Skip to content
/ IoCs Public

Files

Latest commit

638bc3f · Jun 6, 2024

History

History
24 lines (24 loc) · 1.83 KB

crimson_palace_stac1305_charlie.csv

File metadata and controls

24 lines (24 loc) · 1.83 KB
1
IndicatorDataNotes
2
sha256f788d5c2c1bb2d88db09b727b3841155daf43ba81802b5faffec72640451fa4ftpyrced_ambs.exe
3
sha256ad346007f28c4b6d409c95f55e750e249db4b168cd7061baa128f826df948e10443.txt (PocoProxy)
4
sha2561ad26a31c5387055610e053dbab8355e1371f89dfa37526f7a3341122526b7194413.txt (PocoProxy)
5
sha25691f40e8659da3dbbb22497b317aa37f26403be86662e359ecddcb4a0c72e154cchrome.log (PocoProxy)
6
filenameaaaa.txtPocoProxy
7
sha2567d6209036d370dbce7a0657f35dedeaa59c15fcfb4d696b9ebdd0fcc773dad50a8.txt (PocoProxy)
8
sha25634294ff52899a63f2dc02e5a8f1488343afdb9702437d409a0869317ccfb4243s.dat (Malicious file)
9
sha2565f3fd50715aabf43cc6edb5f38026a3baa37a7fd7a17ae232fc65e186c83befbmsedge_elf.dll (HUI Loader)
10
sha2564fcbc598c5699ea48a1edd8dda065eab210f09ad900ab167cb5abdf9841dd2b7hideschtasks.exe (Custom binary; remotely creates scheduled tasks)
11
sha256755b14ad83da2f2eff8ef8bf83ed74c6d96f6b3b3fde95d4c13d8cb75d861631log.ini (Masquerading DLL generating C2)
12
sha25644e0c61f70f44e3a35ecde9b49a623973727d3aa68922ef4e1ff8dfc7479558211.log (LSASS credential interceptor)
13
sha256a1a8adae91daa96deb01326c702fec388d0fa983f299de3f1bdb8a277df644231.dat (Cobalt Strike)
14
sha2563a85c36fff48b223f6edd722bc1603a1fd9b00d3e4d46a88151c4b1b696d90d1sssa.exe (Malicious file)
15
sha25662c9b97a849f40f4b5b167b96a54fa1ef03624ac8f2972b641af8ca5d00b5db0McPvNs.dll (Malicious DLL sideloaded by McPvTray.exe)
16
sha256c1d818f18c7160807d9031e024fcc6429476d6455221e3aa988c6245269fbcc8rsndispot.sys , EDR evasion
17
sha256ea8c8f834523886b07d87e85e24f124391d69a738814a0f7c31132b6b712ed65rspot.sys, EDR evasion
18
ip198.13.47.158PocoProxy C2
19
ip64.176.50.42PocoProxy C2
20
ip158.247.241.188PocoProxy C2
21
domainwww.googlespeedtest33.comPocoProxy C2
22
ip139.180.217.105PocoProxy C2
23
ip45.130.229.181Cobalt Strike C2
24
ip185.201.8.187Cobalt Strike C2