Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Dec. 2 and Dec. 9. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org , or ClamAV.net .
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.
The most prevalent threats highlighted in this roundup are:
Threat Name Type Description Win.Dropper.Tofsee-9980095-0 Dropper Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator's control. Win.Dropper.Gh0stRAT-9980136-1 Dropper Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks. Win.Malware.Barys-9980160-0 Malware This is a trojan and downloader that allows malicious actors to upload files to a victim's computer. Win.Ransomware.TeslaCrypt-9980162-0 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily. Win.Dropper.Remcos-9980211-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails. Win.Downloader.Upatre-9980388-0 Downloader Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware. Win.Dropper.Zeus-9980208-0 Dropper Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing. Win.Packed.Formbook-9980347-1 Packed Formbook is an information stealer that attempts to collect sensitive information from an infected machine by logging keystrokes, stealing saved web browser credentials, and monitoring information copied to the clipboard.
Threat Breakdown Win.Dropper.Tofsee-9980095-0 Indicators of Compromise IOCs collected from dynamic analysis of 47 samples Registry Keys Occurrences <HKU>\.DEFAULT\CONTROL PANEL\BUSES32 <HKU>\.DEFAULT\CONTROL PANEL\BUSES Value Name: Config2 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Type 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Start 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: ErrorControl 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: DisplayName 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: WOW64 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: ObjectName 32 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Description 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: LanguageList 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-100 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-101 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-103 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-102 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-1 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-2 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-4 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-3 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-100 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-101 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-102 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-103 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-100 32 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-101 32
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 80[.]66[.]75[.]432 176[.]113[.]115[.]15332 176[.]113[.]115[.]154/3132 176[.]113[.]115[.]156/3132 176[.]113[.]115[.]15832 185[.]246[.]220[.]21832 142[.]250[.]80[.]426 31[.]13[.]65[.]17424 31[.]13[.]65[.]5224 66[.]254[.]114[.]4122 40[.]93[.]207[.]0/3112 20[.]112[.]52[.]2910 64[.]88[.]254[.]180/3110 20[.]81[.]111[.]858 20[.]84[.]181[.]628 104[.]47[.]53[.]367 157[.]240[.]241[.]637 99[.]181[.]79[.]157 142[.]251[.]40[.]2386 104[.]47[.]58[.]335 52[.]101[.]40[.]295 104[.]47[.]54[.]364 104[.]244[.]42[.]664 20[.]103[.]85[.]334 40[.]93[.]207[.]24
