00000018.00000002.3189493490.000000000511F000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x91eb:$x1: AsyncRAT
- 0x9229:$x1: AsyncRAT
- 0x9b23:$x1: AsyncRAT
- 0x9b61:$x1: AsyncRAT
- 0xa837:$x1: AsyncRAT
- 0xa875:$x1: AsyncRAT
|
00000018.00000002.3214014251.0000000006C60000.00000004.08000000.00040000.00000000.sdmp | JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | |
00000018.00000002.3214014251.0000000006C60000.00000004.08000000.00040000.00000000.sdmp | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
00000018.00000002.3214014251.0000000006C60000.00000004.08000000.00040000.00000000.sdmp | MALWARE_Win_zgRAT | Detects zgRAT | ditekSHen | - 0x530d2:$s1: file:///
- 0x52fda:$s2: {11111-22222-10009-11112}
- 0x53062:$s3: {11111-22222-50001-00000}
- 0x4d4fc:$s4: get_Module
- 0x4d9bb:$s5: Reverse
- 0x52991:$s6: BlockCopy
- 0x52ad4:$s7: ReadByte
- 0x530e4:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
|
00000014.00000000.1945315404.0000000000A72000.00000002.00000001.01000000.00000018.sdmp | JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | |
0000000A.00000002.2583636643.0000000003146000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000013.00000000.1935087181.0000000000622000.00000002.00000001.01000000.00000017.sdmp | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
00000018.00000002.3188525129.0000000005100000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x1763:$x1: AsyncRAT
- 0x17a1:$x1: AsyncRAT
- 0x8b7a:$s8: Win32_ComputerSystem
|
00000018.00000002.3174046241.0000000003A15000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
00000018.00000002.3174046241.0000000003A15000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000018.00000002.3174046241.0000000003A15000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000018.00000002.3174046241.0000000003A15000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000018.00000002.3174046241.0000000003A15000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x47847:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000018.00000002.3174046241.0000000003807000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
00000018.00000002.3152328073.00000000029C5000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x3017:$x1: AsyncRAT
- 0x3055:$x1: AsyncRAT
- 0x351b:$x1: AsyncRAT
- 0x3559:$x1: AsyncRAT
|
00000002.00000002.3156915026.0000000008CB0000.00000040.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x1325e:$s2: ReflectiveLoader@
|
0000000A.00000002.2583636643.00000000030DE000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000013.00000002.3142832732.00000000027C1000.00000004.00000800.00020000.00000000.sdmp | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x29e09f:$b2: DcRat By qwqdanchun1
|
00000005.00000002.1941590624.00000000032C1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
0000000E.00000002.2095704106.0000000002A98000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
0000000E.00000002.2095704106.0000000002A98000.00000004.00000800.00020000.00000000.sdmp | Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown | - 0x17457:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
- 0x18834:$a2: Stub.exe
- 0x188c4:$a2: Stub.exe
- 0x140e4:$a3: get_ActivatePong
- 0x1766f:$a4: vmware
- 0x174e7:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
- 0x14e85:$a6: get_SslClient
|
00000020.00000002.2548612553.0000000002897000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
00000012.00000002.2045157680.0000000000787000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x35f1b:$x1: AsyncRAT
- 0x35f59:$x1: AsyncRAT
|
0000002D.00000002.2707163319.00000000033E1000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x1d8d7:$x1: AsyncRAT
- 0x1d915:$x1: AsyncRAT
|
00000013.00000002.3187954223.000000001B234000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0x305f:$b2: DcRat By qwqdanchun1
|
0000000A.00000002.2583636643.00000000030D0000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000018.00000002.3207543510.0000000006A20000.00000004.08000000.00040000.00000000.sdmp | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
00000002.00000003.1886548235.000000000AB61000.00000004.00000001.00020000.00000000.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
