13726 |
2021-10-19 09:25
|
PTL_100258541102.exe 737732b33bdfa729010c81fba507c59e RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee ComputerName |
1
http://apps.identrust.com/roots/dstrootcax3.p7c
|
4
apps.identrust.com(119.207.65.81) store2.gofile.io(31.14.69.10) - mailcious 173.223.227.8 31.14.69.10 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.0 |
|
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13727 |
2021-10-19 09:26
|
vbc.exe e8545399823b411ea6cb927e80aded0f RAT PWS .NET framework Generic Malware task schedule AntiDebug AntiVM PE File PE32 .NET EXE Dridex TrickBot VirusTotal Malware AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Windows utilities Check virtual network interfaces suspicious process malicious URLs Tofsee Kovter Windows DNS Cryptographic key |
1
|
6
ControllerFinallineballinglove33.webredirect.org(79.134.225.70) - mailcious www.google.com(172.217.175.68) 142.250.66.132 142.250.204.132 13.107.21.200 79.134.225.70 - mailcious
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex
|
|
13.8 |
|
17 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13728 |
2021-10-19 09:27
|
vbc.exe b59b1a9c76a4db8f4df286a20f0735bc Malicious Library UPX PE File OS Processor Check PE32 VirusTotal Malware PDB unpack itself DNS |
|
1
79.134.225.70 - mailcious
|
|
|
2.4 |
|
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13729 |
2021-10-19 09:28
|
askinstall24.exe edd9798569447f5264a467bc71e42964 Gen2 Trojan_PWS_Stealer Credential User Data Generic Malware Malicious Packer Malicious Library SQLite Cookie UPX PE File OS Processor Check PE32 PNG Format Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files ICMP traffic exploit crash unpack itself Windows utilities suspicious process suspicious TLD WriteConsoleW installed browsers check Tofsee Windows Exploit Browser ComputerName Remote Code Execution DNS crashed |
4
http://www.cjnovone.top/Home/Index/lkdinl - rule_id: 6119 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1bV787 https://www.listincode.com/ - rule_id: 2327
|
8
www.listincode.com(144.202.76.47) - mailcious www.iyiqian.com(103.155.92.58) - mailcious www.cjnovone.top(188.225.87.175) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET DNS Query to a *.top domain - Likely Hostile ET INFO HTTP Request to a *.top domain
|
3
http://www.cjnovone.top/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
10.6 |
M |
46 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13730 |
2021-10-19 09:30
|
vbc.exe 880f777281c6d20ac36dcf540d10df1b RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
2.2 |
|
21 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13731 |
2021-10-19 09:31
|
WERTYU345678ertyuiSDF34.exe 70cb56c6c5c12806d8ab9ec9cb9f9721 Gen2 Gen1 Generic Malware Malicious Library UPX DNS AntiDebug AntiVM PE File OS Processor Check PE32 VirusTotal Malware Buffer PE AutoRuns PDB suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted Creates executable files unpack itself Windows utilities suspicious process sandbox evasion WriteConsoleW human activity check Windows ComputerName Remote Code Execution DNS DDNS crashed |
|
2
ezeani.duckdns.org(194.5.98.48) - mailcious 194.5.98.48 - mailcious
|
1
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
|
|
17.0 |
|
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13732 |
2021-10-19 09:33
|
102.exe 34ff816c9decd4151520a12452cde537 RAT PWS .NET framework Generic Malware ASPack Malicious Packer Malicious Library UPX Antivirus AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware powershell AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files unpack itself Windows utilities Disables Windows Security powershell.exe wrote Check virtual network interfaces suspicious process AppData folder malicious URLs sandbox evasion WriteConsoleW Tofsee Ransomware Windows Tor ComputerName Cryptographic key crashed |
2
https://cdn.discordapp.com/attachments/893177342426509335/899196909166686208/87858A4B.jpg https://cdn.discordapp.com/attachments/893177342426509335/899196911062511676/938B601D.jpg
|
3
cdn.discordapp.com(162.159.133.233) - malware 162.159.134.233 - malware 162.159.130.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
16.4 |
M |
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13733 |
2021-10-19 09:34
|
125.exe ea9748d43fde0c8942c9f7e47c8cfa37 RAT PWS .NET framework Generic Malware Antivirus ASPack Malicious Packer Malicious Library UPX AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware powershell suspicious privilege Malicious Traffic Check memory Checks debugger Creates shortcut unpack itself powershell.exe wrote AppData folder WriteConsoleW Tofsee Windows ComputerName Cryptographic key |