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences 249[.]5[.]55[.]69[.]bl[.]spamcop[.]net32 249[.]5[.]55[.]69[.]cbl[.]abuseat[.]org32 249[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net32 249[.]5[.]55[.]69[.]in-addr[.]arpa32 249[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org32 249[.]5[.]55[.]69[.]zen[.]spamhaus[.]org32 microsoft-com[.]mail[.]protection[.]outlook[.]com32 microsoft[.]com32 www[.]google[.]com32 svartalfheim[.]top32 i[.]instagram[.]com24 www[.]instagram[.]com24 www[.]pornhub[.]com22 api[.]twitter[.]com13 outlook[.]office365[.]com12 ev-h[.]phncdn[.]com10 www[.]youtube[.]com8 www[.]tiktok[.]com8 static[.]cdninstagram[.]com7 video-weaver[.]hel03[.]hls[.]ttvnw[.]net7 m[.]youtube[.]com6 imap[.]mail[.]yahoo[.]com4 identitysso[.]betfair[.]com4 work[.]a-poster[.]info3 www[.]google[.]es3
*See JSON for more IOCs
Files and or directories created Occurrences %SystemRoot%\SysWOW64\config\systemprofile32 %SystemRoot%\SysWOW64\config\systemprofile:.repos32 %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>31 %TEMP%\<random, matching '[a-z]{8}'>.exe28 %TEMP%\zfxmrkb.exe1 %TEMP%\gwylcuf.exe1 %TEMP%\qwodibs.exe1 %TEMP%\wmobskv.exe1
File Hashes 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 *See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Gh0stRAT-9980136-1 Indicators of Compromise IOCs collected from dynamic analysis of 10 samples Registry Keys Occurrences <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'>6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: Type 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: Start 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: ErrorControl 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: ImagePath 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: DisplayName 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: WOW64 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: ObjectName 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: Description 6 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RS<random, matching '[A-Z]{4} [A-Z]{8}'> Value Name: FailureActions 6 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSGSCE SGUCOMGW1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSGSCE SGUCOMGW Value Name: ConnectGroup 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSGSCE SGUCOMGW Value Name: MarkTime 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSUZTZ KQJEXTVY1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSUZTZ KQJEXTVY Value Name: ConnectGroup 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSUZTZ KQJEXTVY Value Name: MarkTime 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSWISU YECUACYA1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSWISU YECUACYA Value Name: ConnectGroup 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSWISU YECUACYA Value Name: MarkTime 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSCDXM RIIFDJKA1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSCDXM RIIFDJKA Value Name: ConnectGroup 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSCDXM RIIFDJKA Value Name: MarkTime 1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSXYLX NTFSGSOE1 <HKLM>\SYSTEM\CONTROLSET001\CONTROL\RSXYLX NTFSGSOE Value Name: ConnectGroup 1
Mutexes Occurrences 127.0.0.1:8000:Rsgsce sgucomgw1 ikun100.e2.luyouxia.net:25048:Rsuztz kqjextvy1 ikun100.e2.luyouxia.net:28249:Rswisu yecuacya1 127.0.0.1:17472:Rsxylx ntfsgsoe1 127.0.0.1:8888:Rscdxm riifdjka1 127.0.0.1:6666:Rsuusw uemccgci1 154.31.253.253:8000:Rsoiae ykkeoaki1 127.0.0.1:8000:Rsqigq cmekwwqs1 127.0.0.1:443:Rsqccq cygoawyq1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 47[.]52[.]162[.]137 43[.]248[.]129[.]491 180[.]97[.]221[.]1201 154[.]31[.]253[.]2531
