11011 |
2021-08-06 16:42
|
81vy8extract.exe 902bf3ec932ad1d22584f7c30c35f65e Gen2 RAT Gen1 Generic Malware UPX Malicious Library OS Processor Check .NET EXE PE File PE32 VirusTotal Malware PDB Check memory Checks debugger unpack itself suspicious process WriteConsoleW ComputerName |
|
|
|
|
2.8 |
|
13 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11012 |
2021-08-06 16:44
|
.csrss.exe ef5105caed1d432aca814ba5eb4b9d90 UPX Malicious Library PE File PE32 VirusTotal Malware PDB unpack itself Remote Code Execution |
|
|
|
|
2.6 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11013 |
2021-08-06 16:45
|
1c3c9watch.exe fd18bd8ec985410ddfe371dda8acb47f RAT Generic Malware Antivirus DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Internet API FTP ScreenShot Http API Steal credential Downloader P2P persistence AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Email Client Info Stealer Malware PDB Code Injection Check memory Checks debugger Creates executable files unpack itself Windows utilities suspicious process installed browsers check Windows Browser Email |
|
|
|
|
4.8 |
|
7 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11014 |
2021-08-06 16:47
|
82ig9helloworld.exe af36e389777e2b33f4c2f785203d5c77 RAT Generic Malware Antivirus DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Internet API FTP ScreenShot Http API Steal credential Downloader P2P persistence AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Email Client Info Stealer Malware PDB Code Injection Check memory Checks debugger Creates executable files unpack itself Windows utilities suspicious process installed browsers check Windows Browser Email |
|
|
|
|
4.8 |
|
9 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11015 |
2021-08-06 16:47
|
mazx.exe e1ad89d88c9ffed81a10e3b2e7a323c1 PWS .NET framework Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM .NET EXE PE File PE32 FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
3
http://www.richardggreenhill.com/mxwf/?Ezu=U68BUADVnBX1mfOYklbFYycAs+6aum+kmxds/l9wjQNa05UKM3zcbxraq+dmUoXPsoua5S44&Rxo=M6hH4XnpE45t http://www.sacredkashilifestudio.net/mxwf/?Ezu=eipsewIB2PU7fLq0V+MVTYpseXSXiNmBphXFeMyyAJ/wgZWHvgK6rmKFdWqq2CZ89/HqMPFu&Rxo=M6hH4XnpE45t http://www.sierp.com/mxwf/?Ezu=Ao4ZudGNGCCq/bz1F1jp8r1nNp3jUASgPiEiflfcY9lwBGukS/0V2qMMjZrQt7h4MdjTjHfn&Rxo=M6hH4XnpE45t
|
6
www.sierp.com(52.58.78.16) www.richardggreenhill.com(34.80.190.141) www.sacredkashilifestudio.net(34.102.136.180) 52.58.78.16 - mailcious 34.102.136.180 - mailcious 34.80.190.141 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.4 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11016 |
2021-08-06 16:50
|
olde.exe 0144a7d3ea564aa29856fc657c53c96b RAT PWS .NET framework Generic Malware Admin Tool (Sysinternals etc ...) SMTP Escalate priviledges AntiDebug AntiVM .NET EXE PE File PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs Windows Cryptographic key |
9
