13066 |
2023-05-23 09:39
|
Clji.js c2639b1131697d67a1a76458bcfdf901 Generic Malware Antivirus Hide_URL AntiDebug AntiVM PowerShell powershell suspicious privilege Code Injection Check memory Checks debugger Creates shortcut unpack itself suspicious process Windows ComputerName Cryptographic key |
1
http://176.124.198.212/s0A/DtsT8xt
|
|
|
|
5.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13067 |
2023-05-23 09:39
|
Bkeeki.js b93770e7d4d1a2bc3d3121fc7d1ac0e4 Generic Malware Antivirus Hide_URL AntiDebug AntiVM PowerShell powershell suspicious privilege Code Injection Check memory Checks debugger Creates shortcut unpack itself suspicious process Windows ComputerName Cryptographic key |
1
http://176.124.198.213/Fs8Py/lEEEF8
|
|
|
|
5.6 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13068 |
2023-05-23 09:31
|
@mossad_lzt_packlab.exe 25d97aa66e4925975190a7566b5a8dc0 RedLine stealer[m] UPX Malicious Library Malicious Packer AntiDebug AntiVM OS Processor Check PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications WriteConsoleW installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
|
|
10.0 |
|
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13069 |
2023-05-23 09:24
|
pmexzx.exe 1996e9f0e24dcdbf6b737a5714007e24 PWS .NET framework PWS[m] KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed keylogger |
1
|
2
api.ipify.org(104.237.62.211) 64.185.227.155
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
12.6 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13070 |
2023-05-23 09:22
|
vbc.exe baff53cb7c0dba9be6859bd815559bf1 PWS .NET framework Generic Malware Antivirus SMTP PWS[m] KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware powershell AutoRuns PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote Check virtual network interfaces suspicious process WriteConsoleW IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed |
1
|
2
api.ipify.org(104.237.62.211) 64.185.227.155
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
15.0 |
M |
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13071 |
2023-05-23 09:21
|
bld_3.exe e2ca6f8e77cbaa4a7adf56242880a30c RAT Emotet PWS .NET framework Loki_b UPX Malicious Packer .NET EXE PE File PE32 OS Processor Check VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder IP Check Windows ComputerName DNS Cryptographic key |
16
http://94.142.138.111/concerts/2.php - rule_id: 32678 http://94.142.138.111/concerts/13.php - rule_id: 32689 http://94.142.138.111/concerts/10.php - rule_id: 32686 http://ip-api.com/json/ http://94.142.138.111/concerts/9.php - rule_id: 32685 http://94.142.138.111/concerts/11.php - rule_id: 32687 http://94.142.138.111/concerts/8.php - rule_id: 32684 http://94.142.138.111/concerts/6.php - rule_id: 32682 http://94.142.138.111/concerts/4.php - rule_id: 32680 http://94.142.138.111/concerts/1.php - rule_id: 32677 http://94.142.138.111/software/bld_3s.exe http://94.142.138.111/concerts/12.php - rule_id: 32688 http://94.142.138.111/concerts/7.php - rule_id: 32683 http://94.142.138.111/concerts/5.php - rule_id: 32681 http://ipwhois.app/xml/ http://94.142.138.111/concerts/3.php - rule_id: 32679
|
5
ipwhois.app(103.126.138.87) ip-api.com(208.95.112.1) 103.126.138.87 94.142.138.111 - malware 208.95.112.1
|
5
ET INFO Executable Download from dotted-quad Host ET POLICY PE EXE or DLL Windows file download HTTP ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET POLICY External IP Lookup ip-api.com
|
13
http://94.142.138.111/concerts/2.php http://94.142.138.111/concerts/13.php http://94.142.138.111/concerts/10.php http://94.142.138.111/concerts/9.php http://94.142.138.111/concerts/11.php http://94.142.138.111/concerts/8.php http://94.142.138.111/concerts/6.php http://94.142.138.111/concerts/4.php http://94.142.138.111/concerts/1.php http://94.142.138.111/concerts/12.php http://94.142.138.111/concerts/7.php http://94.142.138.111/concerts/5.php http://94.142.138.111/concerts/3.php
|
7.6 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13072 |
2023-05-23 09:20
|
damianozx.exe c0f457ec5e02531573e8ccfd106ef894 PWS .NET framework .NET EXE PE File PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger unpack itself |
|
|
|
|
5.0 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13073 |
2023-05-23 04:29
|
...............dot d553bd422c8d3621e21049ccc2ebe680 MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware exploit crash Exploit DNS crashed |
|
1
103.125.191.125 - malware
|
|
|
3.8 |
M |
40 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13074 |
2023-05-23 04:29
|
...............dot d553bd422c8d3621e21049ccc2ebe680 MS_RTF_Obfuscation_Objects RTF File doc VirusTotal Malware exploit crash unpack itself Exploit DNS crashed |
|
1
103.125.191.125 - malware
|
|
|
4.2 |
M |
40 |
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13075 |
2023-05-22 16:34
|
345534534.exe 6355c5f8f98ffd7042a07ed616a2bb34 AgentTesla browser info stealer Generic Malware Downloader UPX Malicious Library Create Service DGA Socket DNS BitCoin Code injection HTTP PWS[m] Sniff Audio Steal credential Http API P2P Internet API Escalate priviledges persistence FTP KeyLogger Screen Browser Info Stealer VirusTotal Malware Cryptocurrency wallets Cryptocurrency PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files exploit crash unpack itself Collect installed applications Check virtual network interfaces malicious URLs sandbox evasion installed browsers check Ransomware Windows Exploit Browser ComputerName Remote Code Execution Firmware DNS Cryptographic key crashed |
1
http://185.99.133.246/c2sock - rule_id: 33485
|
1
185.99.133.246 - mailcious
|
1
SURICATA HTTP unable to match response to request
|
1
http://185.99.133.246/c2sock
|
17.2 |
M |
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13076 |
2023-05-22 16:32
|
governorzx.exe 62a46435c5e579b3f3a7d59f64317a09 PWS .NET framework KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces malicious URLs Tofsee Windows Discord Browser Email ComputerName DNS Cryptographic key Software crashed |
1
https://discord.com/api/webhooks/1103875906361118810/4y7iINqCCd1vB_5CHVi8bfs-VsURmj2vh2ZdBw9vV7iC_QaLM-Uzs73INWoN8KSw28mH
|
2
discord.com(162.159.136.232) - mailcious 162.159.137.232 - mailcious
|
3
ET INFO Observed Discord Domain in DNS Lookup (discord .com) ET INFO Observed Discord Domain (discord .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
14.8 |
M |
48 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13077 |
2023-05-22 16:31
|
shell.exe 604e6d6cac22bc2c954367b4a36bb195 Gen1 UPX Malicious Library ASPack Admin Tool (Sysinternals etc ...) Anti_VM OS Processor Check PE64 PE File ZIP Format DLL VirusTotal Malware Check memory Creates executable files crashed |
|
|
|
|
2.6 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13078 |
2023-05-22 16:28
|
adolfzx.exe 372daff38ea8b876b01803b474c7f687 Formbook PWS .NET framework RAT AntiDebug AntiVM .NET EXE PE File PE32 VirusTotal Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted ICMP traffic unpack itself Windows utilities AppData folder Windows |
|
2
www.anime-room.com() www.todipjane.africa()
|
|
|
11.6 |
M |
37 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13079 |
2023-05-22 16:26
|
whiteezx.exe dc7614d708b3b80811a4c8dde9eb4e1c Formbook PWS[m] AntiDebug AntiVM .NET EXE PE File PE32 FormBook Malware download VirusTotal Malware PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself DNS |
