11041 |
2021-08-09 09:54
|
32c96ec2c8d3bf05761aef2c8fd76b... 4412eaa3c2dbe82ac9cf982b1229548d UPX Malicious Library PE File PE32 VirusTotal Malware Check memory Windows crashed |
|
|
|
|
2.2 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11042 |
2021-08-09 09:54
|
32c96ec2c8d3bf05761aef2c8fd76b... 2e0536d1276836fac3ed7eb664148319 UPX Malicious Library PE File PE32 VirusTotal Malware Check memory |
|
|
|
|
1.4 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11043 |
2021-08-09 09:54
|
@JuicyFruicy1.exe b1ebcd72d3bbfa1066b8ecc33ea33c13 RAT PWS .NET framework Generic Malware UPX OS Processor Check .NET EXE PE File PE32 PE64 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process suspicious TLD WriteConsoleW installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
3
http://a0565423.xsph.ru/svhost.exe http://185.250.206.82:21330/ https://api.ip.sb/geoip
|
7
a0565423.xsph.ru(141.8.192.58) sanctam.net(185.65.135.248) - mailcious api.ip.sb(104.26.13.31) 185.65.135.248 - mailcious 141.8.192.58 - malware 185.250.206.82 172.67.75.172
|
4
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
|
|
10.8 |
M |
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11044 |
2021-08-09 09:57
|
askinstall5.exe 4e5c8938ed644daec8e14035d1f13bbe Gen2 Trojan_PWS_Stealer NPKI Emotet RAT Credential User Data Generic Malware UPX Malicious Packer Malicious Library SQLite Cookie Admin Tool (Sysinternals etc ...) Anti_VM ASPack Antivirus OS Processor Check PE File PE32 ELF PNG Format PE64 DLL MSOffic Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process AppData folder WriteConsoleW installed browsers check Tofsee Ransomware Windows Exploit Browser ComputerName Remote Code Execution crashed |
4
http://www.nincefcs.xyz/Home/Index/lkdinl - rule_id: 3618 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1XJq97 https://www.listincode.com/ - rule_id: 2327
|
8
www.listincode.com(144.202.76.47) - mailcious www.nincefcs.xyz(188.225.87.175) - mailcious www.iyiqian.com(103.155.92.58) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
http://www.nincefcs.xyz/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
11.2 |
M |
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11045 |
2021-08-09 09:58
|
lv.exe 79070b764d73af227405bb43ff7400db NPKI Emotet Gen1 Gen2 Malicious Library UPX Malicious Packer DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Hijack Network Internet API FTP ScreenShot Http API Steal credential Downloader P2P persistence AntiD VirusTotal Malware AutoRuns Code Injection Check memory Checks debugger Creates executable files unpack itself Windows utilities AppData folder malicious URLs AntiVM_Disk WriteConsoleW VM Disk Size Check Windows |
|
1
FAiPDwVpqBpfgnM.FAiPDwVpqBpfgnM()
|
|
|
6.6 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11046 |
2021-08-09 09:59
|
vbc.exe 5da37b461ae4c329da6de8b9bc35709b UPX Malicious Library AntiDebug AntiVM PE File PE32 FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Checks debugger buffers extracted unpack itself Remote Code Execution |
1
http://www.dhshk.com/c244/?iB8hJDjp=lkpbFLxrPsHO5rtZ3+GvlL8ukWkuKB162bu0N/dkLkHEi/U/v+S6O2wOWGook3tdSsVy029y&Ir=Y4Klupsh
|
7
www.nitaraine.com() www.dhshk.com(59.188.217.178) www.diemtinthitruong.com() www.humanimmunogenomics.com(81.25.112.73) www.jasaborongan.com(104.232.159.132) 104.232.159.132 59.188.217.178
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.4 |
M |
44 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11047 |
2021-08-09 10:01
|
kuma.exe b3c7b511cf32bf3f7b7b1c930c1220d7 UPX Malicious Library OS Processor Check PE File PE32 VirusTotal Malware AutoRuns suspicious privilege Malicious Traffic Creates executable files unpack itself suspicious TLD Windows DNS |
1
http://139.196.224.137:8080/NetSyst96.dll
|
3
gg.csgohvh.cc() 81.25.112.73 139.196.224.137 - malware
|
2
ET DNS Query for .cc TLD ET INFO Dotted Quad Host DLL Request
|
|
5.8 |
M |
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11048 |
2021-08-09 10:01
|
askinstall55.exe fe3a923be44c84946428582f6022cd0d Gen2 Trojan_PWS_Stealer NPKI Emotet RAT Credential User Data Generic Malware UPX Malicious Packer Malicious Library SQLite Cookie Admin Tool (Sysinternals etc ...) Anti_VM ASPack Antivirus OS Processor Check PE File PE32 ELF PNG Format PE64 DLL MSOffic Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process AppData folder WriteConsoleW installed browsers check Tofsee Ransomware Windows Exploit Browser ComputerName Remote Code Execution crashed |
4
http://www.nincefcs.xyz/Home/Index/lkdinl - rule_id: 3618 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1lcZz https://www.listincode.com/ - rule_id: 2327
|
8
www.listincode.com(144.202.76.47) - mailcious www.nincefcs.xyz(188.225.87.175) - mailcious www.iyiqian.com(103.155.92.58) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
http://www.nincefcs.xyz/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
11.2 |
M |
