Quantcast
Channel: Cisco Talos Blog
Viewing all articles
Browse latest Browse all 2039

Threat Roundup for May 31 to June 7

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 31 and June 07. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Cerber-6984447-1
    Malware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Malware.Ircbot-6984710-0
    Malware
    Ircbot, also known as Eldorado, is known for injecting into processes, spreading to removable media, and gaining execution via Autorun.inf files.
     
  • Win.Malware.Kovter-6985541-0
    Malware
    Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Malware.Lokibot-6987581-1
    Malware
    Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
     
  • Win.Malware.Remcos-6985941-1
    Malware
    Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. Remcos is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
     
  • Win.Malware.Tofsee-6988429-1
    Malware
    Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
     
  • Win.Packed.Zbot-6986485-1
    Packed
    Zbot, also known as Zeus, is trojan that steals information such as banking credentials using methods such as key-logging and form grabbing.
     
  • Win.Ransomware.Sage-6987538-1
    Ransomware
    The Sage ransomware encrypts files and then demands a payment for the files to be recovered. Sage typically spreads via malicious email attachments, and the encrypted file extensions vary.
     
  • Win.Worm.Vobfus-6986418-0
    Worm
    Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
     


Threats

Win.Malware.Cerber-6984447-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 21
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\16000009 19
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\16000009
Value Name: Element
19
<HKCU>\Printers\Defaults\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 19
<HKCU>\PRINTERS\Defaults 19
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000e0 19
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000E0
Value Name: Element
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: Run
19
<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
Value Name: AutoRun
19
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MuiUnattend
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: MuiUnattend
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: takeown
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EhStorAuthn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: EhStorAuthn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ntoskrnl
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: ntoskrnl
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: UserAccountControlSettings
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: UserAccountControlSettings
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pcaui
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: pcaui
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eventvwr
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: eventvwr
1
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}19
\BaseNamedObjects\shell.{5B5347A7-9806-3802-3FD9-E106D6283088}2
\BaseNamedObjects\shell.{2DA495A3-711D-597E-268E-77F8D29EB324}1
\BaseNamedObjects\shell.{A90EDFAB-A502-430E-BDBC-2A277AABA37D}1
\BaseNamedObjects\shell.{5B932A48-D5E6-DC9D-1CCC-8C4A4EFDFAEB}1
\BaseNamedObjects\shell.{641070EF-FED1-8B40-20B1-757459DEA0E7}1
\BaseNamedObjects\shell.{85890FA8-4651-7F6B-96B4-C1A19F5B4623}1
\BaseNamedObjects\shell.{1095E0BC-41F3-CF2A-1232-3CB5F90C4677}1
\BaseNamedObjects\shell.{F1DB17FA-39DB-DA6E-6E05-AC596D3CADD5}1
\BaseNamedObjects\shell.{298948D1-70B9-FF20-23B0-FFCF5A6170CF}1
\BaseNamedObjects\shell.{6B756908-BAD6-5676-BEB4-1AF11E0335F1}1
\BaseNamedObjects\shell.{31C26804-8082-BCD2-AE9A-2E0E343C4A11}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
85[.]93[.]0[.]3819
85[.]93[.]0[.]3919
85[.]93[.]0[.]3619
85[.]93[.]0[.]3719
85[.]93[.]0[.]3419
85[.]93[.]7[.]23419
85[.]93[.]0[.]3219
85[.]93[.]0[.]3319
85[.]93[.]6[.]2419
85[.]93[.]6[.]2519
85[.]93[.]5[.]1019
85[.]93[.]5[.]1119
85[.]93[.]6[.]24419
85[.]93[.]6[.]1619
85[.]93[.]6[.]1719
85[.]93[.]6[.]1819
85[.]93[.]6[.]1919
85[.]93[.]6[.]2019
85[.]93[.]6[.]2119
85[.]93[.]6[.]2219
85[.]93[.]6[.]2319
85[.]93[.]6[.]16919
85[.]93[.]5[.]7219
85[.]93[.]3[.]2019
85[.]93[.]2[.]7119
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io19
Files and or directories createdOccurrences
%HOMEPATH%\NTUSER.DAT19
%HOMEPATH%\ntuser.dat.LOG119
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}19
%System32%\Tasks\MuiUnattend2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\MuiUnattend.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\MuiUnattend.exe2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\UserAccountControlSettings.exe1
%System32%\Tasks\UserAccountControlSettings1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\pcaui.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\pcaui.exe1
%System32%\Tasks\pcaui1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\w32tm.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\w32tm.exe1
%System32%\Tasks\w32tm1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\eventvwr.lnk1
%System32%\Tasks\eventvwr1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\wuapp.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\wuapp.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\bitsadmin.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\bitsadmin.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\certreq.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\certreq.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\mtstocom.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\mtstocom.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\autochk.lnk1
See JSON for more IOCs
File Hashes
  • 12c882e47ae5e2ef9e3621b1d8a719458041ce6f1ed38b370c45c821a5e8c59b
  • 12ec0e3ccef67f877fefce823785ac7d7dbb0f85f8ad001bdf7fc6bfe46e3981
  • 18ca84623943190fa4ac1f756742b2ae30666d74acc7deee679b3a91bbd75e6f
  • 20b9ff24148baa96dbe1a0a7a48bbbeada81598988ee10605ebb21b139359e09
  • 24e2f47a00dba0b61b7ef2994f56318cc775c6fab40ad232598cebf0410b3da8
  • 30731c843ed73bf36620d943ddce0a0237d8694b7afb212541e2e91416096b2b
  • 33b70cc445e8fa02e56ea688be53f7c2993826388539adf7bf48fef3c45995a7
  • 341e0f811782bc5c95e195f6f4d88de2aece469919de8c2c7b61794f99f40d82
  • 4c3c95c99f5d583e2bbf8fb237e55aee3595dcdf24096dc0336190a067487e15
  • 4f5e962ece139e2478863ad05e2d92ed0f8d37c98616faa2338adb84efe99744
  • 5b54c5a4b56149231c5b2c0b9f0f40e226a4a198c9081068d245320f502fb439
  • 6179ede1ad0a80f932189cf1035fe8fe2329b4bde4ccdfcc1d3cbec15179d2b7
  • 692772293eb858cc1aa0bc9844448d3330a057992453e6a75e0a20e528ee4c6b
  • 734e3caad97e6edc7e62687d5a8a4628348ee24726938204779f3f5eb7a0f400
  • 80616c2ddd1a8c4e8be8c6053a905c9687e1f83336cc5661dca04c5ffb056afe
  • 825848fa43ac2ea280104225d930c7c85f33700c51528113295e75c8dc160aec
  • 9721c8e97b3ba15a00de9ab4dbcc0d3236253b5bb73f2b3e9d4f57c7ed3dd922
  • c381125d95a755659683f75fbf32b57546d7ef099e266ca1c00a305a1938736f
  • d9cf96f1f2dd702e618982028129009100e88e30c325775f98e77df4bf907af1
  • dc7f0f8206c6b155e04cca65f269b7f2a2238297e9782c4605ecd5cf5eb5d8a7
  • f378761bf7237c3355845ae18cc335b384e4ea7ba5f8ec1deea3fc59e3880050
  • fa754655007b7b726ede666f2838940ea89d3349dd9c1278a8c998e2eecda3e3
  • ff4ab281a403144dcd8fcf788e5421e739276389fcfe5cf31c708257d0474799

