Dead or Alive? An Emotet Story
Tags
Common Information
Type | Value |
---|---|
UUID | ec1794f9-945d-4940-9132-e6aff26b4abd |
Fingerprint | 400a87f29bde675 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 12, 2022, 12:32 a.m. |
Added to db | Sept. 12, 2022, 3:29 a.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Dead or Alive? An Emotet Story |
Title | Dead or Alive? An Emotet Story |
Detected Hints/Tags/Attributes | 156/3/268 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/ |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 249 | ✔ | The DFIR Report | https://thedfirreport.com/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 538 | pic.twitter.com |
|
Details | Domain | 21 | 1768.py |
|
Details | Domain | 1 | lopespublicidade.com |
|
Details | Domain | 1 | bosny.com |
|
Details | Domain | 1 | seasidesolutions.com |
|
Details | Domain | 1 | borgelin.org |
|
Details | Domain | 1 | loa-hk.com |
|
Details | Domain | 11 | jquery.com |
|
Details | Domain | 24 | mega.io |
|
Details | Domain | 1175 | gmail.com |
|
Details | Domain | 179 | hotmail.com |
|
Details | Domain | 119 | yandex.ru |
|
Details | Domain | 246 | mail.ru |
|
Details | Domain | 272 | outlook.com |
|
Details | Domain | 396 | protonmail.com |
|
Details | Domain | 1 | dropmail.me |
|
Details | Domain | 74 | thedfirreport.com |
|
Details | Domain | 2 | joeware.net |
|
Details | File | 172 | dllhost.exe |
|
Details | File | 3 | find.bat |
|
Details | File | 9 | p.bat |
|
Details | File | 8 | 1.msi |
|
Details | File | 23 | c:\windows\system32\regsvr32.exe |
|
Details | File | 459 | regsvr32.exe |
|
Details | File | 1 | lljymiovft.dll |
|
Details | File | 18 | 1768.py |
|
Details | File | 1260 | explorer.exe |
|
Details | File | 1122 | svchost.exe |
|
Details | File | 92 | c:\windows\system32\svchost.exe |
|
Details | File | 1 | uomcgbxygce.exe |
|
Details | File | 1 | c:\users\user\appdata\local\frlxbdurbdvabvbs\uomcgbxygce.exe |
|
Details | File | 2 | c:\programdata\1.dll |
|
Details | File | 6 | c:\windows\system32\searchindexer.exe |
|
Details | File | 29 | c:\windows\system32\lsass.exe |
|
Details | File | 36 | c:\windows\system32\ntdll.dll |
|
Details | File | 20 | c:\windows\system32\kernelbase.dll |
|
Details | File | 3 | c:\program files\common files\microsoft shared\ink\ipsplugin.dll |
|
Details | File | 23 | c:\windows\system32\kernel32.dll |
|
Details | File | 409 | c:\windows\system32\cmd.exe |
|
Details | File | 53 | adfind.exe |
|
Details | File | 22 | find.exe |
|
Details | File | 16 | ad_users.txt |
|
Details | File | 16 | ad_computers.txt |
|
Details | File | 12 | ad_ous.txt |
|
Details | File | 7 | trustdmp.txt |
|
Details | File | 7 | subnets.txt |
|
Details | File | 12 | ad_group.txt |
|
Details | File | 8 | servers.txt |
|
Details | File | 9 | res.txt |
|
Details | File | 2 | dir.exe |
|
Details | File | 37 | 1.dll |
|
Details | File | 218 | min.js |
|
Details | File | 9 | %windir%\\syswow64\\dllhost.exe |
|
Details | File | 9 | %windir%\\sysnative\\dllhost.exe |
|