4
https://cdn.discordapp.com/attachments/893177342426509335/899579986283986974/61AD9E94.jpg https://cdn.discordapp.com/attachments/893177342426509335/899579983847096320/8F5AF8B4.jpg https://cdn.discordapp.com/attachments/893177342426509335/899579981057916928/D0541226.jpg https://cdn.discordapp.com/attachments/893177342426509335/899579987907186728/7377E0AD.jpg
|
2
cdn.discordapp.com(162.159.130.233) - malware 162.159.133.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
5.2 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13734 |
2021-10-19 09:35
|
askinstall25.exe c048209154042d9ff5514cfd008df4bd Gen2 Trojan_PWS_Stealer Credential User Data Generic Malware Malicious Packer Malicious Library SQLite Cookie UPX PE File OS Processor Check PE32 PNG Format Browser Info Stealer VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Malicious Traffic Checks debugger WMI Creates executable files exploit crash unpack itself Windows utilities suspicious process WriteConsoleW installed browsers check Tofsee Windows Exploit Browser ComputerName Remote Code Execution DNS crashed |
4
http://www.cjnovone.top/Home/Index/lkdinl - rule_id: 6119 http://www.iyiqian.com/ - rule_id: 2326 https://iplogger.org/1b4887 https://www.listincode.com/ - rule_id: 2327
|
8
www.listincode.com(144.202.76.47) - mailcious www.iyiqian.com(103.155.92.58) - mailcious www.cjnovone.top(188.225.87.175) - mailcious iplogger.org(88.99.66.31) - mailcious 103.155.92.58 - mailcious 88.99.66.31 - mailcious 144.202.76.47 - mailcious 188.225.87.175 - mailcious
|
3
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET DNS Query to a *.top domain - Likely Hostile ET INFO HTTP Request to a *.top domain
|
3
http://www.cjnovone.top/Home/Index/lkdinl http://www.iyiqian.com/ https://www.listincode.com/
|
9.8 |
M |
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13735 |
2021-10-19 09:36
|
nett.exe 400fba5ba55de726ed484ba680e74500 Gen2 Generic Malware Malicious Library UPX PE File OS Processor Check PE32 VirusTotal Malware PDB ICMP traffic unpack itself sandbox evasion Browser DNS crashed |
|
1
|
|
|
6.2 |
M |
10 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13736 |
2021-10-19 09:37
|
vbc.exe 9fd8919e62792e6d93995b5f7abda850 RAT PWS .NET framework Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee Windows ComputerName Cryptographic key crashed |
1
|
2
www.google.com(172.217.31.164) 142.250.207.68
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
10.4 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13737 |
2021-10-19 09:37
|
60852000010.exe a37e7dab62e1bc27058e90fa26bd5e60 RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee ComputerName DNS |
1
http://apps.identrust.com/roots/dstrootcax3.p7c
|
5
apps.identrust.com(119.207.65.137) store2.gofile.io(31.14.69.10) - mailcious 173.223.227.8 31.14.69.10 - mailcious 162.159.130.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
4.6 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13738 |
2021-10-19 09:38
|
605300013806.exe 41347ab5d177516699a95664c9af347f RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee ComputerName |
1
http://apps.identrust.com/roots/dstrootcax3.p7c
|
4
apps.identrust.com(119.207.65.137) store2.gofile.io(31.14.69.10) - mailcious 173.223.227.18 31.14.69.10 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.0 |
M |
20 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13739 |
2021-10-19 09:40
|
new.exe 217406c42eee7058fa7de49d0224cefc Lazarus Family Themida Packer Malicious Library UPX PE File PE32 .NET EXE Browser Info Stealer VirusTotal Malware Malicious Traffic Check memory Checks debugger WMI unpack itself Checks Bios Collect installed applications Detects VMWare Check virtual network interfaces suspicious TLD VMware anti-virtualization installed browsers check Tofsee Windows Browser ComputerName Remote Code Execution Firmware DNS Cryptographic key crashed |
2
http://apps.identrust.com/roots/dstrootcax3.p7c https://vs1.ckauni.ru/
|
5
apps.identrust.com(119.207.65.137) vs1.ckauni.ru(81.177.141.85) 173.223.227.8 81.177.141.85 - mailcious 31.131.254.2 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
11.0 |
M |
24 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13740 |
2021-10-19 09:41
|
097001357520.exe dbc86fb7bb8ff78aa755b835af1cea43 RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee ComputerName |
1
http://apps.identrust.com/roots/dstrootcax3.p7c
|
4
apps.identrust.com(119.207.65.153) store2.gofile.io(31.14.69.10) - mailcious 173.223.227.18 31.14.69.10 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.0 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|