Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 6 and Jan. 13. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org , or ClamAV.net .
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.
The most prevalent threats highlighted in this roundup are:
Threat Name Type Description Win.Dropper.Lokibot-9982061-1 Dropper Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails. Win.Packed.Upatre-9982083-0 Packed Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware. Win.Worm.Vobfus-9982088-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers. Win.Dropper.Remcos-9982549-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails. Win.Dropper.Bifrost-9982192-0 Dropper Bifrost is a backdoor with more than 10 variants. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the client, to execute arbitrary code on the compromised machine. Bifrost contains standard RAT features including a file manager, screen capture utility, keylogging, video recording, microphone and camera monitoring, and a process manager. In order to mark its presence in the system, Bifrost uses a mutex that may be named "Bif1234," or "Tr0gBot." Win.Trojan.HawkEye-9982173-1 Trojan HawkEye is an information stealing malware that specifically targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media. Win.Dropper.TrickBot-9982207-0 Dropper TrickBot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts. Win.Packed.DarkComet-9982401-1 Packed DarkComet and related variants are a family of remote access trojans designed to provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user's machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system. Win.Dropper.Shiz-9982208-0 Dropper Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.
Threat Breakdown Win.Dropper.Lokibot-9982061-1 Indicators of Compromise IOCs collected from dynamic analysis of 16 samples Mutexes Occurrences 3749282D282E1E80C56CAE5A
16
Domain Names contacted by malware. Does not indicate maliciousness Occurrences shopper[.]bulutlogistic[.]com
16
Files and or directories created Occurrences %APPDATA%\D282E1
16 %APPDATA%\D282E1\1E80C5.lck
16 %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5
16 %APPDATA%\D282E1\1E80C5.exe
16 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\DeviceProperties.vbs
16 %HOMEPATH%\AppVClient
16 %HOMEPATH%\AppVClient\MuiUnattend.exe
16
File Hashes 1e89d325c93e38db0a565868ab614d7cd834336b1385456c646be0e9082eba51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 Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Packed.Upatre-9982083-0 Indicators of Compromise IOCs collected from dynamic analysis of 29 samples IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 38[.]65[.]142[.]12
28 104[.]18[.]114[.]97
15 104[.]18[.]115[.]97
13 71[.]99[.]130[.]24
6 66[.]196[.]61[.]218
5 96[.]46[.]103[.]232
5 87[.]249[.]142[.]189
4 98[.]214[.]11[.]253
4 87[.]229[.]109[.]250
4 216[.]16[.]93[.]250
4 173[.]243[.]255[.]79
4 66[.]196[.]63[.]33
4 76[.]84[.]81[.]120
3 85[.]135[.]104[.]170
3 66[.]215[.]30[.]118
3 104[.]174[.]123[.]66
3 188[.]255[.]239[.]34
3 69[.]144[.]171[.]44
3 69[.]9[.]204[.]114
3 65[.]33[.]236[.]173
3 68[.]70[.]242[.]203
3 98[.]222[.]64[.]184
3 24[.]148[.]217[.]188
2 72[.]230[.]82[.]80
2 24[.]33[.]131[.]116
2
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences icanhazip[.]com
28
Files and or directories created Occurrences %TEMP%\zoogymal.exe
28
File Hashes 00a70ad787f7835979f4a4910c536b65cedcfdf999694baa561238bb1372c211
0332d56c48dff801d3c4db04b9b7bc67b3b0c37481c912f8e5efebe25c65379f
06e7cf4d404e6b3c4966658605178b7f27b97fa65b86ed3fe5ed7ba189ff074e
0ab323a07848436a04a728c2d676d1315f5402c3d6e21e17a9e6edd648f795de
0ad75143ea7b45a1e39d847d54c5bbde5ceb2b18843b52babe8574ca401e4db7
0b131013bbe7553832b45a6540c4be22c452a244ef432f7b6fddb47d5b1c2cf3
