6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2c1f0:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2c1f0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x2c1f0:$c1: Elevation:Administrator!new:
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x266e0:$a1: \Opera Software\Opera Stable\Login Data
- 0x269e0:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x261d8:$a3: \Google\Chrome\User Data\Default\Login Data
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x28a55:$r1: Classes\Folder\shell\open\command
- 0x28ab9:$r1: Classes\Folder\shell\open\command
- 0x28b0d:$r1: Classes\Folder\shell\open\command
- 0x28b85:$r1: Classes\Folder\shell\open\command
- 0x28adc:$k1: DelegateExecute
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x28014:$s1: RDPClip
- 0x28cf4:$s2: Grabber
- 0x28d04:$s2: Grabber
- 0x28600:$s3: Ave_Maria Stealer OpenSource
- 0x285b8:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x2c310:$s6: /n:%temp%\ellocnak.xml
- 0x2c340:$s7: Hey I'm Admin
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | MALWARE_Win_EXEPWSH_DLAgent | Detects SystemBC | ditekSHen | - 0x28d14:$pwsh: powershell
- 0x2553b:$s2: User-Agent:
- 0x2587c:$s4: LdrLoadDll
- 0x28508:$s4: LdrLoadDll
- 0x250c4:$v6: start
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x28948:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x271ac:$a2: SMTP Password
- 0x25d78:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x2c1f0:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x28838:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x26a38:$a6: \Torch\User Data\Default\Login Data
- 0x2c310:$a7: /n:%temp%\ellocnak.xml
- 0x2c340:$a9: Hey I'm Admin
- 0x26f84:$a10: \logins.json
- 0x2708c:$a10: \logins.json
- 0x27970:$a11: Accounts\Account.rec0
- 0x28600:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
6.0.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.400000.0.unpack | AveMaria_WarZone | unknown | unknown | - 0x28948:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x285e4:$str2: MsgBox.exe
- 0x28a24:$str4: \System32\cmd.exe
- 0x28600:$str6: Ave_Maria
- 0x27b98:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
- 0x271ac:$str8: SMTP Password
- 0x261d8:$str11: \Google\Chrome\User Data\Default\Login Data
- 0x27b44:$str12: \sqlmap.dll
- 0x27b5c:$str12: \sqlmap.dll
- 0x2c1f0:$str16: Elevation:Administrator!new
- 0x2c310:$str17: /n:%temp%
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de57f8.3.raw.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2318:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x5120:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de57f8.3.raw.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2318:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x5120:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x2318:$c1: Elevation:Administrator!new:
- 0x5120:$c1: Elevation:Administrator!new:
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.df8cd0.5.unpack | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de57f8.3.raw.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.raw.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2318:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.raw.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2318:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x2318:$c1: Elevation:Administrator!new:
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.raw.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xb18:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0xb18:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0xb18:$c1: Elevation:Administrator!new:
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de8600.2.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x5704c:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x5704c:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x5704c:$c1: Elevation:Administrator!new:
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x51524:$a1: \Opera Software\Opera Stable\Login Data
- 0x51824:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x5101c:$a3: \Google\Chrome\User Data\Default\Login Data
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x53899:$r1: Classes\Folder\shell\open\command
- 0x538fd:$r1: Classes\Folder\shell\open\command
- 0x53951:$r1: Classes\Folder\shell\open\command
- 0x539c9:$r1: Classes\Folder\shell\open\command
- 0x53920:$k1: DelegateExecute
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x52e58:$s1: RDPClip
- 0x53b38:$s2: Grabber
- 0x53b48:$s2: Grabber
- 0x53444:$s3: Ave_Maria Stealer OpenSource
