12406 |
2021-09-15 07:55
|
rusk.exe b5faf0605f312ebc4ba7db08e4642530 Themida Packer Admin Tool (Sysinternals etc ...) PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces VMware anti-virtualization installed browsers check Tofsee Windows Browser ComputerName Remote Code Execution Firmware DNS Cryptographic key Software crashed |
1
|
3
api.ip.sb(104.26.13.31) 172.67.75.172 - mailcious 144.76.183.53 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
11.2 |
|
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12407 |
2021-09-15 09:23
|
f.wbk e98b2039d50f2482200d688766f9789f RTF File doc AntiDebug AntiVM FormBook Malware download VirusTotal Malware MachineGuid Malicious Traffic Check memory Checks debugger exploit crash unpack itself Windows Exploit DNS crashed Downloader |
1
http://www.kkcindia.com/by65/?xVJtG4Th=PU+Ve4UAPi5Re9LLGDxmdgil374yQ6xwqpxATmSGSVF17+prnoHkx+dFYOe/+U0+Br20Y6Ns&1bw=L6Adp0nXjfjLdR2p
|
4
www.seniorlivingukhomes.com() www.kkcindia.com(209.99.40.222) 209.99.40.222 - mailcious 198.46.199.161 - malware
|
7
ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE FormBook CnC Checkin (GET)
|
|
5.0 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12408 |
2021-09-15 09:23
|
buy.exe c162cbbb6353cb3b09bdc441fdd4c1b8 North Korea RAT PWS .NET framework Generic Malware DNS SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName crashed |
|
|
|
|
8.8 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12409 |
2021-09-15 09:25
|
f13058cb1065b13600fcb4a4f48e8e... dc0b13c9d739e5bd085ed2e8a8a263ab Malicious Library PE File OS Processor Check PE32 DLL VirusTotal Malware Buffer PE Check memory buffers extracted WMI Creates executable files AppData folder Tofsee ComputerName |
2
https://a.goatgame.co/userf/dat/2202/sqlite.dat https://a.goatgame.co/userf/dat/sqlite.dll - rule_id: 4717
|
2
a.goatgame.co(104.21.79.144) - malware 172.67.146.70 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://a.goatgame.co/userf/dat/sqlite.dll
|
4.8 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12410 |
2021-09-15 09:25
|
wealthzx.exe ffd78db073dcc4169752342093c603ea RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName crashed |
|
|
|
|
10.2 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12411 |
2021-09-15 09:27
|
1233212333.exe c0fe83baeb1facb1a25a686166660383 RAT PWS .NET framework Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process WriteConsoleW Windows ComputerName DNS |
|
1
185.92.150.213 - mailcious
|
|
|
12.2 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12412 |
2021-09-15 09:28
|
vbc.exe 1ec248cde51ae1e700565074014f02d0 RAT PWS .NET framework Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself ComputerName |
3
http://www.agirlsministry.com/by65/?DXFTJ=CfJnzJir5fNwbtNWtID7sAotyxsbsVh+JpS85dwFP7vOp8SDFxpIfioG0o7zTOp31uL8uCSV&Jt7=XPv4sVZH http://www.boygirlthing.com/by65/?DXFTJ=RuPtncxmpRkBF/QMHMHEZu6r0m5pWck31IQ1KrcjF7csxN7vW2RN7HEHgOh4v0Rni4GxN9u+&Jt7=XPv4sVZH http://www.cellshellmobiles.com/by65/?DXFTJ=Q0j9r9SdeUpCI+2J6FPNmRRzwhJa70g45YOl/AI0eGYqY1d/jxP63Ercx8ev7POIv7nSA5ca&Jt7=XPv4sVZH
|
6
www.boygirlthing.com(45.203.64.91) www.agirlsministry.com(34.102.136.180) www.cellshellmobiles.com(209.99.40.222) 209.99.40.222 - mailcious 34.102.136.180 - mailcious 45.203.64.91
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.0 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12413 |
2021-09-15 09:30
|
plugmanzx.exe 19665f929613c0e945ff13dd25c9362e Generic Malware DNS AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware Buffer PE AutoRuns suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted unpack itself Windows utilities suspicious process WriteConsoleW human activity check Windows ComputerName DNS DDNS |
|
1
blackbladeinc52.ddns.net() - mailcious
|
1