http://www.searchlakeconroehomes.com/wufn/?jFN8ld=PMoU3Bb4pp7kIq7s9Lu9lk9x8XSdLDPlrC1uiYxj/TRDLGMuRYRvVOWSTnHGXDduCYD74xYV&Ppm=_0GDCjlXRtrXu http://www.pawsthemomentpetphotography.com/wufn/?jFN8ld=Rf1VSXHhjAd3xZbUZ5Onn240es76xn7Vld3yUvp1C0rvyafmXRD7FVPOu25ZGszyPHif5o0I&Ppm=_0GDCjlXRtrXu http://www.tv-safetrading.com/wufn/?jFN8ld=2sIV3/IjLh8nMJX2xiMu8K4DytSqStqs4o42nSjUriRJwCEBjLuMrZn4DqI5ySzTlzvs5kca&Ppm=_0GDCjlXRtrXu http://www.gaigoilaocai.com/wufn/?jFN8ld=+cvcaH9t4IGOvfSH2s/pGQCzCoMlKLNX9S4pg+CdqO+ehvTRSw4m6C0WiIEOYf+cYXNRRXby&Ppm=_0GDCjlXRtrXu - rule_id: 2912 http://www.cuadorcoast.com/wufn/?jFN8ld=kYzY+WOATOJvl0LGKoTI9L4ky9M8/RXPaPgWsg9EorAZ9N2DAW9xe5TyjlQCxAJLBvRqjfNR&Ppm=_0GDCjlXRtrXu - rule_id: 2914 http://www.zwq.xyz/wufn/?jFN8ld=XjXBhjUVI334M/Uwl7gvZZ0GeOD10IACqOCIbULeYHXWrIpOZW21ZlaOwQdpB6LWbxxYrGle&Ppm=_0GDCjlXRtrXu - rule_id: 3226 http://www.intoxickiss.com/wufn/?jFN8ld=eFcjLRgeiIUzDbHmwTb3Jzj/ojOR5Bd5C6w81D5RMgQILdL/YJI1IKkLX7W57Fxdc9GGy5Q6&Ppm=_0GDCjlXRtrXu - rule_id: 3564 http://www.iqpt.info/wufn/?jFN8ld=hrdaP+EsGTITsCagZnHefT6Bmc518UuvQeiOjF2tcIDpZFKKlutoy9+nHdETp4OhFNJGJnoo&Ppm=_0GDCjlXRtrXu - rule_id: 2910 http://www.peak-valleyadvertising.com/wufn/?jFN8ld=FgzG7Qx2bDHQRqzBshosqp2KyuZ4BKgjCPQpIPsUZT2saqt6xf80CxpLR0Dj1LrdceOnKHHp&Ppm=_0GDCjlXRtrXu - rule_id: 3521
|
19
www.intoxickiss.com(151.101.192.119) www.searchlakeconroehomes.com(104.21.0.250) www.gaigoilaocai.com(104.21.84.71) www.rizqebooks.com() - mailcious www.peak-valleyadvertising.com(34.102.136.180) www.iqpt.info(67.199.248.13) www.zwq.xyz(52.128.23.153) www.tv-safetrading.com(217.70.184.50) www.cuadorcoast.com(156.231.25.88) www.pawsthemomentpetphotography.com(198.54.126.105) 52.128.23.153 - mailcious 172.67.151.130 156.231.25.88 - mailcious 34.102.136.180 - mailcious 217.70.184.50 - mailcious 198.54.126.105 - mailcious 67.199.248.12 - mailcious 104.21.84.71 151.101.128.119
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
6
http://www.gaigoilaocai.com/wufn/ http://www.cuadorcoast.com/wufn/ http://www.zwq.xyz/wufn/ http://www.intoxickiss.com/wufn/ http://www.iqpt.info/wufn/ http://www.peak-valleyadvertising.com/wufn/
|
9.2 |
M |
9 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11017 |
2021-08-06 16:50
|
olde-2.exe e2e4c5d869ec7bdb5dd1b8fae00f929a PWS .NET framework Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM .NET EXE PE File PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
16
http://www.333s998.com/wufn/?uZhPcRQ=VTesff5V8BaVQfct7ufB+ZGDNoZjfYL94mUu5cNf67hmTMf3dCw98cZx4Ykp6QvQWnzQdmMu&U4kp=Ntx4ZRIXOr7dPRJ http://www.hk6628.com/wufn/ - rule_id: 2909 http://www.cuadorcoast.com/wufn/ - rule_id: 2914 http://www.333s998.com/wufn/ http://www.peak-valleyadvertising.com/wufn/ - rule_id: 3521 http://www.gaigoilaocai.com/wufn/ - rule_id: 2912 http://www.cuadorcoast.com/wufn/?uZhPcRQ=kYzY+WOATOJvl0LGKoTI9L4ky9M8/RXPaPgWsg9EorAZ9N2DAW9xe5TyjlQCxAJLBvRqjfNR&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 2914 http://www.thetravellingwitch.com/wufn/?uZhPcRQ=SkZZDimVFNr5ByBNwXdupEC24fazy/RNnO17U5xCKPPDvCtbTF67loPH83UjHGCD+yr52EUp&U4kp=Ntx4ZRIXOr7dPRJ http://www.frystmor.city/wufn/ - rule_id: 3223 http://www.hk6628.com/wufn/?uZhPcRQ=Mbz3eb2htBuwJm9my9qYpH4UWvi7L1jn54VVewVZerqVccc7GhECZ0+c8NYoPjvN/okzts0t&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 2909 http://www.pon.xyz/wufn/ - rule_id: 3803 http://www.peak-valleyadvertising.com/wufn/?uZhPcRQ=FgzG7Qx2bDHQRqzBshosqp2KyuZ4BKgjCPQpIPsUZT2saqt6xf80CxpLR0Dj1LrdceOnKHHp&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 