Headline
Threat Roundup for May 19 to May 26
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 19 and May 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 19 and May 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.
The most prevalent threats highlighted in this roundup are:
Threat Name
Type
Description
Win.Ransomware.Djvu-10002408-1
Ransomware
The Djvu ransomware encrypts victim’s files with Salsa20 and is known for changing its payloads, ransom notes and the file extensions appended to encrypted files. It spreads via cracked or faked applications or updates, keygens or activators. The main payload uses a wide variety of anti-debugging and anti-emulation techniques, which includes checking the location of the system via the keyboard layout or websites.
Win.Virus.Ramnit-10002385-0
Virus
Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also steals browser cookies and attempts to hide from popular anti-virus software.
Win.Trojan.Qakbot-10002083-1
Trojan
Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
Win.Dropper.Tofsee-10002081-0
Dropper
Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and send large volumes of spam messages to infect additional systems and increase the size of the botnet under the operator’s control
Xls.Malware.Valyria-10002078-0
Malware
Valyria is a malicious Microsoft Word document family that is used to distribute other malware, such as Emotet.
Win.Dropper.Zeus-10002075-0
Dropper
Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing.
Win.Packed.njRAT-10002074-1
Packed
njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim’s webcam and microphone. The Sparclyheason group originally developed njrAT. Some of the largest attacks using this malware date back to 2014.
Win.Ransomware.TeslaCrypt-10002553-0
Ransomware
TeslaCrypt is a well-known ransomware family that encrypts a user’s files and demands Bitcoin in exchange for a decryptor service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
Threat Breakdown****Win.Ransomware.Djvu-10002408-1****Indicators of Compromise
- IOCs collected from dynamic analysis of 19 samples
Registry Keys
Occurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: SysHelper
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SysHelper
19
Mutexes
Occurrences
{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
19
M5/610HP/STAGE2
17
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
162[.]0[.]217[.]254
19
149[.]154[.]167[.]99
18
116[.]202[.]7[.]239
17
211[.]40[.]39[.]251
5
210[.]182[.]29[.]70
4
201[.]124[.]33[.]177
4
175[.]126[.]109[.]15
3
211[.]171[.]233[.]129
3
211[.]59[.]14[.]90
2
175[.]119[.]10[.]231
2
175[.]120[.]254[.]9
2
123[.]140[.]161[.]243
2
190[.]141[.]35[.]3
2
2[.]180[.]10[.]7
2
95[.]158[.]162[.]200
2
190[.]219[.]153[.]101
2
211[.]119[.]84[.]112
1
186[.]182[.]55[.]44
1
58[.]235[.]189[.]192
1
190[.]229[.]19[.]7
1
49[.]12[.]115[.]154
1
187[.]156[.]85[.]108
1
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
api[.]2ip[.]ua
19
zexeq[.]com
19
colisumy[.]com
19
t[.]me
18
Files and or directories created
Occurrences
I:\5d2860c89d774.jpg
19
\SystemID
19
\SystemID\PersonalID.txt
19
%LOCALAPPDATA%\bowsakkdestx.txt
19
%System32%\Tasks\Time Trigger Task
19
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed65
19
%ProgramData%\freebl3.dll
18
%ProgramData%\mozglue.dll
18
%ProgramData%\msvcp140.dll
18
%ProgramData%\nss3.dll
18
%ProgramData%\softokn3.dll
18
%ProgramData%\vcruntime140.dll
18
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262
18
%APPDATA%\Microsoft\Network
17
%System32%\Tasks\Azure-Update-Task
17
%APPDATA%\Microsoft\Network\mstsca.exe
17
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262\build2.exe
17
%LOCALAPPDATA%\7c34bb01-5d78-49c4-8bbb-73fdc7aa1262\build3.exe
17
%ProgramData%\29186105001818256710234306
1
%ProgramData%\98434069941774401301779229
1
%ProgramData%\06958703710025248238302966
1
%ProgramData%\51085262941586590775670285
1
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed65\64d18a6e518bf68b453134e9fe01968e924fc67e3b6b5274668e606d62842b61.exe
1
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed65\75022ede411ab60fd9e55d3fa517edfe8488101c916d0b0d91161c8c98da9be8.exe
1
%LOCALAPPDATA%\3856b5d6-9eb0-496c-b0d1-db92b0f6ed65\1ed3247b3c2cf5da57d068a93257520d2303b7254fec98110d67194503472a97.exe
1
*See JSON for more IOCs
File Hashes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Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Virus.Ramnit-10002385-0****Indicators of Compromise
- IOCs collected from dynamic analysis of 25 samples
Registry Keys
Occurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
25
Mutexes
Occurrences
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}
25
{79345B6A-421F-2958-EA08-07396ADB9E27}
25
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
193[.]166[.]255[.]171
25
195[.]201[.]179[.]207
25
35[.]205[.]61[.]67
25
63[.]251[.]106[.]25
25
63[.]251[.]235[.]76
25
142[.]251[.]35[.]174
25
162[.]249[.]65[.]221
25
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
google[.]com
25
ygqqaluei[.]com
25
atw82ye63ymdp[.]com
25
mdofetubarhorbvauf[.]com
25
warylmiwgo[.]com
25
caosusubld[.]com
25
bekvfkxfh[.]com
25
xomeommdilsq[.]com
25
wwyreaohjbdyrajxif[.]com
25
grbjgfprk[.]com
25
xxsmtenwak[.]com
25
ydchosmhwljjrq[.]com
25
Files and or directories created
Occurrences
%LOCALAPPDATA%\bolpidti
25
%LOCALAPPDATA%\bolpidti\judcsgdy.exe
25
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe
25
\TEMP\K9eEf4fVf
25
File Hashes
069becc422d6f6f1a739f36c19977e86f973de8ac71d43707f821509eeb7e3ab
0737a484e81ccea1561a2d09482722f4b1b78020b471cc9285762f297a19a9e9
08f041ec2fafe6d1b6d4a4df0fd492a490a815bef4c45407c28f01a53eb2f7e9
112d9844d869a67cc760eb9619a8f96648abe63dd788841b2189708a4ab33e79
19888aed71f14a4b18a67e9b8520a79ce32f9a830a887bea6a8e065c90e483d8
1e08f5c1a773ee61cf068aa8b5b1962f60c974797f2bbbf0af783834278a5760
1e43f958047862b254dd56ef12ad553dd1b1b479c66725ff682d173339180272
24975482f70ca48e97a8ae892db449c45d959580cf1799cce910eb62e1d5dc48
2f2e8b9e8e1257ab1d1f6242b2ee21088c03d9b9160d9b6a3c7e6ed045e78710
3120f89d41fba5cfbe8b5e1e9afb4022cfec268620cc3f5bae0f47bcb368d92e
3424188e777af669655e6710ba4954fb973110bca6d0c69aa40ed97e1f64f5d3
3441e7896f39a452d1391c2391e71aecf9bb5b135871887f35c8566f96c571d6
3688dd56fd61ff5ecf322ada31deec7c26d22ea4e3a634d4a06845e65962182f
4023b5e53d127c9a9d1b268e62a988c64010ac96b0ca509c345fa379e082ac38
5370afb0a0c823ade197b86217534fda5969ef7dd45aa9f48128a31e401cc356
556ee8a712446234cf175b2b96280ab6fd4f3b3f8dc76930c3b3d9ec31b68ca3
73045fc3593bb96604879c80f5b3222f5723815b52240fdd6a7e6c1c58ec1596
797514dff7a8b29b0bea85875a39715ee091fbeaa31fdad4428a4f6863a9b8c4
8257c33afc6f826716bbe89628006659a25006f4276a80c2284965a70abad3b4
83eb00995d90f5e09ee93c2dbaa365f9a3cd5ea02ab32c35e26e5c8bc5af7f68
86cc81d40db039da90b44b476b79e2da8ea0d87580130fe52f93f12c100090af
8ece6f1fd15062ed6f52d02be64f58979065c28e8b135244b7cba144e37f4246
9d4dfffc0a7b70f370f7d1a5802415df422813f7ecbaba01e9f0c96270b08a57
9e1559f93288f34005b9eff555fa227d4c0188a0bd378cbba392fae9ab0b0f1b
9fc031cd7bcccfb61552939bc5a445acc5b23d3b3aa3932ac10b249c479a9ea3
*See JSON for more IOCs
Coverage
Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Trojan.Qakbot-10002083-1****Indicators of Compromise
- IOCs collected from dynamic analysis of 25 samples
Registry Keys
Occurrences
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: bd63ad6b
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: bf228d17
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: 79eea72
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: 7a96a5f8
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: f7b512d3
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: 88fc7d25
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: c22ac29d
25
<HKCU>\SOFTWARE\MICROSOFT\DFWOFIK
Value Name: 5dfca0e
25
Mutexes
Occurrences
Global{06253ADC-953E-436E-8695-87FADA31FDFB}
25
{06253ADC-953E-436E-8695-87FADA31FDFB}
25
{357206BB-1CE6-4313-A3FA-D21258CBCDE6}
25
Files and or directories created
Occurrences
%APPDATA%\Microsoft\Xtuou
25
File Hashes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*See JSON for more IOCs
Coverage
Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
N/A
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
N/A
WSA
N/A
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Dropper.Tofsee-10002081-0****Indicators of Compromise
- IOCs collected from dynamic analysis of 20 samples
Registry Keys
Occurrences
<HKU>.DEFAULT\CONTROL PANEL\BUSES
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: Type
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: Start
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: ErrorControl
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: DisplayName
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: WOW64
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: ObjectName
20
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: Description
20
<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
20
<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
20
<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES<random, matching '[A-Z0-9]{8}’>
Value Name: ImagePath
17
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\isupldcy
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\kuwrnfea
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\zjlgcutp
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\jtvqmedz
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\gqsnjbaw
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\scezvnmi
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\cmojfxws
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\xhjeasrn
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\dnpkgyxt
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\rbdyumlh
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\lvxsogfb
1
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
80[.]66[.]75[.]254
20
176[.]113[.]115[.]136
19
80[.]66[.]75[.]4
19
176[.]113[.]115[.]239
19
176[.]113[.]115[.]135
19
45[.]143[.]201[.]238
19
31[.]13[.]65[.]174
15
31[.]13[.]65[.]52
15
20[.]44[.]209[.]209
11
185[.]161[.]248[.]127
10
176[.]113[.]115[.]84
9
66[.]254[.]114[.]41
8
142[.]250[.]64[.]68
8
20[.]112[.]52[.]29
8
149[.]154[.]167[.]99
7
104[.]16[.]119[.]50
7
104[.]244[.]42[.]66
6
52[.]101[.]40[.]29
6
104[.]18[.]13[.]33
6
104[.]127[.]87[.]210
6
142[.]250[.]217[.]196
6
104[.]244[.]42[.]70
5
142[.]250[.]65[.]196
5
20[.]103[.]85[.]33
5
20[.]84[.]181[.]62
5
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
microsoft-com[.]mail[.]protection[.]outlook[.]com
20
microsoft[.]com
20
vanaheim[.]cn
20
249[.]5[.]55[.]69[.]bl[.]spamcop[.]net
19
249[.]5[.]55[.]69[.]cbl[.]abuseat[.]org
19
249[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net
19
249[.]5[.]55[.]69[.]in-addr[.]arpa
19
249[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org
19
249[.]5[.]55[.]69[.]zen[.]spamhaus[.]org
19
www[.]google[.]com
19
i[.]instagram[.]com
15
www[.]instagram[.]com
15
api[.]twitter[.]com
11
in-jsproxy[.]globh[.]com
11
mobile[.]twitter[.]com
8
www[.]pornhub[.]com
8
api[.]steampowered[.]com
8
identity[.]bitwarden[.]com
8
t[.]me
7
www[.]evernote[.]com
6
steamcommunity[.]com
6
docs[.]google[.]com
5
ev-h[.]phncdn[.]com
5
auth[.]gaijinent[.]com
5
www[.]tiktok[.]com
4
*See JSON for more IOCs
Files and or directories created
Occurrences
%SystemRoot%\SysWOW64\config\systemprofile
20
%SystemRoot%\SysWOW64\config\systemprofile:.repos
20
%SystemRoot%\SysWOW64<random, matching '[a-z]{8}’>
20
%TEMP%<random, matching '[a-z]{8}’>.exe
17
%TEMP%\Administrator.bmp
1
%TEMP%\nwcnlas.exe
1
%TEMP%\udjushz.exe
1
%TEMP%\hqwhfum.exe
1
File Hashes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Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Xls.Malware.Valyria-10002078-0****Indicators of Compromise
- IOCs collected from dynamic analysis of 25 samples
Registry Keys
Occurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS.JS
25
<HKCR>\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\BAGS\160
25
Mutexes
Occurrences
Local\10MU_ACB10_S-1-5-5-0-67863
25
Local\10MU_ACBPIDS_S-1-5-5-0-67863
25
Files and or directories created
Occurrences
%TEMP%\sfoWQ.txt
25
%TEMP%\sfoWQ.txt:Zone.Identifier
25
%APPDATA%\sfoWQ.txt
25
File Hashes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*See JSON for more IOCs
Coverage
Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
N/A
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
N/A
WSA
N/A
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Dropper.Zeus-10002075-0****Indicators of Compromise
- IOCs collected from dynamic analysis of 35 samples
Registry Keys
Occurrences
<HKCU>\SOFTWARE\MICROSOFT\GUZUESLO
Value Name: hbch1bi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Mezas
1
<HKCU>\SOFTWARE\MICROSOFT\GUZUESLO
Value Name: 3055dc04
1
<HKCU>\SOFTWARE\MICROSOFT\GUZUESLO
1
<HKCU>\SOFTWARE\MICROSOFT\GUZUESLO
Value Name: 11822b80
1
Mutexes
Occurrences
Local{<random GUID>}
1
GLOBAL{<random GUID>}
1
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
172[.]245[.]217[.]122
1
86[.]133[.]91[.]153
1
84[.]59[.]129[.]23
1
27[.]54[.]110[.]77
1
184[.]56[.]203[.]9
1
174[.]103[.]25[.]199
1
107[.]221[.]229[.]216
1
172[.]5[.]238[.]222
1
107[.]196[.]239[.]26
1
206[.]205[.]226[.]130
1
142[.]251[.]40[.]164
1
122[.]30[.]92[.]10
1
201[.]22[.]95[.]10
1
68[.]84[.]52[.]227
1
24[.]31[.]240[.]254
1
76[.]218[.]94[.]54
1
71[.]3[.]137[.]208
1
98[.]95[.]188[.]144
1
107[.]217[.]225[.]158
1
180[.]35[.]68[.]186
1
31[.]168[.]72[.]155
