11461 |
2021-08-18 18:24
|
vbs1.html 4b71de199adad75c4855194892a50ad6 Antivirus AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11462 |
2021-08-18 18:24
|
vbs2.html 67ed5f11f9aa46861acce576429764e8crashed |
|
|
|
|
0.2 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11463 |
2021-08-18 18:28
|
vbs3.html 17b23462cc955078526a6fde4746fa4a Antivirus AntiDebug AntiVM Malware powershell suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself Windows utilities powershell.exe wrote Check virtual network interfaces suspicious process Tofsee Windows ComputerName Cryptographic key |
1
https://35d42729-3b2d-44cd-88c7-59a76492301c.usrfiles.com/ugd/35d427_aba34aefaf6944578eaddcbf518b0d51.txt - rule_id: 3974
|
2
35d42729-3b2d-44cd-88c7-59a76492301c.usrfiles.com(34.102.176.152) - mailcious 34.102.176.152 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://35d42729-3b2d-44cd-88c7-59a76492301c.usrfiles.com/ugd/35d427_aba34aefaf6944578eaddcbf518b0d51.txt
|
10.0 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11464 |
2021-08-18 18:29
|
vbs2.html 67ed5f11f9aa46861acce576429764e8 AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Windows Exploit DNS crashed |
|
|
|
|
3.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11465 |
2021-08-18 18:34
|
P7GlorySp.exe 25d7926bab3ac72827a1c1fba9271527 Generic Malware PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware AutoRuns MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder Tofsee Windows Browser Cryptographic key Software crashed |
8
https://iplogger.org/1m32g7 https://allblockchainsolutions.xyz/?k=v3&user=p7_4 https://allblockchainsolutions.xyz/?k=v3&user=p7_5 https://iplogger.org/1XaQy7 https://allblockchainsolutions.xyz/?k=v3&user=p7_6 https://allblockchainsolutions.xyz/?k=v3&user=p7_1 https://allblockchainsolutions.xyz/?k=v3&user=p7_3 https://allblockchainsolutions.xyz/?k=v3&user=p7_2
|
4
allblockchainsolutions.xyz(172.67.192.217) iplogger.org(88.99.66.31) - mailcious 104.21.20.122 88.99.66.31 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
7.6 |
|
18 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11466 |
2021-08-18 18:34
|
JoSetp.exe e001b45815b1982e6334eb348b1684fd Generic Malware PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware AutoRuns MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder Tofsee Windows Browser DNS Cryptographic key Software crashed |
8
https://whileacademy.xyz/?k=v3&user=bj2 https://whileacademy.xyz/?k=v3&user=bj3 https://whileacademy.xyz/?k=v3&user=bj1 https://whileacademy.xyz/?k=v3&user=bj6 https://whileacademy.xyz/?k=v3&user=bj4 https://whileacademy.xyz/?k=v3&user=bj5 https://iplogger.org/1vyFz7 https://iplogger.org/1p6br7
|
5
whileacademy.xyz(104.21.43.208) iplogger.org(88.99.66.31) - mailcious 88.99.66.31 - mailcious 34.102.176.152 - mailcious 104.21.43.208
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.4 |
|
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11467 |
2021-08-18 18:35
|
