Malware Update 2018

Malware Monthly Strikes

Malware December
Malware November
Malware October
Malware September
Malware August
Malware July
Malware June
Malware May
Malware April
Malware March
Malware February
Malware January

Note: New metadata fields were added to all previous malware builds: fileExtension, fileSize, <reference... type="sha1">, <reference... type="md5">, <reference... type="sha256">.


Malware Strikes December - 2018

Back to top Windows
Strike ID Malware Platform Info MD5 External References
M18-6zq01Triusor_86ccc97bWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.86ccc97b747d7cbc76bae4bf1bdf651281bea2a893e787dafc1f4b03201a155d6c44209d 86ccc97b747d7cbc76bae4bf1bdf6512 0bc3007209f850ac764646065dcc8fdd85c46425dc98d72631e51045ba36069c https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-39001Triusor_0607065eWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.0607065e4cc014b3b7476c988f6a0b4051a24aa6903a1dc3411537e3c7e909ae7ec09e5b 0607065e4cc014b3b7476c988f6a0b40 9e76c9877cb6820ff88937ee158cd59cbe16b9eb26526f0f1ec39d09601dca05 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-gd001Donoff_3cca9fc6Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.3cca9fc676659a1fae4c6a8fff9e0e207751ff9750955bc8e5576e12bd06008f00f1f9f2 3cca9fc676659a1fae4c6a8fff9e0e20 19badf1bbaa2ba68db14bf76e88b11a29492fb8d0cf180b83736a55d23a402be https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-62c01Xls.Dropper.Donoff_bd57ed1eMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.bd57ed1e6203e3f3fa62ed4c4d9b9b9c52bf032f08f8d5806a777cbd00a8e22705d17c6f bd57ed1e6203e3f3fa62ed4c4d9b9b9c 0587d2fd8a94400a1a8f87a59111b4ec53c69ab7e4a50e6a4c7dd6eb7590e0b3 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-lvm01Win.Trojan.Emotet_ca21b7d8Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.ca21b7d81598c7cbbe5e4962765a376f8cee4684677a59e6c8060d34590ee0310759fd66 ca21b7d81598c7cbbe5e4962765a376f 3567201c7de66370aa8eb0bd6242b0ce6edf3d4326c2255828470407a2a124b3 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-zpw01Triusor_d0b71e03Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.d0b71e03bb71785f5cce3bb7a5c4ef42d78e553578d5aef541b20e619d0ac0b0742c9e19 d0b71e03bb71785f5cce3bb7a5c4ef42 3822de7241c17afa298071ab05ea0552456c7b9e78f2655b3471554f972520cf https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-g7z01Xls.Dropper.Donoff_c65fb06aMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.c65fb06a84caab2a3c91119f4184ec3e3cd02d1e37cde6598e2b36904349c645a719de0d c65fb06a84caab2a3c91119f4184ec3e 99b43c4080202b48a2a729ed28dac8e3b98cd837494b2e419d71e7693b0652b8 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-y1001Donoff_e6b68bc8Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.e6b68bc88fb560f12a377b95ab3c13af02ebd10101e0540014df56d5aeb2bb0aba7ac042 e6b68bc88fb560f12a377b95ab3c13af 0b2a44c3b90bfc7c26605321c75fdc9703d67f71849cf106ef1e9fbd3160c533 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-hxi01Esfury_0f1d1f4cWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.0f1d1f4cd097684180f8133e4d0642d95d7e436434c47a4e1dbf5ac3ad75590ccd681416 0f1d1f4cd097684180f8133e4d0642d9 09a8a4d6b7e8d68dcbf7279923f5d8322e4d46dea86ca1da0f553bdb1f5fc222 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-nn901Triusor_db9f71f9Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.db9f71f9a64a5aef6ace9ed30addbe0f0d98c5ae08adc0c4fa496a6cc81e1a9ee85e9e70 db9f71f9a64a5aef6ace9ed30addbe0f db6317729cabcb31a4be51a3cc281bffc5dd38a8164861c4d7fe7a0be386f892 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-98301Valyria_42893e13Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.42893e139246458afa15464117cfecde999593d85a85f61666566d40ff6e8613dd723f3b 42893e139246458afa15464117cfecde 500fe0e5847b6677fa8b91073d3c0fca1d80fef35cafd57b95634abab8973d42 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-2p301Doc.Malware.00536d_bf64ed9eMixed This strike sends a malware sample known as Doc.Malware.00536d. Doc.Malware.00536d is the denomination of a set of malicious documents that leverage VBA and PowerShell to install malware on the system. These documents usually convince the user to enable macros that, if executed, will download and install additional malware on the system. The MD5 hash of this Doc.Malware.bf64ed9eb96d8584979c021b046582bcaf25b8ca38e2b9ab56fd0238bc1642b8802f3d91 bf64ed9eb96d8584979c021b046582bc ecbb1cacd8390963a669b92cdd6a78f3e3dfffa93e794dde7426d4ef2780fab4 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-2wg01Donoff_1a0820ddMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.1a0820dd4f6910e2e2684650f8d7f65ac508cbe8e34a13d45baedc1a4bb283d6041e684f 1a0820dd4f6910e2e2684650f8d7f65a 2af5928b3dfeaeff2556b7fbf27ef564c0a67457ef2ec6ac41dcfdb214b84856 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-pem01Donoff_f760b521Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.f760b52142693a7babf374dce0ec6ec439139c54462bf9253e5da83c695170fb4f0f205a f760b52142693a7babf374dce0ec6ec4 1792e52f31de940e6d233967b62bd6712deae048fc110ba38cea000314781c16 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-4os01Donoff_81f63312Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.81f63312e5bf0ca60984249974cbb8d1e0bf9ab67d5ef5f0db89d5f7ad5f0121f0861b7b 81f63312e5bf0ca60984249974cbb8d1 06aa7214d492067f4f6a8aa0a910b5b32aee7734e0525a471bb2ca111ee6f3d0 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-zsk01Esfury_2a8187aaWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.2a8187aa944732f506fb38d000c9464ba48fe658c2c65bd67d9a8db9508cd80c4a8d0d7d 2a8187aa944732f506fb38d000c9464b 05d0ef6586355e9255a5723ae5909602de6def71e64f3e1838211bb0d3c9de81 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-tc401Valyria_e080607bMixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.e080607b757f20d93263cb9e2741e1dd2cd00e526452b6cf3615b0bd7a2e3918ff38014c e080607b757f20d93263cb9e2741e1dd 61da1d5f5a0e508f1b79fee2a8ed00b37970f5c967cdfbf4a7933163752d777a https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-0eo01Donoff_80d4b98eMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.80d4b98ed3542939f6de5591b98050db7c4f3359fb23aa3d9f36202b939e14fd9f738fe6 80d4b98ed3542939f6de5591b98050db 0a12a0000a78dfa623f71b0274df5b54f14dea7ddfe0799ad09cd76db2340441 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-9mo01Triusor_8f62d9d2Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.8f62d9d276c84b8e36a16aac91d4d33d7e2a07490b52a873f4c38a6f2c52dbcd209c94f5 8f62d9d276c84b8e36a16aac91d4d33d 9df2784ba1fd594ab90357d799b26e0fa3abca65a5744ce3d62993d74b0f7e0f https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-1yr01Donoff_c1ced218Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.c1ced218ba05ead3906d899b096f9bf292f35bd2199d16c93461d76b0ebe05d7e3bed110 c1ced218ba05ead3906d899b096f9bf2 0fe0f094572df903940dd8394c4c5c307705bb4146c794e77793f74a1e873327 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-70o01Donoff_0c15821aMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.0c15821af957c5b9e3be928a7b3d1a0952d7f3960f27f4a2e49ad288fcf17b82b9b38f25 0c15821af957c5b9e3be928a7b3d1a09 2caaf8bad60e3e663993727b5ff26d685fb511892f90939d04e5f92765154687 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-29o01Triusor_2eaf5b9bWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.2eaf5b9b0d6fb8cbc179125dcd50cb25fa80b66470872d3dc29ff8db07ea64118083865f 2eaf5b9b0d6fb8cbc179125dcd50cb25 68d400f36ef0ac8869499a0185fc52a7d22add5a137fcdd9d73b7e47d8514049 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-pgu01Donoff_da60d8f2Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.da60d8f26c1991efd1153a0f5e70b57ce8b0d7d1bb9445be206ed77a4c8cc9a944206981 da60d8f26c1991efd1153a0f5e70b57c 043a80eab9723a815096c7338c14105011f90c8fe1fe86a02c7c763726cfaa2a https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-jz401Donoff_6df1613fMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.6df1613f5b8788f662c500f948d66ed99a42bf0aac09a65d89cc419dba1e1a21f4bf2f73 6df1613f5b8788f662c500f948d66ed9 16fa280526ab5a33bf77f4f86ffcf2a0b54c0733e26a2e070e724981927d1ad8 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-doe03Esfury_dcb71480Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.dcb714802afee98cea089c4550948ae307d9942d0c4d33cc911d3cb2c8e66ea992b113d5 dcb714802afee98cea089c4550948ae3 027b08647ec8a4976897114dcac6810acb215dc13805edd0986d4bce04528f59 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-v3501Win.Trojan.Emotet_10f92b8aWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.10f92b8a6eaed33bd0f339e47953ad3b2ba0c793b428293a27e9e1e913df2e436469fa2a 10f92b8a6eaed33bd0f339e47953ad3b 7d42a037f8c824724e3525e40f09ae6b3f0eaca4278e4f0b95bb5ca50f008f7b https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-8f801Win.Trojan.Emotet_7494919aWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.7494919a5ee6e60bc56d24c9745ace75693ff315cd0061112e91ca3d9d13bf7b42f6e33a 7494919a5ee6e60bc56d24c9745ace75 3f2fa56542583680c7feeda31a5e16b85f11d74b710e6cb699ffcf15b6ca753a https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-avz01Win.Trojan.Emotet_92a40dcdWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.92a40dcdc1d6706d95a6fd98114152cdeddcf0de04bf37127f63b72edf4bcfad7c733ec8 92a40dcdc1d6706d95a6fd98114152cd e06807d11e7fba844ffe986638234633bfb93ccea283187b9019e0268b7876f4 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-4cw01Esfury_e11731ecWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.e11731ecede1d7b45daa78a4bab227c0397967942585468786e09887387427869eb59dbe e11731ecede1d7b45daa78a4bab227c0 183b07b0a5e93388d391deeac811b405d0cf46c66f3817efe535780a6d06c10a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-mg902Xls.Dropper.Donoff_dfb87cecMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.dfb87cecb4e1c33ea93efc64372d186b1ae598b16a47d3514f4768db1c6facc6d663f2cb dfb87cecb4e1c33ea93efc64372d186b 21df4279e0c9f6df6fb9ac8462e89ec9d2c777a3309dc9b8cf891a5232178800 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-uf701Triusor_620326ddWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.620326dd50dab27c91e39eb21a030c47c05ea959be8ad9bf1618a618179e95a6bcdbe8b5 620326dd50dab27c91e39eb21a030c47 8f4bd4d1d9d337cfd8ffd0afe80213ae90063d274aad64b04aa8558b837218e6 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-k0301Win.Trojan.Emotet_912807d7Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.912807d798d35323a534fdb59399a9b02060d9f147311fdeec4de5f5d940b7a6f849846d 912807d798d35323a534fdb59399a9b0 78ccba1d9e5d32658ce4cd4b2f8a8be65c6aa6a4f4eec2016777afb3a50ac843 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-4b001Donoff_a0a56a80Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.a0a56a80b5400ac336a123433ae9dce77cdaa16ee951e323cf85c0395ac0963dc0a38c20 a0a56a80b5400ac336a123433ae9dce7 2696e57e2daac38a37ca382f979f1e4c61b20f516dd18ba33290fd00ef3eec7e https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-w8p01Triusor_2edee29dWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.2edee29d4ff7868aa74992ccf285726b54ab7ad550e697925e23ae69e60a300a29c339cd 2edee29d4ff7868aa74992ccf285726b 14bc92fb1cb50fc6ffd2f34b701e57603fb99b96130c7e5b77187c2c3684a4db https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-pjd01Xls.Dropper.Donoff_f898647bMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.f898647b281b95a5fa2fd1a57ce6845b1ee365096195a8febc5821477c09ec72bbb32976 f898647b281b95a5fa2fd1a57ce6845b bffbd9caa578af5caa98fcb20e0e5e4f55154e9e2ca256364c1f70538c04c5b9 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-sqz01Xls.Dropper.Donoff_bbfd6b30Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.bbfd6b30072f3fd8150f77b6fbe33d23814795830b2157853a62316e3a6d31aae48d0277 bbfd6b30072f3fd8150f77b6fbe33d23 dcbdf1859c62728c680ed7267f65b3a425aaed5c79b0f7404ef2e6541150d573 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-2ew01Esfury_6f616a79Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.6f616a79b48160fc7ec6a3fe56972968adb6672bfe91c0d0b74b5ee4165a4aa3907ea586 6f616a79b48160fc7ec6a3fe56972968 033c6325a22ddee4d621558106fd297407f31e0713c7c2314024e8cbcdc0a5b3 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-sei01Valyria_9497ebccMixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.9497ebcc7f404288e16eb8cab121a549ad7658e4ec425e429bbd75813b8e1a79d82735b9 9497ebcc7f404288e16eb8cab121a549 608c215893b99203b2d355253d42b14fe0bae98b22a891cfa2950c79d8b4dfe1 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-80r01Triusor_7a794efcWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.7a794efcc2c8b9a8f34d558ab578f66a247cb9286bd10667b8ae03ea8f9cd1e79631770c 7a794efcc2c8b9a8f34d558ab578f66a a3168cb7b3fd30eed135ba086e9e96984f56fd52317d185f3e988176440a5a25 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-byc01Esfury_a8320da9Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.a8320da93664895b7a1eb4a3442ea7f527d8765188f705636f7a5b693ae20936e6739e9e a8320da93664895b7a1eb4a3442ea7f5 02e94f61d5c4da2b4a3b8991278a77e937da0de55b2f5373f804344cae73dad8 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-68t01Esfury_4d999549Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.4d999549a38e2fb1138272d47a2279b50f2ff2f789e6b3b114ad12e55fdf9e5c9c251681 4d999549a38e2fb1138272d47a2279b5 082831142fe7826130b5d5ac7673d9ae8f7f56e126348283e77fc3c88f4d5b0b https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-9gv01Donoff_50a1ff58Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.50a1ff580accedca1b49c89dc63f4c1f4374583937ba8404f97bb867e64e675826ad8fc9 50a1ff580accedca1b49c89dc63f4c1f 09d47ec5acae65e60e8316435d57e75b8a0153458f4471c8ff3510ee2a809558 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-vb001Xls.Dropper.Donoff_3f217606Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.3f2176060522c71c880cd34765a740e457a27af1e52bcf8ea99c78d36dd39fd8a9321c8a 3f2176060522c71c880cd34765a740e4 0033f2a32856a043d34d491b0b79a3b1d25fbc084447ae801b94a6f4c8c67eec https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-5iq01Xls.Dropper.Donoff_05f00632Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.05f0063292089fc36b9033c5d1de7e28a8d7bf361b900a4a2b422221af2608ba7ac4f3d1 05f0063292089fc36b9033c5d1de7e28 e723f535550c7c4398bbb29f16e76e7a59b8e314b0d0d602c96cda07da56cc17 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-10u01Triusor_e182bfd8Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.e182bfd844b3cee5586bfa067ee80d31a0724f543f1c5f3fba92ff00a6b947a81004bfc4 e182bfd844b3cee5586bfa067ee80d31 6b34a29fcdf2ad7a74859ba38c3a622971c1bbdb6a1268d5c766fac441b9970d https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-idb01Win.Trojan.Emotet_dcebd14eWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.dcebd14e618ae42078dc8c24b5f791db5c8d2b526d89c6a5f66792a875cd663c751d0d0f dcebd14e618ae42078dc8c24b5f791db d60149eb78e3df622e24afec34b06c7c4c1d26a401ec326ea5eaaa74df873e3b https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-zwu01Valyria_212be643Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.212be643884ad7cc867b357fdcaa729354a65038d090631cc9cd55af0c18761c4c58bcd7 212be643884ad7cc867b357fdcaa7293 0734985f67598ec0a0caf9ca31edd54bc93c5072ab0facc09f3d5164c8930afe https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-x0f01Esfury_10b398b5Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.10b398b567350889d290b1217847535342db4c34327c1a51cd77034920f7d5ae425063cc 10b398b567350889d290b12178475353 12e12efef70cc7824ea45771c844393d1e1b878a86def41acc01093249bc7e19 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-gag01Valyria_c0e5d7d0Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.c0e5d7d0c0ac523f42f919928112933ea7c113939d210809cf3264ea64a1c2b62003bbd7 c0e5d7d0c0ac523f42f919928112933e 15edcb2fc3b4d2fc1700f8e6837cd5c4759fb3791787c9cd9d0e16f129e0b234 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-fu901Esfury_012e3e16Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.012e3e162797d17ad0d92a9563eb1be9c789c03737335ad48f6bd3eda622f612eaac552e 012e3e162797d17ad0d92a9563eb1be9 0b979d82d329160c7f95cb8abc9ccc8e0ebb4f981ee321342e84a29ff33687f9 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-msj01Donoff_f0772e4dMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.f0772e4d8f1aa1caeb572fbca4d9edf85e2b77f6ec0d85c8df7fd03f44ebaf69248a8e96 f0772e4d8f1aa1caeb572fbca4d9edf8 1f312a61244c970d254c24055b714138835b839f1da36b9ee1cfc1acf636fbf1 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-99o01Xls.Dropper.Donoff_98c9fefdMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.98c9fefdc2be08d63dc0d2299297374650a9f94dd30d9c58af3b12cfea247ed1119ea98b 98c9fefdc2be08d63dc0d22992973746 9a9d1c1b43c93982eaf304c3c7ecb361bede0ea811c23cddb8b13a39328f0c3c https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-azc01Esfury_5947665eWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.5947665e3d1116667394c44357a12e32449f867b9f9430bc69647ed64ccf6ed9d3b0a855 5947665e3d1116667394c44357a12e32 0e47b656aa6dfdc797ff650a7d1800639f7347d2af4fd0ae6520e02ff0cec9a0 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-pee01Donoff_b61e8461Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.b61e8461f8e39734cbac689b72b6bf17670f3092acef6807be0ee51cf6eece8bac09d441 b61e8461f8e39734cbac689b72b6bf17 29de1616d80266c566605928b266a43dc9e1cb7c1a1ed9c95e32d54efd4f6696 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-3bb01Esfury_7188ac47Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.7188ac47ce4aca7e5f22c7dacb42f3ba11db5e1ca1416cc91621c0c7558c8dfa6e4d6d87 7188ac47ce4aca7e5f22c7dacb42f3ba 0eeb8d4cb796e8460ea5c283deed8788356822e6a7916c9cec496dc7cf4f3ab2 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-bk401Xls.Dropper.Donoff_88631173Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.886311732b0f98fc6b93ba2dde16e54478e40bd174c1d4285147a8c20f2c806fdaa04292 886311732b0f98fc6b93ba2dde16e544 88ceeeed4a5d23e5c26c74300d2f1cc89376c09057ac848032b45e2777d15b3d https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-c6i01Donoff_28892696Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.2889269690aa7d9484b36068be4b18d62e9379a89679c11ae9cd1a15445f47adb732651c 2889269690aa7d9484b36068be4b18d6 25fbacf14f3ea9918aa054f040c6cc73edb9450a34e2fe739b131d9c155e3e3d https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-heb01Win.Trojan.Emotet_bb90b643Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.bb90b6432285aae0d7ebba6379f517f5c40a79fb597465cd1b9fcecf5bf53bd66efa1e23 bb90b6432285aae0d7ebba6379f517f5 c2ffeb181bc57e65011cb68ed33de62ef2ae79b12f320fa8362b096fe9f26430 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-xgp01Xls.Dropper.Donoff_4a555c84Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.4a555c84155d36dc018c278eaf6be6f54d22d9e21d2694451ebc234034b957ba05e75a35 4a555c84155d36dc018c278eaf6be6f5 6816c39d57cf2008ddd7ff252d97b9eb372c9c70ae9ac1834aee5beb0c24208c https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-ti601Xls.Dropper.Donoff_3f20efebMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.3f20efebe0e78d0a4197d4021198cddbf2541dbfffa3eb5b9f88e70ffd8456068214a0de 3f20efebe0e78d0a4197d4021198cddb ee5fb50a88b4b4a97bf82258cefc53e5de1bd416ddbdbee363dd9dc269ad867d https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-elm01Triusor_f3110334Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.f3110334e8dc6c6e910a8b8d9e44f5290ab77e27d07704aa930c4cebb06e875469c9ad1d f3110334e8dc6c6e910a8b8d9e44f529 8cee25864d734f6624754ba68d47d0d6573ce6d4ca55c2cf3025a1435bf84685 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-2p402Esfury_0fc4b7e6 This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.0fc4b7e6335489cb38b074efcde87909d037ac836a5484f7fa979a8bfe7058cbc23ac0d0 0fc4b7e6335489cb38b074efcde87909 0206ba28fd335c6470736f976885f5916375e114ce442208f30aaca55525d41c https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-qo301Triusor_f816d643Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.f816d6436964e13714ac0f71cd0abdbbe92ab65f1e3334b0f3f7513ef73993ef8320b034 f816d6436964e13714ac0f71cd0abdbb 3adbbb8794d8244bbc905ad9b7d54046e494374f1856447fd174869911f8ebd2 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-wd501Win.Trojan.Emotet_2b6afa67Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.2b6afa67bd42bf9a90ebc3b728b4ea411846c2fe64583db394eca035af3d440da6fdf0ff 2b6afa67bd42bf9a90ebc3b728b4ea41 864b1ce8feeed53db144afae131da20601bdf2951e198827177d40a233c490bd https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-zdn01Donoff_f33c38f4Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.f33c38f4a5f61dc51187e4ab5bf13084353640a0f8240ae197938547a28db6419e0e67c5 f33c38f4a5f61dc51187e4ab5bf13084 1b409f2f2146c2318580c73d5eaeafbdd79e39d4d4f3e5862323b3b6f4a6c916 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-hr601Esfury_61de1883Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.61de1883210e8632b578f9aaea9651f3244cbc51921bd5f2651a012b89119a06729848b8 61de1883210e8632b578f9aaea9651f3 