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Malware.Ircbot-6984710-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
43
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
43
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
43
MutexesOccurrences
b243
\BaseNamedObjects\b23
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
220[.]181[.]87[.]8043
64[.]70[.]19[.]20343
216[.]160[.]207[.]1043
35[.]231[.]151[.]726
35[.]229[.]93[.]4617
69[.]49[.]96[.]162
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ageihehaioeoaiegj[.]su43
aefobfboabobfaoua[.]ru43
oeihefoeaboeubfuo[.]su43
eghoabeogbuaeofua[.]su43
abvainvienvaiebai[.]ru43
eghoabeogbuaeofua[.]ru43
iapghahpnpnapcipa[.]ru43
oeihefoeaboeubfuo[.]ws43
goiaegodbuebieibg[.]ru43
iapghahpnpnapcipa[.]ws43
ageihehaioeoaiegj[.]ru43
siiifibiiegiiciib[.]su43
oeihefoeaboeubfuo[.]ru43
aefobfboabobfaoua[.]su43
abvainvienvaiebai[.]su43
rohgoruhgsorhugih[.]ru43
rohgoruhgsorhugih[.]su43
siiifibiiegiiciib[.]ru43
oeabocbeogoaehgoi[.]ru43
rohgoruhgsorhugih[.]ws43
oeabocbeogoaehgoi[.]su43
iapghahpnpnapcipa[.]su43
goiaegodbuebieibg[.]su43
murphysisters[.]org[.]murphysisters[.]org2
www[.]murphysisters[.]org2
Files and or directories createdOccurrences
\??\E:\autorun.inf43
\autorun.inf43
\??\E:\_43
\.lnk43
\??\E:\DeviceConfigManager.vbs43
\??\E:\_\DeviceConfigManager.exe43
\DeviceConfigManager.vbs43
\_\DeviceConfigManager.exe43
\??\E:\DeviceConfigManager.bat43
\DeviceConfigManager.bat43
%SystemRoot%\M-505072059727972903797235092043
%SystemRoot%\M-5050720597279729037972350920\winmgr.exe43
\??\E:\.lnk41
%TEMP%\phqghumeay30
%TEMP%\edakubnfgu29
%TEMP%\rgjqmvnkyr26
%TEMP%\gwhroqkhwu25
%TEMP%\tubjrnmzyu.bat2
%TEMP%\eakjohgdtz.bat1
%TEMP%\roomnvjngg.bat1
%TEMP%\ynyfoqgvhz.bat1
%TEMP%\sypfjdusmt.bat1
%TEMP%\inwumejvuz.bat1
%TEMP%\euywrsbhrm.bat1
%TEMP%\jorljhwyxb.bat1
See JSON for more IOCs
File Hashes
  • 02fb71eb8559f95fd9d1bc2a31b119306c15a0921ab79101bc35e5ee1729e873
  • 0373f392e0cf0ec8a14fdf48a157cbbca1554960b0475724f45a80aae88932f3
  • 0851ddc919f0ea470c3c23e296b6a76b378678364d63a119f6ebab2779e75c00
  • 0b30c46cb7774dfa26d40809d4a665ba733364f3e9768314f5ac258c1ca2b213
  • 0e455cc4d487203ed86f96707ddcf09546c523b14238b003959d29db80db022a
  • 1538cc3c6f059ee7b734150f5e8eab97739c226119edd8b07c543ac77fc68ca5
  • 15647f00761bb8ff63128c4af1e1277e69b4f51c627779259833c6e2d474aea0
  • 168070acbb2cb5200981e8d0dbed8255bb389feef078162f1ba140dc3ea33553
  • 16eae34bfa90161d7948d421636687c4b2e7cd4bf66d33dc27da05370f1f1cdd
  • 1b0cff388754655704d76af041b56978edd261dd7c2bb8a64a7a79a808312e00
  • 1db1f2b0cf7c31206624f21c76587f97e41797d4b034e60577167c751a41c9d7
  • 1f9c1401a3d5279386e59811bd6a916fd555d0ce2701f955110cf548219f64f8
  • 1ffc4c395bbb6a3a25b17845a5bf7d897e7c9455c29a7d930607dddb1539f72e
  • 22e62621d215f605a6ad76325c08c8ade8a78a55411fad1e4081e0406069404d
  • 2a9836c84b839afa60b4fec08b0285404b065a596458237bdbadd9937b637ae2
  • 2d2d8936c9f938e60799545e538bc2397f1c2db0d5bf6a8e8afbb7cd561a81f5
  • 2d32b4679e6550adb81a453813e8a820f9d61133d946a32035a4ec3ab566e421
  • 2d5beaf3e2779270c8b6c3c9d288a64f53e4065104d6806438178f1283ed1c21
  • 2da6a2799761b83b1206e7dab4d590dfb689af837cf3ac66fa3e58bb8484ee21
  • 343054da58235802ed6126128c9b5d1017e32f0831ed5bc09748c0c3707d5433
  • 3451ccb4bdf160e6150d3f1f4ed55dc943544780edcef3098283e41502c8b4ab
  • 368ff13ab0807019f61b3ab0ee083c2ab701151582fd59e3b055be3f4e2c63ed
  • 36dc719c3e47172a121189c734406055df92e986d1e202769a2432191f028bf1
  • 386fdf3836ad5b3bf1588e6b40700abdc69eb793cfe7c6f36895da751944d2bb
  • 3a6e2efe8331037681da5ee01f8deb8aa7cd9960b21f5975aef7d876f7e82b86
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Kovter-6985541-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
25
<HKLM>\SOFTWARE\WOW6432NODE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 25
<HKCU>\SOFTWARE\fc6a75be78 25
<HKLM>\SOFTWARE\WOW6432NODE\fc6a75be78 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUpgrade 25
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0521341d
25
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0521341d
25
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: b5e001e3
25
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: b5e001e3
25
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: bca7705c
25
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: bca7705c
25
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0905afc0
23
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0905afc0
23
<HKLM>\SOFTWARE\WOW6432NODE\E75950E48E5A494D2B 1
<HKLM>\SOFTWARE\WOW6432NODE\0oCEoq 1
<HKLM>\SOFTWARE\WOW6432NODE\98LFDHTIH
Value Name: FeWPlOewHO
1
<HKLM>\SOFTWARE\WOW6432NODE\E75950E48E5A494D2B
Value Name: 7CAC0591BC7764C7382
1
<HKLM>\SOFTWARE\WOW6432NODE\98LFDHTIH
Value Name: p6gawa3
1
<HKCR>\RATHF\SHELL\OPEN\COMMAND 1
<HKCR>\.XJJWQ8S 1
<HKLM>\SOFTWARE\WOW6432NODE\0OCEOQ
Value Name: YcaGv7s
1
<HKLM>\SOFTWARE\WOW6432NODE\0OCEOQ
Value Name: gG1npQtvrW
1
<HKLM>\SOFTWARE\WOW6432NODE\5C8B173AEDDAD6407C3D 1
MutexesOccurrences
C59C87A31F74FB5625
Global\42EDC1955FE17AD425
0D0D9BEBF5D08E7A25
1315B41013857E1925
\BaseNamedObjects\BAD24FA07A7F6DD924
\BaseNamedObjects\863D9F083B3F4EDA24
\BaseNamedObjects\Global\EE662FBC96CBCB1A24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
99[.]19[.]28[.]1501
33[.]162[.]102[.]1251
152[.]71[.]205[.]881
25[.]4[.]98[.]571
180[.]222[.]21[.]2481
125[.]197[.]146[.]1261
1[.]75[.]211[.]461
164[.]202[.]251[.]111
149[.]126[.]117[.]2121
6[.]104[.]211[.]1141
169[.]78[.]132[.]231
46[.]130[.]20[.]791
187[.]185[.]88[.]91
217[.]134[.]228[.]741
156[.]244[.]226[.]391
70[.]181[.]27[.]1141
142[.]72[.]113[.]2501
187[.]78[.]253[.]2021
46[.]171[.]247[.]911
146[.]148[.]18[.]1371
51[.]145[.]9[.]511
190[.]43[.]97[.]881
152[.]195[.]236[.]1641
191[.]169[.]221[.]131
213[.]55[.]97[.]1761
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
cpanel[.]com1
etp[.]adilet[.]gov[.]kz1
Files and or directories createdOccurrences
%LOCALAPPDATA%\epobuj1
%LOCALAPPDATA%\epobuj\0qIkSdDC.V0Eq5OI1
%LOCALAPPDATA%\lyza1
%LOCALAPPDATA%\lyza\CdxtVr.frbnvz1
%LOCALAPPDATA%\zamem1
%LOCALAPPDATA%\zamem\tOLe1R7o.SeYQX1
%LOCALAPPDATA%\jyde1
%LOCALAPPDATA%\jyde\OAws9tY.gXnWQL7wx1
%LOCALAPPDATA%\umove1
%LOCALAPPDATA%\umove\tX0S.dyCX7y1
%LOCALAPPDATA%\ojoc1
%LOCALAPPDATA%\ojoc\zurK74.xJjWq8s1
%LOCALAPPDATA%\pyrul1
%LOCALAPPDATA%\pyrul\Mo3j.DWTa0cV1
%LOCALAPPDATA%\bebet1
%LOCALAPPDATA%\bebet\iIKL9U.DGsvEB1
File Hashes
  • 00bd28d59cb4b7018516410c9664eec2eefe7adba447a37edb587d4829eb760d
  • 037385b8865ee894bf36cdce3b370265b7da03447b3b4e18dd72d114330e9942
  • 039c52e2bd728ba1ac902a0f4af7363d28aced0ba6f5622fbd0e118d959f59b2
  • 065d2473aa32a471228eba99fd58773ee61a634e4f2466b69f6f9c2c94ae56d3
  • 08e337c9f049aa7529aa727fcb8898d1eb2bf14d4b656af95d740e07d7ef9b67
  • 0adc56352600d4dd0a413986ffa45cbeaf04b973abdbd86c9b0c87a53440e294
  • 10f8c098454c63c90a986d037d571d055f5174a00e1f380931157a84ecdc2c01
  • 18b1f735465a3b6fba65570dbe125f10b8489587410a872973216ec853cb125b
  • 1e663349f267cef450ab939b3904bdd33e0809f9080235241929e09fb7b770ae
  • 270d791b5a9c8f7723563afffcb54932ee840920c7b68bed13d8c7aa689190ff
  • 2ca4a4be4d6975d74bb50303fa61c453ae539c6982f88ac38553b7a7ca512813
  • 3057b5a29b5ef78d36bce0c6c31ec2300f8c0ffdd67fc9f5efd7e3b1f00aa04a
  • 334afefc5c14d97cd3af6ab570691d73c23b2c257fd988502a08fec02fc6f7b7
  • 33a640afd9288415aff6de8ef74b85c1879784be2b73dd0900ab00d06dd519c0
  • 3680469ac286cfb7a9ef01f31b5703cfdb965550dba9170d0d60a93ab316cb9a
  • 36d13de18cddc5dcfb7bb8bb9e946c6c77a26be5e7098c1303e70db9f24511fd
  • 39af3ab5ef14b0dd3adc7b2bffa4a344bf19caf9b3d9e9d4c78afab321466f8d
  • 39c7f1118753de1bed52953ab491652c807970d42eff5f5366c3936a297f9220
  • 3b7be616a488f39465e822097aedc82aec3b05e730bcd22e1d5d57e64227439e
  • 3e653e5fbeda3f17ea2e35f2456769710d3210940f157fe25a18026943cef643
  • 3ed50e60a4117ffb607a4843f95df60f6cacbc29498f05371073ae06a562dfc3
  • 3fea545cce296bbbeb27176f2ce630493d3b680f789effa6d9dc26478d5f00cb
  • 449d58bad679912feee287ed8e17ce6221bc61432707e9f189490119bcb9a76d
  • 5263e898133a652e1e0ff1c94919d31c4c3da2bb1bf2fdbf876ba1dd18a01502
  • 56b0d6771543530d8a49ff3e8581f0a81330500ca9e6794a15f6876a394285f7
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Malware.Lokibot-6987581-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
2
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASAPI32 2
