0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.raw.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x1c392:$str02: get_SslClient
- 0x1c3ae:$str03: get_TcpClient
- 0x17a4d:$str04: get_SendSync
- 0x19169:$str05: get_IsConnected
- 0x1a252:$str06: set_UseShellExecute
- 0x1e93e:$str08: Select * from AntivirusProduct
- 0x1419a:$str09: Stub.exe
- 0x1425e:$str09: Stub.exe
- 0x1d08a:$str10: timeout 3 > NUL
- 0x1e382:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x1e344:$str03: Po_ng
- 0x1cb64:$str04: Pac_ket
- 0x1e8b2:$str05: Perfor_mance
- 0x1e8f6:$str06: Install_ed
- 0x19169:$str07: get_IsConnected
- 0x1a455:$str08: get_ActivatePo_ng
- 0x1b71d:$str09: isVM_by_wim_temper
- 0x1d08a:$str11: timeout 3 > NUL
- 0x1e4c2:$str12: ProcessHacker.exe
- 0x1e6b4:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x1e6b4:$q1: Select * from Win32_CacheMemory
- 0x1e6f4:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x1e742:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x1e790:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.raw.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x2080a:$str02: get_SslClient
- 0x20826:$str03: get_TcpClient
- 0x1bec5:$str04: get_SendSync
- 0x1d5e1:$str05: get_IsConnected
- 0x1e6ca:$str06: set_UseShellExecute
- 0x22db6:$str08: Select * from AntivirusProduct
- 0x18612:$str09: Stub.exe
- 0x186d6:$str09: Stub.exe
- 0x21502:$str10: timeout 3 > NUL
- 0x227fa:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x227bc:$str03: Po_ng
- 0x20fdc:$str04: Pac_ket
- 0x22d2a:$str05: Perfor_mance
- 0x22d6e:$str06: Install_ed
- 0x1d5e1:$str07: get_IsConnected
- 0x1e8cd:$str08: get_ActivatePo_ng
- 0x1fb95:$str09: isVM_by_wim_temper
- 0x21502:$str11: timeout 3 > NUL
- 0x2293a:$str12: ProcessHacker.exe
- 0x22b2c:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x22b2c:$q1: Select * from Win32_CacheMemory
- 0x22b6c:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x22bba:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x22c08:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.raw.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.raw.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x171e48:$str02: get_SslClient
- 0x171e64:$str03: get_TcpClient
- 0x16d503:$str04: get_SendSync
- 0x16ec1f:$str05: get_IsConnected
- 0x16fd08:$str06: set_UseShellExecute
- 0x1743f4:$str08: Select * from AntivirusProduct
- 0x179c50:$str09: Stub.exe
- 0x179d14:$str09: Stub.exe
- 0x172b40:$str10: timeout 3 > NUL
- 0x173e38:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.raw.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x173dfa:$str03: Po_ng
- 0x17261a:$str04: Pac_ket
- 0x174368:$str05: Perfor_mance
- 0x1743ac:$str06: Install_ed
- 0x16ec1f:$str07: get_IsConnected
- 0x16ff0b:$str08: get_ActivatePo_ng
- 0x1711d3:$str09: isVM_by_wim_temper
- 0x172b40:$str11: timeout 3 > NUL
- 0x173f78:$str12: ProcessHacker.exe
- 0x17416a:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.raw.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x17416a:$q1: Select * from Win32_CacheMemory
- 0x1741aa:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x1741f8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x174246:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
4.2.MSBuild.exe.400000.0.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
4.2.MSBuild.exe.400000.0.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x171e48:$str02: get_SslClient
- 0x171e64:$str03: get_TcpClient
- 0x16d503:$str04: get_SendSync
- 0x16ec1f:$str05: get_IsConnected
- 0x16fd08:$str06: set_UseShellExecute
- 0x1743f4:$str08: Select * from AntivirusProduct
- 0x179c50:$str09: Stub.exe
- 0x179d14:$str09: Stub.exe
- 0x172b40:$str10: timeout 3 > NUL
- 0x173e38:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
4.2.MSBuild.exe.400000.0.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x173dfa:$str03: Po_ng
- 0x17261a:$str04: Pac_ket
- 0x174368:$str05: Perfor_mance
- 0x1743ac:$str06: Install_ed
- 0x16ec1f:$str07: get_IsConnected
- 0x16ff0b:$str08: get_ActivatePo_ng
- 0x1711d3:$str09: isVM_by_wim_temper
- 0x172b40:$str11: timeout 3 > NUL
- 0x173f78:$str12: ProcessHacker.exe
- 0x17416a:$str13: Select * from Win32_CacheMemory
|
4.2.MSBuild.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x17416a:$q1: Select * from Win32_CacheMemory
- 0x1741aa:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x1741f8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x174246:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x170048:$str02: get_SslClient
