11371 |
2021-08-16 17:20
|
file1.exe efb3e6929403a295ee9f8a0dfcdd591c RAT Generic Malware Anti_VM UPX PE File OS Processor Check .NET EXE PE32 Browser Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces VMware anti-virtualization installed browsers check Tofsee Windows Browser ComputerName Firmware DNS Cryptographic key crashed |
2
http://95.183.55.53:10724/ https://api.ip.sb/geoip
|
4
api.ip.sb(104.26.13.31) 104.26.12.31 103.120.14.249 95.183.55.53
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
9.0 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11372 |
2021-08-16 17:21
|
askinstall52.exe ed8353cf1e80cb6afd65dedd1f83071a Gen2 Trojan_PWS_Stealer Credential User Data Malicious Packer UPX Malicious Library SQLite Cookie PE File OS Processor Check PE32 Browser Info Stealer VirusTotal Malware PDB suspicious privilege WMI Creates executable files Windows utilities suspicious process WriteConsoleW installed browsers check Tofsee Windows Browser ComputerName Remote Code Execution |
2
https://iplogger.org/1G7Sc7 https://www.listincode.com/ - rule_id: 2327
|
4
www.listincode.com(144.202.76.47) - mailcious iplogger.org(88.99.66.31) - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://www.listincode.com/
|
6.4 |
M |
51 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11373 |
2021-08-16 17:45
|
One Million British Pounds.pdf 9b4e673fb8467b6dac5c13fff8db4213 PDF VirusTotal Malware |
|
|
|
|
0.6 |
|
17 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11374 |
2021-08-16 18:12
|
One Million British Pounds.pdf 9b4e673fb8467b6dac5c13fff8db4213 PDF VirusTotal Malware Windows utilities Windows |
5
http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/277_20_6_20042.zip http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/281_20_6_20042.zip http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/280_20_6_20042.zip http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/278_20_6_20042.zip http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/message.zip
|
|
|
|
2.0 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11375 |
2021-08-17 07:39
|
console-play.exe a43be7341e3d13810d20b9e64e329c83 Gen2 Gen1 RAT Generic Malware UPX Malicious Library Malicious Packer Anti_VM PE File OS Processor Check PE32 DLL PNG Format GIF Format .NET DLL PE64 VirusTotal Malware Check memory Checks debugger Creates shortcut Creates executable files unpack itself Windows utilities AppData folder AntiVM_Disk VM Disk Size Check Windows ComputerName crashed |
|
|
|
|
5.2 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11376 |
2021-08-17 09:25
|
Simplydisk_TPEB_Tariff_CtoC_16... fd7075efa74442ec550ba1b0613f0db3 Malicious Packer Malicious Library PE File DLL PE32 VirusTotal Malware Check memory Checks debugger buffers extracted WMI Creates executable files RWX flags setting unpack itself Windows utilities suspicious process Tofsee Windows ComputerName crashed |
5
https://cdn.discordapp.com/attachments/876792192524501045/876810977381847040/222_mod.dll
https://cdn.discordapp.com/attachments/876792192524501045/876811276905480202/222_mod.dll
https://beklear.net/wp-content/plugins/nhpakbigch/9YfqVdDVOAG.php
https://cdn.discordapp.com/attachments/876792192524501045/876811874048565268/222_mod.dll
https://cdn.discordapp.com/attachments/876792192524501045/876811523593482320/222_mod.dll
|
4
beklear.net(172.67.197.185)
cdn.discordapp.com(162.159.129.233) - malware 104.21.84.227
162.159.129.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.2 |
|
9 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11377 |
2021-08-17 09:26
|
unknown.exe fe51eac852001236448794e51ba22956 RAT PWS .NET framework Generic Malware PE File .NET EXE PE32 suspicious privilege MachineGuid Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11378 |
2021-08-17 09:33
|
sufile.exe 0ca116299ae13d37e2368d09f208fd2d UPX Malicious Library PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself |
|
|
|
|
2.6 |
M |
42 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11379 |
2021-08-17 09:34
|
plugmanzx.exe ec9dc86cbda5ad0a0b6c79654e361642 Generic Malware Admin Tool (Sysinternals etc ...) DNS AntiDebug AntiVM PE File .NET EXE PE32 Malware download Nanocore VirusTotal Malware c&c Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted WMI unpack itself Windows utilities suspicious process WriteConsoleW human activity check Windows ComputerName DNS DDNS |
|
2
blackbladeinc52.ddns.net(103.147.185.89) 103.147.185.89
|
2
ET POLICY DNS Query to DynDNS Domain *.ddns .net ET MALWARE Possible NanoCore C2 60B
|
|
14.2 |
M |
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11380 |
2021-08-17 09:36
|
mazx.exe 1423f1e7d436fa26d50fd804f5b93431 Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
3
http://www.alphamillls.com/mxwf/?D8k8=8vU0MhDguONSVZAFdaETy8wVZ8V0psLBFo6hXJA6TygAJBDGiYZVt84widBx7fwwbqBQDNAu&uTxXA=Apm8lx http://www.orders-cialis.info/mxwf/?D8k8=5ldtLAd4WjWQpBn2D9at1Sp5llf8TUCQYgmbUZbfSF6mwcPpZP54RYPSSKh/3i002J3HIC53&uTxXA=Apm8lx http://www.sierp.com/mxwf/?D8k8=Ao4ZudGNGCCq/bz1F1jp8r1nNp3jUASgPiEiflfcY9lwBGukS/0V2qMMjZrQt7h4MdjTjHfn&uTxXA=Apm8lx - rule_id: 3878
|
6
www.orders-cialis.info(161.97.100.26) www.sierp.com(52.58.78.16) www.alphamillls.com(2.57.90.16) 52.58.78.16 - mailcious 2.57.90.16 - mailcious 161.97.100.26
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
1
http://www.sierp.com/mxwf/
|
8.2 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11381 |
2021-08-17 09:40
|
.wininit.exe 73c3916832698d6d47cde8593d7816f8 Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
2
http://www.clansix.xyz/ixwn/?tXU=HKquMzrDdPUL5WCzLxokwwg1M44kElHO2J0O+BGWZnhJatCoGneWRy54iWfWyTz0dcXiGEhv&UlSp=GVgTURZ0B4_lZB http://www.clansix.xyz/ixwn/
|
4
www.clansix.xyz(199.59.242.153) - mailcious www.china-zhongzhi.com(45.192.251.62) 199.59.242.153 - mailcious 45.192.251.62
|
2
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers
|
|
10.0 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11382 |
2021-08-17 09:42
|
vbc.exe 3244a92cbba0f5edcae4ea2f2f0d1b7d UPX Malicious Library PE File PE32 VirusTotal Malware unpack itself Remote Code Execution |
|
|
|
|
2.0 |
M |
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11383 |
2021-08-17 09:43
|
zxcvb.exe 2cae1b3be4c37e8f0ca5dac99dbbac17 PWS Loki[b] Loki.m RAT Gen1 Gen2 Generic Malware UPX Malicious Library Malicious Packer DNS Socket KeyLogger HTTP Internet API ScreenShot Http API Steal credential AntiDebug AntiVM PE File .NET EXE PE32 JPEG Format DLL OS Processor Check GIF Format Browser Info Stealer Malware download Vidar VirusTotal Email Client Info Stealer Malware Cryptocurrency wallets Cryptocurrency Buffer PE suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder malicious URLs AntiVM_Disk WriteConsoleW anti-virtualization VM Disk Size Check installed browsers check Tofsee Ransomware OskiStealer Stealer Windows Browser Email ComputerName DNS crashed Password |