Domain Names contacted by malware. Does not indicate maliciousness Occurrences guduo[.]xyz7 ikun100[.]e2[.]luyouxia[.]net2
Files and or directories created Occurrences %ProgramFiles(x86)%\Vrpbjrd.exe1 %ProgramFiles(x86)%\Fvcbfwe.exe1 %ProgramFiles(x86)%\Tbltlrr.exe1 %ProgramFiles(x86)%\Cayeqau.exe1 %ProgramFiles(x86)%\Microsoft Iewicw1 %ProgramFiles(x86)%\Microsoft Iewicw\Docspgf.exe1 %ProgramFiles(x86)%\Microsoft Kasiyg1 %ProgramFiles(x86)%\Microsoft Kasiyg\Waekgmk.exe1 %ProgramFiles(x86)%\Microsoft Ltuyhe1 %ProgramFiles(x86)%\Microsoft Ltuyhe\Ckuoeia.exe1
File Hashes 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
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Malware.Barys-9980160-0 Indicators of Compromise IOCs collected from dynamic analysis of 89 samples Registry Keys Occurrences <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DNSSET89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STANS89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ZWEBNDS89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Type 89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Start 89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: ErrorControl 89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: Devname 89 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> Value Name: ImagePath 89 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\STARTPAGE Value Name: StartMenu_Balloon_Time 1
Mutexes Occurrences Global\4B565BD3ADE41C32BFE32C5F3FE1059D89 Global\7632BD7EC1DECCA3E3E889 Global\D914CB10-68E3-098B-04C5-2DA38F00B471AD2-5C40-B890-3E8689 7632BD7EC1DECCA3E3E889 4B565BD3ADE41C32BFE32C5F3FE1059D89 D914CB10-68E3-098B-04C5-2DA38F00B471AD2-5C40-B890-3E8689 XMX_XP2P_YT_327589 XROExep_972589 XROMain89
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 204[.]27[.]62[.]7089 157[.]185[.]170[.]14449 157[.]185[.]177[.]20519 157[.]185[.]163[.]15815 180[.]95[.]234[.]24110 58[.]242[.]226[.]1188 113[.]1[.]0[.]1017 14[.]204[.]51[.]2407 221[.]204[.]209[.]1496 211[.]97[.]81[.]1365 116[.]130[.]221[.]525 211[.]93[.]212[.]2355 211[.]93[.]212[.]1444 116[.]177[.]242[.]674 157[.]185[.]158[.]1983 122[.]188[.]38[.]733 211[.]93[.]211[.]2193 116[.]136[.]170[.]1403 14[.]204[.]51[.]2502 221[.]204[.]209[.]2122 116[.]153[.]4[.]1262 221[.]204[.]209[.]2222 116[.]162[.]164[.]1402 36[.]248[.]43[.]2312 138[.]113[.]159[.]202
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences www[.]58sky[.]com89 www[.]go890[.]com89 www[.]ip138[.]com89 ip[.]catr[.]cn89 ip[.]dnsexit[.]com89 wdx[.]go890[.]com89 cnwx[.]58ad[.]cn1
Files and or directories created Occurrences %HOMEPATH%\Favorites\Links\Web Slice Gallery.url89 %APPDATA%\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk89 %APPDATA%\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk89 %PUBLIC%\Desktop\Mozilla Firefox.lnk89 %SystemRoot%\CLOG.txt89 %SystemRoot%\<random, matching [a-z]{7,15}>75 %ProgramData%\<random, matching '[a-z0-9]{3,7}'>43 %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>11 %APPDATA%\<random, matching '[a-z0-9]{3,7}'>10 %SystemRoot%\Ecwlfx.dll1 %ProgramFiles(x86)%\qtYFJqH\037c7de6f86d42b5c6b4d80d4c7d702dd7e3b91b16e889a993d9143dbf74951.exe1 %SystemRoot%\TkfjQTfy.dll1 %ProgramData%\gQggFKP\1032d5ab9736fa60278d22aa886032e9f13a5ee3fb3b6fe33cee5dafacf71c3.exe1 %SystemRoot%\iXPXOhc.dll1 %SystemRoot%\AtPCE8nfVTo.sys1 %SystemRoot%\IrivNwvL.dll1 %SystemRoot%\mvdrxdQ\HKwLLAe.dll1 %SystemRoot%\mvdrxdQ\IgFVsxMO.dll1 %SystemRoot%\mvdrxdQ\JbVBclbtc.tmp1 %SystemRoot%\mvdrxdQ\cmJAAa.dll1 %SystemRoot%\mvdrxdQ\hpIfIHR.dll1 %SystemRoot%\YbASbAvG\JQweUYuK.dll1 %SystemRoot%\YbASbAvG\PnAmehBa.tmp1 %SystemRoot%\YbASbAvG\RsQAstc.dll1 %SystemRoot%\YbASbAvG\VAmVHnO.dll1