0be4b37c4717d53925486df11d9c527be53ea4290c585187bfdafc055aa8f3ff
0fa4711a0c9e7dfc2135a0c7e9407691bf5677b1b1640e250abdc5db4a09f629
14ee75574d7c50b36e0a606d910f393926becb99d0703ea403f207bf6cb06918
15991e724ad40738bf12809d976053842ce01ed3922e49d501630adebc80e128
1647d865e07ebfb89fa02898b63b0ea9c2ffa14455364081d3bdc4a56e06cfcc
18a7a9ada7800ab1df038b7e0957c4aa8deba79dfdec0e390d75e964ee9b1853
19be03d1da5974890f083a5e2c014939ade91bc034c9eb6a88806a321232f9be
1badcfc36cb64a1e931be9768d92cf991edcd2b04d61b22bd36e87e07700f4bd
1be0f73ec48241a860f6551b37c5f732f2f96ff111632837906a143deac311c2
1cba83c1febd55426cca9fa581121acb3b54368642230a0cbfb067d82a133089
1d346fc64f792be85c3b438f75085a4ffe499226d194c14518ba38a9f5322623
2319c3f4c8a8d8fd332eb5a5465c8c217d37930a611d7c9aa8971d273fb75d74
23d3f205a2dbd4c71638daae0e45c65d52b6729c506ac5ba4bfc7901075c8dae
24a9743e5e7368323e8b0a810a7bb5d3e81dc9e73a986f09f442e39462e671e7
254349f4f682c7a562c562577b26c2ce3234cbc34b0412e6cb3865ca25c86cb1
262d2e9044037fae2b213d3c4d85e1a22712a4af3c4ded3fd4866879c890a89d
2878a00aa44232ea17f41e4d8284699bbe8765fdbadc516955ffc8ae93cc7add
2adf5eeec4f05e65a240f3eb24479e665c54feb0053d772a5988531a63bb8425
2b447b52389bbd40e5d51244895e6deee21e7da0c507fd99e9d1b8d29993e376
*See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Worm.Vobfus-9982088-0 Indicators of Compromise IOCs collected from dynamic analysis of 26 samples Registry Keys Occurrences <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
25 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: services
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: services
25 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN Value Name: services
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN Value Name: services
25
Mutexes Occurrences bs_pxy
25
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 173[.]192[.]176[.]139
25
Files and or directories created Occurrences %TEMP%\win32hlp.exe.jpg
25 %APPDATA%\win32hlp.exe
25
File Hashes 01a927c98d1a6c4a6b4ec9a07772d16aa2e141c0713f28a9142da88dccd4661c
01f6f311e250412bbaea712cf20a1bad3d033499d6b9feb1989c09d0d3b52bf5
029f0cdafcd1e43c80b328a4149b9351f768a26db83aafcc2e679576302571cd
032fe6ac96f6fb21fd01e2c0c146511f55b7a698f4520b2baa98921bed2192ca
03c81f2f1bb42eeb694a778e87fd3e5b44cd81f91a2604f45044437490638419
04149273008ed5b1aef18a5196719295e65ad049481432f5e5628a1de1208082
044ca0f0a7948140f562cca6dca7177adeb4a740d195f03a870577f7a772299b
052dd08dd67d615ac889ac38f34619e11f1c397471d2eeac5b9d921006aa193d
053662d3d28f0490b893404303c9eb8279c59774c54c8a119b56e0dd20500140
053f3008ebc5891beb7724ef27cf68da91289440de7e59b20f104398fa8288e9
05da1dffe77ae855f9ce7cb1f3ebc32d9701ba5e28654a04d5700ff4c75d9cb2
075f636f08c1f017ab277e97a3ae5cd1bce9072f03a5bdaeac7c5500ad390acc
07c6f9532ac8e9ac978c8a4d344d2cd92212208f8cad3f88d31f06ed89dd1e9e
0aabbb55d700442b8fc073e529488352830242b18501c1932bb8d01d0ca316e9
0b10a7c650b7a702f86164af756af70372649e9f071e5dc60d3da73479902df8
0b52d2766c544cc0c0ef432e4e01a02f04e6d31dbe52f416a6ab962a4bb61f07
0bd49c63bf53de7d8c6efc3a1756a68041fba3c8e15fccf7266a56f972edc1df
0c0a92c633f18385cb8502537836777131f0e9bdbf7a3e13a6eb4369f6b27b01
0cdc5acf471fc39aaea4e1de4b35b97647048a306e19221da5ac479629565051
0d23312c0f80a322e11a114a700ebb97814d29deed5c90dcbb76f404052ad0b4
0d8f470ce4a58ab6bff8f30531f2e423b7eb9c835aeb105fcf06c9416fb5a96e
0ece757c57f02ee83048fa87cd7582427f2fca256231182d0fa7dfb4708cab54
1027dd8ba0228dc47765f32f6328f3bfde47585b5870ef5e59791ed6667a7419
10c34e5c3a0aabfee083318141f9452e4cc60cad310a2dfc1a206fc83d5132b6
1165b40f6d4dac6d2c478553fcaaa541306b8246684108e001618238c4d3abd5
*See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Remcos-9982549-0 Indicators of Compromise IOCs collected from dynamic analysis of 21 samples Registry Keys Occurrences <HKCU>\SOFTWARE\WINRAR
5 <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9 Value Name: F