sap-4.exe 968413e19e1fb423c105f3ff8de374b5 RAT Generic Malware Admin Tool (Sysinternals etc ...) PE File .NET EXE PE32 VirusTotal Malware Check memory Checks debugger unpack itself Windows ComputerName Cryptographic key |
|
|
|
|
2.8 |
M |
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11468 |
2021-08-18 18:36
|
kl2.exe c7e14c804236547344b4413772a9ad33 RAT Generic Malware Anti_VM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces VMware anti-virtualization installed browsers check Tofsee Windows Browser ComputerName Firmware DNS Cryptographic key Software crashed |
2
http://188.124.36.242:25802/ - rule_id: 4226 https://api.ip.sb/geoip
|
3
api.ip.sb(172.67.75.172) 172.67.75.172 188.124.36.242 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
http://188.124.36.242:25802/
|
9.8 |
M |
16 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11469 |
2021-08-18 18:38
|
sap-2.exe 552b42748a41dac8072808184773620f Generic Malware Admin Tool (Sysinternals etc ...) UPX AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
4
http://www.leonardocarrillo.com/p2io/?svj066g0=Z8FkwwkotLBkQtrDqM/eMJCTIQtJD+6S4GTF4HzAZ8KQRsKSHf3+L+a292aesc2eaUyoVCup&GFQL8=6l8PHn6P3ZB4h8M - rule_id: 1541 http://www.hfjxhs.com/p2io/?svj066g0=DTtQlm+Z53HZQQxwVrobrkMYYvpq+NlfspfnNNuMzI98GFQb/uTk0OsIpqJyOE0lLdOWa4eE&GFQL8=6l8PHn6P3ZB4h8M - rule_id: 1561 http://www.bigplatesmallwallet.com/p2io/?svj066g0=O674xtRxkGNoF6c3kGCKbVIXJyLg/Uv1kE5kvfYRu46mJjBrOhkzeBS5wyL3I0uQtRm1X0si&GFQL8=6l8PHn6P3ZB4h8M - rule_id: 1563 http://www.newmopeds.com/p2io/?svj066g0=bSK1RxPLajIrf62nOJ2LeA3okZHmhG3V4GBmTatllgIVkFsFULHDN0cIL5FJcRS/4igqPa1G&GFQL8=6l8PHn6P3ZB4h8M - rule_id: 1717
|
10
www.leonardocarrillo.com(52.203.81.245) - mailcious www.hfjxhs.com(156.241.53.161) www.newmopeds.com(52.58.78.16) www.bigplatesmallwallet.com(66.235.200.147) www.pyithuhluttaw.net(103.91.67.83) 66.235.200.147 - phishing 156.241.53.161 - mailcious 52.58.78.16 - mailcious 52.203.81.245 103.91.67.83 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
4
http://www.leonardocarrillo.com/p2io/ http://www.hfjxhs.com/p2io/ http://www.bigplatesmallwallet.com/p2io/ http://www.newmopeds.com/p2io/
|
9.4 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11470 |
2021-08-18 18:39
|
sap-3.exe 16d3dfd57d961c73033beb16a80b6728 RAT Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
18
http://www.untylservice.com/p2io/ - rule_id: 1546 http://www.cleanxcare.com/p2io/?Tj=pxlxKDN2MotDZDPtsB4Bv4ohCC0AYWvU81HhH938ZriMjSGbLHz+dyrLkdFSJvUjFQmrBLsu&6l=s8eTzlIxETzp2 - rule_id: 4106 http://www.untylservice.com/p2io/?Tj=L8zxg9SOaofWzoyPv00N4yNSfvs8vmV6MzKbpPLG03vcM8SdHJJ++2zBKn8m8TZ8Pf8jLpz7&6l=s8eTzlIxETzp2 - rule_id: 1546 http://www.totally-seo.com/p2io/?Tj=TySV6YYxUBKYb4HOwOCoDLKT5SC+Z4HfI/KqKrWSPqp5raNcMGgDmwJErp1xJY1yPtBpBPJW&6l=s8eTzlIxETzp2 - rule_id: 3721 http://www.cleanxcare.com/p2io/ - rule_id: 4106 http://www.69-1hn7uc.net/p2io/ - rule_id: 1695 http://www.69-1hn7uc.net/p2io/?Tj=V9Q6YNEu7TOfvwp76j8RVRt0udPCykKEN/raiLh+TizfOzW/z4mr+Qw1L4Mcx+Q4bIGaE8v/&6l=s8eTzlIxETzp2 - rule_id: 1695 http://www.yunlimall.com/p2io/?Tj=FG8u3oFYMEksByvCNClu9ACxgqrSnZ6gPOMyaYsdv+YEYVVrg2Qkx51ZmTmiwfcSVwhsWZbW&6l=s8eTzlIxETzp2 - rule_id: 1551 http://www.carmelodesign.com/p2io/ - rule_id: 4107 http://www.vectoroutlines.com/p2io/?Tj=RfOK6jKjejKyxd8Ge5LTyAppaXreGCTFIzs53vHZyU46XfbA28pKG3jMmZvEd1BBCDsLyI+Y&6l=s8eTzlIxETzp2 - rule_id: 1549 http://www.vectoroutlines.com/p2io/ - rule_id: 1549 http://www.totally-seo.com/p2io/ - rule_id: 3721 http://www.ruhexuangou.com/p2io/ - rule_id: 1557 http://www.essentiallyourscandles.com/p2io/ - rule_id: 1553 http://www.essentiallyourscandles.com/p2io/?Tj=tOwaJov3Qh/So8Abi3+vLu8KpTdHs2Vuljr6rtQHuYg94Ec45hj5yXZ1J0+xHcOVWF/IMli4&6l=s8eTzlIxETzp2 - rule_id: 1553 http://www.yunlimall.com/p2io/ - rule_id: 1551 http://www.ruhexuangou.com/p2io/?Tj=WkKybY+GL5E6d0NB6hKPcEEM/Z4gp4PnllJ4lZDhA9T5haocRpsPFcselLWyxf3h/8OpmW/H&6l=s8eTzlIxETzp2 - rule_id: 1557 http://www.carmelodesign.com/p2io/?Tj=N1c5K3PjC0viFOIgeR7Z0k8Uw9B7cwaCQzeNFWpedVjl04LWmNZIIwAVMJfWqJKb/L1NUNJg&6l=s8eTzlIxETzp2 - rule_id: 4107
|
18
www.vectoroutlines.com(198.54.126.105) www.ruhexuangou.com(23.82.57.32) www.carmelodesign.com(34.102.136.180) www.totally-seo.com(198.49.23.144) www.essentiallyourscandles.com(23.227.38.74) www.69-1hn7uc.net(163.43.122.102) www.untylservice.com(209.99.40.222) www.cleanxcare.com(78.31.67.91) www.yunlimall.com(142.111.47.2) 163.43.122.102 198.54.126.105 - mailcious 209.99.40.222 - mailcious 34.102.136.180 - mailcious 23.82.57.32 - mailcious 23.227.38.74 - mailcious 142.111.47.2 - mailcious 198.185.159.144 - mailcious 78.31.67.91 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
18
http://www.untylservice.com/p2io/ http://www.cleanxcare.com/p2io/ http://www.untylservice.com/p2io/ http://www.totally-seo.com/p2io/ http://www.cleanxcare.com/p2io/ http://www.69-1hn7uc.net/p2io/ http://www.69-1hn7uc.net/p2io/ http://www.yunlimall.com/p2io/ http://www.carmelodesign.com/p2io/ http://www.vectoroutlines.com/p2io/ http://www.vectoroutlines.com/p2io/ http://www.totally-seo.com/p2io/ http://www.ruhexuangou.com/p2io/ http://www.essentiallyourscandles.com/p2io/ http://www.essentiallyourscandles.com/p2io/ http://www.yunlimall.com/p2io/ http://www.ruhexuangou.com/p2io/ http://www.carmelodesign.com/p2io/
|
8.8 |
M |
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11471 |
2021-08-18 18:47
|
Straight.exe 1637661fced5903b3db6ad8f4633a729 NPKI Malicious Library UPX DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Hijack Network Internet API FTP ScreenShot Http API Steal credential Downloader P2P persistence AntiDebug AntiVM PE File PE32 OS Proce Browser Info Stealer FTP Client Info Stealer VirusTotal Malware Buffer PE suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Collect installed applications Check virtual network interfaces suspicious process AppData folder malicious URLs AntiVM_Disk WriteConsoleW VM Disk Size Check installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
2
http://2.56.59.35:43636/ - rule_id: 4060 https://api.ip.sb/geoip
|
4
FpElXOanXJqAQlxZjEpQUO.FpElXOanXJqAQlxZjEpQUO() api.ip.sb(172.67.75.172) 172.67.75.172 2.56.59.35 - mailcious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
1
|