00000002.00000003.1886548235.000000000AB61000.00000004.00000001.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000002.00000003.1886548235.000000000AB61000.00000004.00000001.00020000.00000000.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000002.00000003.1886548235.000000000AB61000.00000004.00000001.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000002.00000003.1886548235.000000000AB61000.00000004.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x47634:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000002.00000000.1786621795.0000000008CB0000.00000040.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x1325e:$s2: ReflectiveLoader@
|
00000020.00000002.2548612553.00000000028A1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
0000000E.00000000.1898904976.00000000006F2000.00000002.00000001.01000000.00000013.sdmp | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
0000000E.00000000.1898904976.00000000006F2000.00000002.00000001.01000000.00000013.sdmp | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0xa0ed:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
00000018.00000002.3217843417.0000000006D60000.00000004.08000000.00040000.00000000.sdmp | JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | |
0000000E.00000002.2061125065.0000000000E39000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0xb493:$x1: AsyncRAT
- 0xb4d1:$x1: AsyncRAT
|
00000002.00000002.3202220761.000000000F3C0000.00000040.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x3b62a:$s2: ReflectiveLoader@
|
00000018.00000002.3152328073.0000000002801000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
00000018.00000002.3152328073.0000000002801000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0x11fe6:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
00000018.00000002.3152328073.0000000002801000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x2e40f:$x1: AsyncRAT
- 0x2e44d:$x1: AsyncRAT
- 0xebf4:$s6: VirtualBox
- 0xeb0c:$s8: Win32_ComputerSystem
|
0000000A.00000000.1890364340.0000000000AC2000.00000002.00000001.01000000.00000010.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
0000000A.00000000.1890364340.0000000000AC2000.00000002.00000001.01000000.00000010.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0000000A.00000000.1890364340.0000000000AC2000.00000002.00000001.01000000.00000010.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0000000A.00000000.1890364340.0000000000AC2000.00000002.00000001.01000000.00000010.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
0000000A.00000000.1890364340.0000000000AC2000.00000002.00000001.01000000.00000010.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x47554:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
0000002D.00000002.2773682295.0000000005D77000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x4edb:$x1: AsyncRAT
- 0x4f19:$x1: AsyncRAT
|
00000002.00000000.1786520032.0000000008B90000.00000020.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x1245e:$s2: ReflectiveLoader@
|
00000002.00000002.3176672303.000000000C350000.00000020.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x3a02a:$s2: ReflectiveLoader@
|
00000009.00000002.2874806986.0000000002901000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
00000009.00000002.2874806986.0000000002901000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000009.00000002.2874806986.0000000002901000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000009.00000002.2874806986.0000000002901000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x322d0:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000018.00000002.3191349230.000000000515B000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x61c6f:$x1: AsyncRAT
- 0x61cad:$x1: AsyncRAT
|
00000006.00000002.3152347475.00000000024D1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
00000006.00000002.3152347475.00000000024D1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000006.00000002.3152347475.00000000024D1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000006.00000002.3152347475.00000000024D1000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x1880:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000018.00000002.3152328073.00000000029CD000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0000000B.00000002.3143963860.0000000002A11000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
0000000E.00000002.2095704106.000000000294D000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
0000000E.00000002.2095704106.000000000294D000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0xb3aa:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
0000000E.00000002.2095704106.000000000294D000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x196f:$x1: AsyncRAT
- 0x19ad:$x1: AsyncRAT
- 0x3f7c:$s6: VirtualBox
- 0x3e94:$s8: Win32_ComputerSystem
- 0x8640:$s8: Win32_ComputerSystem
|
0000000A.00000002.2583636643.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
0000000A.00000002.2583636643.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
0000000A.00000002.2583636643.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
0000000A.00000002.2583636643.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
0000000A.00000002.2583636643.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x39650:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0x28ee2:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
00000006.00000000.1865951347.0000000000192000.00000002.00000001.01000000.0000000E.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x25463:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000018.00000002.3136390098.00000000008EC000.00000004.00000020.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x411b:$x1: AsyncRAT
- 0x4159:$x1: AsyncRAT
|
00000027.00000000.2525684288.0000000000277000.00000002.00000001.01000000.0000001B.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000027.00000000.2525684288.0000000000277000.00000002.00000001.01000000.0000001B.sdmp | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
00000027.00000000.2525684288.0000000000277000.00000002.00000001.01000000.0000001B.sdmp | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
00000027.00000000.2525684288.0000000000277000.00000002.00000001.01000000.0000001B.sdmp | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x24af:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
00000002.00000002.3156274373.0000000008B90000.00000020.00000400.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x1245e:$s2: ReflectiveLoader@
|
00000002.00000000.1790427329.000000000C350000.00000040.00000001.00020000.00000000.sdmp | INDICATOR_SUSPICIOUS_ReflectiveLoader | detects Reflective DLL injection artifacts | ditekSHen | - 0x3a02a:$s2: ReflectiveLoader@
|
00000018.00000002.3152328073.000000000283E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
00000018.00000002.3152328073.000000000283E000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x7ec0b:$x1: AsyncRAT
- 0x7ec49:$x1: AsyncRAT
- 0xb148f:$x1: AsyncRAT
- 0xb14cd:$x1: AsyncRAT
|
00000012.00000002.2071994361.0000000002261000.00000004.00000800.00020000.00000000.sdmp | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x1d96f:$x1: AsyncRAT
- 0x1d9ad:$x1: AsyncRAT
|
00000014.00000002.2394089953.0000000002E66000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
00000014.00000002.2394089953.000000000311E000.00000004.00000800.00020000.00000000.sdmp | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_MicroClip | Yara detected MicroClip | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | JoeSecurity_AveMaria | Yara detected AveMaria stealer | Joe Security | |
Process Memory Space: explorer.exe PID: 2580 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0xc2542:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: 3CBD.tmp.Installer.exe PID: 6828 | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | JoeSecurity_WorldWindStealer | Yara detected WorldWind Stealer | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0x6c36a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
Process Memory Space: 4336.tmp.Server.exe PID: 5720 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x51598:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
- 0x6ae88:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: 476D.tmp.Server.exe PID: 420 | JoeSecurity_WorldWindStealer | Yara detected WorldWind Stealer | Joe Security | |
Process Memory Space: 476D.tmp.Server.exe PID: 420 | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
Process Memory Space: 476D.tmp.Server.exe PID: 420 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: 476D.tmp.Server.exe PID: 420 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: 476D.tmp.Server.exe PID: 420 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: 476D.tmp.Server.exe PID: 420 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x414e5:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: 4BC4.tmp.Client.exe PID: 7244 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: 4BC4.tmp.Client.exe PID: 7244 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: 4BC4.tmp.Client.exe PID: 7244 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: 4BC4.tmp.Client.exe PID: 7244 | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
