event_id
int64
1
1.69k
event_title
stringlengths
8
178
event_timestamp
stringlengths
25
25
event_date
stringlengths
10
10
event_tags
stringlengths
9
5.32k
category
stringclasses
16 values
type
stringlengths
2
23
value
stringlengths
2
22.2k
attribute_tags
stringlengths
3
354
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Payload delivery
md5
2e30520f8536a27dd59eabbcb8e3532a
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Payload delivery
md5
2d841cb153bebcfdee5c54472b017af2
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Payload delivery
md5
2ccb9759800154de817bf779a52d48f8
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Payload delivery
md5
23f4f604f1a05c4abf2ac02f976b746b
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
45.63.76.67
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
155.94.160.72
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
107.173.62.158
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
107.148.219.54
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
104.156.229.226
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
103.77.192.88
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
103.146.179.101
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
182.239.114.135
null
1,664
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
2023-08-29 14:42:36+00:00
2023-08-29
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Network activity
ip-dst
107.148.149.156
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
ip-dst
5.42.94.169
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
kyliansuperm92139124.sbs
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
get-vbs.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
cmd2.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
mymine.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
vbs1.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
vbs22.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
External analysis
domain
vbs3.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
macros-pro.net
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
plugin4free.net
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
self-games.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
slackmessenger.site
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
soft-got.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vpnsget.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vstget.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
seif-games.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
self-games.host
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
self-games.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
self-games.site
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
self-games.space
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
soft-got.co
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
soft-got.net
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
soft-got.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vst-dw.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vstdw.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
hardcoverradio.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
macrospro.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
plugin4free.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
slackmessenger.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vpnsget.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
adanagram.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
bin-a.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
bin-b.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
bin-c.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
bin-d.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
cmd1.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
cmd2.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
cmd22.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-a.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-b.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-c.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-d.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-i.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-vbs.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
get-y.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
hautegaleria.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
jacksmanual.com
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vbs1.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vbs2.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vbs22.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
vbs3.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
minemy.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
mymine.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
crypt1.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
domain
gethere.pw
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
ip-dst
77.91.124.25
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
ip-dst|port
104.193.255.48|80
null
1,665
CustomerLoader: a new malware distributing a wide variety of payloads
2023-09-06 03:00:05+00:00
2023-07-14
admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear
Network activity
ip-dst
179.43.170.241
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
14uagxyW9K3dP8WhR1obGeBFfTf7SE6FYq
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1HBiRxpSxekVND1Rqwqh1gbUKeZiYBsDkt
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1q7sl7zj9ekyxhwqahn26u257cg0esxc576vd96j
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1q7jtlsp6rpfrky6r4yygpmay6gcgylurxhy64er
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qexxekp6wgkxt9mezuhjurzuxga5unz2wpdtxkd
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1DbbBnmvVzqjve6NR8FG8dVPqje1Uk3HVh
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1YD4pi1ncvJqVQFbKSTxQuSdLbjBk8tmw
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qtzxe3ydk6g30wc6lghcx0g6umtm45lfrmjfp5c
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1HMKAPH17qABgSdEcMct2bELV9BofMUHHa
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1q06avh5tcmrjrwh8ty9kg8jhdpzhr8qmh06pw55
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1HTxR4q4vxQKxtCXB95tdSC5xtsa2uPcMP
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
12xHi1pTom3od4CUDGMxAcABboM1W8iej1
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qp8xqah2h0mcnk5w7tq6jkm8d0zs2skhu0ccsxx
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qjtee84rtjan4338fdxp30ydww7vmghq2e8jdvm
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1KWAUSVw219biZKUM9LtPMJmtJTh8kPKdj
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1EJJoUCykyZT3FtxRGSpuUsiBxCiHQ4wqX
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1AyLWnrMcToF2vBnsE3SzwirXFhuc4jpUC
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
13KFphsUk1MQCzr1gcyHpzbfadb37fdf3m
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1FQCKUjeFJPhZmxG98PgZFhBAuQCuwWQ3R
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qrpk94etm3nzfhjqtugpcscv4jmxsdhm3fahxde
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
15Aq9jP5ATC5baaYuh8CU3iyQegDnsaDWT
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1MXcVH6Kwp5z4UpvDWBxDM1HicuhX6LHR8
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1Aub5MNYucx863Z6YfnymUvWJF2F38EWyY
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
132duBMZcHEWygULL3Hovf6dxnsBZXaJpz
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1q05e48e0vj0zh3s6fcpngq56cguam4qjh0qd9ek
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
114t3CxEdMqJSoJB1AgMMWejtdC8xn3ZUQ
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qazjzkd4e572p8c2n4u0gaewhrwe8xxpaklq6fv
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
bc1qrds933q5jgqx33tq5pn0rnmgg6x23qlnqgv00e
null
1,666
Police.CH - Erpresserische Kryptowährung-Adressen
2023-09-08 11:58:47+00:00
2023-09-08
type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear
Financial fraud
btc
1GRSCYSLDe4kX97QobTz8UcZZRVBXi2ewB
null