3.2.powershell.exe.24302f3c610.0.unpack | INDICATOR_SUSPICIOUS_DisableWinDefender | Detects executables containing artifcats associated with disabling Widnows Defender | ditekSHen | - 0x2a11:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
- 0x2a91:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x2b16:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4c9a:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4d59:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4dd9:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4fa1:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x2faf:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutuser $true
- 0x3067:$s2: Set-MpPreference -DisableArchiveScanning $true
- 0x3107:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
- 0x31a5:$s4: Set-MpPreference -DisableScriptScanning $true
- 0x322f:$s5: Set-MpPreference -SubmitSamplesConsent 2
- 0x329d:$s6: Set-MpPreference -MAPSReporting 0
- 0x3315:$s7: Set-MpPreference -HighThreatDefaultAction 6
- 0x33b3:$s8: Set-MpPreference -ModerateThreatDefaultAction 6
- 0x3441:$s9: Set-MpPreference -LowThreatDefaultAction 6
- 0x34cb:$s10: Set-MpPreference -SevereThreatDefaultAction 6
- 0x3622:$e2: Add-MpPreference -ExclusionPath
|
3.2.powershell.exe.24302f46890.1.unpack | INDICATOR_SUSPICIOUS_DisableWinDefender | Detects executables containing artifcats associated with disabling Widnows Defender | ditekSHen | - 0x2a11:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
- 0x2a91:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x2b16:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4c9a:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4d59:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4dd9:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4fa1:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x2faf:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutuser $true
- 0x3067:$s2: Set-MpPreference -DisableArchiveScanning $true
- 0x3107:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
- 0x31a5:$s4: Set-MpPreference -DisableScriptScanning $true
- 0x322f:$s5: Set-MpPreference -SubmitSamplesConsent 2
- 0x329d:$s6: Set-MpPreference -MAPSReporting 0
- 0x3315:$s7: Set-MpPreference -HighThreatDefaultAction 6
- 0x33b3:$s8: Set-MpPreference -ModerateThreatDefaultAction 6
- 0x3441:$s9: Set-MpPreference -LowThreatDefaultAction 6
- 0x34cb:$s10: Set-MpPreference -SevereThreatDefaultAction 6
- 0x3622:$e2: Add-MpPreference -ExclusionPath
|
11.2.powershell.exe.22819b56788.6.raw.unpack | JoeSecurity_XWorm | Yara detected XWorm | Joe Security | |
11.2.powershell.exe.22819b56788.6.raw.unpack | rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io | - 0x6718:$str01: $VB$Local_Port
- 0x6709:$str02: $VB$Local_Host
- 0x6994:$str03: get_Jpeg
- 0x63f4:$str04: get_ServicePack
- 0x75b3:$str05: Select * from AntivirusProduct
- 0x77b1:$str06: PCRestart
- 0x77c5:$str07: shutdown.exe /f /r /t 0
- 0x7877:$str08: StopReport
- 0x784d:$str09: StopDDos
- 0x794f:$str10: sendPlugin
- 0x7afb:$str12: -ExecutionPolicy Bypass -File "
- 0x7c24:$str13: Content-length: 5235
|
11.2.powershell.exe.22819b56788.6.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x7e91:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0xdf64:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x7f2e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0xe01c:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x8043:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0xe14c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x7b3f:$cnc4: POST / HTTP/1.1
|
11.2.powershell.exe.22819b4d148.4.unpack | JoeSecurity_XWorm | Yara detected XWorm | Joe Security | |
11.2.powershell.exe.22819b4d148.4.unpack | rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io | - 0x4918:$str01: $VB$Local_Port
- 0x4909:$str02: $VB$Local_Host
- 0x4b94:$str03: get_Jpeg
- 0x45f4:$str04: get_ServicePack
- 0x57b3:$str05: Select * from AntivirusProduct
- 0x59b1:$str06: PCRestart
- 0x59c5:$str07: shutdown.exe /f /r /t 0
- 0x5a77:$str08: StopReport
- 0x5a4d:$str09: StopDDos
- 0x5b4f:$str10: sendPlugin
- 0x5cfb:$str12: -ExecutionPolicy Bypass -File "
- 0x5e24:$str13: Content-length: 5235
|
11.2.powershell.exe.22819b4d148.4.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x6091:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x612e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x6243:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x5d3f:$cnc4: POST / HTTP/1.1
|
3.2.powershell.exe.24302f46890.1.raw.unpack | INDICATOR_SUSPICIOUS_DisableWinDefender | Detects executables containing artifcats associated with disabling Widnows Defender | ditekSHen | - 0x4811:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
- 0x4891:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4916:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6a9a:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6b59:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6bd9:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6da1:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4daf:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutuser $true