- 0x533fc:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x5716c:$s6: /n:%temp%\ellocnak.xml
- 0x5719c:$s7: Hey I'm Admin
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | MALWARE_Win_EXEPWSH_DLAgent | Detects SystemBC | ditekSHen | - 0x53b58:$pwsh: powershell
- 0x5037f:$s2: User-Agent:
- 0x506c0:$s4: LdrLoadDll
- 0x5334c:$s4: LdrLoadDll
- 0x4ff08:$v6: start
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.363a1fc.6.unpack | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x5378c:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x51ff0:$a2: SMTP Password
- 0x50bbc:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x5704c:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x5367c:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x5187c:$a6: \Torch\User Data\Default\Login Data
- 0x5716c:$a7: /n:%temp%\ellocnak.xml
- 0x5719c:$a9: Hey I'm Admin
- 0x51dc8:$a10: \logins.json
- 0x51ed0:$a10: \logins.json
- 0x527b4:$a11: Accounts\Account.rec0
- 0x53444:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
6.3.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.de6d90.1.unpack | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x441:$r1: Classes\Folder\shell\open\command
- 0x495:$r1: Classes\Folder\shell\open\command
- 0x50d:$r1: Classes\Folder\shell\open\command
- 0x464:$k1: DelegateExecute
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x60098:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x60098:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x60098:$c1: Elevation:Administrator!new:
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x5a570:$a1: \Opera Software\Opera Stable\Login Data
- 0x5a870:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x5a068:$a3: \Google\Chrome\User Data\Default\Login Data
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x5c8e5:$r1: Classes\Folder\shell\open\command
- 0x5c949:$r1: Classes\Folder\shell\open\command
- 0x5c99d:$r1: Classes\Folder\shell\open\command
- 0x5ca15:$r1: Classes\Folder\shell\open\command
- 0x5c96c:$k1: DelegateExecute
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x5bea4:$s1: RDPClip
- 0x5cb84:$s2: Grabber
- 0x5cb94:$s2: Grabber
- 0x5c490:$s3: Ave_Maria Stealer OpenSource
- 0x5c448:$s4: \MidgetPorn\workspace\MsgBox.exe
- 0x601b8:$s6: /n:%temp%\ellocnak.xml
- 0x601e8:$s7: Hey I'm Admin
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | MALWARE_Win_EXEPWSH_DLAgent | Detects SystemBC | ditekSHen | - 0x5cba4:$pwsh: powershell
- 0x593cb:$s2: User-Agent:
- 0x5970c:$s4: LdrLoadDll
- 0x5c398:$s4: LdrLoadDll
- 0x58f54:$v6: start
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.3632fb0.5.raw.unpack | Windows_Trojan_AveMaria_31d2bce9 | unknown | unknown | - 0x5c7d8:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
- 0x5b03c:$a2: SMTP Password
- 0x59c08:$a3: select signon_realm, origin_url, username_value, password_value from logins
- 0x60098:$a4: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x5c6c8:$a5: for /F "usebackq tokens=*" %%A in ("
- 0x5a8c8:$a6: \Torch\User Data\Default\Login Data
- 0x601b8:$a7: /n:%temp%\ellocnak.xml
- 0x601e8:$a9: Hey I'm Admin
- 0x5ae14:$a10: \logins.json
- 0x5af1c:$a10: \logins.json
- 0x5b800:$a11: Accounts\Account.rec0
- 0x5c490:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | Codoso_Gh0st_2 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2c1f0:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | Codoso_Gh0st_1 | Detects Codoso APT Gh0st Malware | Florian Roth | - 0x2c1f0:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
- 0x2c1f0:$c1: Elevation:Administrator!new:
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth | - 0x266e0:$a1: \Opera Software\Opera Stable\Login Data
- 0x269e0:$a2: \Comodo\Dragon\User Data\Default\Login Data
- 0x261d8:$a3: \Google\Chrome\User Data\Default\Login Data
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | JoeSecurity_UACMe | Yara detected UACMe UAC Bypass tool | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM | Detects executables embedding command execution via IExecuteCommand COM object | ditekSHen | - 0x28a55:$r1: Classes\Folder\shell\open\command
- 0x28ab9:$r1: Classes\Folder\shell\open\command
- 0x28b0d:$r1: Classes\Folder\shell\open\command
- 0x28b85:$r1: Classes\Folder\shell\open\command
- 0x28adc:$k1: DelegateExecute
|
0.2.SecuriteInfo.com.Win32.PWSX-gen.1041.15454.exe.4963d30.12.raw.unpack | MALWARE_Win_WarzoneRAT | Detects AveMaria/WarzoneRAT | ditekSHen | - 0x28014:$s1: RDPClip
- 0x28cf4:$s2: Grabber
- 0x28d04:$s2: Grabber
- 0x28600:$s3: Ave_Maria Stealer OpenSource
- 0x285b8:$s4: \M
|