00000003.00000000.417195755.000000000054F000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000003.00000000.417195755.000000000054F000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
- 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
|
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x172dd:$r1: Classes\Folder\shell\open\command
- 0x17300:$k1: DelegateExecute
|
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x16ce4:$s1: RDPClip
- 0x173cc:$s2: Grabber
- 0x16ee0:$s3: Ave_Maria Stealer OpenSource
- 0x16fe0:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x16d16:$s5: @\cmd.exe
- 0x14850:$s8: warzone160
|
00000003.00000000.416591236.0000000000400000.00000040.00000400.00020000.00000000.sdmp | AveMaria_WarZone | unknown | unknown | - 0x17230:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1700c:$str2: MsgBox.exe
- 0x1729c:$str4: \System32\cmd.exe
- 0x16ee0:$str6: Ave_Maria
- 0x16778:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
- 0x15a78:$str8: SMTP Password
- 0x14d58:$str11: \Google\Chrome\User Data\Default\Login Data
- 0x16744:$str12: \sqlmap.dll
|
00000003.00000000.416662895.000000000054F000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000003.00000000.416662895.000000000054F000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
- 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
|
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x172dd:$r1: Classes\Folder\shell\open\command
- 0x17300:$k1: DelegateExecute
|
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x16ce4:$s1: RDPClip
- 0x173cc:$s2: Grabber
- 0x16ee0:$s3: Ave_Maria Stealer OpenSource
- 0x16fe0:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x16d16:$s5: @\cmd.exe
- 0x14850:$s8: warzone160
|
00000003.00000000.417147497.0000000000400000.00000040.00000400.00020000.00000000.sdmp | AveMaria_WarZone | unknown | unknown | - 0x17230:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1700c:$str2: MsgBox.exe
- 0x1729c:$str4: \System32\cmd.exe
- 0x16ee0:$str6: Ave_Maria
- 0x16778:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
- 0x15a78:$str8: SMTP Password
- 0x14d58:$str11: \Google\Chrome\User Data\Default\Login Data
- 0x16744:$str12: \sqlmap.dll
|
00000003.00000003.431594632.00000000012CF000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x7c0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x35c8:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x7c0:$c1: Elevation:Administrator!new:
- 0x35c8:$c1: Elevation:Administrator!new:
|
00000003.00000003.431594632.00000000012CF000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000003.426962811.00000000012E1000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000003.426962811.00000000012E1000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000001.00000002.447136668.0000000003200000.00000004.00000800.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x18e10:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x18e10:$c1: Elevation:Administrator!new:
|
00000001.00000002.447136668.0000000003200000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000001.00000002.447136668.0000000003200000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000001.00000002.447136668.0000000003200000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000003.431623764.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000003.431623764.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000002.622879575.000000000054F000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000003.00000002.622879575.000000000054F000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000003.431671478.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000003.431671478.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000003.426948480.00000000012CF000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x7c0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x35c8:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x7c0:$c1: Elevation:Administrator!new:
- 0x35c8:$c1: Elevation:Administrator!new:
|
00000003.00000003.426948480.00000000012CF000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000003.431567861.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000003.431567861.00000000012F4000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000000.418334237.000000000054F000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000003.00000000.418334237.000000000054F000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
- 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
|
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x172dd:$r1: Classes\Folder\shell\open\command
- 0x17300:$k1: DelegateExecute
|
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x16ce4:$s1: RDPClip
- 0x173cc:$s2: Grabber
- 0x16ee0:$s3: Ave_Maria Stealer OpenSource
- 0x16fe0:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x16d16:$s5: @\cmd.exe
- 0x14850:$s8: warzone160
|
00000003.00000000.418265932.0000000000400000.00000040.00000400.00020000.00000000.sdmp | AveMaria_WarZone | unknown | unknown | - 0x17230:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1700c:$str2: MsgBox.exe
- 0x1729c:$str4: \System32\cmd.exe
- 0x16ee0:$str6: Ave_Maria
- 0x16778:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
- 0x15a78:$str8: SMTP Password
- 0x14d58:$str11: \Google\Chrome\User Data\Default\Login Data
- 0x16744:$str12: \sqlmap.dll
|
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
- 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
|
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x172dd:$r1: Classes\Folder\shell\open\command
- 0x17300:$k1: DelegateExecute
|
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x16ce4:$s1: RDPClip
- 0x173cc:$s2: Grabber
- 0x16ee0:$s3: Ave_Maria Stealer OpenSource
- 0x16fe0:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x16d16:$s5: @\cmd.exe
- 0x14850:$s8: warzone160
|
00000003.00000002.622706566.0000000000400000.00000040.00000400.00020000.00000000.sdmp | AveMaria_WarZone | unknown | unknown | - 0x17230:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1700c:$str2: MsgBox.exe
- 0x1729c:$str4: \System32\cmd.exe
- 0x16ee0:$str6: Ave_Maria
- 0x16778:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
- 0x15a78:$str8: SMTP Password
- 0x14d58:$str11: \Google\Chrome\User Data\Default\Login Data
- 0x16744:$str12: \sqlmap.dll
|
00000003.00000000.417884328.000000000054F000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000003.00000000.417884328.000000000054F000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
- 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
|
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x172dd:$r1: Classes\Folder\shell\open\command
- 0x17300:$k1: DelegateExecute
|
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x16ce4:$s1: RDPClip
- 0x173cc:$s2: Grabber
- 0x16ee0:$s3: Ave_Maria Stealer OpenSource
- 0x16fe0:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x16d16:$s5: @\cmd.exe
- 0x14850:$s8: warzone160
|
00000003.00000000.415418870.0000000000400000.00000040.00000400.00020000.00000000.sdmp | AveMaria_WarZone | unknown | unknown | - 0x17230:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1700c:$str2: MsgBox.exe
- 0x1729c:$str4: \System32\cmd.exe
- 0x16ee0:$str6: Ave_Maria
- 0x16778:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
|