*See JSON for more IOCs
File Hashes 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 *See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Ransomware.TeslaCrypt-9980162-0 Indicators of Compromise IOCs collected from dynamic analysis of 15 samples Registry Keys Occurrences <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: EnableLinkedConnections 15 <HKU>\.DEFAULT\SOFTWARE\TRUEIMG15 <HKCU>\SOFTWARE\TRUEIMG15 <HKCU>\SOFTWARE\TRUEIMG Value Name: ID 15 <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'>14 <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'> Value Name: data 14 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++vgwk 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++yqwy 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++cipe 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++doki 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++ibjn 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++qnch 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++tula 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++mesu 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++cqeu 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++ulau 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++vcta 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++tdao 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++pfgo 1 <HKCU>\SOFTWARE\49FAE92EED4571 <HKCU>\SOFTWARE\49FAE92EED457 Value Name: data 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++ogri 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: +++hnnn 1
Mutexes Occurrences 9_9_9_915
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 139[.]59[.]22[.]5015 119[.]18[.]54[.]10415 104[.]112[.]19[.]8014 75[.]2[.]26[.]188 23[.]3[.]13[.]1298 99[.]83[.]153[.]1087 23[.]3[.]13[.]1523 23[.]218[.]119[.]731
Domain Names contacted by malware. Does not indicate maliciousness Occurrences www[.]godaddy[.]com15 diwali2k15[.]in15 samuday[.]org15 maxmpl[.]com15 setprosports[.]info15 masterlegue[.]com15 toolaria[.]com15 apps[.]identrust[.]com11
Files and or directories created Occurrences %ProgramFiles%\7-Zip\Lang\lt.txt15 %ProgramFiles%\7-Zip\Lang\lv.txt15 %ProgramFiles%\7-Zip\Lang\mk.txt15 %ProgramFiles%\7-Zip\Lang\mn.txt15 %ProgramFiles%\7-Zip\Lang\mng.txt15 %ProgramFiles%\7-Zip\Lang\mng2.txt15 %ProgramFiles%\7-Zip\Lang\mr.txt15 %ProgramFiles%\7-Zip\Lang\ms.txt15 %ProgramFiles%\7-Zip\Lang\nb.txt15 %ProgramFiles%\7-Zip\Lang\ne.txt15 %ProgramFiles%\7-Zip\Lang\nl.txt15 %ProgramFiles%\7-Zip\Lang\nn.txt15 %ProgramFiles%\7-Zip\Lang\pa-in.txt15 %ProgramFiles%\7-Zip\Lang\pl.txt15 %ProgramFiles%\7-Zip\Lang\ps.txt15 %ProgramFiles%\7-Zip\Lang\pt-br.txt15 %ProgramFiles%\7-Zip\Lang\pt.txt15 %ProgramFiles%\7-Zip\Lang\ro.txt15 %ProgramFiles%\7-Zip\Lang\ru.txt15 %ProgramFiles%\7-Zip\Lang\sa.txt15 %ProgramFiles%\7-Zip\Lang\si.txt15 %ProgramFiles%\7-Zip\Lang\sk.txt15 %ProgramFiles%\7-Zip\Lang\sl.txt15 %ProgramFiles%\7-Zip\Lang\sq.txt15 %ProgramFiles%\7-Zip\Lang\sr-spc.txt15
*See JSON for more IOCs
File Hashes 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