- 0x4e67:$s2: Set-MpPreference -DisableArchiveScanning $true
- 0x4f07:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
- 0x4fa5:$s4: Set-MpPreference -DisableScriptScanning $true
- 0x502f:$s5: Set-MpPreference -SubmitSamplesConsent 2
- 0x509d:$s6: Set-MpPreference -MAPSReporting 0
- 0x5115:$s7: Set-MpPreference -HighThreatDefaultAction 6
- 0x51b3:$s8: Set-MpPreference -ModerateThreatDefaultAction 6
- 0x5241:$s9: Set-MpPreference -LowThreatDefaultAction 6
- 0x52cb:$s10: Set-MpPreference -SevereThreatDefaultAction 6
- 0x5422:$e2: Add-MpPreference -ExclusionPath
|
3.2.powershell.exe.24311715540.7.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.24311023810.3.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
11.2.powershell.exe.22819b4d148.4.raw.unpack | JoeSecurity_XWorm | Yara detected XWorm | Joe Security | |
11.2.powershell.exe.22819b4d148.4.raw.unpack | rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io | - 0x6718:$str01: $VB$Local_Port
- 0xfd58:$str01: $VB$Local_Port
- 0x6709:$str02: $VB$Local_Host
- 0xfd49:$str02: $VB$Local_Host
- 0x6994:$str03: get_Jpeg
- 0xffd4:$str03: get_Jpeg
- 0x63f4:$str04: get_ServicePack
- 0xfa34:$str04: get_ServicePack
- 0x75b3:$str05: Select * from AntivirusProduct
- 0x10bf3:$str05: Select * from AntivirusProduct
- 0x77b1:$str06: PCRestart
- 0x10df1:$str06: PCRestart
- 0x77c5:$str07: shutdown.exe /f /r /t 0
- 0x10e05:$str07: shutdown.exe /f /r /t 0
- 0x7877:$str08: StopReport
- 0x10eb7:$str08: StopReport
- 0x784d:$str09: StopDDos
- 0x10e8d:$str09: StopDDos
- 0x794f:$str10: sendPlugin
- 0x10f8f:$str10: sendPlugin
- 0x7afb:$str12: -ExecutionPolicy Bypass -File "
|
11.2.powershell.exe.22819b4d148.4.raw.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x7e91:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x114d1:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x175a4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x7f2e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x1156e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x1765c:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x8043:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x11683:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x1778c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x7b3f:$cnc4: POST / HTTP/1.1
- 0x1117f:$cnc4: POST / HTTP/1.1
|
3.2.powershell.exe.24310fe37d8.6.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.24302f3c610.0.raw.unpack | INDICATOR_SUSPICIOUS_DisableWinDefender | Detects executables containing artifcats associated with disabling Widnows Defender | ditekSHen | - 0x4811:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
- 0xea91:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
- 0x4891:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4916:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6a9a:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6b59:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6bd9:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x6da1:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0xeb11:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0xeb96:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x10d1a:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x10dd9:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x10e59:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x11021:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
- 0x4daf:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutuser $true
- 0xf02f:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutuser $true
- 0x4e67:$s2: Set-MpPreference -DisableArchiveScanning $true
- 0xf0e7:$s2: Set-MpPreference -DisableArchiveScanning $true
- 0x4f07:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
- 0xf187:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
- 0x4fa5:$s4: Set-MpPreference -DisableScriptScanning $true
|
11.2.powershell.exe.22819b56788.6.unpack | JoeSecurity_XWorm | Yara detected XWorm | Joe Security | |
11.2.powershell.exe.22819b56788.6.unpack | rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io | - 0x4918:$str01: $VB$Local_Port
- 0x4909:$str02: $VB$Local_Host
- 0x4b94:$str03: get_Jpeg
- 0x45f4:$str04: get_ServicePack
- 0x57b3:$str05: Select * from AntivirusProduct
- 0x59b1:$str06: PCRestart
- 0x59c5:$str07: shutdown.exe /f /r /t 0
- 0x5a77:$str08: StopReport
- 0x5a4d:$str09: StopDDos
- 0x5b4f:$str10: sendPlugin
- 0x5cfb:$str12: -ExecutionPolicy Bypass -File "
- 0x5e24:$str13: Content-length: 5235
|
11.2.powershell.exe.22819b56788.6.unpack | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x6091:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
- 0x612e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
- 0x6243:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
- 0x5d3f:$cnc4: POST / HTTP/1.1
|
3.2.powershell.exe.243110a3848.5.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.24311715540.7.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.24311023810.3.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.243110a3848.5.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
3.2.powershell.exe.24310fe37d8.6.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
Click to see the 19 entries |