5 <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5 Value Name: F
5 <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC Value Name: F
5 <HKCU>\SOFTWARE\WINRAR Value Name: HWID
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: windows
1 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{L501JP3X-C6PC-RH36-475X-RS2C2OQHHGS0} Value Name: StubPath
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: hpsupportdf
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: windows1
1 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{256C14W2-4307-17L5-O833-2WK3KRN38HN2} Value Name: StubPath
1 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{256C14W2-4307-17L5-O833-2WK3KRN38HN2}
1 <HKCU>\SOFTWARE\HPSUPPORTA-PTVD52
1 <HKCU>\SOFTWARE\HPSUPPORTA-PTVD52 Value Name: exepath
1 <HKCU>\SOFTWARE\HPSUPPORTA-PTVD52 Value Name: licence
1 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{L501JP3X-C6PC-RH36-475X-RS2C2OQHHGS0}
1 <HKCU>\SOFTWARE\REMCOS-7AHD4U
1 <HKCU>\SOFTWARE\REMCOS-7AHD4U Value Name: exepath
1 <HKCU>\SOFTWARE\REMCOS-7AHD4U Value Name: licence
1 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 106f1d501242121b596cc520a89f0523397ced37435e8d4d81a5d57cc1f03714
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 106f1d501242121b596cc520a89f0523397ced37435e8d4d81a5d57cc1f03714
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: Registry Key Name
1
Mutexes Occurrences -
2 A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A
2 Remcos_Mutex_Inj
1 RV_MUTEX
1 Global\<<BID>>98B68E3C00000000
1 Global\<<BID>>98B68E3C00000001
1 hpsupporta-PTVD52
1 Remcos-7AHD4U
1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 38[.]26[.]191[.]78
4 79[.]134[.]225[.]120
1 185[.]165[.]153[.]221
1 35[.]205[.]61[.]67
1 185[.]165[.]153[.]29
1 172[.]82[.]128[.]240
1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences onlygoodam[.]com
4 adiill0053[.]ddns[.]net
1 manerck[.]com
1 fuckusa[.]info
1 werfcdxv[.]ru
1 maccfund[.]duckdns[.]org
1
Files and or directories created Occurrences %TEMP%\-<random, matching '[0-9]{9}'>.bat
5 %APPDATA%\Install\Host.exe
2 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\desktop.ini.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I62TWBD.ppt.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I6FGW9N.exe.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I6FZORX.doc.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IABMX83.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IAJ2Y6R.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IALGTCS.xlsx.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IAPSNOM.tsv.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IGORSF7.xsn.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IGTBBSA.accdb.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IH49RPF.ppt.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IH71GGR.ppt.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJKODPH.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJP965K.accdb.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IKY5R3M.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IMYCSIT.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ISLP722.doc.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXLC77A.pdf.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXUL2U1.doc.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IYSR1FU.ppt.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IZ2GMJW.XLSX.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R08BO8F.xlsx.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1 \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R11KHR4.doc.id[98B68E3C-2275].[checkcheck07@qq.com].Adame
1
*See JSON for more IOCs