Details | File | 37 | rclone.exe |
|
Details | File | 1 | info_1805.xls |
|
Details | File | 7 | ateraagent.exe |
|
Details | File | 17 | attack.exe |
|
Details | File | 1 | project1.dll |
|
Details | File | 1 | runsuite.log |
|
Details | File | 1 | f73.exe |
|
Details | File | 9 | 32.exe |
|
Details | File | 2 | project.dll |
|
Details | File | 9 | 32.dll |
|
Details | File | 1 | vlu405yd87.dll |
|
Details | File | 1 | xx.cpp |
|
Details | File | 1 | xxtype.cpp |
|
Details | md5 | 23 | 72a589da586844d7f0818ce684948eea |
|
Details | md5 | 15 | f176ba63b4d68e576b5ba345bec2c7b7 |
|
Details | md5 | 1 | acd3d4e8f63f52eaf57467a76ca2389d |
|
Details | md5 | 1 | 27d0b9e38cdc9a31fa9271c0bbf5d393 |
|
Details | md5 | 1 | c96b2b5b52ef0013b841d136ddab0f49 |
|
Details | md5 | 1 | adf2b487134ffcd7999e419318dfdf8d |
|
Details | md5 | 1 | e984f812689ec7af136a151a19b2d56c |
|
Details | md5 | 1 | 592155bbbab05ac1f818cfd9eb53b672 |
|
Details | md5 | 1 | 066c972d2129d0e167d371a0abfcf03b |
|
Details | md5 | 1 | bcf185f1308ffd9e4249849d206d9d0c |
|
Details | md5 | 1 | d1aef4e37a548a43a95d44bd2f8c0afc |
|
Details | md5 | 1 | 4e03b8b675969416fb0d10e8ab11f7c2 |
|
Details | sha1 | 1 | 4a42b5e7e7fd43ddefc856f45bb95d97656ddca6 |
|
Details | sha1 | 1 | e96980812c287c9d27be9181bcf08727cc9f457a |
|
Details | sha1 | 1 | 22cc2bc032ae327de9f975e9122b692e4474ac15 |
|
Details | sha1 | 1 | 91c54877440d14538be22d662e7f47e29ab219bf |
|
Details | sha1 | 1 | 88591ad3806c0a1e451c744d4942e99e9a5d2ff7 |
|
Details | sha1 | 1 | 82070d19c26e0f7e255168e1f2364174215aa0de |
|
Details | sha256 | 1 | e598b9700e13f2cb1c30c6d9230152ed5716a6d6e25db702576fefeb6638005e |
|
Details | sha256 | 1 | 1b9c9e4ed6dab822b36e3716b1e8f046e92546554dff9bdbd18c822e18ab226b |
|
Details | sha256 | 1 | 5a5c601ede80d53e87e9ccb16b3b46f704e63ec7807e51f37929f65266158f4c |
|
Details | sha256 | 1 | fd72a9313f8564b57ebd18791a438216d289d4a97df3f860f1fc585a001265d9 |
|
Details | sha256 | 1 | 2b2e00ed89ce6898b9e58168488e72869f8e09f98fecb052143e15e98e5da9df |
|
Details | sha256 | 1 | f4c085ef1ba7e78a17a9185e4d5e06163fe0e39b6b0dc3088b4c1ed11c0d726b |
|
Details | sha256 | 1 | 76bfb4a73dc0d3f382d3877a83ce62b50828f713744659bb21c30569d368caf8 |
|
Details | sha256 | 2 | 5bc00ad792d4ddac7d8568f98a717caff9d5ef389ed355a15b892cc10ab2887b |
|
Details | sha256 | 8 | b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682 |
|
Details | IPv4 | 4 | 103.133.214.242 |
|
Details | IPv4 | 5 | 103.41.204.169 |
|
Details | IPv4 | 4 | 103.42.58.120 |
|
Details | IPv4 | 5 | 103.56.149.105 |
|
Details | IPv4 | 3 | 103.8.26.17 |
|
Details | IPv4 | 4 | 104.248.225.227 |
|
Details | IPv4 | 4 | 110.235.83.107 |
|
Details | IPv4 | 6 | 116.124.128.206 |
|
Details | IPv4 | 5 | 118.98.72.86 |
|
Details | IPv4 | 3 | 134.122.119.23 |
|
Details | IPv4 | 7 | 139.196.72.155 |
|
Details | IPv4 | 5 | 159.69.237.188 |
|
Details | IPv4 | 5 | 175.126.176.79 |
|
Details | IPv4 | 5 | 178.62.112.199 |
|
Details | IPv4 | 5 | 185.148.168.220 |
|
Details | IPv4 | 5 | 188.225.32.231 |
|
Details | IPv4 | 4 | 190.90.233.66 |