3521 http://www.gaigoilaocai.com/wufn/?uZhPcRQ=+cvcaH9t4IGOvfSH2s/pGQCzCoMlKLNX9S4pg+CdqO+ehvTRSw4m6C0WiIEOYf+cYXNRRXby&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 2912 http://www.pon.xyz/wufn/?uZhPcRQ=TjHmMFEWoC7f3AvZD4fy73K0u4EyZw5fKqkeqDjs9aj0G9oQA4BDCe56sbMIcecYmi82gg8d&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 3803 http://www.frystmor.city/wufn/?uZhPcRQ=eWg3OYora75B6Z+tLCzm5f6Ri2Qy6T4wPAbOFkNyDPrqSJvJlKf467sJrNVRbgaUTepkudSS&U4kp=Ntx4ZRIXOr7dPRJ - rule_id: 3223 http://www.thetravellingwitch.com/wufn/
|
15
www.hk6628.com(34.102.136.180) www.pon.xyz(199.59.242.153) www.peak-valleyadvertising.com(34.102.136.180) www.333s998.com(108.160.169.175) www.gaigoilaocai.com(172.67.187.204) www.cuadorcoast.com(156.231.25.88) www.thetravellingwitch.com(23.82.12.30) www.frystmor.city(198.54.117.211) 104.21.84.71 156.231.25.88 - mailcious 31.13.83.16 34.102.136.180 - mailcious 198.54.117.216 - phishing 199.59.242.153 - mailcious 23.82.12.30 - mailcious
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
12
http://www.hk6628.com/wufn/ http://www.cuadorcoast.com/wufn/ http://www.peak-valleyadvertising.com/wufn/ http://www.gaigoilaocai.com/wufn/ http://www.cuadorcoast.com/wufn/ http://www.frystmor.city/wufn/ http://www.hk6628.com/wufn/ http://www.pon.xyz/wufn/ http://www.peak-valleyadvertising.com/wufn/ http://www.gaigoilaocai.com/wufn/ http://www.pon.xyz/wufn/ http://www.frystmor.city/wufn/
|
8.6 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11018 |
2021-08-06 16:51
|
oMJtjs4a49CPQ7j.exe d407e86fb5c5596f51c80d08c5bce3a2 Generic Malware Admin Tool (Sysinternals etc ...) SMTP KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process WriteConsoleW Windows ComputerName DNS Cryptographic key crashed |
|
1
|
|
|
13.4 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11019 |
2021-08-07 13:53
|
installs.exe bf77f4e4b7d99180cd03145e877c3638 RAT PWS .NET framework Generic Malware UPX OS Processor Check .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
2
http://178.32.202.118:43127/ https://api.ip.sb/geoip
|
3
api.ip.sb(104.26.13.31) 172.67.75.172 178.32.202.118
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
7.2 |
|
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11020 |
2021-08-07 13:58
|
vbc.exe 442d2d8a7820a1c0c0ba418476d67fb0 UPX Malicious Library DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Internet API FTP ScreenShot Http API Steal credential Downloader P2P AntiDebug AntiVM PE File PE32 FormBook Emotet Malware download VirusTotal Malware Buffer PE AutoRuns Code Injection Malicious Traffic buffers extracted Creates executable files ICMP traffic RWX flags setting unpack itself Windows utilities suspicious process WriteConsoleW Tofsee Windows ComputerName |
19