1
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
www[.]bing[.]com
1
www[.]google[.]com
1
eqbaguldaxkwhelpbukqxgeuauci[.]net
1
wgmvttwcmhhheeasgvofuqoiwo[.]org
1
plrhyhjvjffywctkbahgiivxcpr[.]info
1
hinbnfxgpqskneahavuoxvtyd[.]com
1
qgkzlqraigymbmobukpjtmdib[.]ru
1
sxbambmzfifirlnjxsbenrbtpz[.]com
1
caozbupzdetgvwinbojtgxxwcqs[.]info
1
xrkyxprttpemeqfamztgfykjdet[.]org
1
zdphmsfahetgarpjdbmkvxcscnf[.]net
1
pztknpblhkrhimnlbrcvspdinb[.]biz
1
hpfmztgmrgqhiusfmvlbdtwdiam[.]ru
1
pvdigajzpwkkfizfmmjmrpkjfeto[.]com
1
cyscqgqsscutljrwqwnbcufexkr[.]net
1
nfkbojqskjulbydktduoskztpf[.]org
1
pvtgqceifucelgmhekrgmfe[.]biz
1
gaaqciscmfiqwthiztlpzscjnyteq[.]com
1
vcfqgmhdyxkirrghiblndeixojz[.]ru
1
fqtfyjvdqbbqoztirtwvwdkrqk[.]com
1
ivpzeiwkwkbxnvcwgqcljnifiz[.]info
1
qkpibzvwrwirqcyhhudykgimz[.]biz
1
xkvcuqyrstcgyvkpnijdixgbeei[.]net
1
mblwytskjplvduxceypeqylce[.]com
1
raihobdypsocykrtlcisgnzzl[.]ru
1
*See JSON for more IOCs
Files and or directories created
Occurrences
%TEMP%\LZP4377.bat
1
%HOMEPATH%\AppData\LocalLow\odaj.koc
1
%APPDATA%\Uwname
1
%APPDATA%\Uwname\mezas.exe
1
File Hashes
02df10e355b422c5bb5e2d597ed5ba186ccd75b1555a02f499ac181b2120ed03
05f6fef63c053c000bbeb362cb05bff689439af1087333a75c69c424581549ba
14053671d31720f2f9221951c1505e601fd9167ff801a805aa816b317f5e912c
168294fb9090044b7bb6c09db9ad27e2e65cde38a71c3596bc9f2081f0711103
16b90f6758b5c39c711ad687a80b7a2ecac0fb7a6d0692d6d16b10f11ae4c1f8
199818c986a03706929b3f1645dd372d53640f43ef052746cebe6d260d38917b
1c5bbb2c3aeee33f6cf3a96baeb0c5e88ea1f39fc71975bba8ec090bb04b51c4
28b99d76eee9430304deb161a95e4bb136f20165ea3f217099e5663281e29809
2b32f617e4dbf6056ef402d619be0c310184c8c6b510058aacba678d19dc4aa0
2dfeefc5caf4511a29ae3fe30a9da8ad2c62ad2ae9fd39ebc2db46a463957597
334d15fcafebf426192ef6d1535eeaa4a7de8126b74e58fbacc6ec94e4f3ab5b
34b6c7ed9349de1a287d0d5592b78cce35522702e91b8ab5db3d62eae6b67b5e
374bd4c2b34ae49846a760619880fd804faed9566d35d25eeda4189c47f98660
64034a052248997224a7e1687a7ed958e5f948f921f3fac55ad2edbb12570daf
6553bb3b7256019f2a51d44b06e823ba23b75c675d881387cdc5483008ecb983
7cc58d096942f3ae0460683bc9f5c35112655be103075ef8f7a58abaf550c979
854a72dd3fbe2c2a0b18ae0bd660757333e10e893b2487390312886634a093be
869d634387c01e319a72f24bdfb0b4c9a2c808aa88a72f7ad171544b713d596d
881d68cc2ac29affc59650aa7ada44c7973fcb014c2f8535b1648a365469e682
9635dd11d2da647afc6bf13c4ce3c8fabd7dfb128f6cfea32d12f7e06f0b4992
a85a35b0487200ca1f49801827aabf6e747ea4a2b07dfd5f7310d3b88b5e3db4
a9f73e6255dbaa0f11d9b1d75d70278ff41f8df374dd31869a68a73d1008e041
af17b70024313eec53d55c113e7c167ad243fb43eeea842f04070d160e9c3f0f
c17798890e73cbfdd95ec9cc21d6253e9a1e823362efa300a3b103f754a19a45
c3b064b3355cd6ab93b68eb0c4651ef6c39601cd5a3419e5cfc50dbf8ef2d581
*See JSON for more IOCs
Coverage
Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Packed.njRAT-10002074-1****Indicators of Compromise
- IOCs collected from dynamic analysis of 23 samples
Registry Keys
Occurrences
<HKCU>\SOFTWARE\7E3975E4EF230D7D9195
4
<HKCU>\SOFTWARE\7E3975E4EF230D7D9195
Value Name: 8BE2FB14B479CCDD9BC15BEAF091A52DF492882CB14B74F194A69E01EEF8E94C
2
<HKCU>\SOFTWARE\7E3975E4EF230D7D9195
Value Name: 6E2CF9A6CE187C062019E955FF60F4FC3EF815C130C306272E592ACCF4FC927A
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 737bd67e46d5cadac827d831840e1c9e
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 74863e1e5b984f4d9f6114e67967ba5a