13
http://kullasa.ac.ug/nss3.dll http://185.163.45.248//l/f/VAuJUXsBPvGyIjkLtOpJ/d657180f13db0ff9b8ee6da6bdfe300a7ea52ed9 http://kullasa.ac.ug/msvcp140.dll http://kullasa.ac.ug/ http://myproskxa.ac.ug/index.php http://185.163.45.248/ http://kullasa.ac.ug/vcruntime140.dll http://kullasa.ac.ug/softokn3.dll http://kullasa.ac.ug/mozglue.dll http://185.163.45.248//l/f/VAuJUXsBPvGyIjkLtOpJ/cd7c869b70884aeb0988dc2ac3b497411564fd4d http://kullasa.ac.ug/main.php http://kullasa.ac.ug/sqlite3.dll http://kullasa.ac.ug/freebl3.dll
|
6
kullasa.ac.ug(185.215.113.77) myproskxa.ac.ug(185.215.113.77) telete.in(195.201.225.248) - mailcious 195.201.225.248 - mailcious 185.215.113.77 - malware 185.163.45.248
|
8
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
|
|
24.4 |
M |
15 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11384 |
2021-08-17 09:45
|
planes.exe fa98ed9794e56f5598319a77831d6339 RAT Generic Malware Admin Tool (Sysinternals etc ...) Antivirus AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware powershell suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote suspicious process WriteConsoleW Windows ComputerName Cryptographic key |
|
|
|
|
9.8 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11385 |
2021-08-17 09:48
|
dow.exe fc610878793ee9ee26ed44da1549f4f8 RAT Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
8
http://www.mimortgageexpert.com/wufn/?zZhxv2=dH6MS4iXfwK5vVCsjjY0pJ1yp3fpUyK5ZhheQrTomEU+/cdclqzrfoafLlR5qbdrvg8w2+Rd&U6ht=NvsduruhTd5tbZY - rule_id: 2911 http://www.gaigoilaocai.com/wufn/ - rule_id: 2912 http://www.hk6628.com/wufn/ - rule_id: 2909 http://www.gaigoilaocai.com/wufn/?zZhxv2=+cvcaH9t4IGOvfSH2s/pGQCzCoMlKLNX9S4pg+CdqO+ehvTRSw4m6C0WiIEOYf+cYXNRRXby&U6ht=NvsduruhTd5tbZY - rule_id: 2912 http://www.martabaroagency.com/wufn/ - rule_id: 2915 http://www.martabaroagency.com/wufn/?zZhxv2=r0PGHSY2SUcZB8VeRTqckmU+v7wbtMF1fJATAoKMkp5jXhuYZ6C7mu0EbtSkXg+d4UfDPRR1&U6ht=NvsduruhTd5tbZY - rule_id: 2915 http://www.hk6628.com/wufn/?zZhxv2=Mbz3eb2htBuwJm9my9qYpH4UWvi7L1jn54VVewVZerqVccc7GhECZ0+c8NYoPjvN/okzts0t&U6ht=NvsduruhTd5tbZY - rule_id: 2909 http://www.mimortgageexpert.com/wufn/ - rule_id: 2911
|
13
www.collegevillepaareahomes.com() - mailcious www.martabaroagency.com(185.14.56.84) www.mimortgageexpert.com(100.24.208.97) www.hk6628.com(34.102.136.180) www.organicdiscover.com() www.chinanl168.com() - mailcious www.gaigoilaocai.com(172.67.187.204) www.cuadorcoast.com(156.231.25.88) 156.231.25.88 - mailcious 34.102.136.180 - mailcious 185.14.56.84 - mailcious 100.24.208.97 104.21.84.71
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
8
http://www.mimortgageexpert.com/wufn/ http://www.gaigoilaocai.com/wufn/ http://www.hk6628.com/wufn/ http://www.gaigoilaocai.com/wufn/ http://www.martabaroagency.com/wufn/ http://www.martabaroagency.com/wufn/ http://www.hk6628.com/wufn/ http://www.mimortgageexpert.com/wufn/
|
9.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|