Submissions

No Date Request Urls Hosts IDS Rule Score Zero VT Player Etc
13306 2023-05-14 17:03 crypted%20%282%29.exe  

7934a25163e1500d54aded65ce354308


AntiDebug AntiVM MSOffice File Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed
4 2 4.8 M ZeroCERT

13307 2023-05-14 17:02 ProtonVPN_v3.0.5.exe  

8589fe09a6ad2bdc47a753125086f742


Gen2 Generic Malware UPX Malicious Library Malicious Packer Antivirus OS Processor Check PE File PE32 CAB MSOffice File DLL VirusTotal Malware PDB suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder AntiVM_Disk VM Disk Size Check installed browsers check Browser ComputerName DNS
4.8 M 23 ZeroCERT

13308 2023-05-14 16:59 testing.exe  

1c74e42557c3d29c125070f17794ed65


AntiDebug AntiVM MSOffice File Code Injection ICMP traffic RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed
4 2 6.0 M ZeroCERT

13309 2023-05-14 10:15 testing.exe  

0bde80954b5c14814f29064c6424d374


RAT Emotet PWS .NET framework Loki_b UPX .NET EXE PE File PE32 OS Processor Check VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder IP Check Windows ComputerName DNS Cryptographic key
16 5 5 14 6.8 M 53 guest

13310 2023-05-12 18:07 Build_2s.exe  

1c2b15ed1c8897bb466ec6f1a0f3e815


Emotet PWS .NET framework Loki_b RAT UPX OS Processor Check .NET EXE PE File PE32 VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger unpack itself Check virtual network interfaces IP Check Windows ComputerName DNS Cryptographic key
15 5 1 13 5.6 M 40 ZeroCERT

13311 2023-05-12 18:04 photo190.exe  

d874573195e89d1fdd72f31050cfcdc2


RedLine stealer[m] Gen1 Emotet UPX Malicious Library Admin Tool (Sysinternals etc ...) Malicious Packer SMTP PWS[m] AntiDebug AntiVM CAB PE File PE32 OS Processor Check DLL Browser Info Stealer Malware download Amadey FTP Client Info Stealer VirusTotal Malware AutoRuns PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted WMI Creates executable files unpack itself Windows utilities Disables Windows Security Collect installed applications suspicious process AppData folder AntiVM_Disk WriteConsoleW VM Disk Size Check installed browsers check Windows Update Browser ComputerName Remote Code Execution DNS Cryptographic key Software crashed
4 2 6 3 20.4 M 40 ZeroCERT

13312 2023-05-12 18:03 test2.exe  

6d67904fdc38ee640fc49af5b9229d93


PWS .NET framework RAT UPX Confuser .NET OS Processor Check .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed
1 6.2 M 54 ZeroCERT

13313 2023-05-12 18:01 QQQ%23%23%23%23%23%23%23%23%23...  

96935f118fdeae482ef56256b22acf86


Loki MS_RTF_Obfuscation_Objects RTF File doc LokiBot Malware download VirusTotal Malware c&c Malicious Traffic buffers extracted RWX flags setting exploit crash Windows Exploit DNS crashed Downloader
2 2 13 1 5.2 M 29 ZeroCERT

13314 2023-05-12 18:01 QQQ%23%23%23%23%23%23%23%23%23...  

ee6851f7c64b5d019791616cc442f6e0


Loki MS_RTF_Obfuscation_Objects RTF File doc LokiBot Malware download VirusTotal Malware c&c Malicious Traffic buffers extracted exploit crash unpack itself Windows Exploit DNS crashed Downloader
2 2 13 1 5.2 M 29 ZeroCERT

13315 2023-05-12 18:00 testing.exe  

0bde80954b5c14814f29064c6424d374


RAT Emotet PWS .NET framework Loki_b UPX .NET EXE PE File PE32 OS Processor Check VirusTotal Malware suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder IP Check Windows ComputerName DNS Cryptographic key
16 5 5 13 6.8 M 40 ZeroCERT

13316 2023-05-12 17:59 vbc.exe  

44bd0753b6efa39826e713e4c6bc9353


UPX Malicious Library OS Processor Check PE File PE32 VirusTotal Malware unpack itself
1.4 M 39 ZeroCERT

13317 2023-05-12 10:15 File_pass1234.7z  

4ea64ab9cad02bd9b12703babb3aff3f


PWS[m] Escalate priviledges KeyLogger AntiDebug AntiVM VirusTotal Malware suspicious privilege Check memory Checks debugger Creates executable files unpack itself DNS
2 3.0 M 9 ZeroCERT

13318 2023-05-12 10:09 File_pass1234.7z  

ebffa14573bad49ce1597ebfdb1b4219


PWS[m] Escalate priviledges KeyLogger AntiDebug AntiVM Malware download Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself suspicious TLD IP Check Tofsee Windows Trojan DNS
17 28 10 2 6.2 M ZeroCERT

13319 2023-05-12 10:06 se1.exe  

29531f95f2ffc356c67975a60effa857


PWS .NET framework RAT UPX SMTP PWS[m] KeyLogger AntiDebug AntiVM .NET EXE PE File PE32 Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware Buffer PE suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Windows Browser Email ComputerName Cryptographic key Software crashed
10.6 28 ZeroCERT

13320 2023-05-12 10:02 File_pass1234.7z  

f12cefd0ab30a148d0d24f8b2db51554


PWS[m] Escalate priviledges KeyLogger AntiDebug AntiVM Malware download Malware suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself IP Check Tofsee Windows Trojan DNS
17 27 10 5.8 M ZeroCERT