14161 |
2023-03-29 14:11
|
2.1.0ff.exe bc338e23e5411697561306eabb29bd9c Raccoon Stealer PE32 PE File VirusTotal Malware Windows crashed |
|
|
|
|
2.0 |
M |
45 |
r0d
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14162 |
2023-03-29 13:41
|
XWorm.exe e5dacf4cce4083b88d8f229162800535 RAT UPX OS Processor Check .NET EXE PE32 PE File MachineGuid Check memory Checks debugger unpack itself AntiVM_Disk VM Disk Size Check Windows ComputerName DNS Cryptographic key DDNS |
|
2
koky.ddns.net(20.150.219.159) 20.150.219.159
|
1
ET POLICY DNS Query to DynDNS Domain *.ddns .net
|
|
2.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14163 |
2023-03-29 13:39
|
index.html 3eebb4f2eb87d262969874e1d4685717 AntiDebug AntiVM PNG Format MSOffice File JPEG Format Code Injection RWX flags setting exploit crash unpack itself Windows utilities Tofsee Windows Exploit DNS crashed |
1
https://transfer.sh/get/1mJbdi/Taxpayer.pdf
|
2
transfer.sh(144.76.136.153) - malware 144.76.136.153 - mailcious
|
5
ET INFO TLS Handshake Failure ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY Observed DNS Query to File Transfer Service Domain (transfer .sh) ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in DNS Lookup)
|
|
3.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14164 |
2023-03-29 13:37
|
Taxpayer.pdf af333833c285ea114b841c4e8cde282f PDF VirusTotal Malware |
1
https://transfer.sh/get/1MeR2u/XWorm.exe
|
|
|
|
1.0 |
|
13 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14165 |
2023-03-29 13:33
|
Bna-invoice#149.pdf.hta 052a2a82953e9e96c0c84caffb694e67 Generic Malware Antivirus AntiDebug AntiVM MSOffice File powershell suspicious privilege MachineGuid Code Injection Check memory Checks debugger Creates shortcut exploit crash unpack itself Windows utilities powershell.exe wrote suspicious process Tofsee Windows Exploit ComputerName DNS Cryptographic key crashed |
1
https://529f38d0-3744-4286-b484-be860d475d25.usrfiles.com/ugd/529f38_27182d05f0a34cf98f51abce87b89dcb.txt
|
|
2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET INFO TLS Handshake Failure
|
|
8.4 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14166 |
2023-03-29 13:13
|
da1942e2f5f58ee90618db1cfdbd75... 30bfba59058499f28d7f7de51d41a745 Gen1 UPX Malicious Packer PE32 PE File VirusTotal Malware Remote Code Execution |
|
|
|
|
0.6 |
|
1 |
BRY
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14167 |
2023-03-29 12:04
|
dbStr-2.map.data 9ffc9e085f430a13aed79ee745ff3084 AntiDebug AntiVM Email Client Info Stealer suspicious privilege Checks debugger Creates shortcut unpack itself installed browsers check Browser Email ComputerName |
|
|
|
|
3.4 |
|
|
BRY
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14168 |
2023-03-29 11:09
|
vbc.exe 542ef4a811e2fa45e96efe1602acd737 UPX Malicious Library PE32 PE File FormBook Malware download VirusTotal Malware suspicious privilege Malicious Traffic Check memory Creates executable files unpack itself Windows utilities AppData folder Windows |
3
http://www.rahilprakash.com/sa79/?T8kD=FQxM/LfEtsdNPd9lcQ3fHhWjGCP7SrZqu0I9GJfO6cOgbFH11N56o5A937py/xwkq6yJtR1f&Vnw0Z=-Z2hTbdPQ2dhN4y http://www.oliviahodges04.uk/sa79/?T8kD=3HmUkRFWstZ/xsvvXCVgYJLRrrcnJmgiwegIDeQwZYyLk7GSagwRMPBNdLuE3jtARa50r64A&Vnw0Z=-Z2hTbdPQ2dhN4y http://www.cloud-spartan.co.uk/sa79/?T8kD=jkxHAd9GAbQei4M5qdOAezShFl0g6rfkBT3I54TzQtwvhmYtcfZekS4RyxImys3XUoylJySQ&Vnw0Z=-Z2hTbdPQ2dhN4y
|
7
