Source: global traffic | TCP traffic: 192.168.2.22:49171 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49171 |
Source: global traffic | TCP traffic: 192.168.2.22:49171 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49171 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49171 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49171 |
Source: global traffic | TCP traffic: 192.168.2.22:49171 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49172 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49172 |
Source: global traffic | TCP traffic: 192.168.2.22:49171 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 45.137.65.132:7410 |
Source: global traffic | TCP traffic: 45.137.65.132:7410 -> 192.168.2.22:49173 |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/freebl3.dll |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/mozglue.dll |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/msvcp140.dll |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/nss3.dll |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/softokn3.dll |
Source: gnwnekc.exe | String found in binary or memory: http://5.206.225.104/dll/vcruntime140.dll |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.entrust.net/2048ca.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.entrust.net/server1.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0 |
Source: word.exe, 00000005.00000002.921295812.000000000040A000.00000004.00000001.01000000.00000004.sdmp, word.exe, 00000005.00000000.901874794.000000000040A000.00000008.00000001.01000000.00000004.sdmp, mwele[1].exe.2.dr, word.exe.2.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0% |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0- |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0/ |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com05 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.entrust.net03 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.entrust.net0D |
Source: EQNEDT32.EXE, 00000002.00000002.904802354.00000000005EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/8LtEm |
Source: EQNEDT32.EXE | String found in binary or memory: http://transfer.sh/get/8LtEmv/mwele.exe |
Source: EQNEDT32.EXE, 00000002.00000002.904708429.000000000058F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/8LtEmv/mwele.exe4 |
Source: EQNEDT32.EXE, 00000002.00000002.904708429.000000000058F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/8LtEmv/mwele.exeO |
Source: EQNEDT32.EXE, 00000002.00000002.904708429.000000000058F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/8LtEmv/mwele.exej |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com.my/cps.htm02 |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0 |
Source: gnwnekc.exe | String found in binary or memory: http://www.google.com |
Source: gnwnekc.exe, 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, gnwnekc.exe, 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, gnwnekc.exe, 00000008.00000003.913528927.00000000008D7000.00000004.00000020.00020000.00000000.sdmp, gnwnekc.exe, 00000008.00000000.911229292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, gnwnekc.exe, 00000008.00000003.913211098.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, gnwnekc.exe, 00000008.00000003.913357063.00000000008CC000.00000004.00000020.00020000.00000000.sdmp, gnwnekc.exe, 00000008.00000003.913236124.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, gnwnekc.exe, 00000008.00000003.913377903.00000000008D2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.google.comhttp://5.206.225.104/dll/softokn3.dllhttp://5.206.225.104/dll/msvcp140.dllhttp: |
Source: EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://secure.comodo.com/CPS0 |
Source: EQNEDT32.EXE, 00000002.00000002.904802354.00000000005EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/ |
Source: EQNEDT32.EXE, 00000002.00000002.904802354.00000000005EE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/3 |
Source: EQNEDT32.EXE, 00000002.00000002.904789219.00000000005E2000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.904836936.0000000000610000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/get/8LtEmv/mwele.exe |
Source: EQNEDT32.EXE, 00000002.00000002.904789219.00000000005E2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/get/8LtEmv/mwele.exeip |
Source: SecuriteInfo.com.Exploit.CVE-2018-0798.4.16955.24932.rtf, type: SAMPLE | Matched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.0.gnwnekc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.3.gnwnekc.exe.8d4cd0.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.3.gnwnekc.exe.8db448.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 6.2.gnwnekc.exe.434a70.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.0.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.2.gnwnekc.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.3.gnwnekc.exe.8db448.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 8.0.gnwnekc.exe.400000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.0.gnwnekc.exe.400000.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.0.gnwnekc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 8.0.gnwnekc.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000008.00000000.911229292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000008.00000003.913211098.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000008.00000003.913236124.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: SecuriteInfo.com.Exploit.CVE-2018-0798.4.16955.24932.rtf, type: SAMPLE | Matched rule: SUSP_INDICATOR_RTF_MalVer_Objects date = 2022-10-20, hash2 = a31da6c6a8a340901f764586a28bd5f11f6d2a60a38bf60acd844c906a0d44b1, author = ditekSHen, description = Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents., score = 43812ca7f583e40b3e3e92ae90a7e935c87108fa863702aa9623c6b7dc3697a2, reference = https://github.com/ditekshen/detection |
Source: SecuriteInfo.com.Exploit.CVE-2018-0798.4.16955.24932.rtf, type: SAMPLE | Matched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.3.gnwnekc.exe.8d6540.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.2.gnwnekc.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.0.gnwnekc.exe.400000.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.3.gnwnekc.exe.8d4cd0.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.3.gnwnekc.exe.8db448.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8db448.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.3.gnwnekc.exe.8d4cd0.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.gnwnekc.exe.434a70.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.gnwnekc.exe.434a70.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.0.gnwnekc.exe.400000.5.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 8.3.gnwnekc.exe.8d6540.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.0.gnwnekc.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.gnwnekc.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.2.gnwnekc.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8db448.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.3.gnwnekc.exe.8db448.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 8.0.gnwnekc.exe.400000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.0.gnwnekc.exe.400000.5.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.0.gnwnekc.exe.400000.4.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 6.2.gnwnekc.exe.420000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 6.2.gnwnekc.exe.420000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.0.gnwnekc.exe.400000.1.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000008.00000002.1165804046.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000000.911229292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000003.913307044.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000000.911346295.0000000000418000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000003.913211098.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000003.913211098.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000008.00000003.913236124.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000008.00000003.913236124.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000006.00000002.914184912.0000000000420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |