14971 |
2023-03-10 10:51
|
obinna.exe 8ae859365952e85bec8f7ecd75d56541 UPX Malicious Library PE32 PE File OS Processor Check Browser Info Stealer FTP Client Info Stealer VirusTotal Email Client Info Stealer Malware AutoRuns Check memory Checks debugger buffers extracted Creates executable files unpack itself Check virtual network interfaces AppData folder IP Check Tofsee Windows Browser Email ComputerName Cryptographic key Software crashed |
1
|
2
api.ipify.org(64.185.227.155) 104.237.62.211
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
8.6 |
|
22 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14972 |
2023-03-10 10:48
|
vbc.exe ad0fd8c49bd571cba00267ef88851d73 RAT Generic Malware Antivirus SMTP PWS[m] KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File VirusTotal Malware suspicious privilege Code Injection Check memory Checks debugger buffers extracted Creates shortcut unpack itself Windows utilities suspicious process WriteConsoleW Windows ComputerName Cryptographic key crashed |
|
|
|
|
11.0 |
M |
34 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14973 |
2023-03-10 10:48
|
.win32.exe 1184127cec87d9bce7565f9499eccc69 UPX Malicious Library OS Processor Check PE32 PE File VirusTotal Malware unpack itself Remote Code Execution |
|
|
|
|
2.0 |
M |
29 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14974 |
2023-03-10 07:54
|
Miner.exe 49aa025262bc86dc07774b6364c39f54 PWS .NET framework RAT .NET EXE PE32 PE File VirusTotal Cryptocurrency Miner Malware Cryptocurrency PDB Malicious Traffic Check memory Checks debugger Creates executable files unpack itself Check virtual network interfaces Tor ComputerName DNS |
1
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion.pet/shared/QuakM.exe
|
2
rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion.pet(198.251.84.49) - malware 198.251.84.49
|
1
ET POLICY DNS Query to .onion proxy domain (onion .pet)
|
|
5.2 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14975 |
2023-03-10 07:51
|
STE.exe fde00f70af28ca030e187b4296a0d847 Loki_b Loki_m RAT Generic Malware UPX PWS[m] AntiDebug AntiVM OS Processor Check .NET EXE PE32 PE File VirusTotal Malware Code Injection Check memory Checks debugger buffers extracted unpack itself ComputerName |
|
|
|
|
7.2 |
|
30 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14976 |
2023-03-09 18:14
|
P49A1RKQbr6n5L2G.zip 5ed137665b139baccce1abee74282b81 ZIP Format VirusTotal Malware Report ICMP traffic DNS |
|
11
91.207.28.33 - mailcious 104.168.155.143 - mailcious 91.121.146.47 - mailcious 103.132.242.26 - mailcious 164.90.222.65 - mailcious 182.162.143.56 - malware 72.15.201.15 - mailcious 187.63.160.88 - mailcious 183.111.227.137 - mailcious 167.172.199.165 - mailcious 66.228.32.31 - mailcious
|
5
ET CNC Feodo Tracker Reported CnC Server group 8 ET INFO TLS Handshake Failure ET CNC Feodo Tracker Reported CnC Server group 5 ET CNC Feodo Tracker Reported CnC Server group 7 ET CNC Feodo Tracker Reported CnC Server group 1
|
|
3.4 |
|
7 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14977 |
2023-03-09 17:46
|
Brav.exe 5a26b0142d5f9a8da8dae6c0fb70ad78 UPX Malicious Library OS Processor Check PE32 PE File VirusTotal Malware Checks debugger unpack itself crashed |
|
|
|
|
2.6 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14978 |
2023-03-09 17:44
|
bcd4b93a1a85c5ba45a4f7e5980db1... ae6df34a140bf74860ca3165d50d8705 Emotet Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL VirusTotal Malware Check memory buffers extracted WMI Creates executable files unpack itself AppData folder Tofsee ComputerName crashed |
3
https://xv.yxzgamen.com/logo.png - rule_id: 26104 https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/35.html - rule_id: 26629
|
2
xv.yxzgamen.com(104.21.27.36) - mailcious 172.67.141.51 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
2
https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/35.html
|
4.6 |
M |
25 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14979 |
2023-03-09 17:42
|
