|
#GlobeImposter #Ransomware Extension: .crypt_fereangos@airmail_cc |
|
Detected by THOR APT Scanner Matched Rule: mimikatz_ru_May17 Ruleset: Mimikatz Description: Auto-generated rule - file mimikatz-ru.exe Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Generic_KeyGen_Patcher Ruleset: Hacktools Description: Keygen from CN Honker Pentest Toolset - file Acunetix_Web_Vulnerability_Scanner_8.x_Enterprise_Edition_KeyGen.exe Reference: Disclosed CN Honker Pentest Toolset |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Javascript_Running_Interpreter Ruleset: MalScripts Description: Detects a suspicious command definition in JavaScript code Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Wscript_Script_Tiny Ruleset: MalScripts Description: Detects a suspiciuely short JavaScript that executes a shell Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Malware_CN_2_Jan17 Ruleset: Malware 2 Description: - Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Meterpreter_AB Ruleset: Malware 2 Description: - Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Kali_Exes_metasploit_device_tool Ruleset: Hacktools Description: - Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Meterpreter_AB Ruleset: Malware 2 Description: - Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Kali_Exes_usr_share_wfuzz_wordlist_fuzzdb_web_backdoors_exe_nc Ruleset: Hacktools Description: Kali Linux malicious executable - file nc.exe Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Wscript_Script_Tiny Ruleset: MalScripts Description: Detects a suspiciuely short JavaScript that executes a shell Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Kali_Exes_churrasco Ruleset: Hacktools Description: Kali Linux malicious executable - file churrasco.exe Reference: - |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Wscript_Script_Tiny Ruleset: MalScripts Description: Detects a suspiciuely short JavaScript that executes a shell Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Wscript_Script_Tiny Ruleset: MalScripts Description: Detects a suspiciuely short JavaScript that executes a shell Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Suspicious_Wscript_Script_Tiny Ruleset: MalScripts Description: Detects a suspiciuely short JavaScript that executes a shell Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Hacktool_Client Ruleset: Hacktools Description: Hacktool VT Research - file Client.exe Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: PowerShell_Keywords_Case_Anomaly Ruleset: MalScripts Description: Detects obfuscated powershell commands by casing anomalies Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Fireball_Signing_Cert Ruleset: APT Winnti Description: Detects signing certificate of Elex vendor Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: CN_Hacktools_Mithril_v1_40_NC Ruleset: Hacktools Description: - Reference: - |
|
captured from honeypot on 09/29/2017 23:01:34 and submitted via viper malware framework |
|
captured from honeypot on 09/29/2017 23:01:34 and submitted via viper malware framework |
|
Detected by THOR APT Scanner Matched Rule: Hacktool_inject_x64 Ruleset: Hacktools Description: Hacktool VT Research - file inject-x64.exe Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Hacktool_Client Ruleset: Hacktools Description: Hacktool VT Research - file Client.exe Reference: Internal Research |
|
Detected by THOR APT Scanner Matched Rule: Unspecified_Malware_Oct16_A Ruleset: Malware 2 Description: Detects an unspecififed malware - October 2016 Reference: Internal Research |
Matched Rule: Suspicious_Javascript_Running_Interpreter
Ruleset: MalScripts
Description: Detects a suspicious command definition in JavaScript code
Reference: Internal Research