14296 |
2023-03-23 18:39
|
ComPlusMethone.exe cf52142e72a8cae6f9f667b19d098459 PWS .NET framework RAT Anti_VM Malicious Packer .NET EXE PE32 PE File VirusTotal Malware PDB suspicious privilege MachineGuid Code Injection Check memory Checks debugger buffers extracted unpack itself |
|
|
|
|
4.4 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14297 |
2023-03-23 18:39
|
NetSySCLI.exe 367030209dfe9a7f1631b8edad37cfa3 PE64 PE File VirusTotal Malware DNS |
|
1
|
|
|
3.0 |
M |
57 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14298 |
2023-03-23 18:33
|
A1.exe f45a24c4f95ebc9c77e61344b65872f2 RAT UPX OS Processor Check .NET EXE PE32 PE File VirusTotal Malware Check memory Checks debugger unpack itself DNS |
|
1
172.67.34.170 - mailcious
|
|
|
2.6 |
M |
54 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14299 |
2023-03-23 18:32
|
BypassUAC.exe f1171757917bda367914537dec2e5ef2 RAT UPX Malicious Packer OS Processor Check PE64 PE File VirusTotal Malware MachineGuid Check memory Checks debugger unpack itself |
|
|
|
|
2.2 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14300 |
2023-03-23 18:31
|
cipher.exe a1a1af51bcab4d2f25637f6aa32ab493 RAT UPX OS Processor Check .NET EXE PE32 PE File VirusTotal Malware AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger buffers extracted WMI ICMP traffic unpack itself Check virtual network interfaces IP Check Tofsee Windows Discord ComputerName DNS |
2
http://ip-api.com/csv/?fields=status,query https://discord.com/api/webhooks/1056590206893051904/2ybdaA7zXHVKpVJNM5j-1a4lW_FhpBXMYcNGIJpTvJx-GQGX3887N8vX1I_ea-w62qoK
|
6
localbeheaders.mcgo.io(108.16.60.193) discord.com(162.159.137.232) - mailcious ip-api.com(208.95.112.1) 162.159.137.232 - mailcious 208.95.112.1 108.16.60.193
|
4
ET INFO Observed Discord Domain in DNS Lookup (discord .com) ET INFO Observed Discord Domain (discord .com in TLS SNI) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY External IP Lookup ip-api.com
|
|
8.6 |
M |
44 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14301 |
2023-03-23 18:30
|
fotocr.exe 86b64b82769fd641a3664ee102cd2f60 UPX Malicious Library OS Processor Check PE32 PE File PDB unpack itself Remote Code Execution |
|
|
|
|
1.2 |
M |
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14302 |
2023-03-23 18:29
|
ConPtyShell.exe ce43d05a16369e03f1ee9e997bce44f6 RAT UPX Malicious Packer Antivirus .NET EXE PE32 PE File VirusTotal Malware Check memory Checks debugger unpack itself DNS |
|
1
|
|
|
2.4 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14303 |
2023-03-23 18:28
|
NRATNew.exe ca6a4db4964f4475bed525178ad92f0c RAT Malicious Packer .NET EXE PE32 PE File GIF Format VirusTotal Malware AutoRuns suspicious privilege Check memory Checks debugger Creates shortcut Creates executable files unpack itself AppData folder Windows ComputerName Cryptographic key keylogger |
|
2
localbeheaders.mcgo.io(108.16.60.193) 108.16.60.193
|
|
|
7.6 |
M |
52 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14304 |
2023-03-23 18:27
|
creal.exe 2120b49043ad53c0a73cbf60bc110f8e Gen1 Emotet Generic Malware UPX Malicious Library Anti_VM Malicious Packer Admin Tool (Sysinternals etc ...) OS Processor Check PE64 PE File DLL ZIP Format VirusTotal Malware Check memory Creates executable files |
|
|
|
|
2.0 |
|
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14305 |
2023-03-23 18:27
|
nettaskcipher.exe 64557121d459383777f4c4f5c611e59b RAT Generic Malware UPX Antivirus OS Processor Check .NET EXE PE32 PE File VirusTotal Malware powershell AutoRuns suspicious privilege MachineGuid Malicious Traffic Check memory Checks debugger Creates shortcut Creates executable files unpack itself Windows utilities Check virtual network interfaces suspicious process AntiVM_Disk WriteConsoleW IP Check VM Disk Size Check Tofsee Windows ComputerName DNS Cryptographic key |
2
http://ip-api.com/csv/?fields=status,query https://pastebin.com/raw/fB4ZyQEn
|
6
0.tcp.eu.ngrok.io(3.125.102.39) pastebin.com(104.20.67.143) - mailcious ip-api.com(208.95.112.1) 208.95.112.1 3.125.102.39 172.67.34.170 - mailcious
|
3
ET INFO DNS Query to a *.ngrok domain (ngrok.io) SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET POLICY External IP Lookup ip-api.com
|
|
10.6 |
M |
53 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14306 |
2023-03-23 18:25
|
g02.exe 9f488e91936c3e39d4c8d9923d067cf6 PWS .NET framework RAT UPX .NET EXE PE32 PE File VirusTotal Malware Check memory Checks debugger unpack itself ComputerName |
|
|
|
|
1.4 |
|
6 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14307 |
2023-03-23 18:24
|
rumf61h.exe 0fba69e599437eb61d2abc86569621be RedLine stealer[m] UPX Malicious Library Malicious Packer AntiDebug AntiVM OS Processor Check PE32 PE File Browser Info Stealer FTP Client Info Stealer VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted unpack itself Collect installed applications installed browsers check Windows Browser ComputerName DNS Cryptographic key Software crashed |
|
1
|
|
|
10.0 |
|
50 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14308 |
2023-03-23 15:26
|
Pass_1234_Setup.rar 37262ca3a1d563877f4324ee75b6facb PWS[m] KeyLogger Escalate priviledges AntiDebug AntiVM Malware download Malware RecordBreaker suspicious privilege Malicious Traffic Check memory Checks debugger Creates executable files unpack itself Stealer Windows DNS |
10
http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue.dll http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3.dll http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3.dll http://185.181.10.208/ http://185.181.10.208/26556a0c2e4bbf69b06c173ce1681609 http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140.dll http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll http://185.181.10.208/8e0966e25decf295f67dfe9904e292d5 http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140.dll http://185.181.10.208/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3.dll
|
1
|
5
ET MALWARE Win32/RecordBreaker CnC Checkin M1 ET MALWARE Win32/RecordBreaker CnC Checkin - Server Response ET INFO Dotted Quad Host DLL Request ET POLICY PE EXE or DLL Windows file download HTTP ET HUNTING Possible Generic Stealer Sending System Information
|
|
3.8 |
|
|
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14309 |
2023-03-23 13:30
|
vbc.exe d26e9a9ca834081f9decb5cdb0c10065 PWS .NET framework RAT Generic Malware Antivirus SMTP PWS[m] KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer Malware download FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware PDB suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities Check virtual network interfaces suspicious process WriteConsoleW IP Check Windows Browser Email ComputerName DNS Cryptographic key DDNS Software crashed keylogger |
1
http://checkip.dyndns.org/
|
2
checkip.dyndns.org(193.122.6.168) 193.122.130.0
|
5
ET MALWARE 404/Snake/Matiex Keylogger Style External IP Check ET POLICY External IP Lookup - checkip.dyndns.org ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns .org Domain ET INFO DYNAMIC_DNS Query to a *.dyndns .org Domain ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
|
|
15.0 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14310 |
2023-03-23 13:27
|
19............................... 8be240ea9814810a1c8a8754595b28b5 MS_RTF_Obfuscation_Objects RTF File doc Malware download VirusTotal Malware Malicious Traffic RWX flags setting exploit crash IP Check Windows Exploit DNS DDNS crashed keylogger Downloader |
2
http://checkip.dyndns.org/
http://104.168.46.107/219/vbc.exe
|
4
checkip.dyndns.org(193.122.130.0) 1.12.242.71 - malware
158.101.44.242
104.168.46.107 - mailcious
|
12
ET INFO Executable Download from dotted-quad Host ET MALWARE MSIL/GenKryptik.FQRH Download Request ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 ET INFO DYNAMIC_DNS Query to a *.dyndns .org Domain ET INFO DYNAMIC_DNS Query to *.dyndns. Domain ET POLICY PE EXE or DLL Windows file download HTTP ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response ET MALWARE 404/Snake/Matiex Keylogger Style External IP Check ET POLICY External IP Lookup - checkip.dyndns.org ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns .org Domain
|
|
5.4 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|