00000013.00000000.404261855.0000000000A54000.00000040.00000400.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xdf0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xdf0:$c1: Elevation:Administrator!new:
|
00000013.00000000.404261855.0000000000A54000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000014.00000003.485883886.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x1f48:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1f48:$c1: Elevation:Administrator!new:
|
00000014.00000003.485883886.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000014.00000003.485883886.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000014.00000003.485883886.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000014.00000003.485883886.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x75e0:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x5dc4:$a2: SMTP Password
- 0x4e78:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x1f48:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x7530:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x5850:$a6: \Torch\User Data\Default\Login Data
- 0x2068:$a7: /n:%temp%\ellocnak.xml
- 0x63b0:$a8: "os_crypt":{"encrypted_key":"
- 0x2098:$a9: Hey I'm Admin
- 0x5c8c:$a10: \logins.json
- 0x6328:$a11: Accounts\Account.rec0
- 0x72b8:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
00000014.00000003.485580240.0000000000E94000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000014.00000003.485580240.0000000000E94000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000014.00000003.485580240.0000000000E94000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x3480:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x8488:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1c64:$a2: SMTP Password
- 0x6c6c:$a2: SMTP Password
- 0xd18:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x5d20:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x33d0:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x83d8:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x16f0:$a6: \Torch\User Data\Default\Login Data
- 0x66f8:$a6: \Torch\User Data\Default\Login Data
- 0x2250:$a8: "os_crypt":{"encrypted_key":"
- 0x7258:$a8: "os_crypt":{"encrypted_key":"
- 0x1b2c:$a10: \logins.json
- 0x6b34:$a10: \logins.json
- 0x21c8:$a11: Accounts\Account.rec0
- 0x71d0:$a11: Accounts\Account.rec0
- 0x3158:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
- 0x8160:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
00000012.00000002.520061729.0000000002B9D000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | |
00000000.00000002.327749606.0000000002F43000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | |
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x51fda:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x8641a:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xba84a:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x51fda:$c1: Elevation:Administrator!new:
- 0x8641a:$c1: Elevation:Administrator!new:
- 0xba84a:$c1: Elevation:Administrator!new:
|
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | |
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000012.00000002.534025112.0000000003C58000.00000004.00000800.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x4f26a:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x836aa:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0xb7ada:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x4da4e:$a2: SMTP Password
- 0x81e8e:$a2: SMTP Password
- 0xb62be:$a2: SMTP Password
- 0x4cb02:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x80f42:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0xb5372:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x51fda:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x8641a:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xba84a:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x4f1ba:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x835fa:$a5: for /F "usebackq tokens=*" %%A in ("
- 0xb7a2a:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x4d4da:$a6: \Torch\User Data\Default\Login Data
- 0x8191a:$a6: \Torch\User Data\Default\Login Data
- 0xb5d4a:$a6: \Torch\User Data\Default\Login Data
- 0x520fa:$a7: /n:%temp%\ellocnak.xml
- 0x8653a:$a7: /n:%temp%\ellocnak.xml
- 0xba96a:$a7: /n:%temp%\ellocnak.xml
|
00000014.00000003.486255631.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x1f48:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1f48:$c1: Elevation:Administrator!new:
|
00000014.00000003.486255631.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000014.00000003.486195668.0000000000E98000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000014.00000003.486195668.0000000000E98000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000014.00000003.486195668.0000000000E98000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x3690:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1e74:$a2: SMTP Password
- 0xf28:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x35e0:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x1900:$a6: \Torch\User Data\Default\Login Data
- 0x2460:$a8: "os_crypt":{"encrypted_key":"
- 0x1d3c:$a10: \logins.json
- 0x23d8:$a11: Accounts\Account.rec0
- 0x3368:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
00000000.00000002.316384133.0000000002A8D000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | |
00000014.00000003.485919583.0000000000E94000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x1ff8:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1ff8:$c1: Elevation:Administrator!new:
|
00000014.00000003.485919583.0000000000E94000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000014.00000003.486150119.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x1f48:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1f48:$c1: Elevation:Administrator!new:
|
00000014.00000003.486150119.0000000000EA6000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000013.00000000.403984932.0000000000919000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000013.00000000.403984932.0000000000919000.00000040.00000400.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000013.00000000.403984932.0000000000919000.00000040.00000400.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x3680:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x1e64:$a2: SMTP Password
- 0xf18:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x35d0:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x18f0:$a6: \Torch\User Data\Default\Login Data
- 0x2450:$a8: "os_crypt":{"encrypted_key":"
- 0x1d2c:$a10: \logins.json
- 0x23c8:$a11: Accounts\Account.rec0
- 0x3358:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x1e0e2:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x52508:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1e0e2:$c1: Elevation:Administrator!new:
- 0x52508:$c1: Elevation:Administrator!new:
|
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | |
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
00000000.00000002.329246325.0000000003C4E000.00000004.00000800.00020000.00000000.sdmp | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x1b372:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x4f798:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x19b56:$a2: SMTP Password
- 0x4df7c:$a2: SMTP Password
- 0x18c0a:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x4d030:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x1e0e2:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x52508:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x1b2c2:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x4f6e8:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x195e2:$a6: \Torch\User Data\Default\Login Data
- 0x4da08:$a6: \Torch\User Data\Default\Login Data
- 0x1e202:$a7: /n:%temp%\ellocnak.xml
- 0x52628:$a7: /n:%temp%\ellocnak.xml
- 0x1a142:$a8: "os_crypt":{"encrypted_key":"
- 0x4e568:$a8: "os_crypt":{"encrypted_key":"
- 0x1e232:$a9: Hey I'm Admin
- 0x52658:$a9: Hey I'm Admin
- 0x19a1e:$a10: \logins.json
|