pain-temper.bond
|
|
|
|
Name: |
pain-temper.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
jarry-deatile.bond
|
|
|
|
Name: |
jarry-deatile.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
immolatechallen.bond
|
|
|
|
Name: |
immolatechallen.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
LummaC encrypted strings found |
HIPS / PFW / Operating System Protection Evasion |
Deobfuscate/Decode Files or Information
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
crookedfoshe.bond
|
|
|
|
Name: |
crookedfoshe.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
LummaC encrypted strings found |
HIPS / PFW / Operating System Protection Evasion |
Deobfuscate/Decode Files or Information
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
stripedre-lot.bond
|
|
|
|
Name: |
stripedre-lot.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
jarry-fixxer.bond
|
|
|
|
Name: |
jarry-fixxer.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
growthselec.bond
|
|
|
|
Name: |
growthselec.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
LummaC encrypted strings found |
HIPS / PFW / Operating System Protection Evasion |
Deobfuscate/Decode Files or Information
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
sobrattyeu.bond
|
|
|
|
Name: |
sobrattyeu.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
LummaC encrypted strings found |
HIPS / PFW / Operating System Protection Evasion |
Deobfuscate/Decode Files or Information
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|
strivehelpeu.bond
|
|
|
|
Name: |
strivehelpeu.bond
|
TargetID: |
0
|
From Memory: |
false
|
Source: |
config extractor
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
C2 URLs / IPs found in malware configuration |
Networking |
Application Layer Protocol
|
LummaC encrypted strings found |
HIPS / PFW / Operating System Protection Evasion |
Deobfuscate/Decode Files or Information
|
Sample uses string decryption to hide its real strings |
AV Detection |
|
|