http://www.mobiessence.com/6mam/?Sjo4=KE8gpfUGztMVNWKMFV5goIwNmc44LE6Oi+XDAS05rkp2RTHle1NPjBrPfhHuDJ31Wqk/Ne1S&L6=VrM8zFVhsB3D - rule_id: 3578 http://www.gxduoke.com/6mam/ http://www.gxduoke.com/6mam/?Sjo4=XyExfHS1GLupBy3CQ8ZHaW0Gc0Et+RmWESSPg9i+4Yd9uJqL2u2pkEb3ToITDIyDz9UOIS1M&L6=VrM8zFVhsB3D http://www.besport24.com/6mam/?Sjo4=G66iPt+xvrTiSrnWMSNY3jIG1auw/RAx4P7alq3BxDAHCc2pRDbTwTzLPU1dODy6kKEhnUhc&L6=VrM8zFVhsB3D http://www.cannamalism.com/6mam/ - rule_id: 3576 http://www.marcuslafond.com/6mam/?Sjo4=DiI3F0Ylam/cMh+wU0CjHhRfuntJ8nyjZcT4nMx9uSVUWqMW4wZqmzUPNc4P48XCZ8APIRdm&L6=VrM8zFVhsB3D http://www.mobiessence.com/6mam/ - rule_id: 3578 http://www.aladinfarma.com/6mam/ http://www.hibachiexpressnctogo.com/6mam/?Sjo4=0HG4+iy4HM9z+nt9884ETIsw7S4XNgMIsS4SVeWydW0ESnQUZ/hCKdKQ9SnakUxepzgcXLa3&L6=VrM8zFVhsB3D - rule_id: 3843 http://www.hibachiexpressnctogo.com/6mam/ - rule_id: 3843 http://www.cannamalism.com/6mam/?Sjo4=kn71xoO9iU2mX4j71h7bz8HHhkUEjJyTF2/azklG2erytyCHrh0zJMDeYoghQinFk6RtaMTe&L6=VrM8zFVhsB3D - rule_id: 3576 http://www.marcuslafond.com/6mam/ http://www.lawmetricssolicitors.com/6mam/ - rule_id: 3575 http://www.lawmetricssolicitors.com/6mam/?Sjo4=4Gj0yn3nr4YWFpZH4qn2bQ/Mf+Y/K54EnXCw/FRHgkyWUNrW3vdYTE+qdBaiGkNQ4kKGGQ8H&L6=VrM8zFVhsB3D - rule_id: 3575 http://www.aladinfarma.com/6mam/?Sjo4=udSG7fe6GY9zo7ZKy45gsyroZuOYrS4qDm5Wf1a6lEkS7UZsR2SStIdy4f3tNkj1uIyko7Uw&L6=VrM8zFVhsB3D http://www.besport24.com/6mam/ https://onedrive.live.com/download?cid=7AD84143EE0A85E3&resid=7AD84143EE0A85E3%21117&authkey=AJAdp78GUbL_5Hc https://pxrvua.sn.files.1drv.com/y4m41792Y6UKDi_7UZp7ByRoAAjAR3fyuA5iLRNNt-n5jRyvXlNyKd14AGIRzIGMUxiuZSxy_OUQr16g9r2TgvRCrZoe_vEz_4NtvrBa8AX_jGkdUIjsjUoufdTv_3ia1afEYa4oWEqdjq6DFpOAnLJod7j1wVkCbTcpxNrKTwsZA9qF1vFtu4BHbu8JvVLPOMhES05MCgiLDLw6gCU58GCKQ/Fuvajutpqxzstoogzkocgvphgpfshra?download&psid=1 https://pxrvua.sn.files.1drv.com/y4m0Ahy6qtakbVJqNkNH6tYmZTEgEOjoSykrWlGKvOTvKyPaFeFtDBSJ9KqSSx7Ma9SVbVmlwIzIpWm4cqZ_oMZAUDZH5hzP6ab5BDAv8wdLz72rIkyOQyxcORZOp8AXgfeMFKPfcv79_DixtsxFSclvxVXV9FeaDrM_C_iOhzor74KUzRaC2_cwlLloLena0QmneO1vv7FrWCnXxR6wZ_lTQ/Fuvajutpqxzstoogzkocgvphgpfshra?download&psid=1
|
25
www.cannamalism.com(34.102.136.180) onedrive.live.com(13.107.42.13) - mailcious www.besport24.com(51.83.52.226) www.mobiessence.com(52.58.78.16) www.paypalticket5396173.info() www.aladinfarma.com(81.95.96.29) www.marcuslafond.com(104.247.218.105) www.freehypnosisevent.com() pxrvua.sn.files.1drv.com(13.107.42.12) www.gxduoke.com(164.88.214.172) www.hibachiexpressnctogo.com(54.230.169.100) www.coicplat.com() www.titanusedcarsworth.com() - mailcious www.lawmetricssolicitors.com(66.45.250.213) www.candlewooddmc.com() - mailcious 104.247.218.105 52.58.78.16 - mailcious 13.107.42.13 - mailcious 13.107.42.12 - malware 34.102.136.180 - mailcious 164.88.214.172 66.45.250.213 - mailcious 54.230.169.104 81.95.96.29 - suspicious 51.83.52.226
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET MALWARE FormBook CnC Checkin (GET)
|
8
http://www.mobiessence.com/6mam/ http://www.cannamalism.com/6mam/ http://www.mobiessence.com/6mam/ http://www.hibachiexpressnctogo.com/6mam/ http://www.hibachiexpressnctogo.com/6mam/ http://www.cannamalism.com/6mam/ http://www.lawmetricssolicitors.com/6mam/ http://www.lawmetricssolicitors.com/6mam/
|
11.8 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11021 |
2021-08-07 13:58
|
waads.exe c47ad106639801ac97d4d676dbc700ec UPX Malicious Library Socket KeyLogger ScreenShot AntiDebug AntiVM PE File PE32 VirusTotal Malware Buffer PE Code Injection buffers extracted RWX flags setting unpack itself Browser ComputerName DNS |
3
http://45.227.253.62:443/submit.php?id=1665433630 http://45.227.253.62:443/j.ad http://45.227.253.62:443/sDr3
|
1
|
2
ET POLICY HTTP traffic on port 443 (POST) ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
|
|
8.4 |
M |
54 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11022 |
2021-08-07 13:58
|
11.exe a3cd270378287770bdd9fdb2b59e5588 Generic Malware Themida Packer Anti_VM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces VMware anti-virtualization installed browsers check Tofsee Windows Browser ComputerName Firmware Cryptographic key Software crashed |
2
http://karopirint.xyz/ https://api.ip.sb/geoip
|
4
karopirint.xyz(141.136.0.182) api.ip.sb(104.26.12.31) 141.136.0.182 104.26.13.31
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
10.0 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11023 |
2021-08-07 14:00
|
askinstall40.exe a86d2af2833f8cc15ad5bca904660fad Gen2 Trojan_PWS_Stealer NPKI Emotet RAT Credential User Data Generic Malware UPX Malicious Packer Malicious Library SQLite Cookie Admin Tool (Sysinternals etc ...) Anti_VM ASPack Antivirus OS Processor Check PE File PE32 ELF PNG Format PE64 DLL MSOffic Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process AppData folder WriteConsoleW installed browsers check Tofsee Ransomware Windows Exploit Browser ComputerName Remote Code Execution crashed |
4
http://www.nincefcs.xyz/Home/Index/lkdinl - rule_id: 3618 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1TBch7 https://www.listincode.com/ - rule_id: 2327
|
8
www.listincode.com(144.202.76.47) - mailcious www.nincefcs.xyz(188.225.87.175) - mailcious www.iyiqian.com(103.155.92.58) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
http://www.nincefcs.xyz/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
11.2 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11024 |
2021-08-07 14:02
|
askinstall53.exe 9192eed4f3433a1fe590754041c0a0cf Gen2 Trojan_PWS_Stealer NPKI Emotet RAT Credential User Data Generic Malware UPX Malicious Packer Malicious Library SQLite Cookie Admin Tool (Sysinternals etc ...) Anti_VM ASPack Antivirus OS Processor Check PE File PE32 ELF PNG Format PE64 DLL MSOffic Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process AppData folder WriteConsoleW installed browsers check Tofsee Ransomware Windows Exploit Browser ComputerName Remote Code Execution DNS crashed |
4
http://www.nincefcs.xyz/Home/Index/lkdinl - rule_id: 3618 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1Z7qd7 https://www.listincode.com/ - rule_id: 2327
|
9
www.listincode.com(144.202.76.47) - mailcious www.nincefcs.xyz(188.225.87.175) - mailcious www.iyiqian.com(103.155.92.58) - mailcious iplogger.org(88.99.66.31) - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious 45.227.253.62 - malware 103.155.92.58 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
http://www.nincefcs.xyz/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
11.8 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11025 |
2021-08-08 17:25
|
229c945c-ac44-4a8b-b053-d4311b... d3211bc1dfe0bcfd47cfc0ac5a11f1b2 JPEG Format |
|
|
|
|
|
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|