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Remcos-9980211-0 Indicators of Compromise IOCs collected from dynamic analysis of 17 samples Registry Keys Occurrences <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: LanguageList 7 <HKU>\S-1-5-21-2580483871-590521980-3826313501-500 Value Name: di 6 <HKCU>\ENVIRONMENT Value Name: SEE_MASK_NOZONECHECKS 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-100 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-101 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-103 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\dhcpqec.dll,-102 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-1 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-2 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-4 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\napipsec.dll,-3 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-100 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-101 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-102 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\tsgqec.dll,-103 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-100 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-101 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-102 6 <HKCR>\LOCAL SETTINGS\MUICACHE\82\52C64B7E Value Name: @%SystemRoot%\system32\eapqec.dll,-103 6 <HKCU>\SOFTWARE\B97EB4B823F471563A37F56B08402D8E4 <HKCU>\SOFTWARE\B97EB4B823F471563A37F56B08402D8E Value Name: [kl] 4 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: MyApp 2 <HKCU>\SOFTWARE\B80B7F3A74788ADC36FE0A59F000A1882 <HKCU>\SOFTWARE\B80B7F3A74788ADC36FE0A59F000A188 Value Name: [kl] 2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: newapp 1
Mutexes Occurrences \??\kofhbzgh17 b97eb4b823f471563a37f56b08402d8e4 b80b7f3a74788adc36fe0a59f000a1882 Remcos_Mutex_Inj1 -1 Local\OfficeSharedLocks_BootMutex_00_S-1-5-181 Local\OfficeSharedLocks_Heap_00_S-1-5-181 Remcos_hgdfdv-X74SUU1 Global\{fda47647-ddc0-4495-9b65-474fd1da1d12}1 3a1e266e-c6f2-4899-82cc-0a025adc38c11
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 41[.]190[.]3[.]2094 192[.]169[.]69[.]252 3[.]230[.]36[.]582 34[.]239[.]194[.]1812 37[.]235[.]1[.]1771 37[.]235[.]1[.]1741 54[.]174[.]11[.]261 52[.]0[.]220[.]1521
Domain Names contacted by malware. Does not indicate maliciousness Occurrences checkip[.]amazonaws[.]com6 oluya[.]duckdns[.]org4 brightgee[.]nsupdate[.]info2 moran101[.]duckdns[.]org2 larbivps[.]freemyip[.]com1 nnekamma[.]net-freaks[.]com1 alaincrestel1900[.]ddns[.]net1
Files and or directories created Occurrences %TEMP%\<random, matching '[0-9]{15}'>000_<random GUID>.db6 %ProgramData%\hhwwx.bmp3 %APPDATA%\MyApp2 %APPDATA%\MyApp\MyApp.exe2 %APPDATA%\newapp1 %APPDATA%\newapp\newapp.exe1 %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C51 %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs1 %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator1 %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat1 %APPDATA%\remcos1 %APPDATA%\remcos\logs.dat1 %APPDATA%\Imminent1 %APPDATA%\Imminent\Logs1 %APPDATA%\Imminent\Monitoring1 %APPDATA%\Imminent\Monitoring\network.dat1 %APPDATA%\Imminent\Monitoring\system.dat1 %APPDATA%\Postbox\profiles.ini1 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\DuxyMxa.exe1 %APPDATA%\Imminent\Logs\03-12-20221
File Hashes 0d9c91a70cb6ef3ee203e3b567282e2c2516c616ffa9d30405d64121efc949ec0e3e8fb6ae66a63a9b085514af208f1304f4b3255b17a4f2ba1990557835dc051441f8d1944520b632283d1efc22834dead226b3c19b921e5dacfa11e160e74915cdb95a89888a9bfa89452569a16b207a7a7295ae61a10db6597d4789c4cc0716f97d958631051e7def9b8771113567ca1b6b62faaa4431d5e2e9c22bd374991c3db036cfbbd66de809349070b0779e7e55bf95eba73bc03226a893157ea4381f467584ef1ea939eee491e32224c2d6ad8a09e9e60632e24327287e38a62a955aaed2fc51f080c89338fbb2f2f6818ac81c171e741b1aa8cec594498257f04167461eba2b2c3ab2a6aadca7f6b78a983db0a35c18848f21ed8b57a69aeb986b6b0aa0eee21218db03f3723ddbd15470c4671b5a267d1a7c99a060d4c8ea7e5d8886a57440f1867b19e5bfac523628cae4fa3b907f642bc7cab18b179f5929fa9712034d5ede4484df452e0415e10a6b515c71e4ae7251eac7dc8508a9fa978a98c5897c46204838ea5ef07c3ea40b3b0267f2d454de518794f9fa257afa1660ae4d60251215497b30a1bc4dfcb126f948daedef4777650d2c03647aadb4ff64bf5f3af820ab0d2c8117713369a31455fbaea57ee19a2a6474f850736c4e4eacd59caa0f1181d3c3c21fbfe06c17621408ab1a3b6a10cdfea6b71e0659fbce91ee65d409071b4d25b7d4c90c7658b3153bbd6b186402dd47e401865c12ddfa7b
