13756 |
2021-10-19 10:00
|
invoice_000300020.wbk 5ebc54ff148cfb126169f6b4a9286f8f Loki RTF File doc LokiBot Malware download VirusTotal Malware c&c Malicious Traffic buffers extracted exploit crash unpack itself Windows Exploit DNS crashed Downloader |
2
http://checkvim.com/fd7/fre.php - rule_id: 5250
http://103.167.93.12/0011000/vbc.exe
|
3
checkvim.com(2.57.184.45) - mailcious 103.167.93.12 - malware
2.57.184.45
|
13
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 ET INFO Executable Download from dotted-quad Host ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Fake 404 Response ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
1
http://checkvim.com/fd7/fre.php
|
5.0 |
M |
35 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13757 |
2021-10-19 10:00
|
ski.exe 1b465c6989637df1d5c511919c43e457 RAT PWS .NET framework Gen2 Formbook Generic Malware task schedule Malicious Library UPX Antivirus Malicious Packer Admin Tool (Sysinternals etc ...) DNS Sniff Audio KeyLogger ScreenShot Create Service DGA Socket Steal credential Internet API Code injecti VirusTotal Malware powershell suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities powershell.exe wrote suspicious process AppData folder WriteConsoleW IP Check Tofsee Ransomware Windows ComputerName DNS Cryptographic key |
2
http://ip-api.com/json/ https://payloads-poison.000webhostapp.com/r77-x64.dll
|
5
payloads-poison.000webhostapp.com(145.14.145.39) - mailcious ip-api.com(208.95.112.1) 145.14.145.34 - malware 91.134.207.16 - malware 208.95.112.1
|
4
ET POLICY External IP Lookup ip-api.com ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com)
|
|
15.8 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13758 |
2021-10-19 10:01
|
qwerty1backend1.html 6756f4badcb40393eca843bbd8f6f4cc Antivirus AntiDebug AntiVM MSOffice File PNG Format Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
6
https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png https://www.blogger.com/static/v1/widgets/807375071-widgets.js https://www.blogger.com/dyn-css/authorization.css?targetBlogID=4561046081807244140&zx=31f586bd-8086-4cb5-94f1-2fdafcdbee5c https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.css
|
4
resources.blogblog.com(172.217.161.41) www.blogger.com(172.217.161.41) 142.250.204.73 142.250.66.73
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13759 |
2021-10-19 10:02
|
vbc.exe 70a1b0e287cfb57fdafc401193a4476b RAT Generic Malware Admin Tool (Sysinternals etc ...) Antivirus AntiDebug AntiVM PE File PE32 .NET EXE FormBook Malware download VirusTotal Malware powershell PDB suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut unpack itself powershell.exe wrote suspicious process Windows ComputerName DNS Cryptographic key |
5
http://www.banytus.xyz/s6tn/ http://www.zcfxwl.com/s6tn/ http://www.ya-volna.com/s6tn/ http://www.ya-volna.com/s6tn/?wR=9Clz7ug2CL6186Tbyj3X1FAOW2tmQrH5oRJNhCXlshVMeE8KJ3EFtRzhq+/mh5chaL1q5ti7&SP=7nET_rrp&sql=1 http://www.zcfxwl.com/s6tn/?wR=zDvFdusyx7CABBJIvq3glw00UZ1zW1gt9QN6jqK7u0nIDc45LfAKtsJglz4hJ0YWZtyeAilB&SP=7nET_rrp&sql=1
|
7
www.ya-volna.com(195.226.192.69) www.banytus.xyz(66.29.151.101) www.zcfxwl.com(45.207.76.146) 195.226.192.69 45.207.76.146 20.43.94.199 66.29.151.101
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
12.6 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13760 |
2021-10-19 10:03
|
vbc.exe 5507731070ebf3b3bb9e93ffccf03624 Loki PWS Loki[b] Loki.m .NET framework Generic Malware Socket DNS AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs AntiVM_Disk VM Disk Size Check installed browsers check Browser Email ComputerName DNS Software |
1
http://checkvim.com/fd7/fre.php - rule_id: 5250
|
2
checkvim.com(2.57.184.45) - mailcious 2.57.184.45