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASMANCS 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileDirectory
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileDirectory
2
<HKCU>\SOFTWARE\Microsoft\Protected Storage System Provider\S-1-5-21-2580483871-590521980-3826313501-500 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
1
<HKCU>\Software\Microsoft\Windows Script Host\Settings 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: deaqsdegdd
1
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\U6T0UXHWPB 1
MutexesOccurrences
3749282D282E1E80C56CAE5A19
-1
eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-21-2580483871-590521980-3826313501-5001
d19ab989-a35f-4710-83df-7b2db7efe7c5{846ee340-7039-11de-9d20-806e6f6e6963}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
87[.]251[.]88[.]305
87[.]251[.]88[.]274
93[.]158[.]134[.]382
47[.]254[.]177[.]1552
87[.]251[.]88[.]282
87[.]251[.]88[.]192
69[.]195[.]146[.]1301
104[.]16[.]154[.]361
104[.]16[.]155[.]361
192[.]185[.]129[.]1091
185[.]29[.]9[.]2461
5[.]253[.]62[.]2141
149[.]129[.]242[.]1471
104[.]31[.]83[.]2471
37[.]120[.]146[.]1241
37[.]120[.]146[.]1221
84[.]234[.]96[.]911
145[.]239[.]202[.]1091
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
doosantax[.]com4
bridgecornenterprises[.]com3
smtp[.]yandex[.]com2
whatismyipaddress[.]com2
unimasa[.]icu2
ip-api[.]com1
OK1
sas-agri[.]ml1
SIBARZZ[.]XYZ1
plutonav[.]ru1
bestbtcchange[.]com1
officialhillcoms[.]ga1
beatfile01[.]ml1
freecaps3[.]ml1
flmates[.]com1
www[.]dlamaqperu[.]com1
lronman4x4[.]com1
apollocapitalp[.]com1
Files and or directories createdOccurrences
%ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol23
%LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol23
%APPDATA%\D282E119
%APPDATA%\D282E1\1E80C5.lck19
%APPDATA%\pid.txt2
%APPDATA%\pidloc.txt2
%TEMP%\holdermail.txt2
%TEMP%\holderwb.txt2
%ProgramData%\freebl3.dll1
%ProgramData%\mozglue.dll1
%ProgramData%\msvcp140.dll1
%ProgramData%\nss3.dll1
%ProgramData%\softokn3.dll1
%ProgramData%\vcruntime140.dll1
%TEMP%\deaqsdegdd\deaqsdegdd.exe1
%TEMP%\deaqsdegdd\deaqsdegdd.vbs1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Soft\Authy1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\ElectronCash1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\Electrum1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\ElectrumLTC1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\Ethereum1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\Exodus1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\JAXX1
%ProgramData%\4O1XVHRT01HDEJRSE1PVNWXU7\files\Wallets\MultiDoge1
See JSON for more IOCs
File Hashes
  • 21ea64cf87a724414eaaa6cc7a69a38cebef6b5507084f036b486adb3f805417
  • 25fa58e7d7821ca2c5cdb947422289eae7d3909efc9455a7a5ef4e476947f4ce
  • 30120ab8f904030dcd4748b4b5edc38f9437ee18d582ffd86c63882ef0afc1e5
  • 33527e13eaf4f1ad749a5d00e5f2f8c06e55503a492cdd3a2a01bebc79360aa3
  • 39bd8e2feb6ff6b4b8d25f5e8f9e2e413d7df9241c9effde6cf5c074b0360964
  • 425b00366b5e0bbcbecaa17a6f3767ce182d10cb54d14b8146d60795e0a91b4a
  • 45332fc059e1f72e4c9c27bd61e33b9af765299f3685bc1e33e31dae5206311b
  • 46773272beedf1cbcd61b41e399df8c437d8c915e3f942115eaa48c5a44af025
  • 4e59cb8c79d9dd7964e5319be30a91b8dee1744054e6e7c470717dab91c95905
  • 527eee4d3d2df6305545a95c33e17524a22464ba921f5091489bc776287e9082
  • 618c7974abfa637082c14b741cab9c859f0ea5ef9cb7517824d5c956886b9959
  • 6f86b9a80e340cae7b6ce7c70b06f7237c54019c37faa9dd888b57fe15568d6c
  • 72394394c1b0b5d02fe6e362fd07940a6d69551fa7fcacef03c0d82f41fc8fbc
  • 83ad9a9b79964ccec70ccf12c7e01c0ea6ea0dcf391dd2ac014d2381e1ba42f1
  • 90836122fddbc258f491d097e53e155258999cee41fe1550c78354aa3c8f2e04
  • 98a3e55133d7a23d343f2d690650e5579e485500447f0fff3e0e23f29c9fa86f
  • 9ad80c24445040b882abd94406f5bd389ab83b400ac4177687e653277788d7f3
  • a493e9a4662dabc9083cde701821e1df98e499dd9404f49dbedbe3f55fedd764
  • c6605ed53413e717e788b8f551455a1f9e94a313ebd00613fac0c63f7bfb920f
  • cce98d91043e66d5b85e536b8864e604d2b26566a8d875dda21e93f51efc6f71
  • dc9c4bb8db7e3b0d26dab3572df9ab97cd0218c14a17621104c2a6c095a61f40
  • dd33d5c467751e8f531bd557cc74f91619d43e3c8ebd1a516c339f33d3be9ac3
  • e25beccc8caa3518794a0ba5edbdc99916a66cee94fd55e25d9d34a23420bbe0