File Hashes 0350cbfc4ff5a579a459d6ceff060d5d157d30f20fb451a94d82166631f18066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 Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Bifrost-9982192-0 Indicators of Compromise IOCs collected from dynamic analysis of 18 samples Registry Keys Occurrences <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Bulas
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: FW_KILL
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: XP_FW_Disable
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: XP_SYS_Recovery
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Online_List
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Port
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: LanNotifie
5 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN Value Name: DirectX For Microsoft® Windows
5 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5Y99AE78-58TT-11DW-BE53-Y67078979Y} Value Name: StubPath
5 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON Value Name: Shell
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Tport
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: ServerVersionInt
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Mail
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: KSil
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: ICQ_UIN2
5 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS
5 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5Y99AE78-58TT-11DW-BE53-Y67078979Y}
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT SCRIPT HOST\MICROSOFT DXDIAG\WINSETTINGS Value Name: Hata
5 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: EnableLUA
4 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC Value Name: Start
4 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS Value Name: Start
4 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS Value Name: Type
4
Mutexes Occurrences ASPLOG
4 DENEK
4 _x_X_BLOCKMOUSE_X_x_
2 _x_X_PASSWORDLIST_X_x_
2 _x_X_UPDATE_X_x_
2 Administrator5
1 Bif123
1 Local\{D45184B2-D44D-4D99-931B-B84626BC5EF2}
1 Global\71448401-8e57-11ed-9660-001517baa3de
1 2AC1A572DB6944B0A65C38C4140AF2F45c072227468
1 2AC1A572DB6944B0A65C38C4140AF2F45c072227490
1 2AC1A572DB6944B0A65C38C4140AF2F45c0722274A4
1 2AC1A572DB6944B0A65C38C4140AF2F45c0722274CC
1 2AC1A572DB6944B0A65C38C4140AF2F45c07222758C
1 2AC1A572DB6944B0A65C38C4140AF2F45c0722276DC
1 2AC1A572DB6944B0A65C38C4140AF2F45c072227710
1 2AC1A572DB6944B0A65C38C4140AF2F45c072227750
1 2AC1A572DB6944B0A65C38C4140AF2F45c072227828
1 2AC1A572DB6944B0A65C38C4140AF2F45c0722278B0
1 2AC1A572DB6944B0A65C38C4140AF2F45c073D96134
1 Global\7970dca1-8e57-11ed-9660-001517f0cb6e
1 Global\8aa08521-8e57-11ed-9660-001517ec5612
1 Global\82b4eea1-8e57-11ed-9660-001517d6ab3f
1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 178[.]237[.]20[.]14
1 23[.]222[.]236[.]33
1 24[.]201[.]72[.]161
1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences jrpg30[.]no-ip[.]biz
2 vasadosvandalo[.]no-ip[.]org
1 www[.]icq[.]com
1 racker[.]no-ip[.]org
1 jrpg30[.]no-ip[.]org
1 racker[.]no-ip[.]org2
1 jrpg30[.]no-ip[.]org2
1 tallmaster[.]no-ip[.]org
1 tallmaster[.]no-ip[.]org2
1
Files and or directories created Occurrences %SystemRoot%\services.exe
5 %System16%\sservice.exe
5 %SystemRoot%\SysWOW64\fservice.exe
5 %SystemRoot%\SysWOW64\winkey.dll
5 %SystemRoot%\SysWOW64\reginv.dll
5 %SystemRoot%\cmsetac.dll
4 %SystemRoot%\ntdtcstp.dll
4 %APPDATA%\addon.dat
2 %SystemRoot%\mstwain32.exe
2 %SystemRoot%\tkjn.exe
2 %APPDATA%\8570673.exe
1 %TEMP%\njq6086.tmp
1 %TEMP%\Kill1.exe
1 %TEMP%\Kill2.exe
1 %SystemRoot%\3790487.exe.bat
1 %TEMP%\1878931.exe
1 %TEMP%\7582623.jpg
1 %TEMP%\gjq6344.tmp
1 %TEMP%\PROGRAMA iTouch.exe
1 %SystemRoot%\1068842.jpg
1 %SystemRoot%\3790487.exe
1 %SystemRoot%\7981640.exe
1 %TEMP%\6118084.jpg
1 %TEMP%\6221277.exe
1 %SystemRoot%\SysWOW64\FGOIKG\AKV.exe
1
*See JSON for more IOCs