16.6 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11472 |
2021-08-18 18:48
|
22.exe dfd446df8d5951a2f84b6690fcd12387 RAT BitCoin Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Collect installed applications Check virtual network interfaces installed browsers check Tofsee Windows Browser ComputerName DNS Cryptographic key Software crashed |
3
http://80.92.205.153:60983/ https://cdn.discordapp.com/attachments/873994649574985761/876826597016100914/22.exe https://api.ip.sb/geoip
|
5
cdn.discordapp.com(162.159.135.233) - malware api.ip.sb(104.26.12.31) 104.26.12.31 80.92.205.153 162.159.135.233 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) SURICATA HTTP unable to match response to request
|
|
11.6 |
M |
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11473 |
2021-08-18 18:50
|
sap-055.exe 74cfa68466e906ff582929d714fa6755 PWS .NET framework Generic Malware Admin Tool (Sysinternals etc ...) KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows Cryptographic key |
7
http://www.procircleacademy.com/p2io/?EZX0sf=tgVoMP8jv8oJh0LH0MPWwDnGYGbnfEGTJ+yRL/Ijcc1+MHyU0MyQxKIFLUwq3WzUPcz2/uvN&qL3=gjnL3zDhVr - rule_id: 2905 http://www.austinpavingcompany.com/p2io/?EZX0sf=/p3UPvDrJtL2ffqgClQIzlUqVjEGCGPFDq2Hn6OfZmbiCDMT5Q5+tgpZIm5/Lurlq5QKJ4pz&qL3=gjnL3zDhVr - rule_id: 3246 http://www.thesoulrevitalist.com/p2io/?EZX0sf=ywi4HDlC8ElSOMEyK6H+rd6B6cynTULkanOSXBUPYg06e2wPUHpv6wPun14JIO+5lIaxxIkr&qL3=gjnL3zDhVr - rule_id: 2157 http://www.adultpeace.com/p2io/?EZX0sf=4oufm6g7w9cVhgu+mDBWoA8I6Q2bNaX51teMhl/6i5f1woTl8Y4Ohfe29cQ9y7IaJQfIj0iK&qL3=gjnL3zDhVr - rule_id: 1554 http://www.yunlimall.com/p2io/?EZX0sf=FG8u3oFYMEksByvCNClu9ACxgqrSnZ6gPOMyaYsdv+YEYVVrg2Qkx51ZmTmiwfcSVwhsWZbW&qL3=gjnL3zDhVr - rule_id: 1551 http://www.trendbold.com/p2io/?EZX0sf=YuHUVBROXCfg7aakNX6aejQt13LdGy2QNXOPqDJZQ0blgOG1Ou0e6o/Qymt+KddQAKm5B3Gq&qL3=gjnL3zDhVr - rule_id: 2197 http://www.shopihy.com/p2io/?EZX0sf=Ei6RqbmvJXwd1KhoWyb/BZtLNDk4B448l51n8Zz8P/g/u3IBdZc5bHR/QCXBboISRM182550&qL3=gjnL3zDhVr - rule_id: 2198
|
16
www.adultpeace.com(163.44.239.73) www.shopihy.com(160.153.137.40) www.jonathan-mandt.com() - mailcious www.foxwaybrasil.com() - mailcious www.procircleacademy.com(104.16.12.194) - mailcious www.trendbold.com(64.190.62.111) www.thesoulrevitalist.com(34.102.136.180) - mailcious www.austinpavingcompany.com(74.220.199.6) www.yunlimall.com(142.111.47.2) 160.153.137.40 - mailcious 163.44.239.73 - mailcious 34.102.136.180 - mailcious 74.220.199.6 - mailcious 64.190.62.111 - mailcious 142.111.47.2 - mailcious 104.16.14.194
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
7
http://www.procircleacademy.com/p2io/ http://www.austinpavingcompany.com/p2io/ http://www.thesoulrevitalist.com/p2io/ http://www.adultpeace.com/p2io/ http://www.yunlimall.com/p2io/ http://www.trendbold.com/p2io/ http://www.shopihy.com/p2io/
|
8.0 |
M |
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11474 |
2021-08-18 18:50
|
sap-5.exe 9f32b6c7db4f796c44ab518f698f32ce RAT PWS .NET framework Generic Malware Admin Tool (Sysinternals etc ...) AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows DNS Cryptographic key |