- 0x170064:$str03: get_TcpClient
- 0x16b703:$str04: get_SendSync
- 0x16ce1f:$str05: get_IsConnected
- 0x16df08:$str06: set_UseShellExecute
- 0x1725f4:$str08: Select * from AntivirusProduct
- 0x177e50:$str09: Stub.exe
- 0x177f14:$str09: Stub.exe
- 0x170d40:$str10: timeout 3 > NUL
- 0x172038:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x171ffa:$str03: Po_ng
- 0x17081a:$str04: Pac_ket
- 0x172568:$str05: Perfor_mance
- 0x1725ac:$str06: Install_ed
- 0x16ce1f:$str07: get_IsConnected
- 0x16e10b:$str08: get_ActivatePo_ng
- 0x16f3d3:$str09: isVM_by_wim_temper
- 0x170d40:$str11: timeout 3 > NUL
- 0x172178:$str12: ProcessHacker.exe
- 0x17236a:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.44195d0.4.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x17236a:$q1: Select * from Win32_CacheMemory
- 0x1723aa:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x1723f8:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x172446:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x1ea0a:$str02: get_SslClient
- 0x1ea26:$str03: get_TcpClient
- 0x1a0c5:$str04: get_SendSync
- 0x1b7e1:$str05: get_IsConnected
- 0x1c8ca:$str06: set_UseShellExecute
- 0x20fb6:$str08: Select * from AntivirusProduct
- 0x16812:$str09: Stub.exe
- 0x168d6:$str09: Stub.exe
- 0x1f702:$str10: timeout 3 > NUL
- 0x209fa:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x209bc:$str03: Po_ng
- 0x1f1dc:$str04: Pac_ket
- 0x20f2a:$str05: Perfor_mance
- 0x20f6e:$str06: Install_ed
- 0x1b7e1:$str07: get_IsConnected
- 0x1cacd:$str08: get_ActivatePo_ng
- 0x1dd95:$str09: isVM_by_wim_temper
- 0x1f702:$str11: timeout 3 > NUL
- 0x20b3a:$str12: ProcessHacker.exe
- 0x20d2c:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32ab9fc.2.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x20d2c:$q1: Select * from Win32_CacheMemory
- 0x20d6c:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x20dba:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x20e08:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x1a592:$str02: get_SslClient
- 0x1a5ae:$str03: get_TcpClient
- 0x15c4d:$str04: get_SendSync
- 0x17369:$str05: get_IsConnected
- 0x18452:$str06: set_UseShellExecute
- 0x1cb3e:$str08: Select * from AntivirusProduct
- 0x1239a:$str09: Stub.exe
- 0x1245e:$str09: Stub.exe
- 0x1b28a:$str10: timeout 3 > NUL
- 0x1c582:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x1c544:$str03: Po_ng
- 0x1ad64:$str04: Pac_ket
- 0x1cab2:$str05: Perfor_mance
- 0x1caf6:$str06: Install_ed
- 0x17369:$str07: get_IsConnected
- 0x18655:$str08: get_ActivatePo_ng
- 0x1991d:$str09: isVM_by_wim_temper
- 0x1b28a:$str11: timeout 3 > NUL
- 0x1c6c2:$str12: ProcessHacker.exe
- 0x1c8b4:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.32afe74.3.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x1c8b4:$q1: Select * from Win32_CacheMemory
- 0x1c8f4:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x1c942:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x1c990:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.325f8e8.0.unpack | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.325f8e8.0.unpack | rat_win_asyncrat | Detect AsyncRAT based on specific strings | Sekoia.io | - 0x6ab1e:$str02: get_SslClient
- 0x6ab3a:$str03: get_TcpClient
- 0x661d9:$str04: get_SendSync
- 0x678f5:$str05: get_IsConnected
- 0x689de:$str06: set_UseShellExecute
- 0x6d0ca:$str08: Select * from AntivirusProduct
- 0xbe70:$str09: Stub.exe
- 0xbf34:$str09: Stub.exe
- 0x62926:$str09: Stub.exe
- 0x629ea:$str09: Stub.exe
- 0x6b816:$str10: timeout 3 > NUL
- 0x6cb0e:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.325f8e8.0.unpack | rat_win_dcrat_qwqdanchun | Find DcRAT samples (qwqdanchun) based on specific strings | Sekoia.io | - 0x6cad0:$str03: Po_ng
- 0x6b2f0:$str04: Pac_ket
- 0x6d03e:$str05: Perfor_mance
- 0x6d082:$str06: Install_ed
- 0x678f5:$str07: get_IsConnected
- 0x68be1:$str08: get_ActivatePo_ng
- 0x69ea9:$str09: isVM_by_wim_temper
- 0x6b816:$str11: timeout 3 > NUL
- 0x6cc4e:$str12: ProcessHacker.exe
- 0x6ce40:$str13: Select * from Win32_CacheMemory
|
0.2.SecuriteInfo.com.Trojan.DownLoader48.29860.1293.7282.exe.325f8e8.0.unpack | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen | - 0x6ce40:$q1: Select * from Win32_CacheMemory
- 0x6ce80:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
- 0x6cece:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
- 0x6cf1c:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
|
Click to see the 27 entries |