Process Memory Space: 4BC4.tmp.Client.exe PID: 7244 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x4e9ca:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
- 0x7d1d1:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: accc.exe PID: 7324 | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
Process Memory Space: 5087.tmp.update.exe PID: 7408 | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
Process Memory Space: 5087.tmp.update.exe PID: 7408 | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0x95aa:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
- 0x340b3:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
- 0x378d0:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
Process Memory Space: 5087.tmp.update.exe PID: 7408 | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x2c480:$x1: AsyncRAT
- 0x2c4b2:$x1: AsyncRAT
- 0x36399:$x1: AsyncRAT
- 0x363cb:$x1: AsyncRAT
- 0x9670:$s6: VirtualBox
- 0x34179:$s6: VirtualBox
- 0x3689e:$s6: VirtualBox
- 0x9623:$s8: Win32_ComputerSystem
- 0x1f51f:$s8: Win32_ComputerSystem
- 0x23cec:$s8: Win32_ComputerSystem
- 0x25361:$s8: Win32_ComputerSystem
- 0x3412c:$s8: Win32_ComputerSystem
- 0x3684d:$s8: Win32_ComputerSystem
- 0x37588:$s8: Win32_ComputerSystem
- 0x3be3f:$s8: Win32_ComputerSystem
- 0x3be54:$s8: Win32_ComputerSystem
- 0x3be7e:$s8: Win32_ComputerSystem
- 0x3c7d3:$s8: Win32_ComputerSystem
- 0x3c8ee:$s8: Win32_ComputerSystem
- 0x3dc66:$s8: Win32_ComputerSystem
|
Process Memory Space: 53A5.tmp.update.exe PID: 7508 | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x58e2:$x1: AsyncRAT
- 0x5914:$x1: AsyncRAT
- 0x1854b:$x1: AsyncRAT
- 0x1857d:$x1: AsyncRAT
|
Process Memory Space: 5E16.tmp.aaa.exe PID: 7640 | JoeSecurity_VenomRAT | Yara detected VenomRAT | Joe Security | |
Process Memory Space: 5E16.tmp.aaa.exe PID: 7640 | Windows_Trojan_DCRat_1aeea1ac | unknown | unknown | - 0xa43a:$a1: havecamera
- 0x1b4a6:$b2: DcRat By qwqdanchun1
- 0x1dee0:$b2: DcRat By qwqdanchun1
|
Process Memory Space: 62AB.tmp.build.exe PID: 7672 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: 62AB.tmp.build.exe PID: 7672 | JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
Process Memory Space: svchost.exe PID: 7952 | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen | - 0x522ab:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
|
Process Memory Space: svchost.exe PID: 7952 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x32900:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: svchost.exe PID: 7952 | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x18beb:$x1: AsyncRAT
- 0x18c1d:$x1: AsyncRAT
- 0x1a90f:$x1: AsyncRAT
- 0x1a941:$x1: AsyncRAT
- 0x37319:$x1: AsyncRAT
- 0x3734b:$x1: AsyncRAT
- 0x373b3:$x1: AsyncRAT
- 0x59902:$x1: AsyncRAT
- 0x59934:$x1: AsyncRAT
- 0x59968:$x1: AsyncRAT
- 0x8fce3:$x1: AsyncRAT
- 0x8fd15:$x1: AsyncRAT
- 0x9b101:$x1: AsyncRAT
- 0x9b133:$x1: AsyncRAT
- 0x9f08a:$x1: AsyncRAT
- 0x9f0bc:$x1: AsyncRAT
- 0x226f2:$s4: Stub.exe
- 0x518b4:$s6: VirtualBox
- 0x1b16e:$s8: Win32_ComputerSystem
- 0x33f00:$s8: Win32_ComputerSystem
- 0x51863:$s8: Win32_ComputerSystem
|
Process Memory Space: accc.exe PID: 6896 | JoeSecurity_KeyzetsuClipper | Yara detected Keyzetsu Clipper | Joe Security | |
Process Memory Space: jqnnpe.exe PID: 5184 | JoeSecurity_StormKitty | Yara detected StormKitty Stealer | Joe Security | |
Process Memory Space: jqnnpe.exe PID: 5184 | JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | |
Process Memory Space: jqnnpe.exe PID: 5184 | JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | |
Process Memory Space: jqnnpe.exe PID: 5184 | JoeSecurity_RLSTEALER | Yara detected RL STEALER | Joe Security | |
Process Memory Space: jqnnpe.exe PID: 5184 | INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen | - 0x18df:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
|
Process Memory Space: svchost.exe PID: 796 | MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen | - 0x62e4:$x1: AsyncRAT
- 0x6316:$x1: AsyncRAT
- 0x28a96:$x1: AsyncRAT
- 0x28ac8:$x1: AsyncRAT
|
Click to see the 133 entries |