event_id
int64 1
1.69k
| event_title
stringlengths 8
178
| event_timestamp
stringlengths 25
25
| event_date
stringlengths 10
10
| event_tags
stringlengths 9
5.32k
| category
stringclasses 16
values | type
stringlengths 2
23
| value
stringlengths 2
22.2k
| attribute_tags
stringlengths 3
354
⌀ |
---|---|---|---|---|---|---|---|---|
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Payload delivery | md5 | 2e30520f8536a27dd59eabbcb8e3532a | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Payload delivery | md5 | 2d841cb153bebcfdee5c54472b017af2 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Payload delivery | md5 | 2ccb9759800154de817bf779a52d48f8 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Payload delivery | md5 | 23f4f604f1a05c4abf2ac02f976b746b | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 45.63.76.67 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 155.94.160.72 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 107.173.62.158 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 107.148.219.54 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 104.156.229.226 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 103.77.192.88 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 103.146.179.101 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 182.239.114.135 | null |
1,664 | Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) | 2023-08-29 14:42:36+00:00 | 2023-08-29 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Network activity | ip-dst | 107.148.149.156 | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | ip-dst | 5.42.94.169 | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | kyliansuperm92139124.sbs | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | get-vbs.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | cmd2.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | mymine.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | vbs1.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | vbs22.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | External analysis | domain | vbs3.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | macros-pro.net | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | plugin4free.net | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | self-games.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | slackmessenger.site | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | soft-got.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vpnsget.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vstget.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | seif-games.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | self-games.host | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | self-games.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | self-games.site | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | self-games.space | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | soft-got.co | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | soft-got.net | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | soft-got.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vst-dw.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vstdw.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | hardcoverradio.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | macrospro.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | plugin4free.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | slackmessenger.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vpnsget.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | adanagram.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | bin-a.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | bin-b.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | bin-c.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | bin-d.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | cmd1.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | cmd2.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | cmd22.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-a.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-b.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-c.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-d.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-i.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-vbs.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | get-y.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | hautegaleria.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | jacksmanual.com | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vbs1.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vbs2.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vbs22.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | vbs3.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | minemy.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | mymine.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | crypt1.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | domain | gethere.pw | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | ip-dst | 77.91.124.25 | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | ip-dst|port | 104.193.255.48|80 | null |
1,665 | CustomerLoader: a new malware distributing a wide variety of payloads | 2023-09-06 03:00:05+00:00 | 2023-07-14 | admiralty-scale:source-reliability="b",admiralty-scale:information-credibility="2",DOTRUNPEX,Loader,feedly:source="Sekoia.io Blog",malware_classification:malware-category="Downloader",osint:source-type="blog-post",misp-galaxy:mitre-attack-pattern="Symmetric Cryptography - T1573.001",misp-galaxy:mitre-attack-pattern="Impair Defenses - T1562",misp-galaxy:malpedia="vidar",misp-galaxy:malpedia="XLoader",misp-galaxy:malpedia="Agent Tesla",misp-galaxy:malpedia="AsyncRAT",misp-galaxy:malpedia="Ave Maria",misp-galaxy:malpedia="DarkCloud Stealer",misp-galaxy:malpedia="LgoogLoader",misp-galaxy:malpedia="RedLine Stealer",misp-galaxy:malpedia="SectopRAT",misp-galaxy:malpedia="Stealc",misp-galaxy:mitre-malware="Agent Tesla - S0331",misp-galaxy:mitre-malware="WarzoneRAT - S0670",misp-galaxy:mitre-tool="QuasarRAT - S0262",misp-galaxy:mitre-tool="Remcos - S0332",misp-galaxy:rat="AsyncRAT",misp-galaxy:stealer="Vidar",misp-galaxy:stealer="DarkCloud Stealer",misp-galaxy:tool="FormBook",misp-galaxy:tool="Agent Tesla",misp-galaxy:malpedia="BitRAT",misp-galaxy:mitre-malware="WannaCry - S0366",misp-galaxy:mitre-attack-pattern="Spearphishing Attachment - T1566.001",misp-galaxy:mitre-attack-pattern="Shared Modules - T1129",misp-galaxy:mitre-attack-pattern="Ingress Tool Transfer - T1105",misp-galaxy:mitre-attack-pattern="Disable or Modify Tools - T1562.001",misp-galaxy:mitre-attack-pattern="Deobfuscate/Decode Files or Information - T1140",misp-galaxy:mitre-attack-pattern="Obfuscated Files or Information - T1027",misp-galaxy:mitre-attack-pattern="Dynamic API Resolution - T1027.007",misp-galaxy:mitre-attack-pattern="Reflective Code Loading - T1620",misp-galaxy:mitre-attack-pattern="Web Protocols - T1071.001",misp-galaxy:mitre-attack-pattern="Standard Encoding - T1132.001",misp-galaxy:mitre-attack-pattern="Data Obfuscation - T1001",tlp:clear | Network activity | ip-dst | 179.43.170.241 | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 14uagxyW9K3dP8WhR1obGeBFfTf7SE6FYq | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1HBiRxpSxekVND1Rqwqh1gbUKeZiYBsDkt | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1q7sl7zj9ekyxhwqahn26u257cg0esxc576vd96j | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1q7jtlsp6rpfrky6r4yygpmay6gcgylurxhy64er | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qexxekp6wgkxt9mezuhjurzuxga5unz2wpdtxkd | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1DbbBnmvVzqjve6NR8FG8dVPqje1Uk3HVh | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1YD4pi1ncvJqVQFbKSTxQuSdLbjBk8tmw | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qtzxe3ydk6g30wc6lghcx0g6umtm45lfrmjfp5c | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1HMKAPH17qABgSdEcMct2bELV9BofMUHHa | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1q06avh5tcmrjrwh8ty9kg8jhdpzhr8qmh06pw55 | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1HTxR4q4vxQKxtCXB95tdSC5xtsa2uPcMP | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 12xHi1pTom3od4CUDGMxAcABboM1W8iej1 | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qp8xqah2h0mcnk5w7tq6jkm8d0zs2skhu0ccsxx | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qjtee84rtjan4338fdxp30ydww7vmghq2e8jdvm | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1KWAUSVw219biZKUM9LtPMJmtJTh8kPKdj | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1EJJoUCykyZT3FtxRGSpuUsiBxCiHQ4wqX | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1AyLWnrMcToF2vBnsE3SzwirXFhuc4jpUC | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 13KFphsUk1MQCzr1gcyHpzbfadb37fdf3m | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1FQCKUjeFJPhZmxG98PgZFhBAuQCuwWQ3R | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qrpk94etm3nzfhjqtugpcscv4jmxsdhm3fahxde | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 15Aq9jP5ATC5baaYuh8CU3iyQegDnsaDWT | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1MXcVH6Kwp5z4UpvDWBxDM1HicuhX6LHR8 | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1Aub5MNYucx863Z6YfnymUvWJF2F38EWyY | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 132duBMZcHEWygULL3Hovf6dxnsBZXaJpz | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1q05e48e0vj0zh3s6fcpngq56cguam4qjh0qd9ek | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 114t3CxEdMqJSoJB1AgMMWejtdC8xn3ZUQ | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qazjzkd4e572p8c2n4u0gaewhrwe8xxpaklq6fv | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | bc1qrds933q5jgqx33tq5pn0rnmgg6x23qlnqgv00e | null |
1,666 | Police.CH - Erpresserische Kryptowährung-Adressen | 2023-09-08 11:58:47+00:00 | 2023-09-08 | type:OSINT,osint:lifetime="perpetual",osint:certainty="50",tlp:white,tlp:clear | Financial fraud | btc | 1GRSCYSLDe4kX97QobTz8UcZZRVBXi2ewB | null |
Subsets and Splits