ET POLICY DNS Query to DynDNS Domain *.ddns .net
|
|
13.6 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12414 |
2021-09-15 09:30
|
tmt.exe b95fa0b61f4744cfb0ccd7dcb48270f8 North Korea RAT PWS .NET framework Generic Malware DNS SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName crashed |
|
|
|
|
8.8 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12415 |
2021-09-15 09:32
|
d.wbk cfd3682c2cf1f604af25f77e9ac3fc84 RTF File doc AntiDebug AntiVM FormBook Malware download VirusTotal Malware MachineGuid Malicious Traffic Check memory Checks debugger exploit crash unpack itself Windows Exploit DNS crashed |
1
http://www.fact-about.com/m8g0/?EzuxZl=CJjkS1LluJdyCrC/wWSSdZmBbPjhWleK8FTZxyZzjK5W/DntwLv4XF/Fx0jov/ipugt5t8Pp&anX=TXFxrpEH_FZt
|
4
www.fact-about.com(146.148.189.222) www.corbvalperu.com() 146.148.189.222 198.46.199.161 - malware
|
8
ET INFO Executable Download from dotted-quad Host ET MALWARE Possible Malicious Macro DL EXE Feb 2016 ET MALWARE Possible Malicious Macro EXE DL AlphaNumL ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE FormBook CnC Checkin (GET)
|
|
5.0 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12416 |
2021-09-15 09:32
|
bluestwozx.exe ab66db9b6118f9156a0bd820642fa9cf RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
4
freegeoip.app(172.67.188.154) checkip.dyndns.org(158.101.44.242) 172.67.188.154 132.226.247.73
|
3
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY External IP Lookup - checkip.dyndns.org
|
|
15.4 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12417 |
2021-09-15 09:34
|
esembler.exe 148fab089c36dcbd7cc58e0bdba881e4 RAT PWS .NET framework Generic Malware PE File OS Processor Check .NET EXE PE32 VirusTotal Malware Check memory Checks debugger unpack itself Windows DNS Cryptographic key |
|
1
|
|
|
3.8 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12418 |
2021-09-15 09:35
|
slFZvqw6JB8bsDt.exe 03fa2aa90ad1ce098de68893d83f701d RAT PWS .NET framework NPKI Generic Malware Malicious Packer UPX Malicious Library PE File OS Processor Check .NET EXE PE32 Malware download VirusTotal Malware IoC AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AppData folder AntiVM_Disk WriteConsoleW VM Disk Size Check Windows ComputerName |
4
http://qjqpqiamh2.eternalhost.info//gate.php?hwid=7C6024AD&os=6.1.7601&av= http://qjqpqiamh2.eternalhost.info//cisCheckerstroke.php http://qjqpqiamh2.eternalhost.info//loader.txt http://sherence.ru/12332123331.exe
|
4
qjqpqiamh2.eternalhost.info(194.61.0.8) sherence.ru(104.21.48.37) - malware 104.21.48.37 - malware 194.61.0.8 - malware
|
4
ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET MALWARE Generic gate[.].php GET with minimal headers ET HUNTING Suspicious GET To gate.php with no Referer
|
|
8.6 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12419 |
2021-09-15 09:36
|
StubMonoDLL.exe f613cc950434bbccd7e48e584d60989a RAT Generic Malware Malicious Packer Malicious Library PE File OS Processor Check .NET EXE PE32 VirusTotal Malware suspicious privilege Check memory Checks debugger unpack itself sandbox evasion Browser crashed |
|
|
|
|
3.0 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12420 |
2021-09-15 09:37
|
loadetc.exe 2bd18b0ce7aa8dfaee0e922090aae138 AntiDebug AntiVM PE File PE32 Malware download VirusTotal Malware AutoRuns PDB Code Injection Malicious Traffic Check memory Creates executable files Windows utilities suspicious process WriteConsoleW Windows DNS Downloader |
1
http://185.215.113.84/ec.exe
|
2
185.215.113.84 - malware 172.67.188.154
|
5
ET DROP Spamhaus DROP Listed Traffic Inbound group 25 ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET POLICY PE EXE or DLL Windows file download HTTP ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
8.2 |
M |
38 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|