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11049 |
2021-08-09 10:01
|
Slipstream.exe dedfaa24909d03522a814068f9c00d5d RAT BitCoin Generic Malware AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
2
http://185.250.206.82:21330/ https://api.ip.sb/geoip
|
3
api.ip.sb(104.26.13.31) 172.67.75.172 185.250.206.82
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
11.8 |
M |
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11050 |
2021-08-09 10:03
|
askinstall5.exe df5c5f0768e8d2f554467b930afda09c UPX Malicious Library PE File PE32 VirusTotal Malware PDB unpack itself Remote Code Execution |
|
|
|
|
2.8 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11051 |
2021-08-09 10:08
|
askinstall54.exe 09bbb3e275b933030e970564ac22fe77 Gen2 Trojan_PWS_Stealer NPKI BitCoin Credential User Data Generic Malware UPX Malicious Packer Malicious Library SQLite Cookie Anti_VM DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Internet API FTP ScreenS Browser Info Stealer VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Checks debugger WMI Creates executable files ICMP traffic exploit crash unpack itself Windows utilities suspicious process malicious URLs WriteConsoleW installed browsers check Tofsee Windows Exploit Browser ComputerName Remote Code Execution crashed |
4
http://www.nincefcs.xyz/Home/Index/lkdinl - rule_id: 3618 http://www.iyiqian.com/ - rule_id: 2326 https://www.listincode.com/ - rule_id: 2327 https://iplogger.org/169Bx7
|
8
www.listincode.com(144.202.76.47) - mailcious www.nincefcs.xyz(188.225.87.175) - mailcious www.iyiqian.com(103.155.92.58) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
http://www.nincefcs.xyz/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
12.2 |
M |
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11052 |
2021-08-09 10:31
|
empty_q1ylzu.hta.html f700771a4157e26361ddb27921b6674c AntiDebug AntiVM MSOffice File MachineGuid Code Injection Check memory RWX flags setting exploit crash unpack itself Windows utilities suspicious process Tofsee Windows Exploit DNS crashed |
10
https://za.schoolplus.pk/availability/condition/completion/lang/en/zf1TdZ47Z.php
https://employee.homesupportandcareinc.com/application/Gk9I8xiDfl.php
https://hr.clientbook.co.uk/front_assets/css/plugins/hover-effect/css/oFaRBXje2M7r4D.php
https://assettagger.saleseos.com/Classes/PHPExcel/Shared/JAMA/examples/nnfH9djf7ieGT.php
https://deepsource.in/ncsitebuilder/css/flag-icon-css/flags/1x1/8wNk3GOASeBjjFa.php
https://loans.uhuruloans.com/wp-includes/sodium_compat/namespaced/Core/ChaCha20/vC7yShwVw4.php
https://athletesusa.co.uk/wp-content/plugins/wordfence/images/icons/B1tLAqOFWL0XN0.php
https://pompeevfx.in/scripts/KrkdMDi4.php
https://ebanking.hentostreasury.com/account/UYU7Z0biaiL.php
https://rupinis.club/amcerp/public/integration/select2/css/L34ZRoB1qcP.php
|
2
za.schoolplus.pk(173.231.197.236) 173.231.197.236
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
5.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11053 |
2021-08-09 10:32
|
logo_w7ka3.hta.html a4bc9811de784a760790de7bb5028e15 AntiDebug AntiVM MSOffice File MachineGuid Code Injection Check memory exploit crash unpack itself Windows utilities suspicious process Tofsee Windows Exploit DNS crashed |
10
https://shops.simply4u.in/demo/1/Solapur/Chicken-Shop/error/etodrhFXVA.php
https://investigacion.seguridadypc.com.mx/wp-includes/sodium_compat/namespaced/Core/ChaCha20/vBYypdC2U.php
https://pompeevfx.in/scripts/KrkdMDi4.php
https://pizzaplus.com.ng/wp-content/themes/twentytwentyone/template-parts/content/UweT0tlVUgDx.php
https://maasaifarms.com/wp-content/plugins/all-in-one-wp-migration/lib/controller/J1byieGYJ.php
https://hr.clientbook.co.uk/front_assets/css/plugins/hover-effect/css/oFaRBXje2M7r4D.php
https://ebanking.hentostreasury.com/account/UYU7Z0biaiL.php
https://mayolid.saddleprime.com/wp-content/plugins/wpforms-lite/src/Access/NJGs1yX6LMhuk.php
https://rupinis.club/amcerp/public/integration/select2/css/L34ZRoB1qcP.php
https://sbz1.world-inter.com/img/icons/8p28h4AJ2Fn.php
|
2
shops.simply4u.in(162.241.85.73) 162.241.85.73 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11054 |
2021-08-09 10:42
|
spamer.exe 05df5711f2ac455d0e0a8954056d50f9 Gen1 Generic Malware UPX Malicious Library Anti_VM PE64 OS Processor Check PE File DLL VirusTotal Malware Check memory Creates executable files |
|
|
|
|
2.2 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11055 |
2021-08-09 11:26
|
svhost.exe 48fe2a425a5c393ecec9d4b00c3b6431 RAT Generic Malware PE64 PE File VirusTotal Malware AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW Tofsee Windows ComputerName |
1
https://bitbucket.org/Sanctam/sanctam/raw/971c8ecebdd877f830112d662aa6f6d660aba682/includes/ethminer
|
4
sanctam.net(185.65.135.248) - mailcious bitbucket.org(104.192.141.1) - malware 185.65.135.248 - mailcious 104.192.141.1 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
|
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|