|
Details | IPv4 | 4 | 194.9.172.107 |
|
Details | IPv4 | 8 | 195.154.146.35 |
|
Details | IPv4 | 8 | 195.77.239.39 |
|
Details | IPv4 | 9 | 196.44.98.190 |
|
Details | IPv4 | 6 | 202.134.4.210 |
|
Details | IPv4 | 5 | 202.28.34.99 |
|
Details | IPv4 | 5 | 202.29.239.162 |
|
Details | IPv4 | 5 | 203.153.216.46 |
|
Details | IPv4 | 7 | 207.148.81.119 |
|
Details | IPv4 | 5 | 210.57.209.142 |
|
Details | IPv4 | 7 | 217.182.143.207 |
|
Details | IPv4 | 4 | 36.67.23.59 |
|
Details | IPv4 | 8 | 37.44.244.177 |
|
Details | IPv4 | 7 | 37.59.209.141 |
|
Details | IPv4 | 4 | 45.71.195.104 |
|
Details | IPv4 | 5 | 5.56.132.177 |
|
Details | IPv4 | 4 | 51.68.141.164 |
|
Details | IPv4 | 6 | 54.37.106.167 |
|
Details | IPv4 | 8 | 54.37.228.122 |
|
Details | IPv4 | 6 | 54.38.143.246 |
|
Details | IPv4 | 7 | 54.38.242.185 |
|
Details | IPv4 | 8 | 59.148.253.194 |
|
Details | IPv4 | 5 | 62.171.178.147 |
|
Details | IPv4 | 7 | 66.42.57.149 |
|
Details | IPv4 | 4 | 68.183.91.111 |
|
Details | IPv4 | 4 | 68.183.93.250 |
|
Details | IPv4 | 8 | 78.46.73.125 |
|
Details | IPv4 | 8 | 78.47.204.80 |
|
Details | IPv4 | 7 | 85.214.67.203 |
|
Details | IPv4 | 5 | 85.25.120.45 |
|
Details | IPv4 | 4 | 87.106.97.83 |
|
Details | IPv4 | 7 | 88.217.172.165 |
|
Details | IPv4 | 5 | 93.104.209.107 |
|
Details | IPv4 | 1 | 59.95.98.204 |
|
Details | MITRE ATT&CK Techniques | 59 | T1059.006 |
|
Details | MITRE ATT&CK Techniques | 118 | T1570 |
|
Details | MITRE ATT&CK Techniques | 59 | T1055.001 |
|
Details | MITRE ATT&CK Techniques | 31 | T1559.001 |
|
Details | MITRE ATT&CK Techniques | 460 | T1059.001 |
|
Details | MITRE ATT&CK Techniques | 44 | T1218.010 |
|
Details | MITRE ATT&CK Techniques | 38 | T1550.002 |
|
Details | MITRE ATT&CK Techniques | 74 | T1069.002 |
|
Details | MITRE ATT&CK Techniques | 99 | T1087.002 |
|
Details | MITRE ATT&CK Techniques | 124 | T1482 |
|
Details | MITRE ATT&CK Techniques | 365 | T1204.002 |
|
Details | MITRE ATT&CK Techniques | 139 | T1021.002 |
|
Details | MITRE ATT&CK Techniques | 440 | T1055 |
|
Details | MITRE ATT&CK Techniques | 100 | T1567.002 |
|
Details | MITRE ATT&CK Techniques | 20 | T1055.003 |
|
Details | MITRE ATT&CK Techniques | 243 | T1018 |
|
Details | MITRE ATT&CK Techniques | 1006 | T1082 |
|
Details | MITRE ATT&CK Techniques | 444 | T1071 |
|
Details | MITRE ATT&CK Techniques | 176 | T1135 |
|
Details | MITRE ATT&CK Techniques | 36 | T1558.003 |
|
Details | MITRE ATT&CK Techniques | 173 | T1003.001 |
|
Details | MITRE ATT&CK Techniques | 380 | T1547.001 |
|
Details | MITRE ATT&CK Techniques | 409 | T1566 |
|
Details | MITRE ATT&CK Techniques | 310 | T1566.001 |
|
Details | Url | 1 | http://praachichemfood.com/wp-content/mwmos/","..\hvxda.ocx |
|
Details | Url | 1 | https://lopespublicidade.com/cgi-bin/e5r5og4ieaqnxqrzdh/","..\hvxda.ocx |
|
Details | Url | 1 | https://bosny.com/aspnet_client/rnmp0ofr/","..\hvxda.ocx |
|
Details | Url | 1 | http://seasidesolutions.com/cgi-bin/wloo6sezycj3ltlc/","..\hvxda.ocx |
|