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Malware.Remcos-6985941-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\remcos_jpetmoenqu 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: srvs
21
<HKCU>\SOFTWARE\REMCOS_JPETMOENQU
Value Name: EXEpath
18
MutexesOccurrences
\BaseNamedObjects\remcos_jpetmoenqu25
Remcos_Mutex_Inj21
remcos_jpetmoenqu21
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
213[.]208[.]129[.]21325
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%TEMP%\install.bat25
%HOMEPATH%\MdRes25
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\RmClient.url25
%APPDATA%\WindowsApp\logs.dat25
%APPDATA%\WindowsApp\srvs.exe25
%HOMEPATH%\MdRes\RmClient.vbs25
%HOMEPATH%\MdRes\klist.exe25
%HOMEPATH%\Start Menu\Programs\Startup\RmClient.url25
%APPDATA%\WindowsApp21
File Hashes
  • 2d0c8f189df656a4eb6e0352bd32fb21c3afbce9ea7c345550386ce0127c320a
  • 30f9c76cd44a579c337269351ab40daf575e5996769cf23ab9a0047663593809
  • 33baecfca9dcc0ad6c662a1df86a3ee2e97a9c042e6951145a1139674ee040ad
  • 430d466c1c81f8b680b5e8d57eb696a1c09efc0727009ee3412698bdbd77cede
  • 4ee4c01b513f59cef746c45b14b8211597937dfba27fb58b5e003fe97b7c87ce
  • 516aee696300bb4b56085134b659caa5800a89badc46fc6611864ff5e79ca872
  • 561a586d20b38ac2bac223d970186c02bacfdca09c96fe7d41125483b0a583d0
  • 6319c58313ab6b8172994320d5ae1c16dc3e0cd1462d10eddc1244dc2573b987
  • 68df7e2ac8625213080dad97fb015f78d0a7cbcf560e1d118879a7c949cf2eb4
  • 7f3e2f8ba14f4f08655e53d1e4daf2fd581e58a444c8c66c57292e28fdde1afc
  • 876ba61de5a3feb2e34181bc9a6e1197e70215b51cc169126c2d0bf0bb7588d4
  • 8eca101db0d90f835dce7436a4e36f786694950a27eef3bfcbc458a347118f3f
  • 9d3547fe7517b3a9cd60eb408e9233273433bcd1bf86093ee7040f8162e54b9a
  • a280c5a73c7388441c7b06d600fd0237cce304d02b93a80a88dff73e1e1fbcc8
  • abd1175388917b260096ca11cc3a8c3e56425abd0dc04650f528ad1669214923
  • b67255713feb497e145187f505da1cb42becbc0684f2b23efb1bbeff2f2f7431
  • b95ea3839a21dfeac94eb4f21efd35d2f1652a7e4c7f65b08bdc846685a7de44
  • c5f806ef8bdaec76e4b022eac1386fd7954522542e7ce21afbc7f7e848d35e12
  • cc5535a4f201268e7a60692d4b21f2da0478771f6fd3379b43f36dbd13d0a2d3
  • d47300165d3868f3b9ad434e8256a950ba2d83a5b71a684000fda9bdbd673585
  • e3fa269a38eea19a1d0e8fbdf9432347109a365378afe16a77fe5956e825ae53
  • effec65407157ad26d5bea08a1def289630078e9c88e4fc70b1e11f83836476d
  • f601204c1446b69b8a5606eb6bfe4e8bded5287513a1beab99160d0495e79f4f
  • f67262db3cd9ff311c83c274b4498a60147316ba82b8e91b16bd2292082c3ff5
  • fa6030698b41b7d260a55312fd83746df4c79d3f86e4c565ae170414d79b1642
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Tofsee-6988429-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 17
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 17
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 17
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 17
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 17
<HKU>\.DEFAULT\Control Panel\Buses 17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
17
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
17
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\dwkqpxds
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\dwkqpxds 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: ErrorControl
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: ObjectName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DWKQPXDS
Value Name: Description
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\rkyedlrg
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\rkyedlrg 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\RKYEDLRG
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\RKYEDLRG
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\RKYEDLRG
Value Name: ErrorControl
2
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25017
69[.]55[.]5[.]25017
46[.]4[.]52[.]10917
176[.]111[.]49[.]4317
85[.]25[.]119[.]2517
144[.]76[.]199[.]217
144[.]76[.]199[.]4317
43[.]231[.]4[.]717
192[.]0[.]47[.]5917
94[.]23[.]27[.]3817
211[.]231[.]108[.]4614
213[.]209[.]1[.]12913
173[.]194[.]207[.]2712
188[.]125[.]73[.]8711
199[.]212[.]0[.]4610
104[.]47[.]53[.]3610
104[.]47[.]5[.]339
104[.]47[.]124[.]339
98[.]137[.]159[.]248
216[.]239[.]36[.]217
104[.]47[.]8[.]337
104[.]47[.]0[.]337
62[.]211[.]72[.]327
213[.]205[.]33[.]617
148[.]163[.]156[.]17
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa17
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org17
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org17
mta5[.]am0[.]yahoodns[.]net17
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net17
whois[.]iana[.]org17
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net17
whois[.]arin[.]net17
eur[.]olc[.]protection[.]outlook[.]com17
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org17
hotmail-com[.]olc[.]protection[.]outlook[.]com17
microsoft-com[.]mail[.]protection[.]outlook[.]com17
sweety2001[.]dating4you[.]cn17
honeypus[.]rusladies[.]cn17
katarinasw[.]date4you[.]cn17
marina99[.]ruladies[.]cn17
mx-eu[.]mail[.]am0[.]yahoodns[.]net16
tiscali[.]it16
etb-1[.]mail[.]tiscali[.]it16
hanmail[.]net14
mx1[.]hanmail[.]net14
ipinfo[.]io13
smtp-in[.]libero[.]it13
libero[.]it13
tiscalinet[.]it13
See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%17
%SystemRoot%\SysWOW64\config\systemprofile:.repos17
%SystemRoot%\SysWOW64\config\systemprofile17
%SystemRoot%\SysWOW64\dwkqpxds2
%SystemRoot%\SysWOW64\rkyedlrg2
%SystemRoot%\SysWOW64\athnmuap1
%SystemRoot%\SysWOW64\nguazhnc1
%SystemRoot%\SysWOW64\wpdjiqwl1
%SystemRoot%\SysWOW64\piwcbjpe1
%SystemRoot%\SysWOW64\qjxdckqf1
%TEMP%\euatucsb.exe1
%TEMP%\bvxuokuz.exe1
%TEMP%\baqmtpu.exe1
%TEMP%\idkhgdza.exe1
%TEMP%\irjirdhy.exe1
%TEMP%\mgifzvfk.exe1
%TEMP%\kmhypjqj.exe1
%TEMP%\tryutcar.exe1
%System32%\sflmyjon\mgifzvfk.exe (copy)1
File Hashes
  • 1d7dce1a75f19e02b554764e116205833fc300e13e407a1424aee1f7efcef491
  • 2896e3d9e7e10b9faa9254c44f78b7bc7005fa008090234eb5d92ddc55415f12
  • 33906a7062f316e0683753977c6018675877c19755d830bbca04e6c87cd7d727
  • 3b902891e76a3efe254aaa04071bee804576585be3324f1938001827e817f3a1
  • 478f07fdb1dcd3672ff5d290c70d5f372f5f5eb31ecdd7d9d5eba82cc316b7f2
  • 490867ad1a8bea080a54486696c32aeeb614900e2af12f2766789267b9c84292
  • 5b168cedb6dd729ddce5adaf8728639d9caab7513dce660cfa85f77b2d3a2fb1
  • 6bff144513b6bca96b1a1681870f114bcdffaaca0aa23e1f523ef01ee81b4a3f
  • a448406f2e0e9583c0fe8f8366b55bb36e73ee3ef2d2258a13045be87488fecb
  • b66ab4ace074418791a4aa3b22d467087b3f72106844724d50ad8429867b9f27
  • bebc1ca1106ef7f9ab3773cb50dbfac77057d2ac485930ddde418734a30dcea6
  • d65a714eacd52d80ae4d81f7c3f0439b1eed742a91d8e18e351306a8e9a7d56a
  • dd949e91c747449bc0cf3271378e86160a4caba277441237f5854133b5b63e37
  • e0a341fb6e766d58f954fc9801b8c9b2e3b76dea4987b051673c9c9fbfb1bd5b
  • ebd599453987fc52d3783dfcb4b7cd93bd7d1cad864da460ea4fabd4340ddd09
  • f867deb777721ceec1e0da73c4f7599e20d041030e42bdc07e90b0ee58f171f5
  • fb1da0632e8f438ef9b22e13ccf98fc6cda8cbc79276a179f4e00a18fbc24554