3
http://www.ebndeoo.store/pr29/?Sh=T2TbN0Zq62ho9rLNZMUBepa4dSHomHzO9AtC/XYSeFvuxA7nQTBQ8gktsXrl5MMEMi+Syat/&RX=dnHxRbdHWnS4fP5 http://www.eventequipmentexpress.com/pr29/?Sh=fp/AfiVnqCIH8M1YKHlz0gaU8dW5ScGccE7V/FPeYIQ0AeAEOBMSxwD4Ou/6lh0DqUgisOqN&RX=dnHxRbdHWnS4fP5 http://www.cuisineconfort.com/pr29/?Sh=S0SwMb/6oZgQzwAmRA9qWrUSbSeRu71rATdJ/boUNw8KzXM8MwG+oUPoGiXkDp9gToBx8Zsu&RX=dnHxRbdHWnS4fP5
|
7
www.eventequipmentexpress.com(34.102.136.180) www.ebndeoo.store(47.251.52.228) www.cuisineconfort.com(23.227.38.74) 46.30.213.155 - mailcious 23.227.38.74 - mailcious 34.102.136.180 - mailcious 47.251.52.228
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
10.2 |
M |
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13080 |
2023-05-22 16:25
|
vbc.exe f4fb22b77def98b9cc1231ab69a98f58 Formbook NSIS UPX Malicious Library PE File PE32 DLL FormBook Malware download VirusTotal Malware suspicious privilege Malicious Traffic Check memory Creates executable files unpack itself AppData folder suspicious TLD ComputerName DNS |
12
http://www.zservers.xyz/hjdr/ - rule_id: 28386 http://www.xn--pdotrychler-l8a.ch/hjdr/ - rule_id: 28389 http://www.amateurshow.online/hjdr/?sQ51n=xX5SVKkWhoDut3GzBaDmppnEHsg/q+4WKSSlO6xSWbIBYORImKJaBpt9iPBmVz2FT2wLfcB9Y2Q6assiK3BzS8oN8k0Uh6RuPdoxrUM=&O-G=Y-3P - rule_id: 28385 http://www.howtrue.info/hjdr/?sQ51n=kJhn0XnRZRgnPBFsTC3RrkdNU3jL2gKJb5tjL3sD/5M7+ZJLcewBYYG+QRdPVJXXplIlf5qgAFj8zlCmH3brR5caIrNXSuF9PhWnmJU=&O-G=Y-3P - rule_id: 28387 http://www.tugrow.top/hjdr/?sQ51n=2Lz3cRNcgovZAvoxkyTJJkVbnS/f0a6Q88r0UIjg2Los90+Pf0cBdPH279Q+Q6Q5Wf8ziDEK77rXCjEWctJre0mQm9v094R3uDXqBk4=&O-G=Y-3P - rule_id: 28388 http://www.sqlite.org/2019/sqlite-dll-win32-x86-3290000.zip http://www.moneyflowplant.com/hjdr/?sQ51n=eyJcKPxcHEkYOgBJ9ZZ9cit4y5B++Dvl/uOHalw31nGSIs778X+Kd1FjwZjeX1NbjiHN6FVudnpl9UmJEcwgNYvdeBiOQHW6RccTTCs=&O-G=Y-3P - rule_id: 31708 http://www.xn--pdotrychler-l8a.ch/hjdr/?sQ51n=viX6L1AgcIzkNKvffNzJJ+Yd0/U+wEe4YYZ25bQBQN6YyRvPjBEvK6hqMFdbfSlnHMzHqKUOr90SHQpYKy1ow0mwR1Rp7LB2XNGkbPc=&O-G=Y-3P - rule_id: 28389 http://www.zservers.xyz/hjdr/?sQ51n=a/jwoO6Li4WGoMKhZK2qV7tdnllQ6mdQYsYFdFr7RisYjJd1Hm0f46xorIJmHDnVHKTR/o/1BaU+86MBDvdqY5CeL0wg/BcTjfumQVU=&O-G=Y-3P - rule_id: 28386 http://www.howtrue.info/hjdr/ - rule_id: 28387 http://www.tugrow.top/hjdr/ - rule_id: 28388 http://www.moneyflowplant.com/hjdr/ - rule_id: 31708
|
15
www.flamencovive.com() - mailcious www.amateurshow.online(37.220.1.68) - mailcious www.xn--pdotrychler-l8a.ch(95.130.17.35) - mailcious www.fruitecology.com(46.30.213.155) - mailcious www.howtrue.info(184.168.113.29) - mailcious www.zservers.xyz(103.42.108.46) - mailcious www.tugrow.top(66.29.131.66) - mailcious www.moneyflowplant.com(62.77.152.57) - mailcious 95.130.17.35 - mailcious 184.168.113.29 - mailcious 62.77.152.57 - mailcious 66.29.131.66 - mailcious 103.42.108.46 - mailcious 45.33.6.223 37.220.1.68
|
5
ET MALWARE FormBook CnC Checkin (GET) ET HUNTING Request to .XYZ Domain with Minimal Headers ET INFO HTTP Request to a *.top domain ET DNS Query to a *.top domain - Likely Hostile ET HUNTING Request to .TOP Domain with Minimal Headers
|
11
http://www.zservers.xyz/hjdr/ http://www.xn--pdotrychler-l8a.ch/hjdr/ http://www.amateurshow.online/hjdr/ http://www.howtrue.info/hjdr/ http://www.tugrow.top/hjdr/ http://www.moneyflowplant.com/hjdr/ http://www.xn--pdotrychler-l8a.ch/hjdr/ http://www.zservers.xyz/hjdr/ http://www.howtrue.info/hjdr/ http://www.tugrow.top/hjdr/ http://www.moneyflowplant.com/hjdr/
|
5.6 |
M |
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|