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d9dbb7f30ccf6b9605ba0f91e4001e71
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: dc9f4568244aa164419d8d55d41d338c
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: e4f591a3b114bf24d3f9b3a6ef913cb4
1
<HKCU>\SOFTWARE\7E3975E4EF230D7D9195
Value Name: 0452D60D658A43929BF2D5BC049E2C57C2D61F58B6444BAB88834C870305DFDF
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: c2527172636652462d2476d220259bd2
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 3845e39e1f3dcec4ff7961b0a2f0ba67
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: bbeb2271f980d0c2e59e411521a4e871
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 890bacd47c7d51fd7312becbd950c7bf
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 708d8fc0a77c9a0879ac7cb1189ea39a
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d5d3c1f0e4d5aef3a94d97f2fb26b8d6
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 9520744a7360c89a58faf9868697bdea
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 2cae9becdde38041e4e330e3f52f0a60
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: e58abc3caa74411ce434a3aa461ead84
1
<HKCU>\SOFTWARE\7E3975E4EF230D7D9195
Value Name: 91E582DD0FE0224A74B326FAA35161958AAE425DF4B6151646B9C330E7BD5487
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 6598d612c9ecbbb158c36266743d42c8
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: b8b4e1b25a2b6f817649b78b5b5a5d29
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: b152c91bc1c4e0824480fad7befedebf
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: cc4f48707ebaf216d4fef0b4c0c61272
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 5be60fdc5ddb62f32a7de89740b3cd166e812a191d5b4813db31d0a45ab00677
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 12d415023bdd583b20d45b79802e10e84dd45196c3d1caafc488024d3be9eca6
1
Mutexes
Occurrences
ogqaAwjfB2yh3bfL
2
SCv88LFTFFI8dR9w
1
1QnSO4JAiZV6WpHF
1
N4axFUgaXdIayzbn
1
22gJEda1Zfw2vwfK
1
hQjSOlWGIZB5DO8N
1
nsly6rwu2jgM0E2F
1
MuT3h4qwhzPDqNiv
1
i92Ri83XAhIENZeN
1
CpM0BozFwJiJLCI4
1
HYYqdMBVvkvW9qet
1
iGfoxbmflgpokAoH
1
b6yNsMdOe03HL9LG
1
leyfUfKDaom1wjaJ
1
cCWueNtsBI6pgZxq
1
MfH1eroMODfvADCS
1
QGrfowgnGcHxTGed
1
S7lyHQsJzumSHESB
1
3tZldvx3UxeahMbo
1
catUiEXpaeVC068N
1
axlm4DdNg7oDuPl8
1
mIZVGJlfF3sM9H74
1
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
209[.]25[.]140[.]180
7
193[.]161[.]193[.]99
4
209[.]25[.]140[.]223
4
209[.]25[.]140[.]211
2
18[.]231[.]93[.]153
2
54[.]94[.]248[.]37
2
18[.]229[.]146[.]63
2
172[.]67[.]34[.]170
1
3[.]67[.]112[.]102
1
18[.]228[.]115[.]60
1
18[.]158[.]58[.]205
1
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
metal-msn[.]at[.]ply[.]gg
6
ayman03-31268[.]portmap[.]io
4
0[.]tcp[.]sa[.]ngrok[.]io
2
pastebin[.]com
1
5[.]tcp[.]eu[.]ngrok[.]io
1
engine-perception[.]at[.]ply[.]gg
1
battery-columbus[.]at[.]ply[.]gg
1
members-path[.]at[.]ply[.]gg
1
asked-dress[.]at[.]ply[.]gg
1
insurance-chocolate[.]at[.]ply[.]gg
1
works-threaded[.]at[.]ply[.]gg
1
visit-tamil[.]at[.]ply[.]gg
1
Files and or directories created
Occurrences
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\3845e39e1f3dcec4ff7961b0a2f0ba67.lnk
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\bbeb2271f980d0c2e59e411521a4e871.lnk
1
%System32%\Tasks\c2527172636652462d2476d220259bd2
1
%APPDATA%\bbeb2271f980d0c2e59e411521a4e871.exe
1