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Packed.Zbot-6986485-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: LoadAppInit_DLLs
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: AppInit_DLLs
25
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%ProgramData%\Mozilla\thfirxd.exe25
%System32%\Tasks\aybbmte25
%ProgramData%\Mozilla\lygbwac.dll25
%HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll22
%HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe22
%SystemRoot%\Tasks\kylaxsk.job22
File Hashes
  • 75a96e041086cc1af7696888b0519dcfdba518234345f55746ef5a3c5b7db554
  • 7f0d74475cce26ef072c23f5788e56688d280645a5eed19537cdc66feed7d223
  • 7f22ccfdfb24939537763a2f265979c540ef674e0f29101f57d63573863a4ebc
  • 87aef6c3658a5e31c59df0dbd604d1309cff42b84cbe2761634e8e5f8add3cba
  • 8fc42bf42753de20f7f8a889146d5ac3f81b1498b8de4695ed759d930c55a81e
  • 9a3dab606f2bfa91bc7b4e1a6ddf2fde1a579daeea10d273c5d92ed5400ee72e
  • 9f47c7fb5108b7802a9721115563d8485389e29d08082e747e5317e4b85a93b9
  • a8ccd6f1a376356ec6a54a0f233d495183d52bfbe0da041403c32717d5321853
  • b16564e7e63b6761a2a307d0f03b5eb8725b7f688693df8d4cea881f09b2d959
  • bbab6e4862965c729645b63b2dd3a73fde02cecb960a03169196ae409dcf424d
  • be492dd9101569320491e515e195d7679aa67e3d293ba551aa47724b5298a957
  • c2a7bd7b3f15334856a1631683490dce70db66ea8aea2b82589cf16e6a566829
  • cbaba36a158d6be04f18de282f77db026b1fcd82451a28e93aaaaedb363b9691
  • d8d3e9b08507ce57c428b0dcfad69ef8c9e303d7c89a14a44dd0a2b0fd14583c
  • da185a973d7add8f69eb42818c9783f0608f77e63036ec0014228ab9a2cefee9
  • dc5d91b1c9767f8920b8803266e6c8443f6c416c3a45c0321ba7124d9dca0d4d
  • de68595f96cae94bb027659485fe9dc90c92f1de376c2206ae351d397ffffcbb
  • e6efee10de9b5ae15896cd35f87ca6e108823f00857e6c4c6cdc97aae0a0e8aa
  • e8818da0e728731d74779bb9c8328ba40cf2331703a250f4f1369aaa996b9f79
  • ea45d1af873f9b6ba50a5c7e4e96bf7f62948ede9777391e1558530c02f3c3ec
  • eadf0dd3d9bb9c60c00328d43ae8b52657af58cce0794ecb31bff77b8a6eff8b
  • ed8653b1e049258b58ece93559603a0fdb998003c6ae3a0f9930bccf21bbcdf0
  • edd63bc56a1a477e20d52a7931177a65e4ab7f78f4f807a8eed1f3785a7fe704
  • ef7f834b58f201bc59b17a7a3e45e9cab4f0426a1c084506acb5be97c03fd376
  • efd021314885ae49896a01c9244a4ca301cfe74e72a3ad6ca35afc8dcbbc01f0
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Ransomware.Sage-6987538-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Control\Session Manager 25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\##PC#Users 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\##PC#USERS
Value Name: _CommentFromDesktopINI
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\##PC#USERS
Value Name: _LabelFromDesktopINI
25
MutexesOccurrences
wj6qbq4X25
\BaseNamedObjects\PFShggN33
\BaseNamedObjects\adX9ZN6Z3
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
5[.]45[.]6[.]13825
5[.]45[.]159[.]1925
5[.]45[.]140[.]625
139[.]59[.]93[.]18125
5[.]45[.]226[.]23725
138[.]197[.]136[.]19625
138[.]197[.]105[.]6825
211[.]114[.]30[.]725
5[.]45[.]247[.]2225
138[.]197[.]196[.]1925
138[.]197[.]122[.]6825
139[.]59[.]227[.]17225
211[.]114[.]64[.]6325
5[.]45[.]129[.]5225
138[.]197[.]22[.]15125
211[.]114[.]47[.]8025
211[.]114[.]28[.]23525
138[.]197[.]109[.]7925
5[.]45[.]242[.]19725
139[.]59[.]219[.]23725
5[.]45[.]24[.]23625
139[.]59[.]185[.]425
5[.]45[.]238[.]9025
211[.]114[.]135[.]13625
211[.]114[.]84[.]14225
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
mbfce24rgn65bx3g[.]2kzm0f[.]com25
mbfce24rgn65bx3g[.]l3nq0[.]net25
Files and or directories createdOccurrences
%TEMP%\__config252888.bat25
%APPDATA%\1SKJ4BcT.tmp25
%APPDATA%\h7Ph24Fx.exe25
%System32%\Tasks\NuqH5Wz325
%HOMEPATH%\Documents\!HELP_SOS.hta20
%HOMEPATH%\Documents\Outlook Files\!HELP_SOS.hta20
%TEMP%\__config16184093.bat3
%APPDATA%\qh78RMdu.exe3
%APPDATA%\vpiuxHWP.tmp3
%HOMEPATH%\Start Menu\Programs\Startup\TLkOeWe7.lnk3
File Hashes
  • 1160b42660eafdbaa7e8eb963f3bb9ae17058c06248965265df0fe8b3d39fda0
  • 239d51f57e2cb6b6dd712deeef8d87a4a1f78b10269424edf028f79eccf70bec
  • 3599109b2d20e97baaec09e11e917058dc902158a377015c425a7371ff584054
  • 5d62a735a26a9c4494ad3abefd99287889264451798948b8e3dd2a83370312c3
  • 5e9e35441ce1473fedd37ca2356cb4932d47f62a9125903383706dba1c356896
  • 6c4aa0ea8d6828c79bfc6e973ed1b03f88cf311dd7cd5b0ca2982221a29317d5
  • 7aec11754a7a9c23b313376a188c4231e1d6f1e5110b689de56236d891f956d5
  • 7f89228c94c44ab61cc5ba06ce6dad7524343a0c50dc394a39b0066a8378a349
  • 80e3c7ad157c9b87a49817973591df737a0d1399bdc9c0a0093acecb7d50d21a
  • 901ff9ae67350d0d294b9b666a7b1fc5612df5fa7e15acf78561716f5a6567f7
  • 97c9f82d70fb957f74e31413b9ac00e56bdab268727f11189c781e7ac93b5479
  • 98cc91e7d693e7b41f471f256ecf7f780847d37576696c94f005203a614be616
  • 9c7b75a7daae70019419abd51ce4c2bea8e383bd7e618b45d640b08a5f07b99c
  • a24fef8d4b55e29dec0b57011e4aa605a39b0ce3d6f207d94ca6e83cd11edaa6
  • a5d950f3e43db37527ed31959ffeecb5fb8e7b96d5caae1356577b16dccf183b
  • a9ed29372780e5c7c43144308475457df9bc9767c5bdcc294a41eb4fb18a5ac1
  • bc584c0d484c2f772bfdfe5afce3860f8de64fc3f7a147aa731c48e62b8f895f
  • c039c4ba185062fd62b7033dbf3b323f15ee8ec385029c7e91560dab1e1b6a4b
  • c771267b2194218e3e8c81795f9e13382415cefea5809260acc7f2a2a0ff8838
  • ccf5439e4290e97bb501bf81b8e2c868fd602799dfaaf45254454bb796ffe8a5
  • dc0eddac68e6ef891133b6992bdacf4993b49a1a23d3b279ce3092588cb8d1c1
  • e4fe560783615e0fc7b410b7c951095749f15dbcb54dd05d1f20fc56da90cb70
  • e6a535eaf2e4d37287a4dde09528a29095daa74f05378239b4786b3f90f42192
  • ec49a254c5bc7d07d346d5821483cd10ad166b2b96ffd59aa9038bace5fc82e8
  • fddf11ffb5c70acf8f0d0c4de1cc352948c263a8646ced62248fd689f4555756

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Malware



Win.Worm.Vobfus-6986418-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: ShowSuperHidden
24
<HKLM>\SOFTWARE\WOW6432NODE\Policies 24
<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\WindowsUpdate\AU 24
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 24
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: xyyiaf
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wdciac
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: tioguh
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: xaone
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: goatia
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: muunai
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: woiotin
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: xanix
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: diozog
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: jkxab
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: hakol
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: baualof
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: leaewi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yiiepi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: dooreab
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: boebit
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: liuolum
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yifeg
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: kuawea
1
MutexesOccurrences
A24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ns1[.]boxonline2[.]net24
ns1[.]boxonline3[.]com24
ns1[.]boxonline1[.]com24
ns1[.]boxonline3[.]org24
ns1[.]boxonline2[.]com24
ns1[.]boxonline3[.]net24
ns1[.]boxonline1[.]net24
ns1[.]boxonline1[.]org24
ns1[.]boxonline2[.]org24
Files and or directories createdOccurrences
\??\E:\autorun.inf24
\autorun.inf24
\??\E:\System Volume Information.exe24
\System Volume Information.exe24
\$RECYCLE.BIN.exe24
\??\E:\$RECYCLE.BIN.exe24
\Secret.exe24
\??\E:\Passwords.exe24
\??\E:\Porn.exe24
\??\E:\Secret.exe24
\??\E:\Sexy.exe24
\??\E:\x.mpeg24
\Passwords.exe24
\Porn.exe24
\Sexy.exe24
%HOMEPATH%\c24
%HOMEPATH%\Passwords.exe24
%HOMEPATH%\Porn.exe24
%HOMEPATH%\Secret.exe24
%HOMEPATH%\Sexy.exe24
%HOMEPATH%\c\Passwords.exe24
%HOMEPATH%\c\Porn.exe24
%HOMEPATH%\c\Secret.exe24
%HOMEPATH%\c\Sexy.exe24
%HOMEPATH%\c\autorun.inf24
See JSON for more IOCs
File Hashes
  • 0223f31be057b76cc3c77463a5ac362dfb164d921865d6fac45bc0b342a24987
  • 116a453c9f33b2471e3e4f688e65d9a816039ed8978e4bf9419e0e74d3e4c956
  • 184c4a17e81a3b8628401cec2c3153c8d447427612b0015689e63eb57c6d2929
  • 3d51dc56d04b6b1a770191d01ebd25a8f461e906cbcc4a3c5e95d37c7b117d1a
  • 5050ea8a4fc19652186b7bd5d2376c5772cf7fdcd8f9075731e2c7ece560afc8
  • 83a2a54dfd89718b6f949e79a21b697288197422655c1eef52d410df9583c96a
  • 9aa53a3a52c40afe47a531badf1df6c812c985e5d0d345f00fabf8fad53319b7
  • 9cf7815a0c7da0d55dd202dcbe171d7109a24857ccea16a7ab21827e3fce8386
  • a1cdaec71cd76dcf37b43c55d7ae9c33dc4d2a6baf55cae35d3214e582c1f9f3
  • a20512d57c5d82b8df044ac5bfb0f7f345290e8b6e388b3a17ea88671766f9c4
  • a5cf7dc6a3c6b2fce41a4fcf0f0d98ef1cdd91af9d0e292c6e9142eae0b06b82
  • afc01f079aec32874f62926770d6cdf74eb19289954fdfe830d0ac17160698bf
  • b9845e32db4bdf3fc5f795fa7979f092116c3b9b39c364b96bcada6921a81918
  • b990b6dd7a5bfde334b246c100a95b7dd52611d7167a81e9399f1f191be172e9
  • ba9f10b7ac5e09f0137206341a4a7ab36e74f6d2d12f84f4057adccbc9d2ea3e
  • bbbb74ba16e46156f476676ba8e24de3b7b13ee363188a8252f7b2784e9b5e55
  • be56ffcee4c9fb35af3ba72afb1b4be47ae841390e2ea2966cced4af7dad46d5
  • c54174b6e003481ce059f05fe0c33d8bdabc5d49cdf82eb3f52436c87ba886e3
  • cc8cc46b4932f6ec383699a14776bbc573f366a5f3db87e1cd0edafd1b36303f
  • dae1aa0ccf8af9b1ea58d81097f09ea3af90f7c9bf0bf4d6e03f93fa0224e0f9
  • edb225e13b85e2680eaf3379f1902afe8059a23b475642076e0b4b3558dd738c
  • f43b29ce77ef694b43467fd0e69956e46ee69805abd2963bab7d33bbcd0ad4ef
  • fd17a474fedafc167118316dbad93648c63365e645a1233b9f8ef0aa5d7aa127
  • ffdd606b64c51d5ec950dee14328c97cac84b75090f77ad7e77c5bf9da20ce08

Coverage


Screenshots of Detection

AMP



ThreatGrid



Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Madshi injection detected (3872)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Kovter injection detected (2952)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • PowerShell file-less infection detected (1443)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (356)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Dealply adware detected (243)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Gamarue malware detected (194)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Excessively long PowerShell command detected (106)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Installcore adware detected (61)
    Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Fusion adware detected (40)
    Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Possible fileless malware download (31)
    A site commonly used by fileless malware to download additional data has been detected. Several different families of malware have been observed using these sites to download additional stages to inject into other processes.

Viewing all articles
Browse latest Browse all 2039

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>