File Hashes 16d1317d954506fb689c594e0dbea407c5d224882d02ee9c97944ecaf2aa815e
2580b7e5ab9ca31e8dd146f1e5e3bde58287794e4c876ae6e74ab2b93f38fc90
288990debffcd3adb7af4e84c86f83e49f1c3726b95f61bf84fded46fbd74a77
2e3cbe941ab655a6d3ea57382028a75794ebd7895dfaba49ac3aad78921f172f
3c39945e576bdfe9a878b8543c925bbd48f03a778c4f4aabb50362aff6340bfa
43931b0b9523f9f80e6846838495bfcdfac29b4ad4f47e24032ac02c1d0158f2
48e01c9d590f702876d78f5c7eb7c6d1473174c062e34aafd496fbccfff530ba
4ce9d9c4d2bb24b5e1f2c7429f2fcd04096ee3038cf7bf3f1ec33d040a4e37fc
5d3988d3e1f179c521916b9cab44bf663dacf9a4eb54065475f7619a89a85160
69780d868e9beee05b3070af2dfc55e953ecde1d826aef0ec27cbbe8ca32ef14
6b11b23dbbc86681e47b0aa7e8406d7782e790ee187020e46762312c4cc8b9a8
78684bb61de2e43084294d8e38974d3e5150174fe5f0282c40ef701d5d621ab7
7deb18fe91d5c043b06f0d7cb3894176b8eaf26b76f3cec14aae17bd91facb8a
b780a6616b56776be514c74c969be3c2b51acd03b81f3ace8d666d5d4b0d1feb
bf95dc1c0b1b6c234eb8eac2a967c38adbf28bf9aa22558aff970fc92def0813
c4736cc96c32c48fb86a39d47b5732dc3171f71c0d48033cb1d4c9e62f0b08ea
e9bf3013a7a3985eb4c658e8973147c70770e96edb70b12faa77ea469312d0bd
efc1da346ba66ebd0defb0be5cda235c16116b24778ad2ec386de715bec0bcdb
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Trojan.HawkEye-9982173-1 Indicators of Compromise IOCs collected from dynamic analysis of 20 samples Registry Keys Occurrences <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED Value Name: Hidden
13 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: Windows Update
6
Mutexes Occurrences 3749282D282E1E80C56CAE5A
7 Global\<random guid>
3
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 104[.]16[.]154[.]36
7 104[.]16[.]155[.]36
6 208[.]91[.]199[.]224
1 23[.]94[.]43[.]90
1 185[.]128[.]81[.]119
1 202[.]66[.]174[.]77
1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences whatismyipaddress[.]com
13 smtp[.]decemberdonreach[.]com
2 www[.]traucotravel[.]com
2 sahakyanshn[.]com
2 smtp[.]wanjiall-group[.]com
1 us2[.]smtp[.]mailhostbox[.]com
1 smtp[.]millionslogs[.]com
1 mail[.]mmt-me[.]com
1 smtp[.]esrgroup-au[.]com
1 mail[.]salesoffice1[.]com
1 mail[.]hoordesign[.]com
1 traucotravel[.]com
1 jelimold[.]com
1
Files and or directories created Occurrences %APPDATA%\pid.txt
13 %APPDATA%\pidloc.txt
13 %TEMP%\holdermail.txt
10 %TEMP%\holderwb.txt
9 %APPDATA%\D282E1
7 %APPDATA%\D282E1\1E80C5.lck
7 %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5
7 %APPDATA%\WindowsUpdate.exe
6
File Hashes 25c4e0e82248fe0f5eeaaa95ad509506e3ccebd87fa0b15fca2ca8e57f3e9355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 Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.TrickBot-9982207-0 Indicators of Compromise IOCs collected from dynamic analysis of 25 samples Registry Keys Occurrences <HKLM>\SYSTEM\CONTROLSET001\SERVICES\EFS Value Name: Start
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED Value Name: ShowCompColor
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\EFS\CURRENTKEYS Value Name: Capabilities
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\EFS\CURRENTKEYS Value Name: NumBackupAttempts
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\EFS\CURRENTKEYS
25 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES
25 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINDOWS
25 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
25 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: LanguageList
25 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINDOWS Value Name: UniqueUserHash
25 <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CERTIFICATES\36CA11DE9886E4D13A82049E967E9A354BA64866
2 <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CERTIFICATES\36CA11DE9886E4D13A82049E967E9A354BA64866
2 <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CERTIFICATES\36CA11DE9886E4D13A82049E967E9A354BA64866 Value Name: Blob