|
7
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Fake 404 Response
|
1
http://checkvim.com/fd7/fre.php
|
15.0 |
M |
47 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13761 |
2021-10-19 10:09
|
new.exe b45c61350ecdc4abd20c7b0647de3e99 RAT PWS .NET framework Generic Malware task schedule UPX ASPack Malicious Packer Malicious Library Antivirus AntiDebug AntiVM PE File PE32 .NET EXE VirusTotal Malware powershell AutoRuns suspicious privilege Code Injection Malicious Traffic Check memory Checks debugger buffers extracted Creates shortcut Creates executable files unpack itself Windows utilities Disables Windows Security powershell.exe wrote Check virtual network interfaces suspicious process AppData folder malicious URLs sandbox evasion WriteConsoleW installed browsers check Tofsee Ransomware Windows Browser Tor ComputerName DNS Cryptographic key crashed |
7
https://cdn.discordapp.com/attachments/893177342426509335/899580084757880883/E323B09A.jpg https://cdn.discordapp.com/attachments/893177342426509335/899580081851232277/BE2DE664.jpg https://cdn.discordapp.com/attachments/893177342426509335/899580086141988914/A657F6E6.jpg https://cdn.discordapp.com/attachments/893177342426509335/899580079158485002/9490FC74.jpg https://cdn.discordapp.com/attachments/893177342426509335/899196911062511676/938B601D.jpg https://cdn.discordapp.com/attachments/893177342426509335/899196909166686208/87858A4B.jpg https://pastebin.com/raw/peS2LDTc
|
5
pastebin.com(104.23.99.190) - mailcious cdn.discordapp.com(162.159.130.233) - malware 198.23.172.50 - mailcious 104.23.99.190 - mailcious 162.159.130.233 - malware
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
19.6 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13762 |
2021-10-19 10:10
|
vbc.exe 70e9b753cb1f4f173c75c0d85f5e5a48 Generic Malware Malicious Library UPX PE File PE32 VirusTotal Malware Check memory RWX flags setting unpack itself Remote Code Execution |
|
|
|
|
2.4 |
M |
23 |
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13763 |
2021-10-19 10:10
|
.rundll32.exe 7f092cc4b4eed56b3af2686351f7402e PWS Loki[b] Loki.m RAT .NET framework Generic Malware Socket DNS AntiDebug AntiVM PE File PE32 .NET EXE Browser Info Stealer LokiBot Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware c&c suspicious privilege MachineGuid Code Injection Malicious Traffic Check memory Checks debugger buffers extracted unpack itself malicious URLs installed browsers check Browser Email ComputerName DNS Software |
1
http://63.250.40.204/~wpdemo/file.php?search=475803 - rule_id: 6600
|
1
63.250.40.204 - mailcious
|
6
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
|
1
http://63.250.40.204/~wpdemo/file.php
|
14.2 |
M |
26 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13764 |
2021-10-19 10:11
|
qwerty11111qq.html 156b2455eb724c47be076902ab8b54d7 Antivirus AntiDebug AntiVM PNG Format MSOffice File Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
32
https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png https://resources.blogblog.com/img/anon36.png https://www.google.com/css/maia.css https://fonts.googleapis.com/css?family=Open+Sans:300 https://accounts.google.com/ServiceLogin?passive=true&continue=https://www.blogger.com/comment-iframe.g?blogID%3D8965474558532949541%26pageID%3D4663060867336927382%26blogspotRpcToken%3D5363996%26bpli%3D1&followup=https://www.blogger.com/comment-iframe.g?blogID%3D8965474558532949541%26pageID%3D4663060867336927382%26blogspotRpcToken%3D5363996%26bpli%3D1&go=true https://www.google-analytics.com/analytics.js https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=4663060867336927382&blogspotRpcToken=5363996&bpli=1 