Details | Url | 1 | http://borgelin.org/belzebub/okwrwz1c/","..\hvxda.ocx |
|
Details | Url | 1 | http://loa-hk.com/wp-content/ffbag/","..\hvxda.ocx |
|
Details | Url | 1 | https://lopespublicidade.com/cgi-bin/e5r5og4ieaqnxqrzdh |
|
Details | Url | 1 | https://bosny.com/aspnet_client/rnmp0ofr |
|
Details | Url | 1 | http://seasidesolutions.com/cgi-bin/wloo6sezycj3ltlc |
|
Details | Url | 1 | http://borgelin.org/belzebub/okwrwz1c |
|
Details | Url | 1 | http://loa-hk.com/wp-content/ffbag |
|
Details | Url | 1 | https://103.133.214.242 |
|
Details | Url | 1 | https://103.133.214.242:8080 |
|
Details | Url | 1 | https://103.41.204.169 |
|
Details | Url | 1 | https://103.41.204.169:8080 |
|
Details | Url | 1 | https://103.42.58.120 |
|
Details | Url | 1 | https://103.42.58.120:7080 |
|
Details | Url | 1 | https://103.56.149.105 |
|
Details | Url | 1 | https://103.56.149.105:8080 |
|
Details | Url | 1 | https://103.8.26.17 |
|
Details | Url | 1 | https://103.8.26.17:8080 |
|
Details | Url | 1 | https://104.248.225.227 |
|
Details | Url | 1 | https://104.248.225.227:8080 |
|
Details | Url | 1 | https://110.235.83.107 |
|
Details | Url | 1 | https://110.235.83.107:7080 |
|
Details | Url | 1 | https://116.124.128.206 |
|
Details | Url | 1 | https://116.124.128.206:8080 |
|
Details | Url | 1 | https://118.98.72.86 |
|
Details | Url | 1 | https://134.122.119.23 |
|
Details | Url | 1 | https://134.122.119.23:8080 |
|
Details | Url | 1 | https://139.196.72.155:8080 |
|
Details | Url | 1 | https://159.69.237.188 |
|
Details | Url | 1 | https://175.126.176.79 |
|
Details | Url | 1 | https://175.126.176.79:8080 |
|
Details | Url | 1 | https://178.62.112.199 |
|
Details | Url | 1 | https://178.62.112.199:8080 |
|
Details | Url | 1 | https://185.148.168.220 |
|
Details | Url | 1 | https://185.148.168.220:8080 |
|
Details | Url | 1 | https://188.225.32.231 |
|
Details | Url | 1 | https://188.225.32.231:4143 |
|
Details | Url | 1 | https://190.90.233.66 |
|
Details | Url | 1 | https://194.9.172.107 |
|
Details | Url | 1 | https://194.9.172.107:8080 |
|
Details | Url | 1 | https://195.154.146.35 |
|
Details | Url | 1 | https://195.77.239.39 |
|
Details | Url | 2 | https://195.77.239.39:8080 |
|
Details | Url | 1 | https://196.44.98.190 |
|
Details | Url | 2 | https://196.44.98.190:8080 |
|
Details | Url | 1 | https://202.134.4.210 |
|
Details | Url | 1 | https://202.134.4.210:7080 |
|
Details | Url | 1 | https://202.28.34.99 |
|
Details | Url | 1 | https://202.28.34.99:8080 |
|
Details | Url | 1 | https://202.29.239.162 |
|
Details | Url | 1 | https://203.153.216.46 |
|
Details | Url | 1 | https://207.148.81.119 |
|
Details | Url | 2 | https://207.148.81.119:8080 |
|
Details | Url | 1 | https://210.57.209.142 |
|
Details | Url | 1 | https://210.57.209.142:8080 |
|
Details | Url | 1 | https://217.182.143.207 |
|
Details | Url | 1 | https://36.67.23.59 |
|
Details | Url | 1 | https://37.44.244.177 |
|
Details | Url | 2 | https://37.44.244.177:8080 |
|
Details | Url | 1 | https://37.59.209.141 |
|
Details | Url | 2 | https://37.59.209.141:8080 |
