|