bcd4b93a1a85c5ba45a4f7e5980db1... a1c5f268d670ba3a4440647bdeaa3e20 Emotet Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL VirusTotal Malware Check memory buffers extracted WMI Creates executable files unpack itself AppData folder Tofsee ComputerName crashed |
3
https://xv.yxzgamen.com/logo.png - rule_id: 26104 https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/3005.html
|
2
xv.yxzgamen.com(172.67.141.51) - mailcious 172.67.141.51 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://xv.yxzgamen.com/logo.png
|
5.0 |
M |
41 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14980 |
2023-03-09 17:42
|
LEMMIN.exe 38aad33a1f0f90c4294abab2a85221eb Malicious Library PE File PE64 VirusTotal Cryptocurrency Miner Malware Cryptocurrency DNS |
|
2
xmr.2miners.com(162.19.139.184) - mailcious 162.19.139.184
|
1
ET INFO Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com)
|
|
1.4 |
M |
31 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14981 |
2023-03-09 17:41
|
bcd4b93a1a85c5ba45a4f7e5980db1... d5e7b6fe3bb68f1da7ec111231292f02 Emotet Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL VirusTotal Malware Check memory buffers extracted WMI Creates executable files AppData folder Tofsee ComputerName crashed |
3
https://xv.yxzgamen.com/logo.png - rule_id: 26104 https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/3003.html
|
2
xv.yxzgamen.com(172.67.141.51) - mailcious 104.21.27.36 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://xv.yxzgamen.com/logo.png
|
5.2 |
M |
43 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14982 |
2023-03-09 17:41
|
dd_64.exe 9029a43c6034a4f0b3408fd38936beb9 UPX Malicious Library OS Processor Check PE File PE64 VirusTotal Email Client Info Stealer Malware MachineGuid Malicious Traffic installed browsers check Tofsee Browser Advertising Email ComputerName DNS crashed |
2
http://195.123.211.57/g.php https://chromedriver.storage.googleapis.com/LATEST_RELEASE_65
|
5
chromedriver.storage.googleapis.com(142.250.206.208) github.com(20.200.245.247) - mailcious 34.64.4.16 20.200.245.247 - malware 195.123.211.57 - mailcious
|
3
ET INFO TLS Handshake Failure SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
|
|
4.6 |
M |
23 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14983 |
2023-03-09 17:38
|
bcd4b93a1a85c5ba45a4f7e5980db1... e7f609df5c0fcdc581a69ed69aa3c4a1 Emotet Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL VirusTotal Malware Check memory buffers extracted WMI Creates executable files AppData folder Tofsee ComputerName crashed |
3
https://xv.yxzgamen.com/logo.png - rule_id: 26104 https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/27.html
|
2
xv.yxzgamen.com(172.67.141.51) - mailcious 172.67.141.51 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://xv.yxzgamen.com/logo.png
|
5.2 |
M |
42 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14984 |
2023-03-09 17:38
|
vbc.exe 17764f0a8189a2f85bdbac3e1e820fb4 PWS .NET framework KeyLogger AntiDebug AntiVM .NET EXE PE32 PE File Browser Info Stealer VirusTotal Email Client Info Stealer Malware PDB Code Injection Check memory Checks debugger buffers extracted unpack itself Check virtual network interfaces IP Check Tofsee Windows Browser Email ComputerName crashed |
1
|
2
api.ipify.org(64.185.227.155) 104.237.62.211
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
|
10.4 |
M |
33 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
14985 |
2023-03-09 17:36
|
bcd4b93a1a85c5ba45a4f7e5980db1... 24527c1cb60027d91ddc051990ba55ca Emotet Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL VirusTotal Malware Check memory buffers extracted WMI Creates executable files unpack itself AppData folder Tofsee ComputerName crashed |
3
https://xv.yxzgamen.com/logo.png - rule_id: 26104 https://xv.yxzgamen.com/logo.png https://xv.yxzgamen.com/2201.html
|
2
xv.yxzgamen.com(172.67.141.51) - mailcious 172.67.141.51 - mailcious
|
1
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
|
1
https://xv.yxzgamen.com/logo.png
|
4.8 |
M |
36 |
ZeroCERT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|