%APPDATA%\9520744a7360c89a58faf9868697bdea.exe
1
%APPDATA%\890bacd47c7d51fd7312becbd950c7bf.exe
1
%ProgramData%\708d8fc0a77c9a0879ac7cb1189ea39a.exe
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\d5d3c1f0e4d5aef3a94d97f2fb26b8d6.lnk
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9520744a7360c89a58faf9868697bdea.lnk
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\890bacd47c7d51fd7312becbd950c7bf.lnk
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\708d8fc0a77c9a0879ac7cb1189ea39a.lnk
1
%System32%\Tasks\3845e39e1f3dcec4ff7961b0a2f0ba67
1
%APPDATA%\d5d3c1f0e4d5aef3a94d97f2fb26b8d6.exe
1
%System32%\Tasks\bbeb2271f980d0c2e59e411521a4e871
1
%System32%\Tasks\890bacd47c7d51fd7312becbd950c7bf
1
%APPDATA%\2cae9becdde38041e4e330e3f52f0a60.exe
1
%System32%\Tasks\d5d3c1f0e4d5aef3a94d97f2fb26b8d6
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\2cae9becdde38041e4e330e3f52f0a60.lnk
1
%System32%\Tasks\708d8fc0a77c9a0879ac7cb1189ea39a
1
%ProgramData%\e58abc3caa74411ce434a3aa461ead84.exe
1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\e58abc3caa74411ce434a3aa461ead84.lnk
1
%System32%\Tasks\2cae9becdde38041e4e330e3f52f0a60
1
%System32%\Tasks\e58abc3caa74411ce434a3aa461ead84
1
%System32%\Tasks\9520744a7360c89a58faf9868697bdea
1
%ProgramData%\6598d612c9ecbbb158c36266743d42c8.exe
1
*See JSON for more IOCs
File Hashes
0370568ad761d369d0fe91aa0bf745ed954676aea7674e3238bf5f133cff49ed
10f1764ba7cb74110a0a9db2920c7d3007bbd3e13df111a2b697f3c244ad3a21
12d415023bdd583b20d45b79802e10e84dd45196c3d1caafc488024d3be9eca6
1a4101c995b330093388628b206da88250bcceebc0c3ef6b25334db5babfe5fb
305d0c9e1e847a7306285575091f523f521dea096cfc8db5a7b32e465ac180bc
353d5db9b2e6175843d74a62770d7fd2a82b43d06154b7cef6137e49a23c74ba
5be60fdc5ddb62f32a7de89740b3cd166e812a191d5b4813db31d0a45ab00677
5f2bd99627a93373f1a3ca2728063698863b10b0479faf782fab447a1e061e2d
720fb13f797dbba6a0ec19877c644abb0dde8bf6906b2ea4559a2a7cafe6b5cd
73619700a7d06a97037c3dc393146d58f7624356f766f9bb19fe9d33308522f2
80b8a0a5cca9ed908dec4f2441a9515efa3bde5a0b67a689316816c4ad6eae85
8c66b9dec0e884de4cc10f46b73f666ebe0ed0c5709a80fc7bedf0f4eddea473
95f8c56216adfc5127dfe195128001298dd815b85b2335f8da2def24b5364ee3
b26c13faf1b58138c2e4bb181ecf5cd561bef6fa0e9dfc343248453d34be55bd
b8338d589b1622dffb54ce8f512b8b70df7315ee75b28f47000e39cd5b9a40c4
c043c8d127281746c9c81a202bfb9f9a2ff3150775b50285d78e78c069d04712
c6042c265751e439c5a96222b5821e2c526614b3189d614ddc1e89f8e41433d6
d4268de943471bbfb03cd03056504d6e0ff7c81ad6b684d6af6d28d89f5d4c08
db67fb81e08ae38d7241c2247b0429e261481c3e069f7be47bb5a71dd0ed8e9f
e75fd2007d1c704022a95ba8a0726c737a980eedb99bef704c83da5742c154bb
eb13e60e5169d58acf9264f620d7474c697b48fde63db5c9af551d5431c9aaf8
ed74db49ccee7eb4b157dfaa6ddc6faf068f267eb9ff50000225879bfdb4b8ce
f6e407e5b8ce98202da3776a3936e61a07e3acd5538eace8d232d763b0b707ef
Coverage
Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK
Win.Ransomware.TeslaCrypt-10002553-0****Indicators of Compromise
- IOCs collected from dynamic analysis of 16 samples
Registry Keys
Occurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLinkedConnections
15
<HKCU>\SOFTWARE\XXXSYS
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
Value Name: CheckSetting
15
<HKCU>\SOFTWARE\XXXSYS
Value Name: ID
15
<HKCU>\Software<random, matching '[A-Z0-9]{14,16}’>
15
<HKCU>\Software<random, matching '[A-Z0-9]{14,16}’>
Value Name: data
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Eoawaa
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Update Installer
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: BCSSync
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pjluoctfesrw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pooqkvflocpc
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fwxkhpyjafio
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eacropxvpihj
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vnqeujgcjhuk
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: exetrpjyrtxg
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: njlwvbxfxmkw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: efwffgphvtdj
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: unwhvdemefqp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: tfeckcphtbxc
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: gqvoaslhlyoj
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ypojwqitnhyi
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: tguywpqhaosq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: jhrayyslywvo
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: rcjftpogpimu
1
Mutexes
Occurrences
ityeofm9234-23423
15
c731200
1
-9caf4c3fMutex
1
FvLQ49I›¬{Ljj6m
1
SSLOADasdasc000900
1
SVCHOST_MUTEX_OBJECT_RELEASED_c0009X00GOAL
1
IP Addresses contacted by malware. Does not indicate maliciousness
Occurrences
85[.]128[.]188[.]138
15
162[.]241[.]224[.]203
15
34[.]98[.]99[.]30
15
35[.]205[.]61[.]67
15
23[.]221[.]227[.]186
9
23[.]221[.]227[.]174
6
194[.]58[.]112[.]165
1
204[.]95[.]99[.]243
1
Domain Names contacted by malware. Does not indicate maliciousness
Occurrences
biocarbon[.]com[.]ec
15
imagescroll[.]com
15
music[.]mbsaeger[.]com
15
stacon[.]eu
15
surrogacyandadoption[.]com
15
worldisonefamily[.]info
15
apps[.]identrust[.]com
15
api[.]wipmania[.]com
1
n[.]ezjhyxxbf[.]ru
1
n[.]hmiblgoja[.]ru
1
n[.]jntbxduhz[.]ru
1
n[.]lotys[.]ru
1
n[.]oceardpku[.]ru
1
n[.]vbemnggcj[.]ru
1
n[.]yqqufklho[.]ru
1
n[.]yxntnyrap[.]ru
1
n[.]zhgcuntif[.]ru
1
Files and or directories created
Occurrences
%ProgramFiles%\7-Zip\Lang\ka.txt
15
%ProgramFiles%\7-Zip\Lang\kaa.txt
15
%ProgramFiles%\7-Zip\Lang\kab.txt
15
%ProgramFiles%\7-Zip\Lang\kk.txt
15
%ProgramFiles%\7-Zip\Lang\ko.txt
15
%ProgramFiles%\7-Zip\Lang\ku-ckb.txt
15
%ProgramFiles%\7-Zip\Lang\ku.txt
15
%ProgramFiles%\7-Zip\Lang\ky.txt
15
%ProgramFiles%\7-Zip\Lang\lij.txt
15
%ProgramFiles%\7-Zip\Lang\lt.txt
15
%ProgramFiles%\7-Zip\Lang\lv.txt
15
%ProgramFiles%\7-Zip\Lang\mk.txt
15
%ProgramFiles%\7-Zip\Lang\mn.txt
15
%ProgramFiles%\7-Zip\Lang\mng.txt
15
%ProgramFiles%\7-Zip\Lang\mng2.txt
15
%ProgramFiles%\7-Zip\Lang\mr.txt
15
%ProgramFiles%\7-Zip\Lang\ms.txt
15
%ProgramFiles%\7-Zip\Lang\nb.txt
15
%ProgramFiles%\7-Zip\Lang\ne.txt
15
%ProgramFiles%\7-Zip\Lang\nl.txt
15
%ProgramFiles%\7-Zip\Lang\nn.txt
15
%ProgramFiles%\7-Zip\Lang\pa-in.txt
15
%ProgramFiles%\7-Zip\Lang\pl.txt
15
%ProgramFiles%\7-Zip\Lang\ps.txt
15
%ProgramFiles%\7-Zip\Lang\pt-br.txt
15
*See JSON for more IOCs
File Hashes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Product
Protection
Secure Endpoint
Cloudlock
N/A
CWS
Email Security
Network Security
Stealthwatch
N/A
Stealthwatch Cloud
N/A
Secure Malware Analytics
Umbrella
WSA
Screenshots of Detection****Secure Endpoint
Secure Malware Analytics
MITRE ATT&CK