12346 |
2023-06-11 23:21
|
minuscrypt_crypted.exe 3a68a2cbeb827588f3749568b121a79b task schedule UPX Malicious Library ScreenShot AntiDebug AntiVM OS Processor Check PE File PE32 Browser Info Stealer Malware download FTP Client Info Stealer NetWireRC VirusTotal Malware Buffer PE suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates shortcut unpack itself Check virtual network interfaces AntiVM_Disk VM Disk Size Check DCRat Windows Browser ComputerName Software crashed |
7
http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO&2bcbbadd386e94688f7bcd0f3aa63b0c=d1nIjRTMlhTN1kjM0kTMzYGZ4MDZxYDZjBTZkFGMmdTN5UmN5QmNwATNyIiOiQDZwU2YxYWMyUmNkNTM0kTMidzY5IWN4gTNkZmMzYjYiwiI4gjNwUGOhJTOjJWMjZGN4kjZhFWNlNGNxI2Y0cDOkJTZ5MGZ2UGZwIiOiAzN5MTY1QGNlFmYlNWOzAjNhNDN5YjM2kjM5ITNzUDMis3W http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO&d781a1a8eb39cb308dfb94081154ee99=QX9JSUml2aU1keBpXT1FkaMBTWIh1Y012Y2RGWaRnRtN2R4ZEWVZ1aUVXUupldONjY550Vh5EeGhlekNjYrVzVhhFeGhlNNtWS2k0QhBjRHVVa3lWS1R2MiVHdtJmVKl2Tpd2RkhmQGpVe5ITW6x2RSl2dplUavpWSvJFWZFVMXlVekdlWzZ1RWl2dplUavpWS6JESjJUMXlFbSNTVpdXaJVHZzIWd01mYWpUaPlWUVNVeWJzYWFzVZxmUzUVa3lWS1R2MiVHdtJmVKl2TplEWapnVWJGaWdEZUp0QMlGNyQmd1ITY1ZFbJZTS5pVdGdEV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWSvJFWZFVMXlFbSNTVpdXaJB3ZaV3cYFnbzRUeiBnUXRmQClmY2x2RkBXNXFWbWdkUndmMaBHaFt0Z3F2Z0RlYuNna0AncMl2Tp1EWaVXOHF2d502Yqx2VUl2dplUavpWS6FzVZpmSXpFWKNETpRzRYlHeW1kWGVEVR5kVTVEeGhVd3ZEWjhHbJZTS5NWdWdlW55kMVl2dplUdkNjY1RXbiZlSp9UaBZ1UPZURUl2dpl0QkVUSxkUaPlGMVF1UKNETpRjMkZXNyEWdWxWS2k0QiNnRyQGbKhVYHp0QMlGNyQmd1ITY1ZFbJZTS5NWMKhVYyw2RkVnRrl0cJNUT5FkaNdGMDlEUaFDVPZVRUl2bqlUd5cVY6pEWadlTxQlSKtWSzl0QX1kSFZVVKZVURJERNVXRElUeW1mVp9maJxWMXl1TOFDVKp0aJNXSD1UavpWSFxWRalnRyIWaKhlWvJ1Mi5kSDxUa0IjYwJFWZlXOHNWe5ITUnV1RipmRtNGUKl2TplEWalnVIRmaG1mWxUzVZ5kUtNGa50WW5Z1RhBTOXRVa3lWS0kTbRNnRXRGMKhVYXpUaPlWVXJGa1UkW5ZkMilmSYp1bSNjYOp0QMlWRqNGb4dkY2pESkVXOyEldWdkWwpFbJZTSDplSWJTWwpFWaVkVGVFSKNETpVEMM9kSp9UaVdEZopkRhpnVtNWbW1WV0Y0VUZlQxIVa3lWSClTaUl2bqlUd5cVYwIEWhlnTyMGbSVlWrlzVUZnVHpFcaZlVRR2aJNXSTFld0sWS2k0UllXOXJGbxAjYsJ1VhdlVGVFSKNETpVEMM9kSp9UaJNjY65EWapWOtNWU5clWrxWbWZlQxIVa3lWSxkUaPlWVtNWMSNTWsJFWh9mTtNmQ5clWrxWbWZlQxIVa3lWS5Z1RkdnRHplQCl3Yqx2RhdnRtNGSCNVUIplRJtmSYl1a1cVWw4EbJZTSTpFdG1GVWJUMSl2dplkQ5kGVp9maJtGbrNmdONzYs5kMilnQWZVUOtWSzl0QNZlQxEVavpWSrxWVapGbtRGbSVlVR50aJNXQq9Ua0IjYw5EWhJjVtVlVCFTUpdXaJZDaVR1ZnRUT0kkaJZTSDpFbWd0YURnMZZHeyEFM1clW5pEWkRkVGVFRKNETpVEMM9kSp9UaRdlWsJ0MVJnTyI2cOVkYoVTbjxmUIVmRWZUVEp0QMlWSVFGTCNUTp9maJxGcYFGVWdUYqZkMRp3dVZVUOtWSzl0URZHNrlkNJNlW2wmMVxGaykFaOtWTNZlRVRkSDxUarpWS2k0UalnVIRmaWdEZwhmMZlnRVZVUOtWSzlkaPlWTuNmdONzYs5kMilnQGJGaOdVYulzRUZlQxEVa3lWT2kUejxmSzIGRWZUVEp0QMlWQU10Zj1mYwJESjxmUzU1ZnRlT4F0QixmUyImTClmTntGSiBXMXl1RCNkTyc3VaBTNXNVavpWS1lzVhBjQYFWeOJzYsJVVWFlTrl0cJlWZJRWRNRDNp10ZBVUSWJUMRdWQE1EMnRFTxs2RJBHMFZ1bV12Y25URJBXSGt0cWdEZ1x2aJZTSTpFdG1GVWJUMRl2dplUM0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiYTN1ATM2MjYyEjYhV2N3AjNzkDZ1Y2Y0cTZlhTNwQzMiwiIyQTM0ITZ3AzMmVzYldDOyMDZiRGMklTYmRTNyUGN5UTMlZmM0EWMxIiOiQDZwU2YxYWMyUmNkNTM0kTMidzY5IWN4gTNkZmMzYjYiwiI4gjNwUGOhJTOjJWMjZGN4kjZhFWNlNGNxI2Y0cDOkJTZ5MGZ2UGZwIiOiAzN5MTY1QGNlFmYlNWOzAjNhNDN5YjM2kjM5ITNzUDMis3W http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO&3b7ae68eb993d548c19527223e31ff2f=QX9JSUNJiOiYTN1ATM2MjYyEjYhV2N3AjNzkDZ1Y2Y0cTZlhTNwQzMiwiIjRTMlhTN1kjM0kTMzYGZ4MDZxYDZjBTZkFGMmdTN5UmN5QmNwATNyIiOiQDZwU2YxYWMyUmNkNTM0kTMidzY5IWN4gTNkZmMzYjYiwiI4gjNwUGOhJTOjJWMjZGN4kjZhFWNlNGNxI2Y0cDOkJTZ5MGZ2UGZwIiOiAzN5MTY1QGNlFmYlNWOzAjNhNDN5YjM2kjM5ITNzUDMis3W http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO&2bcbbadd386e94688f7bcd0f3aa63b0c=d1nIwIzYlFzNjV2NykTM2YDOwE2MjNGMzQjN2ATOkNDZyYjMwUjNycjY4IiOiQDZwU2YxYWMyUmNkNTM0kTMidzY5IWN4gTNkZmMzYjYiwiI4gjNwUGOhJTOjJWMjZGN4kjZhFWNlNGNxI2Y0cDOkJTZ5MGZ2UGZwIiOiAzN5MTY1QGNlFmYlNWOzAjNhNDN5YjM2kjM5ITNzUDMis3W&3b7ae68eb993d548c19527223e31ff2f=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 http://2681291.im499886.web.hosting-test.net/Authtemporary.php?F2JampeGDvzF2JeJ1oJPO=YoisIxmrIPU7rAfr&ed8fd7e7a200892434e46582022e8380=QMzQGOlNDM4UjZkFzMjJWYmJWOwYjMwEGOiBzM3QjNjRjN5AjMwgjY3QDOxATNyEzMzIjM0gTN&c1bb1560f442ef0933fc6c48d516b05d=gM2kDZmJTYygTM0ImYjZjN0YmM1IDNjBjNkRzN1AzYkljZxEmZmRGO&3b7ae68eb993d548c19527223e31ff2f=0VfiIiOiYTN1ATM2MjYyEjYhV2N3AjNzkDZ1Y2Y0cTZlhTNwQzMiwiIyQTM0ITZ3AzMmVzYldDOyMDZiRGMklTYmRTNyUGN5UTMlZmM0EWMxIiOiQDZwU2YxYWMyUmNkNTM0kTMidzY5IWN4gTNkZmMzYjYiwiI4gjNwUGOhJTOjJWMjZGN4kjZhFWNlNGNxI2Y0cDOkJTZ5MGZ2UGZwIiOiAzN5MTY1QGNlFmYlNWOzAjNhNDN5YjM2kjM5ITNzUDMis3W http://2681291.im499886.web.hosting-test.net/Authtemporary.php?LkGjQpyv1FWj8xY=de24gqeWnjv5bdnKYrEn&0999bd534b797febf876c5b1b7e96a8e=071206b7f6ce4b63d3a218e844940d46&c1bb1560f442ef0933fc6c48d516b05d=wYzgDO2MTY0EDNyUzNxEGZkVjNkljN3QGM4M2MmVDOmRTNiRWOmRjY&LkGjQpyv1FWj8xY=de24gqeWnjv5bdnKYrEn
|
2
2681291.im499886.web.hosting-test.net(91.206.201.50) 91.206.201.50
|
2
ET MALWARE DCRAT Activity (GET) ET HUNTING Observed Malicious Filename in Outbound POST Request (Information.txt)
|
|
13.2 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12347 |
2023-06-11 23:19
|
ojawar2.1.exe 6b43c223d7bf1db3d6287decf2504719 NSIS UPX Malicious Library PE File PE32 DLL Malware download AveMaria NetWireRC VirusTotal Malware AutoRuns MachineGuid Check memory Creates executable files unpack itself AppData folder Windows RAT ComputerName DNS DDNS keylogger |
|
2
hightense.duckdns.org(84.54.50.66) 84.54.50.66
|
4
ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound) ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain ET INFO DYNAMIC_DNS Query to *.duckdns. Domain ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin
|
|
5.4 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12348 |
2023-06-11 23:13
|
trashcr.exe 8130fa6b0279dd54179954acb33e57d5 RedLine stealer[m] RAT UPX AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
3
ET MALWARE RedLine Stealer TCP CnC net.tcp Init ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE Redline Stealer TCP CnC - Id1Response
|
|
11.0 |
M |
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12349 |
2023-06-11 23:04
|
gabapentin.exe e1c7c46a3ac8cd9ee53d864743a32218 RedLine stealer[m] RAT UPX AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Malware Code Injection Check memory Checks debugger buffers extracted unpack itself Windows DNS Cryptographic key |
|
1
|
|
|
9.0 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12350 |
2023-06-11 23:03
|
wininit.exe 055e1dcecd2c329e5aa4e9ae798c8a6c .NET EXE PE File PE32 VirusTotal Malware PDB Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
2.8 |
M |
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12351 |
2023-06-11 22:59
|
steamcmd.exe 8207a32252287772c05c6ab0381e98f2 UPX Malicious Library PE File PE32 MSOffice File VirusTotal Malware RWX flags setting unpack itself |
|
|
|
|
2.6 |
M |
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12352 |
2023-06-11 22:57
|
llllllllllllllllllllllllllllll... 4dcb360da811ecbe897b157b9c9e56fb MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware Malicious Traffic RWX flags setting exploit crash Exploit DNS crashed |
1
http://45.66.230.217/191/cleanmgr.exe
|
1
|
1
ET INFO Executable Download from dotted-quad Host
|
|
4.6 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12353 |
2023-06-11 22:56
|
tehpoddejrka06.exe 9189a5b029e681245e8f98a196d76958 RedLine stealer[m] RAT NSIS UPX Malicious Library AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications AppData folder installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
3
ET MALWARE RedLine Stealer TCP CnC net.tcp Init ET MALWARE Redline Stealer TCP CnC Activity ET MALWARE Redline Stealer TCP CnC - Id1Response
|
|
11.4 |
M |
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12354 |
2023-06-11 22:54
|
uMM.exe 27c4f6ca1b49e3723ba158c9c268a526 PE64 PE File VirusTotal Malware ICMP traffic unpack itself DNS |
|
1
|
|
|
4.0 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12355 |
2023-06-11 22:52
|
[Content_Types].xml 7084b736cec7aca9dcd6448907d35fb2 AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12356 |
2023-06-11 22:52
|
theme1.xml 7c846c1a3ca16765bede316a0b88981f AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12357 |
2023-06-11 22:51
|
cleanmgr.exe 9a499fe6b96fa6952e8af6c4fee8ea21 UPX Malicious Library OS Processor Check PE File PE32 VirusTotal Malware unpack itself |
|
|
|
|
2.0 |
M |
55 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12358 |
2023-06-11 22:50
|
[Content_Types].xml 7084b736cec7aca9dcd6448907d35fb2 AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12359 |
2023-06-11 22:49
|
wtrelaxing.exe ec9d7eb68b700dc7f81b7a808c4642ec RedLine stealer[m] RAT NSIS Generic Malware UPX Malicious Library AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer RedLine Malware download FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself Collect installed applications AppData folder installed browsers check Stealer Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
1
ET MALWARE RedLine Stealer TCP CnC net.tcp Init
|
|
11.8 |
M |
49 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12360 |
2023-06-11 22:49
|
theme1.xml 7c846c1a3ca16765bede316a0b88981f AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
|
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.8 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|