2 <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CERTIFICATES\36CA11DE9886E4D13A82049E967E9A354BA64866 Value Name: Blob
2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: PATHPING
2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE Value Name: PATHPING
2 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: PATHPING
2 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE Value Name: PATHPING
2 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE Value Name: certreq
1 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: ARP
1 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE Value Name: ARP
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: cacls
1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE Value Name: cacls
1 <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: cacls
1
Mutexes Occurrences CTF.Compart.Mutex.{40873C05-0BAB-1575-53E7-E3B7E9D4CC75}
25 MSCTF.SHARED.MUTEX.{7F088249-2BED-DE54-803E-53B1C3A674AF}
25 Local\{6F884C5F-38C5-4662-BC91-53BD684CCB0D}S-1-5-21-2580483871-590521980-3826313501-500
25 Local\{A55C3BEE-5BFF-4c61-8833-39CD46D49BC7}-1-S-1-5-21-2580483871-590521980-3826313501-500
25 MSCTF.Shared.MUTEX.9cb030d9
25 MSCTF.Shared.EVENT.3e261e83
25 shell.{C41FA798-DCC4-AA56-599A-737C5A6CFFA8}
25 MSCTF.Shared.MUTEX.4acf71e1
25 MSCTF.Shared.MUTEX.c4db82e0
25 MSCTF.Shared.MUTEX.b45dae0d
25 MSCTF.Shared.EVENT.4d29acca
23 MSCTF.Shared.EVENT.c6bc01be
23 MSCTF.Shared.MUTEX.4d29acca
23 MSCTF.Shared.MUTEX.a694d665
23 MSCTF.Shared.MUTEX.c6bc01be
23 MSCTF.Shared.MUTEX.e35e00df
23 MSCTF.Shared.MUTEX.10e27d81
23 MSCTF.Shared.MUTEX.1ddf8ea2
23 MSCTF.Shared.MUTEX.2144df1c
23 MSCTF.Shared.MUTEX.273b1396
23 MSCTF.Shared.MUTEX.2e3f9266
23 MSCTF.Shared.MUTEX.380fe355
23 MSCTF.Shared.MUTEX.60d05f0d
23 MSCTF.Shared.MUTEX.77224409
23 MSCTF.Shared.MUTEX.80b41a15
23
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 217[.]23[.]9[.]206
25
Files and or directories created Occurrences \System Volume Information\EFS0.LOG
25 %APPDATA%\Microsoft\Windows\dllcache
25 %APPDATA%\Microsoft\Windows\dllcache\drivers
25 \Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp
25 %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp
25 \{40873C05-0BAB-1575-53E7-E3B7E9D4CC75}
24 \temp\localsystem.txt
23 %APPDATA%\Microsoft\Windows\dllcache\Magnify.exe
15 %APPDATA%\Microsoft\Windows\dllcache\NAPCRYPT.DLL
15 %APPDATA%\Microsoft\Windows\dllcache\fc.exe
14 %APPDATA%\Microsoft\Windows\dllcache\ubpm.dll
14 %APPDATA%\Microsoft\Windows\dllcache\takeown.exe
14 %APPDATA%\Microsoft\Windows\dllcache\WEB.rs
13 %APPDATA%\Microsoft\Windows\dllcache\w32tm.exe
13 %APPDATA%\Microsoft\Windows\dllcache\eapp3hst.dll
13 %APPDATA%\Microsoft\Windows\dllcache\rasctrnm.h
13 %APPDATA%\Microsoft\Windows\dllcache\t2embed.dll
13 %APPDATA%\Microsoft\Windows\dllcache\VAN.dll
12 %APPDATA%\Microsoft\Windows\dllcache\cacls.exe
12 %APPDATA%\Microsoft\Windows\dllcache\QAGENT.DLL
12 %APPDATA%\Microsoft\Windows\dllcache\KBDBLR.DLL
11 %APPDATA%\Microsoft\Windows\dllcache\JavaScriptCollectionAgent.dll
11 %APPDATA%\Microsoft\Windows\dllcache\rasautou.exe
11 %APPDATA%\Microsoft\Windows\dllcache\l2gpstore.dll
11 %APPDATA%\Microsoft\Windows\dllcache\ucrtbase.dll
11
*See JSON for more IOCs
File Hashes 010f84deb5e78bad41895e882203db172819778c5dfd28c26eb079e8be50d77f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*See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Packed.DarkComet-9982401-1 Indicators of Compromise IOCs collected from dynamic analysis of 23 samples Registry Keys Occurrences <HKCU>\SOFTWARE\DC3_FEXEC
22 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON Value Name: UserInit
10 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: LanguageList
6 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: DarkComet RAT