14
http://www.fuhaitongxin.com/p2io/?ETYPCTH=CqJktM7UGR26O9R1i2rMnV6ue2YAEq5Rd3PPV6e4Hl6CDdUsDohA0iBr0JiOXGWnot9DaOMs&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 2907 http://www.cmannouncements.com/p2io/ - rule_id: 1572 http://www.procircleacademy.com/p2io/?ETYPCTH=tgVoMP8jv8oJh0LH0MPWwDnGYGbnfEGTJ+yRL/Ijcc1+MHyU0MyQxKIFLUwq3WzUPcz2/uvN&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 2905 http://www.adultpeace.com/p2io/ - rule_id: 1554 http://www.cmannouncements.com/p2io/?ETYPCTH=wzEdtbrAF/I1cRkF/h093gtD2EzP1yO8zPBZTUdll922Z1OUYyEpwi72EGdxEgGIGaDMgw4G&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 1572 http://www.boogerstv.com/p2io/ - rule_id: 2921 http://www.adultpeace.com/p2io/?ETYPCTH=4oufm6g7w9cVhgu+mDBWoA8I6Q2bNaX51teMhl/6i5f1woTl8Y4Ohfe29cQ9y7IaJQfIj0iK&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 1554 http://www.cyrilgraze.com/p2io/?ETYPCTH=PONkgH6OT+IdHpvpbj4YyU3gBn/U0y1OFS1Y8BXnr3YdY2x3tUozsMLieTk0sG+frQWfUBsy&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 1567 http://www.cyrilgraze.com/p2io/ - rule_id: 1567 http://www.defenestration.world/p2io/ - rule_id: 2211 http://www.boogerstv.com/p2io/?ETYPCTH=fW2NkW2hr8hPz8wwd/m+egXTc5dWq8qtohIQX9xRv3Snfsyr1ZmLXS10rFsoitOMGqtVMq3V&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 2921 http://www.procircleacademy.com/p2io/ - rule_id: 2905 http://www.fuhaitongxin.com/p2io/ - rule_id: 2907 http://www.defenestration.world/p2io/?ETYPCTH=lrOqxb+TUC8Po5HmYZ1tkMjkgx31NOkXgmck/5zOeb61pSaxp+mpU5HJ8/bv+r3dcUpLXcCA&VRfXx=00GP1JE0pz-tHNA0 - rule_id: 2211
|
15
www.adultpeace.com(163.44.239.73) www.boogerstv.com(198.54.117.210) www.cmannouncements.com(74.220.199.8) www.defenestration.world(99.83.154.118) www.procircleacademy.com(104.16.12.194) - mailcious www.fuhaitongxin.com(156.237.130.173) - mailcious www.cyrilgraze.com(172.67.138.177) www.m678.xyz() - mailcious 163.44.239.73 - mailcious 104.16.13.194 198.54.117.215 - mailcious 99.83.154.118 - mailcious 172.67.138.177 - mailcious 74.220.199.8 - mailcious 156.237.130.173 - mailcious
|
3
ET INFO Observed DNS Query to .world TLD ET MALWARE FormBook CnC Checkin (GET) ET INFO HTTP Request to Suspicious *.world Domain
|
14
http://www.fuhaitongxin.com/p2io/ http://www.cmannouncements.com/p2io/ http://www.procircleacademy.com/p2io/ http://www.adultpeace.com/p2io/ http://www.cmannouncements.com/p2io/ http://www.boogerstv.com/p2io/ http://www.adultpeace.com/p2io/ http://www.cyrilgraze.com/p2io/ http://www.cyrilgraze.com/p2io/ http://www.defenestration.world/p2io/ http://www.boogerstv.com/p2io/ http://www.procircleacademy.com/p2io/ http://www.fuhaitongxin.com/p2io/ http://www.defenestration.world/p2io/
|
9.6 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
11475 |
2021-08-18 18:51
|
sap-01.exe af562eff56d983eb266f4177962d4842 Generic Malware Admin Tool (Sysinternals etc ...) PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger unpack itself Windows Cryptographic key |
|
|
|
|
5.0 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|