|
Details | Url | 1 | https://45.71.195.104:8080 |
|
Details | Url | 1 | https://5.56.132.177:8080 |
|
Details | Url | 1 | https://51.68.141.164:8080 |
|
Details | Url | 1 | https://54.37.106.167:8080 |
|
Details | Url | 1 | https://54.37.228.122 |
|
Details | Url | 1 | https://54.38.143.246 |
|
Details | Url | 1 | https://54.38.143.246:7080 |
|
Details | Url | 1 | https://54.38.242.185 |
|
Details | Url | 1 | https://59.148.253.194 |
|
Details | Url | 1 | https://62.171.178.147:8080 |
|
Details | Url | 1 | https://66.42.57.149 |
|
Details | Url | 1 | https://68.183.91.111 |
|
Details | Url | 1 | https://68.183.91.111:8080 |
|
Details | Url | 1 | https://68.183.93.250 |
|
Details | Url | 1 | https://78.46.73.125 |
|
Details | Url | 1 | https://78.47.204.80 |
|
Details | Url | 1 | https://85.214.67.203 |
|
Details | Url | 2 | https://85.214.67.203:8080 |
|
Details | Url | 1 | https://85.25.120.45 |
|
Details | Url | 1 | https://85.25.120.45:8080 |
|
Details | Url | 1 | https://87.106.97.83 |
|
Details | Url | 1 | https://87.106.97.83:7080 |
|
Details | Url | 1 | https://88.217.172.165 |
|
Details | Url | 1 | https://88.217.172.165:8080 |
|
Details | Url | 1 | https://93.104.209.107 |
|
Details | Url | 1 | https://93.104.209.107:8080 |
|
Details | Url | 1 | http://59.95.98.204:8080/jquery-3.3.1.min.js |
|
Details | Url | 15 | https://thedfirreport.com |
|
Details | Yara rule | 1 | import "pe" rule UOmCgbXygCe_14335 { meta: description = "UOmCgbXygCe.exe" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "f4c085ef1ba7e78a17a9185e4d5e06163fe0e39b6b0dc3088b4c1ed11c0d726b" strings: $s1 = "runsuite.log" ascii fullword $s2 = "AppPolicyGetProcessTerminationMethod" ascii fullword $s3 = "f73.exe" ascii fullword $s4 = "Processing test line %ld %s leaked %d" ascii fullword $s5 = "Internal error: xmlSchemaTypeFixup, complex type '%s': the <simpleContent><restriction> is missing a <simpleType> child, but was" $s6 = "The target namespace of the included/redefined schema '%s' has to be absent or the same as the including/redefining schema's tar" $s7 = "The target namespace of the included/redefined schema '%s' has to be absent, since the including/redefining schema has no target" $s8 = "A <simpleType> is expected among the children of <restriction>, if <simpleContent> is used and the base type '%s' is a complex t" $s9 = "there is at least one entity reference in the node-tree currently being validated. Processing of entities with this XML Schema p" $s10 = "## %s test suite for Schemas version %s" ascii fullword $s11 = "Internal error: %s, " ascii fullword $s12 = "If <simpleContent> and <restriction> is used, the base type must be a simple type or a complex type with mixed content and parti" $s13 = "For a string to be a valid default, the type definition must be a simple type or a complex type with simple content or mixed con" $s14 = "For a string to be a valid default, the type definition must be a simple type or a complex type with mixed content and a particl" $s15 = "Could not open the log file, running in verbose mode" ascii fullword $s16 = "not validating will not read content for PE entity %s" ascii fullword $s17 = "Skipping import of schema located at '%s' for the namespace '%s', since this namespace was already imported with the schema loca" $s18 = "(annotation?, (simpleContent | complexContent | ((group | all | choice | sequence)?, ((attribute | attributeGroup)*, anyAttribut" $s19 = "get namespace" ascii fullword $s20 = "instance %s fails to parse" ascii fullword condition: uint16(0) == 0x5a4d and filesize < 7000KB and (pe.imphash() == "bcf185f1308ffd9e4249849d206d9d0c" and pe.exports("xmlEscapeFormatString") or 12 of them) } |
|
Details | Yara rule | 1 | rule info_1805_14335 { meta: description = "info_1805.xls" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "e598b9700e13f2cb1c30c6d9230152ed5716a6d6e25db702576fefeb6638005e" strings: $s1 = "32.exe" ascii fullword $s2 = "System32\\X" ascii fullword $s3 = "DocumentOwnerPassword" wide fullword $s4 = "DocumentUserPassword" wide fullword $s5 = "t\"&\"t\"&\"p\"&\"s:\"&\"//lo\"&\"pe\"&\"sp\"&\"ub\"&\"li\"&\"ci\"&\"da\"&\"de.c\"&\"o\"&\"m/cgi-bin/e\"&\"5R\"&\"5o\"&\"G4\"&\"" $s6 = "UniresDLL" ascii fullword $s7 = "OEOGAJPGJPAG" ascii fullword $s8 = "\\Windows\\" ascii fullword $s9 = "_-* #,##0.00_-;\\-* #,##0.00_-;_-* \"-\"??_-; [email protected] _-" ascii fullword $s10 = "_-* #,##0_-;\\-* #,##0_-;_-* \"-\"_-; [email protected] _-" ascii fullword $s11 = "_-;_-* \"" ascii fullword $s12 = "^{)P -z)" ascii fullword $s13 = "ResOption1" ascii fullword $s14 = "DocumentSummaryInformation" wide fullword $s15 = "Root Entry" wide fullword $s16 = "SummaryInformation" wide fullword $s17 = "A\",\"JJCCBB\"" ascii fullword $s18 = "Excel 4.0" ascii fullword $s19 = "Microsoft Print to PDF" wide fullword $s20 = "\"_-;\\-* #,##0.00\\ \"" wide fullword condition: uint16(0) == 0xcfd0 and filesize < 200KB and all of them } |
|
Details | Yara rule | 1 | import "pe" rule cobalt_strike_14435_dll_1 { meta: description = "1.dll" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "1b9c9e4ed6dab822b36e3716b1e8f046e92546554dff9bdbd18c822e18ab226b" strings: $s1 = "curity><requestedPrivileges><requestedExecutionLevel level=\"asInvoker\" uiAccess=\"false\"></requestedExecutionLevel></requeste" $s2 = "CDNS Project.dll" ascii fullword $s3 = "hemas.microsoft.com/SMI/2005/WindowsSettings\">true</dpiAware></windowsSettings></application></assembly>" ascii fullword $s4 = "Hostname to lookup:" wide fullword $s5 = "Hostnames:" wide fullword $s6 = "wOshV- D3\" [email protected] \\" ascii fullword $s7 = "T4jk{zrvG#@KRO* d'z" ascii fullword $s8 = "CDNS Project Version 1.0" wide fullword $s9 = "zK$%S.cPO>rtW" ascii fullword $s10 = "vOsh.HSDiXRI" ascii fullword $s11 = "l4p.oZewOsh7zP" ascii fullword $s12 = "5p2o.ewOsh7H" ascii fullword $s13 = "h7H.DiX" ascii fullword $s14 = "l4pWo.ewOsh[H%DiXRI" ascii fullword $s15 = "rEWS).lpp~o" ascii fullword $s16 = ",m}_lOG" ascii fullword $s17 = "<assembly xmlns=\"urn:schemas-microsoft-com:asm.v1\" manifestVersion=\"1.0\"><trustInfo xmlns=\"urn:schemas-microsoft-com:asm.v3" $s18 = "vileges></security></trustInfo><application xmlns=\"urn:schemas-microsoft-com:asm.v3\"><windowsSettings><dpiAware xmlns=\"http:/" $s19 = "tn9- 2" ascii fullword $s20 = "PDiXRI7" ascii fullword condition: uint16(0) == 0x5a4d and filesize < 8000KB and (pe.imphash() == "d1aef4e37a548a43a95d44bd2f8c0afc" or 8 of them) } |
|
Details | Yara rule | 1 | import "pe" rule cobalt_strike_14435_dll_2 { meta: description = "32.dll" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "76bfb4a73dc0d3f382d3877a83ce62b50828f713744659bb21c30569d368caf8" strings: $x1 = "mail glide drooping dismiss collation production mm refresh murderer start parade subscription accident retorted carter stalls r" $s2 = "vlu405yd87.dll" ascii fullword $s3 = "XYVZSWWVU" ascii fullword $s4 = "ZYWVWSXVT" ascii fullword $s5 = "WXVZTVVUVX" ascii fullword $s6 = "ZYXZXSWZW" ascii fullword $s7 = "SZWVSZTVU" ascii fullword $s8 = "VXVWUWVZYY" ascii fullword $s9 = "VSXZZYSVU" ascii fullword $s10 = "VXUZUVWVU" ascii fullword $s11 = "SVVZZXZUVW" ascii fullword $s12 = "USVZVSWVZ" ascii fullword $s13 = "SWVVTVSVWWXZZVVV" ascii fullword $s14 = "VSXVUXXZS" ascii fullword $s15 = "WSVZYWZWWW" ascii fullword $s16 = "XUSZXXVVW" ascii fullword $s17 = "ZWZWZVZWWWZ" ascii fullword $s18 = "STZVYVVZYS" ascii fullword $s19 = "ZWZWYSZXUZ" ascii fullword $s20 = "SVVWWVVVWW" ascii fullword condition: uint16(0) == 0x5a4d and filesize < 2000KB and (pe.imphash() == "4e03b8b675969416fb0d10e8ab11f7c2" or (1 of ($x*) or 12 of them)) } |
|
Details | Yara rule | 1 | rule find_bat_14335 { meta: description = "Find.bat using AdFind" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "5bc00ad792d4ddac7d8568f98a717caff9d5ef389ed355a15b892cc10ab2887b" strings: $x1 = "find.exe" ascii wide nocase $s1 = "objectcategory" ascii wide nocase $s2 = "person" ascii wide nocase $s3 = "computer" ascii wide nocase $s4 = "organizationalUnit" ascii wide nocase $s5 = "trustdmp" ascii wide nocase condition: filesize < 1000 and 1 of ($x*) and 4 of ($s*) } |
|
Details | Yara rule | 1 | rule adfind_14335 { meta: description = "Find.bat using AdFind" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" hash1 = "b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682" strings: $x1 = "joeware.net" ascii wide nocase $s1 = "xx.cpp" ascii wide nocase $s2 = "xxtype.cpp" ascii wide nocase $s3 = "Joe Richards" ascii wide nocase $s4 = "RFC 2253" ascii wide nocase $s5 = "RFC 2254" ascii wide nocase condition: uint16(0) == 0x5a4d and filesize < 2000KB and 1 of ($x*) or 4 of ($s*) } |
|
Details | Yara rule | 1 | rule p_bat_14335 { meta: description = "Finding bat files that is used for enumeration" author = "The DFIR Report" reference = "https://thedfirreport.com" date = "2022-09-12" strings: $a1 = "for /f %%i in" ascii wide nocase $a2 = "do ping %%i" ascii wide nocase $a3 = "-n 1 >>" ascii wide nocase $a4 = "res.txt" ascii wide nocase condition: filesize < 2000KB and all of ($a*) } |