5 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: EnableLUA
3 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER Value Name: AntiVirusDisableNotify
3 <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER Value Name: UpdatesDisableNotify
3 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: MicroUpdate
3 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
3 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE Value Name: EnableFirewall
2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE Value Name: DisableNotifications
2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC Value Name: Start
2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: DisableRegistryTools
2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: rundll32
2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: DisableTaskMgr
1
Mutexes Occurrences DC_MUTEX-<random, matching [A-Z0-9]{7}>
8 DCPERSFWBP
3 DCMIN_MUTEX-ZDY0P6P
2 Global\27d1fa40-3def-11ed-9660-001517b8248a
1 DCMIN_MUTEX-BMAZJU1
1 DCMIN_MUTEX-MG8WJXZ
1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences nitoh95240[.]no-ip[.]org
4 epiclegit[.]no-ip[.]biz
2 nzarkatar[.]no-ip[.]biz
1 faffa[.]no-ip[.]org
1 c0san0stra[.]zapto[.]org
1 jonshouse[.]no-ip[.]biz
1
Files and or directories created Occurrences %APPDATA%\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\<original file name>.exe
15 %APPDATA%\dclogs
12 %HOMEPATH%\Documents\DCSCMIN
5 %HOMEPATH%\Documents\DCSCMIN\IMDCSC.exe
5 %HOMEPATH%\Documents\MSDCSC
3 %HOMEPATH%\Documents\MSDCSC\msdcsc.exe
3 %TEMP%\MSDCSC
2 %TEMP%\MSDCSC\msdcsc.exe
2 %TEMP%\W63.JPG
1
File Hashes 1ee3ae7119ccc045cefe6de4f99f2da69f05d244bfef964795a9e9b08163ad97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 Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Shiz-9982208-0 Indicators of Compromise IOCs collected from dynamic analysis of 25 samples Registry Keys Occurrences <HKLM>\SOFTWARE\MICROSOFT Value Name: 67497551a
24 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON Value Name: 98b68e3c
24 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON Value Name: userinit
24 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON Value Name: System
24 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS Value Name: load
24 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS Value Name: run
24 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: userinit
24
Mutexes Occurrences Global\674972E3a
24 Global\MicrosoftSysenterGate7
24 internal_wutex_0x000004b4
24 internal_wutex_0x0000043c
24 internal_wutex_0x000004dc
24 internal_wutex_0x<random, matching [0-9a-f]{8}>
24
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 85[.]94[.]194[.]169
24 13[.]107[.]21[.]200
15 45[.]33[.]18[.]44
7 198[.]58[.]118[.]167
6 45[.]33[.]20[.]235
6 45[.]79[.]19[.]196
5 45[.]33[.]2[.]79
5 45[.]56[.]79[.]23
4 72[.]14[.]185[.]43
4 96[.]126[.]123[.]244
2 45[.]33[.]23[.]183
2 173[.]255[.]194[.]134
2 72[.]14[.]178[.]174
2 45[.]33[.]30[.]197
1
Domain Names contacted by malware. Does not indicate maliciousness Occurrences purijygirem[.]eu
24 dimasyhageh[.]eu
24 ciqofymosip[.]eu
24 vonerymekix[.]eu
24 novubymyvip[.]eu
24 fobyqyhezem[.]eu
24 gacucuhumeg[.]eu
24 maxilumiriz[.]eu
24 jelojujopen[.]eu
24 qekafuqafit[.]eu
24 ryhyruqeliz[.]eu
24 kejepujajeg[.]eu
24 tufibiqunit[.]eu
24 lygumujycen[.]eu
24 xudoxijiwef[.]eu
24 pupoliqotul[.]eu
24 citahikodab[.]eu
24 direfiwahur[.]eu
24 vowypikelaf[.]eu
24 foqurowyxul[.]eu
24 nomimokubab[.]eu
24 mavaxokitad[.]eu
24 rylupalyxad[.]eu
24 jecekorosuk[.]eu
24 qexeholagav[.]eu
24
*See JSON for more IOCs
Files and or directories created Occurrences %TEMP%\<random, matching [A-F0-9]{1,4}>.tmp
24
File Hashes 00a9f6bb07a133aff93fa5dfd009477e886e2da2fd0a6d41b19deb29e737c950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*See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK