Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 144.76.136.153:80 -> 192.168.2.22:49173 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 144.76.136.153:443 -> 192.168.2.22:49174 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 192.168.2.22:49175 -> 193.42.33.225:1957 |
Source: global traffic | TCP traffic: 193.42.33.225:1957 -> 192.168.2.22:49175 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49174 -> 144.76.136.153:443 |
Source: global traffic | TCP traffic: 192.168.2.22:49173 -> 144.76.136.153:80 |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/freebl3.dll |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/mozglue.dll |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/msvcp140.dll |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/nss3.dll |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/softokn3.dll |
Source: efwhixxln.exe | String found in binary or memory: http://5.206.225.104/dll/vcruntime140.dll |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.entrust.net/2048ca.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.entrust.net/server1.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0 |
Source: word.exe, 00000005.00000000.913542104.000000000040A000.00000008.00000001.01000000.00000004.sdmp, word.exe, 00000005.00000002.928115050.000000000040A000.00000004.00000001.01000000.00000004.sdmp, gstallabt4.2[1].exe.2.dr, word.exe.2.dr | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0% |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0- |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com0/ |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.comodoca.com05 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.entrust.net03 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.entrust.net0D |
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.916177028.000000000028F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/mGCQGV/gstallabt4.2.exe |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.000000000028F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://transfer.sh/get/mGCQGV/gstallabt4.2.exej |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.digicert.com.my/cps.htm02 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0 |
Source: efwhixxln.exe | String found in binary or memory: http://www.google.com |
Source: efwhixxln.exe, 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, efwhixxln.exe, 00000007.00000003.923616743.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, efwhixxln.exe, 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, efwhixxln.exe, 00000007.00000003.923531390.00000000005F2000.00000004.00000020.00020000.00000000.sdmp, efwhixxln.exe, 00000007.00000003.923388878.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, efwhixxln.exe, 00000007.00000003.923479705.00000000005EC000.00000004.00000020.00020000.00000000.sdmp, efwhixxln.exe, 00000007.00000003.923411469.00000000005F5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.google.comhttp://5.206.225.104/dll/softokn3.dllhttp://5.206.225.104/dll/msvcp140.dllhttp: |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.0000000000312000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://secure.comodo.com/CPS0 |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/ |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/2.exe |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/get/mGCQ |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/get/mGCQGV/gstallabt4.2.exe |
Source: EQNEDT32.EXE, 00000002.00000002.916177028.00000000002DA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://transfer.sh/get/mGCQGV/gstallabt4.2.exeC: |
Source: RFQ-BT5004423.doc, type: SAMPLE | Matched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 7.3.efwhixxln.exe.5fb358.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 7.3.efwhixxln.exe.5fb358.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.3.efwhixxln.exe.5f4be0.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 6.2.efwhixxln.exe.324a70.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 7.2.efwhixxln.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: 00000007.00000003.923388878.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000007.00000003.923411469.00000000005F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Author: unknown |
Source: RFQ-BT5004423.doc, type: SAMPLE | Matched rule: SUSP_INDICATOR_RTF_MalVer_Objects date = 2022-10-20, hash2 = a31da6c6a8a340901f764586a28bd5f11f6d2a60a38bf60acd844c906a0d44b1, author = ditekSHen, description = Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents., score = 43812ca7f583e40b3e3e92ae90a7e935c87108fa863702aa9623c6b7dc3697a2, reference = https://github.com/ditekshen/detection |
Source: RFQ-BT5004423.doc, type: SAMPLE | Matched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 6.2.efwhixxln.exe.310000.3.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 7.3.efwhixxln.exe.5f6450.1.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 7.3.efwhixxln.exe.5f4be0.2.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.3.efwhixxln.exe.5fb358.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5fb358.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 7.2.efwhixxln.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.3.efwhixxln.exe.5fb358.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5fb358.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f4be0.2.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 6.2.efwhixxln.exe.310000.3.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 6.2.efwhixxln.exe.324a70.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 6.2.efwhixxln.exe.324a70.2.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 7.3.efwhixxln.exe.5f6450.4.raw.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.efwhixxln.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.418070.1.raw.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 7.2.efwhixxln.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000007.00000002.1181598002.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000007.00000003.923388878.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000007.00000003.923388878.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000007.00000003.923411469.00000000005F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000007.00000003.923411469.00000000005F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000007.00000003.923433855.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841 |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23 |
Source: 00000006.00000002.924110797.0000000000310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |