12421 |
2021-09-15 09:39
|
Invoice1.docx 9021afcfefe0fd391eacd306de705448 Word 2007 file format(docx) Vulnerability VirusTotal Malware unpack itself |
3
http://wiyolo.com/956fb7ffae6a93d9 http://wiyolo.com/956fb7ffae6a93d9/ http://wiyolo.com/956fb7ffae6a93d9/remove.html
|
2
wiyolo.com(142.234.157.206) 142.234.157.206
|
|
|
3.0 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12422 |
2021-09-15 09:40
|
testen.exe e4a200fc3da152d2b8c48f6e19b8ec97 RAT PWS .NET framework BitCoin Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware Code Injection Check memory Checks debugger buffers extracted ICMP traffic unpack itself Check virtual network interfaces Windows Cryptographic key |
|
|
|
|
9.2 |
M |
40 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12423 |
2021-09-15 09:41
|
bluezx.exe 021ffe1bcf154accf3b947f301c9b676 RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed |
2
http://checkip.dyndns.org/ https://freegeoip.app/xml/175.208.134.150
|
5
freegeoip.app(172.67.188.154) checkip.dyndns.org(158.101.44.242) 104.21.48.37 - malware 158.101.44.242 172.67.188.154
|
3
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain ET POLICY External IP Lookup - checkip.dyndns.org SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
17.0 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12424 |
2021-09-15 09:42
|
vmnet.exe e07ce1ac09be171289b93538009c471c RAT Generic Malware Antivirus PE64 PE File VirusTotal Malware powershell suspicious privilege MachineGuid Check memory Checks debugger WMI Creates shortcut ICMP traffic unpack itself powershell.exe wrote suspicious process WriteConsoleW Windows ComputerName Cryptographic key |
|
4
www.youtube.com(172.217.161.46) www.google.com(142.250.196.100) 142.250.66.132 142.250.204.78
|
|
|
6.4 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12425 |
2021-09-15 09:43
|
raccon.exe dea12cd62b3999b22534da85f839e6c3 Malicious Library PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself Remote Code Execution |
|
|
|
|
2.0 |
M |
28 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12426 |
2021-09-15 09:44
|
win32.exe f0f4b5aa6183bbc5265f26e47aaeb579 RAT PWS .NET framework Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself ComputerName |
|
1
|
|
|
8.2 |
M |
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12427 |
2021-09-15 09:45
|
ashleyzx.exe 25bed2de415ddf039da98d134f99c226 RAT PWS .NET framework Generic Malware AntiDebug AntiVM PE File .NET EXE PE32 FormBook Malware download VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted ICMP traffic unpack itself |
2
http://www.manualdobalconista.com/crg3/?Ulm=5aJYfJodYG6BrS0FfuAwGX0MfoQ+tl7mlPkfTpt57IVgoZ48UAgNU6sYsDPVuo0HUmr+aUbZ&TVg8Al=uFNXBt2HlNP8 http://www.thedecorcorner.com/crg3/?Ulm=jyRJRWWorKBrL9rPhTzn3uyL3ElVefX3VfTSscFXSKsmaYWV2Cj1pXrkGXbwLbU0ZvFEd1u4&TVg8Al=uFNXBt2HlNP8
|
5
www.m-starlighthoi.com() www.manualdobalconista.com(162.241.2.219) www.thedecorcorner.com(34.102.136.180) 162.241.2.219 34.102.136.180 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
9.0 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12428 |
2021-09-15 09:48
|
123456.exe 80875b1e913ff7c71ce5e32810f9ddda RAT PWS .NET framework Generic Malware Malicious Packer PE File OS Processor Check .NET EXE PE32 VirusTotal Malware AutoRuns PDB suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AppData folder AntiVM_Disk suspicious TLD WriteConsoleW VM Disk Size Check Tofsee Windows ComputerName DNS |
4
http://sherence.ru/323.exe https://sh1729062.b.had.su//loader.txt - rule_id: 4573 https://sh1729062.b.had.su//cisCheckerstroke.php - rule_id: 4574 https://sh1729062.b.had.su//gate.php?hwid=7C6024AD&os=6.1.7601&av= - rule_id: 4575
|
5
sherence.ru(172.67.176.114) - malware sh1729062.b.had.su(92.119.113.140) - mailcious 172.67.176.114 - malware 172.67.188.154 92.119.113.140 - malware
|
2
ET DNS Query for .su TLD (Soviet Union) Often Malware Related SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
3
https://sh1729062.b.had.su//loader.txt https://sh1729062.b.had.su//cisCheckerstroke.php https://sh1729062.b.had.su//gate.php
|
9.4 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12429 |
2021-09-15 09:50
|
angelzx.exe 9bdcd248d7d3333d2ea92620b44c427e RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName DNS crashed |
|
1
|
|
|
10.6 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12430 |
2021-09-15 09:57
|
diagram-170.doc 62f8ccb8d886cf7762527c6492723f45 VBA_macro Generic Malware MSOffice File RWX flags setting unpack itself |
5
https://ghapan.com/Kdg73onC3oQ/090921.html
https://gruasingenieria.pe/LUS1NTVui6/090921.html
https://yoowi.net/tDzEJ8uVGwdj/130921.html
https://chaturanga.groopy.com/7SEZBnhMLW/130921.html
https://lotolands.com/JtaTAt4Ej/130921.html
|
5
ghapan.com(136.243.74.161)
gruasingenieria.pe(192.185.17.114)
yoowi.net(210.211.111.87)
chaturanga.groopy.com(143.95.80.83)
lotolands.com(198.54.124.27)
|
|
|
1.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12431 |
2021-09-15 09:57
|
diagram-171.doc bfa9d4b7bcf5820e663d338e9921d1f8 VBA_macro Generic Malware MSOffice File unpack itself |
5
https://ghapan.com/Kdg73onC3oQ/090921.html
https://gruasingenieria.pe/LUS1NTVui6/090921.html
https://yoowi.net/tDzEJ8uVGwdj/130921.html
https://chaturanga.groopy.com/7SEZBnhMLW/130921.html
https://lotolands.com/JtaTAt4Ej/130921.html
|
5
ghapan.com(136.243.74.161)
gruasingenieria.pe(192.185.17.114)
yoowi.net(210.211.111.87)
chaturanga.groopy.com(143.95.80.83)
lotolands.com(198.54.124.27)
|
|
|
1.2 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12432 |
2021-09-15 10:13
|
0914_718257604903.doc 7cbc4c74870212cf418af8417001c23b VBA_macro Generic Malware MSOffice File GIF Format VirusTotal Malware Malicious Traffic Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself Check virtual network interfaces suspicious TLD IP Check ComputerName |
2
http://api.ipify.org/
http://woureves.ru/8/forum.php
|
4
woureves.ru(91.226.80.10) - mailcious
api.ipify.org(23.23.145.149) 50.19.104.221
91.226.80.10 - mailcious
|
1
ET POLICY External IP Lookup api.ipify.org
|
|
8.2 |
M |
8 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12433 |
2021-09-15 10:13
|
0914_4534346255302.doc db8169d3473f0079a1850b2d5d5f7861 VBA_macro Generic Malware MSOffice File unpack itself |
|
|
|
|
1.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12434 |
2021-09-15 10:20
|
0914_4534346255302.doc db8169d3473f0079a1850b2d5d5f7861 hancitor VBA_macro Generic Malware MSOffice File GIF Format Malware Malicious Traffic Checks debugger buffers extracted Creates shortcut Creates executable files RWX flags setting unpack itself Check virtual network interfaces IP Check ComputerName |
2
http://woureves.ru/8/forum.php - rule_id: 5191 http://api.ipify.org/
|
4
woureves.ru(91.226.80.10) - mailcious api.ipify.org(50.16.248.208) 54.235.244.43 91.226.80.10 - mailcious
|
1
ET POLICY External IP Lookup api.ipify.org
|
1
http://woureves.ru/8/forum.php
|
7.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12435 |
2021-09-15 10:24
|
000856KL2021.pdf.exe 4700856b989963a3319e864ffa5adbff RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE PE32 VirusTotal Malware AutoRuns suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows ComputerName crashed |
|
|
|
|
10.2 |
|
32 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|