https://www.blogger.com/comment-iframe-bg.g?bgresponse=js_disabled&iemode=9&page=1&bgint=NMsfSAB1cPG0QoXXUd-CPn0VjSjqgOnQ9ahJZa2gxKo https://www.blogger.com/static/v1/jsbin/2745582061-cmt__en_gb.js https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js https://www.blogger.com/static/v1/v-css/281434096-static_pages.css https://www.blogger.com/static/v1/widgets/807375071-widgets.js https://fonts.gstatic.com/s/roboto/v29/KFOmCnqEu92Fr1Mu4mxM.woff https://resources.blogblog.com/img/blank.gif https://www.blogger.com/dyn-css/authorization.css?targetBlogID=8965474558532949541&zx=56aedf68-0486-41b6-8e5a-d80afd9d485e https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fmeinajkallunjaisahowawahun.blogspot.com%2Fp%2Fqwerty11111qq.html&type=blog&bpli=1 https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.css https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png https://www.blogger.com/img/share_buttons_20_3.png https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg https://fonts.googleapis.com/css?lang=ko&family=Product+Sans|Roboto:400,700 https://www.blogger.com/img/blogger-logotype-color-black-1x.png https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.js https://www.google.com/js/bg/NMsfSAB1cPG0QoXXUd-CPn0VjSjqgOnQ9ahJZa2gxKo.js https://www.blogger.com/static/v1/v-css/2621646369-cmtfp.css https://fonts.gstatic.com/s/opensans/v26/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4gaVQ.woff https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmWUlfBBc-.woff https://www.blogger.com/static/v1/jsbin/2261764250-comment_from_post_iframe.js https://accounts.google.com/ServiceLogin?passive=true&continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://meinajkallunjaisahowawahun.blogspot.com/p/qwerty11111qq.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://meinajkallunjaisahowawahun.blogspot.com/p/qwerty11111qq.html%26type%3Dblog%26bpli%3D1&go=true https://resources.blogblog.com/img/icon18_edit_allbkg.gif https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=4663060867336927382&blogspotRpcToken=5363996 https://www.blogger.com/blogin.g?blogspotURL=https://meinajkallunjaisahowawahun.blogspot.com/p/qwerty11111qq.html&type=blog
|
16
resources.blogblog.com(172.217.161.41) www.google.com(172.217.31.164) www.gstatic.com(172.217.161.35) fonts.googleapis.com(216.58.220.106) accounts.google.com(172.217.25.77) www.google-analytics.com(142.250.199.110) fonts.gstatic.com(172.217.161.67) www.blogger.com(172.217.161.41) 172.217.31.233 216.58.200.78 142.250.204.131 142.250.207.73 172.217.24.74 142.250.204.68 172.217.161.163 172.217.24.237
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13765 |
2021-10-19 10:12
|
100.exe b7078ac2fca819769a2d21d8e3a3ea15 RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.4 |
M |
7 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13766 |
2021-10-19 10:14
|
New_771008123115.exe 5e4006f91dabad1c5e0ae08e2241775e RAT PWS .NET framework Generic Malware PE File PE32 .NET EXE VirusTotal Malware Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces Tofsee ComputerName |
1
http://apps.identrust.com/roots/dstrootcax3.p7c
|
4
apps.identrust.com(119.207.65.137) store2.gofile.io(31.14.69.10) - mailcious 31.14.69.10 - mailcious 182.162.106.26
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.0 |
M |
27 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13767 |
2021-10-19 10:18
|
11.html 8e3047d1a165713737c10ca4c7420a21 Antivirus AntiDebug AntiVM PNG Format MSOffice File Code Injection Creates executable files RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
22
https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png https://fonts.googleapis.com/css?family=Open+Sans:300 https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fajsidjasidwxoxwkwjddududjf.blogspot.com%2Fp%2F11.html&type=blog&bpli=1 https://www.google-analytics.com/analytics.js https://www.blogger.com/img/share_buttons_20_3.png https://www.blogger.com/static/v1/v-css/281434096-static_pages.css https://www.blogger.com/static/v1/widgets/807375071-widgets.js https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.css https://www.google.com/css/maia.css https://fonts.gstatic.com/s/roboto/v29/KFOmCnqEu92Fr1Mu4mxM.woff https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg https://fonts.googleapis.com/css?lang=ko&family=Product+Sans|Roboto:400,700 https://www.blogger.com/img/blogger-logotype-color-black-1x.png https://accounts.google.com/ServiceLogin?passive=true&continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ajsidjasidwxoxwkwjddududjf.blogspot.com/p/11.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ajsidjasidwxoxwkwjddududjf.blogspot.com/p/11.html%26type%3Dblog%26bpli%3D1&go=true https://www.blogger.com/blogin.g?blogspotURL=https://ajsidjasidwxoxwkwjddududjf.blogspot.com/p/11.html&type=blog https://fonts.gstatic.com/s/opensans/v26/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4gaVQ.woff https://www.blogger.com/dyn-css/authorization.css?targetBlogID=6774392999284712153&zx=2032a8f7-613d-4053-bd21-47de012d84af https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmWUlfBBc-.woff https://resources.blogblog.com/img/icon18_edit_allbkg.gif https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.js
|
16
resources.blogblog.com(172.217.161.41) www.google.com(172.217.175.68) www.gstatic.com(172.217.161.35) fonts.googleapis.com(216.58.220.106) accounts.google.com(172.217.25.77) www.google-analytics.com(142.250.199.110) fonts.gstatic.com(172.217.161.67) www.blogger.com(172.217.161.41) 142.250.207.67 172.217.25.10 142.250.66.100 142.250.207.73 142.250.204.67 172.217.31.233 142.250.204.78 142.250.199.77
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
4.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13768 |
2021-10-19 10:36
|
trend-1158968190.xls 2f51f9ca08ea41c5b2835a0bb1b61344 Downloader MSOffice File RWX flags setting unpack itself suspicious process Tofsee |
3
https://adricarautocenter.com.br/hIIYY6fH/index.html
https://readcentre.org.in/Dfx6lucN1Nn/index.html
https://sacewdtrust.org.in/xaWRjapI/index.html
|
5
readcentre.org.in(192.185.129.109)
sacewdtrust.org.in(192.185.129.109)
adricarautocenter.com.br(192.185.212.213) 192.185.212.213
192.185.129.109 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13769 |
2021-10-19 10:38
|
trend-1159280455.xls 82fc838754595239ae0b9a0deed17a77 Downloader MSOffice File RWX flags setting unpack itself suspicious process Tofsee |
3
https://adricarautocenter.com.br/hIIYY6fH/index.html
https://readcentre.org.in/Dfx6lucN1Nn/index.html
https://sacewdtrust.org.in/xaWRjapI/index.html
|
5
readcentre.org.in(192.185.129.109)
sacewdtrust.org.in(192.185.129.109)
adricarautocenter.com.br(192.185.212.213) 192.185.212.213
192.185.129.109 - malware
|
2
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
3.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
13770 |
2021-10-19 10:41
|
trend-1159085967.xls c52b100b9fda49cbfed66f05b4630592 Downloader MSOffice File RWX flags setting unpack itself suspicious process Tofsee |
3
https://adricarautocenter.com.br/hIIYY6fH/index.html
https://readcentre.org.in/Dfx6lucN1Nn/index.html
https://sacewdtrust.org.in/xaWRjapI/index.html
|
5
readcentre.org.in(192.185.129.109)
sacewdtrust.org.in(192.185.129.109)
adricarautocenter.com.br(192.185.212.213) 192.185.212.213
192.185.129.109 - malware
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
3.6 |
|
|
guest
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|