www.rahilprakash.com(13.248.243.5) www.oliviahodges04.uk(192.0.78.24) www.ndyc.africa() www.cloud-spartan.co.uk(35.227.197.36) 192.0.78.24 - mailcious 35.227.197.36 76.223.105.230 - mailcious
|
1
ET MALWARE FormBook CnC Checkin (GET)
|
|
5.6 |
M |
39 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14169 |
2023-03-29 11:09
|
utd.exe 7c4e7dc9b73afae121b7f83004013971 PWS .NET framework RAT UPX .NET EXE PE32 PE File VirusTotal Malware Check memory Checks debugger unpack itself ComputerName DNS |
|
1
|
|
|
2.4 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14170 |
2023-03-29 11:09
|
RegSvcs.exe 004a919e31049dce0f9b96699cbbec5e PWS .NET framework RAT UPX Malicious Library Malicious Packer OS Processor Check .NET EXE PE32 PE File Malware download AsyncRAT NetWireRC Malware DNS DDNS |
|
4
4-hitler.publicvm.com(207.32.216.119) hitler5573.linkpc.net(142.202.240.126) 207.32.216.119 142.202.240.126
|
4
ET INFO Observed DNS Query to DynDNS Domain (linkpc .net) ET POLICY Observed DNS Query to DynDNS Domain (publicvm .com) ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) ET MALWARE Generic AsyncRAT Style SSL Cert
|
|
1.4 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14171 |
2023-03-29 10:52
|
RegSvcs.exe 7f47c9d043fcec52e995e98d21813482 PWS .NET framework RAT UPX Malicious Library Malicious Packer OS Processor Check .NET EXE PE32 PE File Malware download AsyncRAT NetWireRC Malware DNS DDNS |
|
3
pop12.linkpc.net(15.204.170.1) 15.204.170.1 45.80.158.108
|
3
ET INFO Observed DNS Query to DynDNS Domain (linkpc .net) ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) ET MALWARE Generic AsyncRAT Style SSL Cert
|
|
2.4 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14172 |
2023-03-29 10:50
|
2.1.0ff.exe bc338e23e5411697561306eabb29bd9c PE32 PE File VirusTotal Malware Windows crashed |
|
|
|
|
2.0 |
M |
45 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14173 |
2023-03-29 10:48
|
Tarlatan.exe b26480dce772642635204619f30c35d6 RedLine stealer[m] PWS .NET framework RAT RedLine Stealer Confuser .NET SMTP PWS[m] AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
|
|
9.4 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14174 |
2023-03-29 10:47
|
Tarlatan.exe b26480dce772642635204619f30c35d6 RedLine stealer[m] PWS .NET framework RAT RedLine Stealer Confuser .NET SMTP PWS[m] AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
|
|
9.4 |
M |
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14175 |
2023-03-29 10:46
|
65................65............. 20e82801d2b5b859faab91680dbcb903 MS_RTF_Obfuscation_Objects RTF File doc LokiBot Malware download VirusTotal Malware c&c Malicious Traffic exploit crash unpack itself Windows Exploit DNS crashed Downloader |
2
http://171.22.30.164/china/five/fre.php
http://107.174.45.106/65/vbc.exe
|
2
171.22.30.164 - mailcious
107.174.45.106 -
|
15
ET MALWARE LokiBot User-Agent (Charon/Inferno) ET MALWARE LokiBot Checkin ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 ET INFO Executable Download from dotted-quad Host ET MALWARE MSIL/GenKryptik.FQRH Download Request ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET INFO Packed Executable Download ET MALWARE LokiBot Request for C2 Commands Detected M1 ET MALWARE LokiBot Request for C2 Commands Detected M2 ET MALWARE LokiBot Fake 404 Response ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
|
|
5.0 |
M |
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|