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Downloader.Upatre-9980388-0 Indicators of Compromise IOCs collected from dynamic analysis of 28 samples IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 204[.]11[.]56[.]4828 15[.]197[.]142[.]17315 3[.]33[.]152[.]14713
Domain Names contacted by malware. Does not indicate maliciousness Occurrences clevelandeyedr[.]com28 goldbagshopping[.]com28 mumbaich[.]com28
Files and or directories created Occurrences %TEMP%\viewpdf_updater.exe28 %TEMP%\vmp018.exe28
File Hashes 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 *See JSON for more IOCs
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Win.Dropper.Zeus-9980208-0 Indicators of Compromise IOCs collected from dynamic analysis of 15 samples Registry Keys Occurrences <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY Value Name: CleanCookies 2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: {2EC645E8-BA31-AD44-55BA-04D54CAC27C8} 2 <HKCU>\SOFTWARE\MICROSOFT\XYKE Value Name: 10f2f269 1 <HKCU>\SOFTWARE\MICROSOFT\XYKE Value Name: 31638d6j 1 <HKCU>\SOFTWARE\MICROSOFT\XYKE1 <HKCU>\SOFTWARE\MICROSOFT\XYKE Value Name: 14afb6i7 1 <HKCU>\SOFTWARE\MICROSOFT\EVAXEW Value Name: 183d225f 1 <HKCU>\SOFTWARE\MICROSOFT\EVAXEW Value Name: 2dh3617d 1 <HKCU>\SOFTWARE\MICROSOFT\EVAXEW1 <HKCU>\SOFTWARE\MICROSOFT\EVAXEW Value Name: 1bfaae7h 1
Mutexes Occurrences Local\{C8D239CA-C613-4B50-55BA-04D54CAC27C8}2 Local\{C8D239CB-C612-4B50-55BA-04D54CAC27C8}2 Local\{E9745CFB-A322-6AF6-55BA-04D54CAC27C8}2 GLOBAL\{<random GUID>}2
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 76[.]24[.]245[.]2512 98[.]250[.]118[.]102 114[.]76[.]43[.]2512 62[.]103[.]170[.]902 178[.]174[.]147[.]102 64[.]60[.]153[.]2102 173[.]62[.]135[.]1742 68[.]44[.]81[.]302 206[.]111[.]155[.]662 74[.]235[.]18[.]692 75[.]181[.]168[.]1292 69[.]255[.]22[.]492 24[.]39[.]46[.]2222 2[.]30[.]33[.]1212 69[.]222[.]104[.]512 72[.]184[.]101[.]2062 75[.]8[.]122[.]2202
Files and or directories created Occurrences %TEMP%\tmp340c54f4.bat1 %APPDATA%\Osep1 %APPDATA%\Osep\owycu.exe1 %APPDATA%\Ugugvy1 %APPDATA%\Ugugvy\akoda.epy1 %TEMP%\tmp3b41dc6e.bat1 %APPDATA%\Loro1 %APPDATA%\Loro\onib.zya1 %APPDATA%\Ucpyus1 %APPDATA%\Ucpyus\luiv.exe1
File Hashes 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
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security N/A Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella N/A WSA N/A
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK Indicators of Compromise IOCs collected from dynamic analysis of 21 samples Registry Keys Occurrences <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE22 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TASKKILL2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TASKKILL Value Name: ErrorControl 2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TASKKILL Value Name: Type 2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TASKKILL Value Name: Start 2 <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TASKKILL Value Name: ImagePath 2 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: APP 2 <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM Value Name: EnableLUA 1 <HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX1 <HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX\20.0.1 (EN-US)\MAIN1 <HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA THUNDERBIRD1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\NOTIFICATIONS1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\NOTIFICATIONS\SETTINGS1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: C72C6807598A4C8FAB7BF329B542ADF5 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 1BF87F4277E4430D8A09A4F766D4318D 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 0E0F6CEE3A5841B9A3412C81368FE961 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 0C74521719F24DE19A690E011E9E347F 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: CC0C0971387244718DE410BE7F7F6978 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 1429371977834B68AA3C3659F5DB5476 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 448B16A21F084978A57492DBB010F904 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: 319826B543B04630A7D69D8C16253318 1 <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN Value Name: DE5E4284832A4DB59F2EB81EC0AE4422 1
Mutexes Occurrences 8-3503835SZBFHHZ5 S-1-5-21-2580483-12444507478592 KN6QTO9VC-1JF9422 Local\MSCTF.Asm.MutexRemoteDesktop11 Local\MSCTF.CtfMonitorInstMutexRemoteDesktop11 S-1-5-21-2580483-12449829183961 3L792CR58BH9WL-21 327499-267B7KzeD1 Global\fb988221-72c1-11ed-9660-0015177d15301 88PM4-A43-E4JG3B1 O880S08F13FUxFz81 12PANRQ7W93XC-CJ1 PreIzXewwN1 S-1-5-21-2580483-12448918687691 LQOPQ0P1XT3V3C8z1 S-1-5-21-2580483-12441723254771 t5013175GUU3F24Y1
IP Addresses contacted by malware. Does not indicate maliciousness Occurrences 80[.]76[.]51[.]1884 34[.]102[.]136[.]1802 64[.]190[.]63[.]1112 44[.]230[.]85[.]2411 52[.]33[.]207[.]71 23[.]227[.]38[.]741 103[.]20[.]127[.]611 217[.]160[.]0[.]2491 142[.]250[.]65[.]2111 209[.]17[.]116[.]1631 34[.]117[.]168[.]2331 185[.]87[.]187[.]2451 3[.]33[.]152[.]1471 8[.]212[.]24[.]671 52[.]20[.]78[.]2401 3[.]232[.]242[.]1701 109[.]70[.]148[.]441 192[.]64[.]112[.]1581 199[.]59[.]243[.]2221 45[.]33[.]6[.]2231 109[.]107[.]191[.]1691 65[.]108[.]204[.]971 35[.]241[.]11[.]1621 15[.]197[.]136[.]1101 5[.]77[.]63[.]1441
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness Occurrences api[.]ipify[.]org2 www[.]jimsnell[.]xyz2 www[.]kfcvn3[.]tech1 www[.]ednateixeirabrand[.]com1 www[.]wineshopsonline[.]com1 www[.]thejoy[.]run1 www[.]hfhxfcawc[.]xyz1 www[.]alfakhamahusa[.]net1 www[.]58worchester[.]info1 www[.]gracepropertyandevent[.]com1 www[.]7pijj[.]com1 www[.]laesperanzarealista[.]com1 www[.]oyshoppesay[.]pro1 www[.]longergolf[.]com1 www[.]mastermindenterprises[.]info1 www[.]kirkzero318[.]top1 www[.]exozuvy[.]bond1 www[.]stnicholaswtc[.]store1 www[.]reviewmgmtsystem[.]com1 www[.]karengillen[.]com1 www[.]kaity[.]site1 www[.]sensing[.]rest1 www[.]myrgroupinc[.]com1 www[.]niveaguide[.]com1 www[.]midtowndistrictsantafe[.]info1
*See JSON for more IOCs
Files and or directories created Occurrences %LOCALAPPDATA%\Yandex4 %LOCALAPPDATA%\Yandex\YaAddon4 %APPDATA%\APP2 %APPDATA%\APP\APP.exe2 \x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x54\x65\x6d\x70\x5c\x418\x438\x441\x443\x441\x2e\x73\x79\x732 %ProgramFiles%\Microsoft DN11 %TEMP%\sqlite3.dll1 %TEMP%\tmpC873.tmp1 %TEMP%\sqlite3.def1 %TEMP%\tmp81FF.tmp1 %TEMP%\wx4tdx.zip1 %TEMP%\tmp19E7.tmp1 %TEMP%\tmpA57F.tmp1
File Hashes 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
Coverage Product Protection Secure Endpoint Cloudlock N/A CWS Email Security Network Security Stealthwatch N/A Stealthwatch Cloud N/A Secure Malware Analytics Umbrella WSA
Screenshots of Detection Secure Endpoint Secure Malware Analytics MITRE ATT&CK