0be8709e38625829811638c2460a8eaa993569df882f4a7263747f91bd08970a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-xzk02Triusor_4eb4993dWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.4eb4993d2b3099dcf4048fd0785c2dac7839c10ecc19cc94da1bd53c112434695169d52f 4eb4993d2b3099dcf4048fd0785c2dac 6a897eacea0f1a6773d19c6b1dbd101db860e3f8df547d97392c98a6aef0cce5 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-cdg01Esfury_ee787e23Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.ee787e23a0c603319c423279cb12f226a1932e3bea31306990333eb29a16ab0407f89b5c ee787e23a0c603319c423279cb12f226 1374cf423bc66983991c7fd3e3767aedf67094cf5a3eff6eb695112b51dc5e6a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-40l01Xls.Dropper.Donoff_e40e5618Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.e40e561837573ccf7c4a95e910640c4591cd88e392638a490fc2da730a0872e142c4b5b6 e40e561837573ccf7c4a95e910640c45 792436cb281c6704ea7f53f7532e7abdfa1370ecf071cb07fdf690f8f6469013 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-st602Donoff_85b276b9Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.85b276b9c189beff14dcdaea65da86e3325b0173fdd2f3fc4c305eb783bdf3e80d686372 85b276b9c189beff14dcdaea65da86e3 33d98771535a91ad332f2e59969b9f51a2bf811dbe886208e139e456cd124631 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-7fz01Donoff_7896f09cMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.7896f09c253c9cb647a281e26e1cafc91c9a6bed41d0b37452d9d5b86abcd58a1df8e92a 7896f09c253c9cb647a281e26e1cafc9 2eab620737103e94f0dcd33163071e8c0bd1cdaaf42c1d2e254d3e5e71851b24 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-vzs01Xls.Dropper.Donoff_6ffe8170Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.6ffe817013abab377ef6ed3f91aceaa910a7c72bb995d4c9e7acc9757162952c80ed9aa2 6ffe817013abab377ef6ed3f91aceaa9 d59e75ccdee3f0419fd247372697275fa45f391af8319a4cf1f56df411885805 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-cvn01Valyria_bba70058Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.bba700580c8fbd38f736809ad7ad732cf7c6b8eb6cd671d8daa1d0e5375a3452b55956c1 bba700580c8fbd38f736809ad7ad732c 52fb2178d177421a16086155829b67154ddfc589ddc71a99b14f922741586479 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-rm401Donoff_9f11d9bbMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.9f11d9bb69d946db53bd0eeb94e247553dc6c5b75287028a30ea7d7a6f02715c1fbc863e 9f11d9bb69d946db53bd0eeb94e24755 24d62b3de48bf8b55b79fafcd17bf4a2cb8489a86358b26aa361193ad355dee4 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-aq101Esfury_3501dc98Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.3501dc98d077e58a95cab4bf60ad81e15d6e4a2f0f9f91f56006eb4a4c30d6412548f0ba 3501dc98d077e58a95cab4bf60ad81e1 17ea3123406cb0ef21c174f4f27a89d4cbd5b61ff1359ec9b8c756b311ee0f4d https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-o0g01Xls.Dropper.Donoff_3a359e11Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.3a359e117d73c86eb37625eba9747e6e9ecfd8d8575fca34890a29fa94f4a08cb37e242f 3a359e117d73c86eb37625eba9747e6e 9e8fb999bba4c93ae100c02ede01475ddbc2b7db624930574ed76ec5813dd451 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-3lz01Xls.Dropper.Donoff_f7ee8c4bMixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.f7ee8c4b62741fea6e0e7de7619d6b47e167c361f626de9eb2e3fa848519b0412f4ce541 f7ee8c4b62741fea6e0e7de7619d6b47 67e1cadae72e11ddb22ce0fe36e319fde32e417acaf9fcbe9ea1b0bd1852fded https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-d9x02Esfury_5ef94c6cWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.5ef94c6cebcf7e8c4c0c5ee1d2fa41f0531d93725d99eeaa9009a0b357abd086f164586b 5ef94c6cebcf7e8c4c0c5ee1d2fa41f0 06e53af6c4bde93f7a9da0b90408e59b701d1ced02c5fb14fba45c7272452367 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-mp201Win.Trojan.Emotet_e5b098fbWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.e5b098fb8954a7913969f8b51ccc20b5df9d7a784a3ecc04d987141b421384fe97c4f339 e5b098fb8954a7913969f8b51ccc20b5 fe7d3a850371b6effe47525e39efbf705c4136e78b35f78228b1f986d30ceced https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-b3e01Valyria_c2051f72Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.c2051f72e532fe9da8f1a845d20180b2a571c36730b117ade8f315cee1060d06eb3b257c c2051f72e532fe9da8f1a845d20180b2 5ac2183dc29d6cea617b06c5787019409662898e259f6b1c0c7465c69054bb26 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-79302Triusor_7c21c148Windows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.7c21c148f3bbb12887ce933f1fff2b15856fef8fcd5b87caacde42f96383562c5d33c60c 7c21c148f3bbb12887ce933f1fff2b15 ec0b82ac2d4ca03a4c20ebeaa2fe5a0fc33f4e2270f8bf08063400c06a005f59 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-vj502Win.Trojan.Emotet_d88c80f1Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.d88c80f1db8016a4d95a29ce764d43be70ec7bc25e81073476c343c008172d78f6c414b9 d88c80f1db8016a4d95a29ce764d43be 5f30eab9dbf08a80292bc5184b6ff8e0ef075806b3d1eb8f5b5c525ec3efc4e9 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-esu01Donoff_fe2fc9bbMixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.fe2fc9bb543aa92ae8e2d74c373968fbc43488fbf8dfb9c98466b50f9acc14b8afec93de fe2fc9bb543aa92ae8e2d74c373968fb 0e12bab4d0a4c65141c6d16cc8401efda84373a667dfdca21f56b61466ef9e7d https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-v7n01Esfury_85541b13Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.85541b131d7caf6d80fb9a5269975d30a56beb152d1ce873addc9bef8be3e86f4ce33e2e 85541b131d7caf6d80fb9a5269975d30 13910ca1a7fbadf757c082dde5d1724b6b46d36b9eae47d1bd968c66a67be3ba https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-qum01Esfury_e4b3aa74Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.e4b3aa747aa0d5a137396f0ba38de860e0bbed6544cb9b1d1eb45bb1baf24db8edebd49e e4b3aa747aa0d5a137396f0ba38de860 09c40f54a73303ddf1d6170f3cd06778583260e82b7dfe155a2f804346aadfc9 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-onl01Esfury_ec541d19Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.ec541d190c4159ac6cfb8737a95dc63328e611526de7091999a6344b41d86cec8f55102d ec541d190c4159ac6cfb8737a95dc633 01474c0dacb671b37172b985d8e96bb688f2e4f6f8975a6bdab76c3ebb6ca29a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-n7l01Esfury_baf23c38Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.baf23c38114e85d9a9dd4e1618340fbd376ed0ed3fa2fb792c4693e8f3764a2baa4fcaf0 baf23c38114e85d9a9dd4e1618340fbd 0b032c40e0877bd1c4aeca8bf56b87d0daacc781ad2cb025cdc7c3944074e816 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-6pf01Win.Trojan.Emotet_e390ca8dWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.e390ca8d55f33ac89d090dafb85ea2435fd93f27794514888d0282768535370b752c801c e390ca8d55f33ac89d090dafb85ea243 40ef85a4108702a3af09f9047b66585ffa2c73458cf9177a6ca67b4d8f388050 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-nip02Esfury_8726d5fbWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.8726d5fb85e27d692eb679383821663d7c9f7844ac8b802831b1c83323214b95a55d3fcd 8726d5fb85e27d692eb679383821663d 11e0b16cfcd0e45c21a1fbe9b7b14bf019f3e2ceb7894eee8e458eb6a7571c34 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-4q902Esfury_3dde5d0cWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.3dde5d0c3185b189a22543fedc8336eda297f59be0f621d75b0862a09ab873f1ba2439d2 3dde5d0c3185b189a22543fedc8336ed 101217714340fcd5d1194ac746d2b4c9d42f739f12b983ce33801d2baebb71ab https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-gs201Doc.Malware.00536d_cd5941b5Mixed This strike sends a malware sample known as Doc.Malware.00536d. Doc.Malware.00536d is the denomination of a set of malicious documents that leverage VBA and PowerShell to install malware on the system. These documents usually convince the user to enable macros that, if executed, will download and install additional malware on the system. The MD5 hash of this Doc.Malware.cd5941b58668f5313408ce28b500f4bff989047b059c3ab52f78feca639430f6748c9633 cd5941b58668f5313408ce28b500f4bf e796ca332e26230a092f392d509829b63808965679e245d5914a3a9fbaeeb04f https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-cte01Win.Trojan.Emotet_ca09f71fWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.ca09f71f50784652354806186a6c3a38e2cb27f4790aba6e8b5a8c0906805527b174595f ca09f71f50784652354806186a6c3a38 529a8f391dd994779340aa59118b703256321bb421db138ee0b7db4265599b12 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-nv801Win.Trojan.Emotet_e02b09f1Windows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.e02b09f1f638cde48435b4993c027c94c6d4f189353305237b55cec121976ac4c1054d61 e02b09f1f638cde48435b4993c027c94 c1b6f751fda9de784eea8764525eda4ea0644492c1dd8f1da9fc34e5b26b95b6 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-pjk01Donoff_b1f82127Mixed This strike sends a malware sample known as Donoff. Donoff is a malicious Microsoft Office document that leverages the Windows Command shell to launch PowerShell and download and execute an executable.b1f821272196571d9fef48f99e37961da503bee06173330abd6f2354d726bb103ab90e30 b1f821272196571d9fef48f99e37961d 121c49ab3eccc4472a13766f874b489b025ef1d5d9e1f8243085cb07290177c6 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-8cg01Valyria_3d2080c2Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.3d2080c234c910bc2434cc9d57d7f172049cb728843c56cf93d16d5a71dab9e3875bd8d8 3d2080c234c910bc2434cc9d57d7f172 52577b1c77ef1a8e21c3681d4610bf47fec5fbae0f751f3396dc349d23186de8 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-ovh01Triusor_41e1694cWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.41e1694ce3ddb74f6298d5532808cc9cc43dadcc8ada8549f1f40f773eda5586aaef1d58 41e1694ce3ddb74f6298d5532808cc9c dc8c46a57c38955f4b6356d29662beeb0f88eeca50a94191df8892efab3bfc2e https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-rm701Win.Trojan.Emotet_cbb12b1aWindows This strike sends a malware sample known as Win.Trojan.Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails, and saw a resurgence recently during Black Friday. The MD5 hash of this Win.Trojan.cbb12b1abd614fd51ba65b366f222a123a21532ae26c9c1b618934c39c20621fcef61488 cbb12b1abd614fd51ba65b366f222a12 f5e1c6d6d9bd26a6d0ae3b8657030dd40138e0371b824013821f48302e3f67f3 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-iu401Triusor_10b77c0eWindows This strike sends a malware sample known as Triusor. Triusor is a highly polymorphic malware family. All the binaries are packed and obfuscated to hinder the static analysis. The malware contains code that complicates the dynamic analysis. Once it is executed, the samples perform code injection.10b77c0ebe212ccd6ed234741d16c41dedae115a4b959685239ffc0c212689bcaf20cdc8 10b77c0ebe212ccd6ed234741d16c41d 249ac287cada8bab59c445a286a8edb645f58035681c788687979c17d7eb766f https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-uq301Esfury_d65a4fcbWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.d65a4fcbfa3ee5c14a6781e9e76eb89194dd80248211a9c056fa327c9ab2f54d4c82c550 d65a4fcbfa3ee5c14a6781e9e76eb891 08617dcb9523e28efed1e47917b6f9dc6dfb534c6d0d7df0888e977099f4db71 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-gfr01Esfury_75583f80Windows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.75583f80e814b350a2e096c26534bc3aaa3422d6d7f89d9348bba174590f362f1f8bc783 75583f80e814b350a2e096c26534bc3a 00de9aefee7e84028781e5d88e23c7ac53d8a10aa97116411d43b6532112fa16 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html
M18-d0o01Valyria_4e29a162Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.4e29a162f87bf97276c6523c9262d0cd58fb95f9bbb1ace97908fa3118f90a9513c11232 4e29a162f87bf97276c6523c9262d0cd 0ed8f1b95565876de24b49ab281f37d05d68130edc574ddd66300c5d5c9ad468 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-kg201Valyria_63ad7c25Mixed This strike sends a malware sample known as Valyria. Valyria is a malicious Microsoft Word document family that is used to distribute other malware. This campaign is currently spreading Emotet.63ad7c25273eb13fdf9d3495e3433ee15162e1020bf1ee01ac3c32c6ee1fd2852918800c 63ad7c25273eb13fdf9d3495e3433ee1 13707ac10ce41e2ec1547148c17a6186ff06009cd79789e01b879e96a5765f8a https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-mqo01Xls.Dropper.Donoff_ee90c808Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.ee90c8089a170884b803dd089b9f9584073f42b487fb05a8bf026ebade169a6fa8115cbc ee90c8089a170884b803dd089b9f9584 f60827889d806f6864b2af5e5c08c467c1f41b176ae47b51bb3918f5cafa68a9 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-ol701Xls.Dropper.Donoff_7ce9aa21Mixed This strike sends a malware sample known as Xls.Dropper.Donoff. Donoff is a payload delivery Office document that leverages the Windows Command shell to launch PowerShell to download and execute an executable. The MD5 hash of this Xls.Dropper.7ce9aa21925e22e6d70ff649dbfa57de3928809fef29ce4242e5a1907ab73e3dec7b8a09 7ce9aa21925e22e6d70ff649dbfa57de 405e08a4ab0c60f3ddc24dc4f4998bb654fbfae556163c9b70a2545cb79c4414 https://blog.talosintelligence.com/2018/11/threat-roundup-1123-1130.html
M18-kg901Esfury_47c9078fWindows This strike sends a malware sample known as Esfury. Autorunner is in the Esfury family. Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.47c9078f89000d08f23a6c8067645e84d315c306fc5c8f038be335d27fb43042a44c0b72 47c9078f89000d08f23a6c8067645e84 06bdc32de83eec39c9153b7944b8abc0137e3b69c80ac02e74d6903c656915e7 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html

Malware Strikes November - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-7sy01Gandcrab_b91a77fbWindows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.b91a77fb35ef6c01ce3d85849efaa024cfdf1f35749c32adafbac6d9741730c73790b763 b91a77fb35ef6c01ce3d85849efaa024 0a48f61677791bca8d2553662ec6bce8acfdb3249cfcabac2802ba216ac54262 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-3v801Vobfus_cf17419dWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.cf17419d230a34033845258ed68923e42676bc9ae0b1ef83eb198747d2f59139f956a970 cf17419d230a34033845258ed68923e4 133fea888e19e34c7703b38194ec08360ce8d697d7aec79da979a35072adce02 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-9ld01Upatre_b2f4668bWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.b2f4668bd5e1185afa6bcaa27053553673bb866c6128f254d2229a5af603ac00985fdc42 b2f4668bd5e1185afa6bcaa270535536 bcdfdc97d2a6f3769902d3bf55b180b4dd9efc74af345cf23a795dbdc9456b51 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-qx602Dijo_a30502eaWindows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.a30502eaea733c662a1f0e150531b9bb7fe35f8d2ed5f35ce6758a8eea33bdb2737bb4e5 a30502eaea733c662a1f0e150531b9bb 01aa3a5ab9590ff079a13d66f67d40b441ab171d2a6ead0df5453b2d3b55888d https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-rgc01Gandcrab_0c13b508Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.0c13b5084c0de79bd17846db859772d0e888556b0395ac80caa79ef6974391d11c3e4a26 0c13b5084c0de79bd17846db859772d0 0acc350e791e4201a7dd17e389ba8e03264343020432389d3e1b9d08874005af https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-am401Gamarue_ef78d661Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.ef78d6619c72c3dca9e371402ed4c5ba0f7ac8d96d7f94bfdf2e55d10d9ff6d31d4c9925 ef78d6619c72c3dca9e371402ed4c5ba 4d60b0ae61b9ef56997be59f7c896f2a60e81e28d267cbcec52a75140e05aa16 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-k6p01Gamarue_d0573162Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.d0573162e5f9420070f99e6c9d06d8ec2febcf10810c9fa1ef465476ddf1930b84ff7e60 d0573162e5f9420070f99e6c9d06d8ec 44e49ebd375b57146ad486e37db18e7809d01d51c0ed55e8d8afe9c43d3a5485 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-hsu01Emotet_5dd3fd84Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.5dd3fd8405b3af2532b30ccd42dc01a2e9a13af010b9e9fa1cb202d8a027078db1b65c94 5dd3fd8405b3af2532b30ccd42dc01a2 b53fb3cf4ed1d4e62dd0cc9d8e1d482dc1a55dedc3804a097f1b213080bb64c5 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-awg01Dijo_89573ceeWindows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.89573cee1420d858dbf5ad2eef44e9ad07c768f52f6867467d5ca7b8ba89dabed652eea1 89573cee1420d858dbf5ad2eef44e9ad 0b438e78bb3fe8bffc8f5f1453f318efe177c97d9e4f0ba7e26969a60671a67e https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-vis01Emotet_b51a68ccWindows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.b51a68cc20ef5bd16a55e132ca62e15f219817a065763243fe2c841b4dfced24eb8021c6 b51a68cc20ef5bd16a55e132ca62e15f 11fb93e3b137ff6978fd79fdd634f44f257ee28f9bc5c2965108cb5c49a0d949 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-rdi01Upatre_0c66098dWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.0c66098d9390fc284f5616e0bdb3200f0663b5e46378fb0a683e4309f7d30a49b1c478f1 0c66098d9390fc284f5616e0bdb3200f af44d4fff8ce394f9ecb9b3f9d95b8fb440a7b8f1892574f41355072ec2f0999 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-olm01Mikey_177a6adcWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.177a6adc86da9097f74a4bc3e64b9028c46fc9859cd86c6af815b719d3b4f1e65b881504 177a6adc86da9097f74a4bc3e64b9028 201872934f7f6674af89597d1a819f79cf843578aa9928191561ebdb637a53cd https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-wh801Gandcrab_a38ca4bfWindows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.a38ca4bfbafe6794c3c3599169fc584e10674c336d22324ae41e8f9dd6a0ab0f9679fea1 a38ca4bfbafe6794c3c3599169fc584e 13ab0a6dcd3cfd5136b54d11739169917df37a5681189baf92c4c6b0a2df0bc9 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-pm101Dijo_1ede6fadWindows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.1ede6fade6fa59f6ebbe07bfb00ecadd361ba38715d8d9583856d95f8cd56fc5194ee798 1ede6fade6fa59f6ebbe07bfb00ecadd 0326d68f08fc899cd8bb7f1a9c1d7df50bc5b979e0f7d2532904a419ab1b7160 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-5wt01Emotet_44d33f5eWindows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.44d33f5e0db7e8dc2f3a62d3a41b1e09dd068887950d4fafd9078f4beb9b14c542a22c3e 44d33f5e0db7e8dc2f3a62d3a41b1e09 ea8479d471d38105312f8264f2d93c7dd317d1bfda94f345f74313efffe8fb54 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-vhm01Gandcrab_72e2b716Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.72e2b7166b4c79e4f8b58635f86f9718ba5a361b98dda44308a42336b6b112ceef952c2f 72e2b7166b4c79e4f8b58635f86f9718 09abf839c42200b000d3065d2cda41d858be415a521a5cb2b77b6e62503ae460 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-06x01Upatre_c3ed95d8Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.c3ed95d8ece4d48060bf324b2de77507b8423998f4df971a0cca2c52694b8505ae95a9e4 c3ed95d8ece4d48060bf324b2de77507 c224d27d7adf2fece2e9round2f62e244e8e5bcaa98c89ade06d40b0112e6bd1 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-dzd01Dijo_6fa50420Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.6fa5042099c0263594c92894663675f82aaaff2a9f6ffd0ea58c799ba7d9fc1d2be7c8c1 6fa5042099c0263594c92894663675f8 01e4c31f4836784dc4d297c4ba6e8f680216693735339022e11669960b929dcc https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ray01Dijo_6da5c152Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.6da5c152acd675f3d40ba161ab650361854519fbba5e3f73cd961c5ede8fb4b2d247bdd9 6da5c152acd675f3d40ba161ab650361 0b4d5c0751ead190373484f7b4d8f0d7e5de5ade613b888712b92947fc173a6a https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-5oy01Dijo_943a92b7Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.943a92b7b787ea05bb8e6f51404d81412e570e6ba9ade4556bb4b5e76ffb8e5712cb76d1 943a92b7b787ea05bb8e6f51404d8141 03df086184a6b1b146858ea3cef951dc9c3bf6148a26740a74e2384f5cc4a256 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-jl501Gamarue_a2334783Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.a233478346fb01b7191b51d0cd8a0cf23cd50292cce2857fb991e30687d6fe11d3e6e9a8 a233478346fb01b7191b51d0cd8a0cf2 59751557033163959f841a10157e94f1c9fa8e5366a910644f1966a125ad9b35 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-x5401Nymaim_0d3e630bWindows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.0d3e630b954b9d181833158eb1955c8b716593553edfaa80b873cd148f5899d6c12d1080 0d3e630b954b9d181833158eb1955c8b 079c12699c6dbd13e486a4c7db333ec114420da38acde8afe4d62219c62afd82 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-1pc01Dijo_9f96c2a7Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.9f96c2a7e210439b1b3b6f77d01bde5675213195187697a185894944964346301eafb2f6 9f96c2a7e210439b1b3b6f77d01bde56 004a4d3772f1253ed309ce48cdefb8358c7500b91b7fc1a548dd32af03f8178d https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ch001Vobfus_b2393681Windows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.b2393681aef1a9712b42511368a143eaace283dd391a9003cc2185511e89d4f5fd9885fc b2393681aef1a9712b42511368a143ea 0feb943bda713bb872c82a94bceb10acd11a1ec0cd2997236dc17da24b646288 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ngc01Upatre_de5099b3Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.de5099b3f458a6f567545e99c4f417989e3066958d034f88c290561ac76f57f1822b6bae de5099b3f458a6f567545e99c4f41798 d7afe736ed75987b854236b451a4cb6f0642b4e9cc92f3a9a96e2b8535070d05 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-nih01Mikey_12236d1fWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.12236d1f87bd057b46c81d3b056400190f30fdb27377c614b7835a3b710a7d6133510541 12236d1f87bd057b46c81d3b05640019 48437e0f2c8bc5f0d3f46fec63ce26b3b66dc65610e3c97b4fa8a1b643c8e2f1 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-hyp01Mikey_9b9905b2Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.9b9905b290a1fa192b032e97150136addd086a87350d39b1559d21cbab6d89939ec7f432 9b9905b290a1fa192b032e97150136ad f99b50470431b2f91b80f3acccbf179441aa24bc702d3f2ba08f4f9f2357d6c8 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-vv401Vobfus_be76a71fWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.be76a71fbd7ab349e9c13aea9dc96f686724be40d4072f5024421675806297b9a368be18 be76a71fbd7ab349e9c13aea9dc96f68 0db0feea81c1b211fbae852151734fca8fb423102cb953dafb3c188f40491482 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-aab01Nymaim_6bb72d2eWindows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.6bb72d2ee5c0e66a27291b448ae26115d177d2bd9c546ee6768cef406aba717d15081ccc 6bb72d2ee5c0e66a27291b448ae26115 91e2920a163dec32f3edd8ff50a8b545fb192ad3d75c2ee96db6ac9b01f373dd https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-rck01Mikey_ab923633Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.ab923633032c47ff6d9c40ed36a40b2bb7c4fbc1b9bc8715582fb9624672c3aa6b86ddce ab923633032c47ff6d9c40ed36a40b2b 3c66d120d27778c2a1110170ad85eed2313fcc5cf55345cdbdc283ada76a86c1 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-glp01Mikey_dfc48442Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.dfc4844209da59d73ffe55e86a32ed1969c6a72a68bc8603c65a1021659bda5be6348e57 dfc4844209da59d73ffe55e86a32ed19 8f815fbcf18c1bc554756233e3fa7d326645a30809042b068ac03daef649c307 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-6fa01Parite_09557ccaWindows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.09557cca23be7357bddeb0b0d52700c863dfa90220db37bb90eb7c8462deaf1a8909fbf0 09557cca23be7357bddeb0b0d52700c8 51bbe9d3ae4bd23f31fd90ddf0d8af295ca98773653a16c2bb5a950670352888 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-g5p01Nymaim_824c18c9Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.824c18c98e40097027c7ffdbc10714d81b25c0df2b6b22ba1ce02b613606f43b1ea17903 824c18c98e40097027c7ffdbc10714d8 303f8d6644e52783c8d4ebdef5d4e720803e828529eef24607806cb6041d1adc https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-hq101Upatre_bc25ca4dWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.bc25ca4d4d2bc446ad42ae03bbbdf58491776cb8cfcdb218271352c7f19f3da812828ef4 bc25ca4d4d2bc446ad42ae03bbbdf584 7da8dd2d31ad4ed61c87b5f44e1d70bcb938d9c5ff9abbc94c8e76cf0b10f379 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-14901Dijo_d090014cWindows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.d090014c5368ff2b933884ed7848b42f5f51503d8ff904810b256e41cbcb20f76baeaea8 d090014c5368ff2b933884ed7848b42f 03e17ccdc6dfa104759f6d08c38a1ee96fd9cb161600fb5446b61132e4d9bd3d https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-dy601Parite_0d2b7458Windows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.0d2b74583db3119d38bf181cb87c01e665f150a8555a06593e12d01081aad03fe01f1afa 0d2b74583db3119d38bf181cb87c01e6 15c7b9a2c4688af296b57ac418f01347c8fbbd74ac5fbcae17c90f9bcdfb8e26 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-66k01Vobfus_d3955505Windows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.d39555056c2196f079c2a0b9bd177b5375bd33da1025388a376f7281fa1b50d183d43833 d39555056c2196f079c2a0b9bd177b53 0ceecae1d802f19881b04e6f97af98b5039f2b8ccd538c293d66de93d8d77964 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-cs301Upatre_a8de1a4fWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.a8de1a4fd81ba43522595ce44abc145dfbe187704eca5c92e814c3b5034117fce65d524a a8de1a4fd81ba43522595ce44abc145d 61e96310f388db546db48b6b8d81958264647add9f7cc880067cd6f875b5b4f9 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-7ks01Mikey_37c49226Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.37c492268b68f7a00419c59c177b5859730010dc3690beb8abfb5815f89cad37e603a6d7 37c492268b68f7a00419c59c177b5859 d3edf8ca17f1b41fa96ea9b4377d5778a7965345230425730940444469ce57fb https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-j9d01Upatre_e844abdaWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.e844abda1418fb88ced2052cc9bab9e96e0fd6bdc67e0e9e59a4667d3ec098040cf37256 e844abda1418fb88ced2052cc9bab9e9 87071c84cff348e086cb28fcfeec54daf58d728c5fb3aaa26ff4aca42fab4b4f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-vn801Gandcrab_47a8d848Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.47a8d848c48dd4733c3c339182307a33280eb52a118a54d35e15fe915a54ecf6bfc9aecc 47a8d848c48dd4733c3c339182307a33 10b5897f820d7ae3fe0194b8969c42c5c5de6cc658baf95699f8a781e18237ff https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-dtg01Mikey_f86f73bbWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.f86f73bbd0ff1862d39e09d041f5b0dbb4858a448637f4d3640b3e82b3495d34298bf27c f86f73bbd0ff1862d39e09d041f5b0db 633bcbf980d9299324b3b0baefe80954f06e41a6f71267bfc83c8950a8932696 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-6w001Upatre_5bec3f93Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.5bec3f937091694bf4b5ce26e9e76e1e22ac7ddf2c6aad3a63d36e5866ffd923f825a970 5bec3f937091694bf4b5ce26e9e76e1e e6c03bfb271c97063320d079b7ed156b8eae18c75ccf5c25d5ae5cc01df62139 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-qc801Upatre_b9427bb7Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.b9427bb78c372b02410ed1a519c1bc1c75ddaa6387e8e86664c865d54f4cab83751d0434 b9427bb78c372b02410ed1a519c1bc1c 1df5a1477102ad9d32a976eea0af04b7c63a660fefc39a8c2c524e8cfa9634e3 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-8bv01Mikey_be6b70ceWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.be6b70ceb3de89f9b4d5f2b2faba676d6a9dcc55f5610727b55cc05f3e8bc0342591d4c4 be6b70ceb3de89f9b4d5f2b2faba676d da37e831e94b3f7226688cf7f201ef4c032d393ee25bd2437d826a21e08c03b4 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-irm01Mikey_4b628393Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.4b628393f5e7827b345d6d98ad055ef8daf14f1e4876ea7688857a5227c5fdf3c81dd42c 4b628393f5e7827b345d6d98ad055ef8 19e073fb9fb7811440e873ae60578b28c06b0aec9e21d730f8205c81b7ababf5 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-h5r01Mikey_6e4f04e9Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.6e4f04e94f22b1a967407ce84e20d1ea4c2431c4dcfa569814368de6888f4cf0b934875a 6e4f04e94f22b1a967407ce84e20d1ea 243e098e78e1ff111354e231fac6b01e69f473cb10c27f2485a568316c0395df https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-wqy01Gandcrab_0e69d065Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.0e69d06516255a02aec969f5174462e0f8803ee66b34ea9c59de33950b34e22deca654fe 0e69d06516255a02aec969f5174462e0 051f4d57fc51e1491eb9121cb6ecdd036e140103f1afbc73fe9cef9a4fd67a84 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-czd01Gamarue_b6617548Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.b66175488bdbba0c2837e074f154e10c9c87dc70cd25c10e2f19950087480f098d4e4c58 b66175488bdbba0c2837e074f154e10c 06c823cc443447348137467a2951dd2d34b4ffdcde178e6d1700394ef5e2793f https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-shl01Parite_7ecf46e1Windows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.7ecf46e19900a69db8e0c68bcdf261f525c67c970701117f7b65533c667367120e5f755f 7ecf46e19900a69db8e0c68bcdf261f5 29f37223352f9584de101958ce00b41c3c66d9cfb15cc27d22a67df2c9dcd53e https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-igs01Gamarue_ea4c2e0dWindows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.ea4c2e0d5fbed4ef514eb71ebc6a2eb46eef6032a734b2cba64871293618445dd8010b22 ea4c2e0d5fbed4ef514eb71ebc6a2eb4 5ff49224ceb338b6b35b7303c68ff3df9f87099ffcec50970627a06e938f510a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-sj801Dijo_03b7c60bWindows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.03b7c60b63c2ac06ab926971540e09231481f07ebb2bfc3558a8059764cf64b1b6c1f2a8 03b7c60b63c2ac06ab926971540e0923 016ef438660d7acbe94a229f0680b154bb963bc9dbc56eed7450dab36d486c01 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-xev01Dijo_95d64b60Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.95d64b60a5d8ce76418042b042a452897c873dbf0c143126e4251938c5545e5a43c2bddb 95d64b60a5d8ce76418042b042a45289 0d1b953aa006b38c0140f3a2bacda47a28262d54d5676aeeaf432235e356a5bd https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-b4q01Gamarue_f0f136ddWindows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.f0f136dd4cbadf24865d7784cb1a09482ead3c5e2b855a3126e04cac3e0bef44c734f9b7 f0f136dd4cbadf24865d7784cb1a0948 84b9a43ff01d4b6be671749b56dcf724c0c4553153dfa336730f36b42fac6969 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-3se01Emotet_aede0078Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.aede0078e3504fccad3199ad3d1471590329933659b404db026712b9975c22349a698481 aede0078e3504fccad3199ad3d147159 fc5935b12a8d07abcafc613a04d3c6773e088f31b88f78acc7f8ee2d2fc2d529 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-c7n01Vobfus_77fa9a2eWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.77fa9a2ec302b7ffa338531616c5ea89c217b25d6a6dcb866f1883919feda0dcaea35545 77fa9a2ec302b7ffa338531616c5ea89 145fe07226fb8eb92f609f16f7044ae5a529433730d285ca7c33b9cff6b86b71 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-upq01Gandcrab_e4af76e2Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.e4af76e25598f76071227ffd0ef7438b024e2068f07983150cb49aaa2313addab45eef63 e4af76e25598f76071227ffd0ef7438b 00f07cc799aabac7449a324ff47161a6a34ad02ba4b2074ddb382152d383ed14 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-esq01Gamarue_f79369b8Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.f79369b86340f236e94bcd8bc08bce2f6f6d543d57209f8a9ce1c481ce9304478a86f6ee f79369b86340f236e94bcd8bc08bce2f 478ea2c130bd95ecf1763952f2f644a8b175184284f9713cc35abe0c6f6f848e https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-g7u01Upatre_aa9e88c3Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.aa9e88c343d4348a7c4d74de25c62eaa63bf95dfd89f23ae45183fb70dd2586893300dbf aa9e88c343d4348a7c4d74de25c62eaa 1b806d44ead6688b22e623a1d50ad910af73b6ebe274901cccff8aabd526e3dd https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-fo001Dijo_674c6e32Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.674c6e3271cae13aeebe979e5ae31d0055a80851731f890c19144585a1fd275bf805aa77 674c6e3271cae13aeebe979e5ae31d00 0024d14e96fc79b1f7fd052945424e685843a48b1124f2b19b3a0b00570fb716 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-eh301Gamarue_5aea77caWindows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.5aea77ca4f1fd3de53278433f25825b6f706ab756892e3d88a0bb97750006a1c1586eaef 5aea77ca4f1fd3de53278433f25825b6 6b82c968572a2ab008cb8bca2816d3f7cca491c059aee6b1e7a693b10580e073 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-fyw01Gandcrab_b48cda00Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.b48cda006af1eea9b0339814ed76d9db351a3035433721b1222d3517e17156ce143e046e b48cda006af1eea9b0339814ed76d9db 0b3e086550e4baaa05c69777d484b9b20773b01d5c6da124197eff423b798b04 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-uqv01Gandcrab_0b77afd9Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.0b77afd997f9a9520116ca9720151fd169dbf7e275d9630bb06ae0009b3723a79deccc6b 0b77afd997f9a9520116ca9720151fd1 0f50d6433d2a79f30c2417fc434098d029eceedf3acd405901d3951208be2ae7 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ezl01Upatre_ee8db9a8Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.ee8db9a869f31c626b6223293d3dfdbc8d6d436242cadd332dac85861374b9636eb122e9 ee8db9a869f31c626b6223293d3dfdbc f41388706c803a31645f416804995ad881d8ee0e0de0f0c355fb87fc415de211 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-0r001Parite_2233191fWindows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.2233191fb297b8a867d677c88be02407f6883cfb5989855d06acedaefd1f5c08f89aa7eb 2233191fb297b8a867d677c88be02407 3b6a4dbf9a923ac935f6f671b38de0ed83da428b74dea48efa180365a507e13f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-p4i01Upatre_aa0320c4Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.aa0320c4011b351308264f16999f3ee45e416338276a67e991acd5d4447cf8787d22f372 aa0320c4011b351308264f16999f3ee4 99230cc2ba171d71a9c5bade432d53bbf1ea78be629f62b90bb73fd71a26e8a4 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-elo01Emotet_efc70b33Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.efc70b3370c9267ae5fb4596ae1224f6d35a4bc2508cd3cba3167bad7cd324baf4b3345d efc70b3370c9267ae5fb4596ae1224f6 dab7877de92a3793873fec30c4b2e4a758bd5c3c6a67c8da20bfce7c255031be https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-1at01Mikey_aa40501aWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.aa40501a99badad5c42bef705176f39eddafc99b3750c02f7300f0bfccc5c4b9df8268c4 aa40501a99badad5c42bef705176f39e f980768d4d68e75b6d83cff0c80ec153a80bf700f7df3bd53fe9f06bdafda01b https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-k3w01Vobfus_ede865deWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.ede865de6fca1bd7255da5af4704677b8198f6d72d7382fb6eb38dd4a5a5dd15ac8b5ea2 ede865de6fca1bd7255da5af4704677b 0572a5a7f2888736e647fccbd2d4ed051bb038b82d3d53fb899dcde836922fc2 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-xd701Dijo_315a4174Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.315a4174f3302c518a4f47bc064f9a755e97bdb40de5cccfa6562864129da999ef7b8b1b 315a4174f3302c518a4f47bc064f9a75 095114cf4e2a81c44821a1ad9d4ea632e8cf17cf35a5cabc65813a29bcc41157 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-6hm01Gamarue_4afc6f9aWindows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.4afc6f9af11563748df65b94297f1fdb2577d37bd3970addb1890e582c2ab589725b6208 4afc6f9af11563748df65b94297f1fdb 9b082ca14ca1f7f7244f1a6b93062c01a8c336bf3ef6cab707a2aada4214178b https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-egz01Vobfus_3309c008Windows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.3309c0086ad3985ae8a249dbfe3e16d0db3eb8a67881d58408d2aed3bbd1340b96edd202 3309c0086ad3985ae8a249dbfe3e16d0 1551de875bb37b13c332d5b67ed64026c477f21bbcc6ad3d50ba8b3b8702ee5f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-rbi01Emotet_f5e2f375Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.f5e2f3757a46c9aea1b49317f6f162af05b6cc1ef2a0aeba9e807c6090703abad7850778 f5e2f3757a46c9aea1b49317f6f162af f2a2d0eda6e21c4273d07aafe190918d96c21db335de4c4872e1eca136920c6b https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-05701Mikey_70e0402fWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.70e0402fbdf691bfe937911bbf2590180b0b88774b2170b41f308a7ff05543a417f62657 70e0402fbdf691bfe937911bbf259018 6705cf85955113629d95a7206deb524f82ed5a3fe04666d98423b944c3ce2156 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-y0a01Gamarue_eb0b7118Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.eb0b711845dd08e91bdd44d7497d0d178beb7f516c13c91d541a3173f5c5d75f79b9fea8 eb0b711845dd08e91bdd44d7497d0d17 884ae2b467d21f8dbf65bce26b08a6659d75004b22f1af5d7ed8e4198c2688ae https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-cuy01Dijo_0ddd0f79Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.0ddd0f792d796a17dda2eb8c86eabe0f0b2608a951ef2c0060833807d5bd086590d60d75 0ddd0f792d796a17dda2eb8c86eabe0f 00f9d43bdeb5c30acc9e5594c0ff1bd29b52efdcaa63bb8eba745342c165f856 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-myk01Nymaim_d564c47fWindows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.d564c47fd6868621489bc5ae4c0511103fa400f3c3c3a8eba5be0fbaafebc6d3dc0dcbb0 d564c47fd6868621489bc5ae4c051110 899752fd8fbe560e658be72bf03a3a774b6dcb9d2d14e25da862d7edce5d9fbf https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-jry01Upatre_a59835caWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.a59835cadb669dab9b77121900e429085154869f01394674a42ff187bdceec7ab8d872bb a59835cadb669dab9b77121900e42908 7a305e442718a07f2ddcc7ae9a8983c49be3247c123b06dabcf7d48d3a4bdcde https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-10p01Vobfus_e32adc17Windows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.e32adc17d458423676ab0db622780ecc1476f6947d9c46e1d17648368381b57a011058df e32adc17d458423676ab0db622780ecc 02f72dfcc27501cd1a44b3a0eed9e41831f745fc26d6b7d1526c151c94d58333 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-moj01Upatre_621d6842Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.621d6842b256316318e7f239f99262071425d836d59d3ffe35d35b4045c312c5eb2b7b73 621d6842b256316318e7f239f9926207 fb75875cdf989e58a80330aa43543b9ab3765fde077174729e2011555cd295d9 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-cyj01Upatre_d14d90edWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.d14d90ed71124890c53ba0bf441375cc24ed80ef1e5186f1020d16681eea07fc4c15197c d14d90ed71124890c53ba0bf441375cc e4eddc3910aca83db9bef4bc4f11006c0ae09a1552a6266adac79dc922ffe90a https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-kq001Upatre_bcf9779bWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.bcf9779b0c493a280446c948e8a4026a429039b3a9df26f8be9941501625df40bcfd8162 bcf9779b0c493a280446c948e8a4026a 71dfc74d26d696f74b65c03c93a9118b9c62e5adfb6c93a5e15d00dcb50d585f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-cqe01Emotet_e29f583bWindows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.e29f583b36c9863d507e078ed6b04bb6b645cd8dbeeb5164616d603745c96838743065f5 e29f583b36c9863d507e078ed6b04bb6 fba4b9baf4b72790f1ff9ad58160efd7bd4a1927191668da75468255083e48b9 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ucp01Nymaim_4ee79820Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.4ee79820c39adbdfff55a342fb57b967848324da5758d6e1f9a05f0a6704f2343003453f 4ee79820c39adbdfff55a342fb57b967 86bd123441e1b1ed3f37938b58dbc572b844e7ba8e59506ccd41fd0d9d950628 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-0in01Upatre_7803f307Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.7803f30705d8da528407496ab4cba9ce96ee53b7f6566661228f36cb5b56a1fd2ca64ff4 7803f30705d8da528407496ab4cba9ce 64c1bb68e91d30812c0ea2690a4bb15d2788b43ec6c54aa9672de758ee7e5042 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-rc401Mikey_c243f8bbWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.c243f8bb39dc7367db3aa9c6d7b88e9eea7f28b856cc2729246be97537a8d986836e94e9 c243f8bb39dc7367db3aa9c6d7b88e9e 4f80b59c35090b1dbdf94f73770c222352555e7112bec28efb189e3b340b4c2c https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-thv01Mikey_1fb9d5b3Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.1fb9d5b305c3bcd4f1fc29aa9b089c45b6dc734da746c310299b3f580cfa2c43ab915e3e 1fb9d5b305c3bcd4f1fc29aa9b089c45 4a2364a4b3e8ad43b505a616486ef537159c8b8df9fe140977c9ab6aa1bad658 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-frl01Gandcrab_c7666c17Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.c7666c175b72291ff6649ebd523040f6ffa2d7846b828244dd4ef034916cd57b708e8cb6 c7666c175b72291ff6649ebd523040f6 043f30bd958e54d6947631c10d70ddec772ababd8a3852ceb0e646e87d670a92 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-48m01Emotet_294a2053Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.294a2053699d333b5928cac2ac984a662c207f29530d8d5d92546a39cb20b6a18c0f0a53 294a2053699d333b5928cac2ac984a66 83b316b9a9f76efcab1e741c8eeb7a0c7a50072c3fde5acd49cb0d28afbe7a23 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-vfs01Vobfus_7b961908Windows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.7b961908fcb6ff2461fee3382d36eb9525e964ef7096bfc6e49fd694be4da2b59f2a446d 7b961908fcb6ff2461fee3382d36eb95 121a6b3a8000948f073e3660ecafb19bf5d204a9d468112575afd15c39222eb1 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ssp01Dijo_1f694996Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.1f694996fef7ea9bba3bb8869783fc8a6829432a671118873994a302a909254fdb5f601c 1f694996fef7ea9bba3bb8869783fc8a 0a088fe8df26a9a2cd4330224134e1ea0d249300cbce0eaf11fc6f70b75f21f1 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-a4901Mikey_60ad68e8Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.60ad68e8bc5d9b1c96446ecde4f32bead6a43de37a1e7d13860c552783693466c299a855 60ad68e8bc5d9b1c96446ecde4f32bea 711c1db67575b1a795a4aeb439ada79ab8a7cc98f2c68cb0e2beacafa5d044de https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-szh01Emotet_b4cb5f6aWindows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.b4cb5f6a77a41852eb0478fa09300a9dbe00bd2a0dd1fdda16c06e9b082ff22787cd5c60 b4cb5f6a77a41852eb0478fa09300a9d 313f19bdb8c46b96ac18bca55f53f5c0eb03d2fcececaab47b9339d8f014f7c7 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-3g001Mikey_094cc5abWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.094cc5abe363b54f30925cc227b76c5001178f67e7cef8ac1ffea324b3322e2c4611d4ae 094cc5abe363b54f30925cc227b76c50 70a7d3ac821670090237f52308fb6b1ca47e032d3de9267584f59abe247e536a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-etb01Emotet_1f99daa9Windows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.1f99daa94d90515dec89b753db9225ccdc60f9629f5dcff60dc3b00791fc67ef036bbc74 1f99daa94d90515dec89b753db9225cc 5df55f78a21cd8457c9432afc8da45c182fad6107e3b6e4f5cf86272b68012b1 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-te001Gandcrab_69507fa7Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.69507fa72856abe90439fe5a6696061765f40191f39f75b4219d61803347f4d764f1308f 69507fa72856abe90439fe5a66960617 166627c9ad4fb0acb0bec8e09e1d4ceedc3110e7cdbaa709322d0dbe41a2f70f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-t4c01Parite_ba12d382Windows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.ba12d382901e8e3441e61483b0e9f04347242cd528fea1d863e89a877e1239a3335e2070 ba12d382901e8e3441e61483b0e9f043 0e70c57c577078b1c9cab7d6bd1215372330548ae0c20ff2b80f0cb86cde2074 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-dih01Mikey_8c78fe46Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.8c78fe4624fa41924bd85711477e7d08e2b0a3f11474f12c795dddc843e5e482f50be117 8c78fe4624fa41924bd85711477e7d08 6f74c88c2c04eb117c26d5283d83ac4735928bb50f76b2104be36f8101466aa3 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-y1v01Gandcrab_9ed39ba1Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.9ed39ba18273fa59f2e60ea41a3e3b4515e7df77aa783bba7b65fa01ddcc570e87b638bc 9ed39ba18273fa59f2e60ea41a3e3b45 06cafb061ce341647e48d4113eb71bed76290d30d54ce6d98169fcfe8bbe83c5 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-3fc01Gandcrab_144b6c81Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.144b6c81aea844c0d54a7375fe782d9276cb2a7778d654b4b42766ccc1663c4888f88df2 144b6c81aea844c0d54a7375fe782d92 13ccda5af78a1dea028d076418db880ab3734c745f068d2c4df5de4d4968b478 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-ywy01Mikey_32ac0af9Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.32ac0af91ffaab48f32591e00fb4413c21690639af1520bc8faadf85235e9a94eb556112 32ac0af91ffaab48f32591e00fb4413c dedb1d0c69521f7c47abc2e6fa925642269fd40a00ea21270b7b950cb101f7be https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-3q601Dijo_a77f4728Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.a77f47289052c3bb6b7439349ac0d4d276f00dd1377887065c509ba8328fa05e96b423a6 a77f47289052c3bb6b7439349ac0d4d2 05a5bbabbab5444214ce70c1190f41ccef8ef3dee786d1821d26a396d8a49eb5 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-5fa01Gandcrab_1a8847a7Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.1a8847a71de661411d0b9418eeaaada0944d7871e0d1aea01863834eef9199891e5f4b57 1a8847a71de661411d0b9418eeaaada0 0dd771fecae00517f9297e21a42956d2ee113f6f0bc4d3ee277f887721efc19a https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-rj201Upatre_e026a1d1Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.e026a1d1bc15063357cfb0fa9ba37b96eababfbec7293fa23fa232d9ea9ec7974bbf856b e026a1d1bc15063357cfb0fa9ba37b96 56db7b1dd0bcbeca631eee556146fb599fc363466f51ec01eae28ecd4289e838 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-mfh01Nymaim_2e0a1fc4Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.2e0a1fc473c0a91fc958ea9b6f77cb4794dab538f1f7c8d64470b6799b1dfc30b56b727c 2e0a1fc473c0a91fc958ea9b6f77cb47 1e12e3edeb209993fd7d5623fb10f342dca54e101ea8593348d8cc9e72e91384 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-qi301Parite_0f1f2362Windows This strike sends a malware sample known as Parite. Parite is a polymorphic file infector. It infects executable files on the local machine and on network drives.0f1f236295242cf3cff1c2ba480f28998366d06a7eef5f023578e4cca2abba0c4329c8be 0f1f236295242cf3cff1c2ba480f2899 35270fa68190eba46f59bba10c8dce3a03e55d8af7e8a33f9a330e077f63aeff https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-fbc01Dijo_adbfe348Windows This strike sends a malware sample known as Dijo. Win.Malware.DIJO, also known as Ursnif, is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.adbfe348bd245cd6e1d941b3b9639441177b14ccad550ffb110cf1fc01e81935a9693d90 adbfe348bd245cd6e1d941b3b9639441 04ef397e7e52f4c71553f5eb2d4bc1971d2eda8a54eafa5a23aae4700264688d https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-yn001Gandcrab_f1b70fb3Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.f1b70fb3a82a98bb4b083a7ed6e18cb2f81996c304d582b202b485f88db673f3b47bf969 f1b70fb3a82a98bb4b083a7ed6e18cb2 0799d33c49bceeeeb9c92077d448d5823ab8e71a04b71c6b8afa7f386fb5aa92 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-mlz01Gandcrab_9f9ec21bWindows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.9f9ec21bc23a3161edd8fcefa69d69bfd45c0d508b8157a6db04f30efbc2d0c9959476b2 9f9ec21bc23a3161edd8fcefa69d69bf 130f32c65f3f2e67bdc228f125bc07c049f40fae04114b0de920e9fd0b00bccf https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-40601Nymaim_ad8a90c4Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.ad8a90c40e28ae32413caef915437888b3e00337277044b67d571ce3979dca5f4e1a2ee1 ad8a90c40e28ae32413caef915437888 a98b56d5bd9e67da1d1052cc044af7f45cc0a6472093799466d48e6f841016db https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-ff101Nymaim_41e20428Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.41e204282ea905371512d35206d37a2eeae3728e40e63f2fa7be26ebfbe4a15361a8e90d 41e204282ea905371512d35206d37a2e 87c04d2500b70ebf0865d5ac5889f13bdc86d0a137dd1a20094a3308b52ac191 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-3rw01Vobfus_c3a68d0eWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.c3a68d0ec1fed0bbb56ff380001a2073a49d398c1a8e3d7b7ae68234f0a2ca98248012fd c3a68d0ec1fed0bbb56ff380001a2073 080d08b5202a6da7052a3256c1863db41121881d75188ad96b9af9ab5932a97e https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-m4001Gamarue_b4ad9dc6Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.b4ad9dc6d4c2787e5716310b2c6e84bd15a4c1cd078f33c3c4576c666ca59ee6af824f71 b4ad9dc6d4c2787e5716310b2c6e84bd 3e3decd6f11025d59dbb0c0457b9e5e0353a063d53d5725a3a94836819613a1c https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-xdi01Mikey_2087a325Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.2087a3256c8035aa72379c872001557991d827064e488a769aff6d07a4cfe5a46ac0cb63 2087a3256c8035aa72379c8720015579 bb99c43836000b751e3fa1deda851b646f02be036ad9d86a09adb7963bec7b69 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-mow01Upatre_cff046a9Windows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.cff046a913975f5734f6d476ded97f1f1dd5e06c3cac49203718c828fa19523384bb808f cff046a913975f5734f6d476ded97f1f 2e09c458bc34495f4390b2783d17369a2f809860eb95b95ff914c6610fd42ab0 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-9i101Vobfus_faa1d8aeWindows This strike sends a malware sample known as Vobfus. Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.faa1d8ae1741841cc4b958d71043d62181b2447c97b8b2ffaf9872825cea96a31fa2137a faa1d8ae1741841cc4b958d71043d621 18ee7ed2c61ee532f9a42d02c3c53b017496071608324361117514bdd3fdcade https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-cze01Emotet_f8b0934bWindows This strike sends a malware sample known as Emotet. Emotet is a banking trojan that has remained relevant due to its continual evolution to bypass antivirus products. It is commonly spread via malicious emails.f8b0934b106e04ad16f3c5c1587cc56250b7130386ff9dec22c943930207223bbc8b20c8 f8b0934b106e04ad16f3c5c1587cc562 40651a1759d2ae614541d3f6e8bb6298ab72a242673c44e541dc28e30ca8929f https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-fzo01Gamarue_cfd38073Windows This strike sends a malware sample known as Gamarue. Win.Trojan.Gamarue covers a family that, after installing itself on the system to survive after reboot, will spread itself to USB drives and modify system configuration settings to weaken its security and disable certain features, such as the task manager or the Windows shell, in order to protect itself. It can exfiltrate sensitive data and receive additional commands.cfd38073c0542bbe4e3a3d5b5bde5713afea0cb5182f279cea464bf7c206cae331a93667 cfd38073c0542bbe4e3a3d5b5bde5713 cd80fcca97cb88cb92da3d5fb396b24e102001d3efc06082e6e3dfded9f8ee0a https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-blh01Nymaim_e3b91ef1Windows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.e3b91ef1583194d01055d46635e92d83c5a4e6a7ea5e634fa3279a68e5f9a9141acaa977 e3b91ef1583194d01055d46635e92d83 5056a547e092c82e74a2da61a5a90eb2a7e7e551e39a3387753917bedf8c3130 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-mby01Gandcrab_f4ef0e90Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.f4ef0e905cbba60c9bd6a91fab534b383a6c6fb82f666f6ef90b6fc07894e2b0820bdc12 f4ef0e905cbba60c9bd6a91fab534b38 02edf037074ebd2445625737108f7337715a6af17ec161429fa0392894e479bd https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-xoo01Gandcrab_6eac5ed1Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.6eac5ed1e9961191c5942c87f54e726cef39c9730831fae694b8ff244ed568a9589f5440 6eac5ed1e9961191c5942c87f54e726c 04196939eee8a21a4480a5e5bcf34f70b20f1dad9c3038bc632a415130ac47e8 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-8mu01Mikey_e97e1d93Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.e97e1d93996abcc91a7d870c91a8e482e6310161edb7093829edd829edab65b7cc18c953 e97e1d93996abcc91a7d870c91a8e482 42228a6bafdf985fc02536b17990299589d967ad44d22dbefdb2dbc44681741b https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-s9101Upatre_bae1315aWindows This strike sends a malware sample known as Upatre. Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.bae1315a80c5c19ef9edbcc1dfe9b0d40f685019dc2ccf8c4d9c61ddd049596a75468b7b bae1315a80c5c19ef9edbcc1dfe9b0d4 d9d107fed85d142d6a5cb4d40a48b3ddf5c61f97bc502a297f816ac902fa13a6 https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-hvg01Nymaim_1d14820dWindows This strike sends a malware sample known as Nymaim. Win.Malware.Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.1d14820d7ddf2970b1020396b6684d71fabbd4473dbfa68dc84711252a42a6136eb867f0 1d14820d7ddf2970b1020396b6684d71 a20d48b79e72d3fc229929af39560ac26504fd31d20a7b29b81a4624eda6a0b9 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-soa01Mikey_6c9afb18Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.6c9afb18178718b71ced2ae97394a60e4d5a6373ae8a3e5958cea0275a22cfa972461e49 6c9afb18178718b71ced2ae97394a60e 95aa51bc0016bf055d53f1d663b560c97d15d19956787aecf8af7933e6765e5b https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-ly001Mikey_670f08d3Windows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.670f08d3fffe3998bf97154bfa68540a3bb792281bfdf0d72b1cae541e5bbdeec3f19abe 670f08d3fffe3998bf97154bfa68540a 2b52ef895983a4778aaa66dd90cc8bb296ca3b96b891c087c4fcf483d5bf48c6 https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-do301Gandcrab_81d7e038Windows This strike sends a malware sample known as Gandcrab. Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB." It's spread through traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.81d7e0384ef386da5dfeba80311cf5d06a99e4901f3016afbd78adf51d41b8d102e8ae49 81d7e0384ef386da5dfeba80311cf5d0 1ac89466a2668afd8d06d0f9345d48151dc2978b81985070bb23e30a767bd71c https://blog.talosintelligence.com/2018/11/threat-roundup-1109-1116.html#more
M18-i3201Mikey_e8e1a47cWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.e8e1a47cf4cf45eac05fe17665d3b223d1561956b02573f51fd555d20157a4e1a4ea06e0 e8e1a47cf4cf45eac05fe17665d3b223 911ce750a17ac1e43d53087630b1e3af416619aff2d086b89b6def0d0bfa927d https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more
M18-f4o01Mikey_fe91a7bcWindows This strike sends a malware sample known as Mikey. Win.Malware.Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. These types of threats can also receive additional commands and perform other malicious actions on the system such as installing additional malware upon request.fe91a7bc87b62b1f115a4c993a368243ca117bab2cb20a35e085392230c2d474c5b01a2a fe91a7bc87b62b1f115a4c993a368243 f3dd18c0de2af39bfd1dc3498de48e31668f6fdeb89065dcc9e7a81ae6c5046e https://blog.talosintelligence.com/2018/11/threat-roundup-1102-1109.html#more

Malware Strikes October - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-xnq01T9000_b9c584c7Windows This strike sends a malware sample known as T9000. This sample has been associated with the malware backdoor T9000. T9000 is a modular malware that was initially dropped via an RTF document that contained either CVE-2012-1856 or CVE-2015-1641 exploits. It includes capabilities like capturing encrypted data, taking screenshots, and evade security products. The purpose of this malware is to steal information from the targeted machine and send relevant critical files to the attacker.b9c584c7c34d14599de8cd3b72f2074b73160d3a59db4a5858cd51ef7428a444caaf7cc4 b9c584c7c34d14599de8cd3b72f2074b bf1b00b7430899d33795ef3405142e880ef8dcbda8aab0b19d80875a14ed852f https://researchcenter.paloaltonetworks.com/2016/02/t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques/
M18-4k701RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.28ef823d10a3b78f8840310484e3cc699cc55e437efbacf2ddf0558c74c8b77bad889dcc 28ef823d10a3b78f8840310484e3cc69 b097a3fa288331b8ec2dd2e1332154268935afffbbb35ca0b302ee17ec9e89fb https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-r3401RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.19e3daf40460aea22962d98de4bc32d29d8f83e322741f98d145b073516738e9a2f9680f 19e3daf40460aea22962d98de4bc32d2 d44321ee252a6dd3a20315487bb249867a7d5d0089237d4d5622f006c863ce89 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-z3a01Ryuk_1354ac0dWindows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.1354ac0d5be0c8d03f4e3aba78d2223ea44a8c8c8f167d455db41316f3616ef5703bffff 1354ac0d5be0c8d03f4e3aba78d2223e c51024bb119211c335f95e731cfa9a744fcdb645a57d35fb379d01b7dbdd098e https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-y4g02Marap_e96b1418Mixed This strike sends a malware sample known as Marap. Marap is a modular downloader malware with a focus on downloading other modules and payloads. It has the ability to add functionality to itself over time due to its modular nature. For example it downloads a system fingerprinting module to allow the attacker to perform reconnaissance on the targeted machine.e96b1418314fe28dd5423144f756b7a3a69899bc097b0a69af732010b79ba9744799d0ea e96b1418314fe28dd5423144f756b7a3 1c6661cc19d071df75ef94c58829f223b8634c00a03d1dadcde222c25475fa05 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap
M18-v8401GreyEnergy_275f821bWindows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.275f821b328c06a2ef7b5ebb22af9cb6748fe84497423ed209357e923be28083d42d69de 275f821b328c06a2ef7b5ebb22af9cb6 7ceab4ac6b3376bb6b6e11e8b6b2a3c2398e0c1f1faef138bf60aa1765bfd25a https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-abw01NOKKI_48f031f8Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.48f031f8120554a5f47259666fd0ee0202ee6302436250e1cee1e75cf452a127b397be8d 48f031f8120554a5f47259666fd0ee02 b8120d5c9c2c889b37aa9e37514a3b4964c6e41296be216b327cdccd2e908311
M18-51m01NOKKI_42fbea77Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.42fbea771f3e0ff04ac0a1d09db2a45e2b6b6f24f58072a02f03fa04deaccce04b6bb43b 42fbea771f3e0ff04ac0a1d09db2a45e 9bf634ff0bc7c69ffceb75f9773c198944d907ba822c02c44c83e997b88eeabd
M18-e0r01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.b964645e76689d7e0d09234fb7854ede5c38844d5618f51ce356d95c5811760305eaadd4 b964645e76689d7e0d09234fb7854ede 1588e671c3c29ecbced61b01f08622562614cb9b19411cce3e259deafda6f2b7 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-80p01GreyEnergy_92f63b12Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.92f63b1227a6b37335495f9bcb939ea230af51f1f7cb9a9a46df3abffb6ae3e39935d82c 92f63b1227a6b37335495f9bcb939ea2 c2d06ad0211c24f36978fe34d25b0018ffc0f22b0c74fd1f915c608bf2cfad15 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-ixw01KONNI_38ead1e8Windows This strike sends a malware sample known as KONNI. This sample is a Remote Access Trojan that has many capabilities like taking screen shots, finding and executing files, and uploading files to a C2 server.38ead1e8ffd5b357e879d7cb8f467508d6b306a283ebba49c77f888c6e3e7c6034acd5eb 38ead1e8ffd5b357e879d7cb8f467508 44d0a1eaca283426c02a506f8dd2499ee006b96af26746bc751bc0353978922e https://www.fortinet.com/blog/threat-research/a-quick-look-at-a-new-konni-rat-variant.html
M18-1ob01GreyEnergy_2bff6b87Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.2bff6b87ee4b4d1d4f9468939797e8a9bfc164e5a28a3d56b8493b1fc1ca4a12fa1ac6ac 2bff6b87ee4b4d1d4f9468939797e8a9 037723bdb9100d19bf15c5c21b649db5f3f61e421e76abe9db86105f1e75847b https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-rec01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.ee0718c18b2e9f941b5d0327a27fbda10e05cd3914443dd45000ed5f80c727bc846b59a1 ee0718c18b2e9f941b5d0327a27fbda1 d0ecc4b289a6bae15b8d05a3ce396ae17ff80bc74ba71999b6baeea59d114ee9 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-btp01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.a5d2403b98cddcd80b79a4658df4d1478f7ff105469267cffb46d79937023e017dd71185 a5d2403b98cddcd80b79a4658df4d147 14ef13a6d07575a06d788f305175fb3095640ba5c42d2558cc8b0dd552f8e5a6 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-uux01NOKKI_ae27e617Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.ae27e617f4197cd30cc09fe784453cd4dc739ca07585eab7394843bc4dba2faca8e5bfe0 ae27e617f4197cd30cc09fe784453cd4 9b1a21d352ededd057ee3a965907126dd11d13474028a429d91e2349b1f00e10
M18-fgi01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.8a4ed9c4a66d7ccb3d155f85383ea3b3923f95c17b37fd8a8b9394095b1047fd44d2138e 8a4ed9c4a66d7ccb3d155f85383ea3b3 1a4cac4a70cb95fae23bb917a549756ed33910b8b9be31c3b4d3c701879ec8fd https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-nb401ChachaDDos_36d3cf44Linux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.36d3cf441cf46c4be9763c30b2b953050ab55b573703e20ac99492e5954c1db91b83aa55 36d3cf441cf46c4be9763c30b2b95305 0006a8dfc7bb8d07c233b66fd54aff8b2f9c10cd2ef518e2541f7b81ae5650bb https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-zwr01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.fe0198f4b3d9dc501c2b7db2750a228ba4d682cd2b3f2c475d06939004152f624a6ea6ba fe0198f4b3d9dc501c2b7db2750a228b 067d9a08ea3cc9c37dc03dc2d88d364bb17d4b07a2bd4060b2dde6f96b3dce88 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-khh01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.3e4bff0e8ed962f3c420692a35d2e503a7ea3faf634a752db70ce01d1d8c1f43fd4f4884 3e4bff0e8ed962f3c420692a35d2e503 8bbce6b2772a4d4e014634bcda448ad015743fd95ac801c713cc390704829c1d https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-3nx01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.5145c98d809bc014c3af39415be8c9ac8b320db4452788315c34bce7f7af81f84ad7adc1 5145c98d809bc014c3af39415be8c9ac 7c8eb86d2181a69691dd32d1ec4b8bf3171a9f8eecd324799fadc4915caffc56 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-vkr01Marap_13cc8c74Mixed This strike sends a malware sample known as Marap. Marap is a modular downloader malware with a focus on downloading other modules and payloads. It has the ability to add functionality to itself over time due to its modular nature. For example it downloads a system fingerprinting module to allow the attacker to perform reconnaissance on the targeted machine.13cc8c748ab6beab2b942a9d046795117bc60af7993f8bf3d595e98e87f8dd99d8e7182e 13cc8c748ab6beab2b942a9d04679511 2c5729e17b64cd4e905ccfeabbc913ed945e17625c35ec1d6932194aae83d7c6 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap
M18-r9801RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.31e61e52d38f19cf3958df2239fba1a7a9ee622c0dc661a10dc3f96f3696b0ef8dbe7953 31e61e52d38f19cf3958df2239fba1a7 cc2617d7d904986b83baf7843db6969151363000678e8da599edbf6cf23cb827 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-nn102NOKKI_cf62c2f6Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.cf62c2f67cd933ca176f84a26d4cdca265195ce6b3437acee417f405153f1c210cc86f6c cf62c2f67cd933ca176f84a26d4cdca2 d5fc0ef2d1ed037b5b6389882f9bb4ea15a6b41f21cdc0f5e90752f4e687445c
M18-61102Ryuk_5ac0f050Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.5ac0f050f93f86e69026faea1fbb44509709774fde9ec740ad6fed8ed79903296ca9d571 5ac0f050f93f86e69026faea1fbb4450 23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2 https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-gf401RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.a21322b2416fce17a1877542d16929d5faae3d8930839a2283423212f9a38ac2bf59b405 a21322b2416fce17a1877542d16929d5 7e49b7c6ed359b4e910e8d4d2c9436d99cddeb7f9af2e2f1082d0ca45d469566 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-q9p01CobInt_2f98a491Mixed This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.2f98a491258b6606b7d9ad2a662a55130add1984917ac56eb2824ca20f71e730a814fdb5 2f98a491258b6606b7d9ad2a662a5513 5d29b89e9ee14261c1b556bbc66650488b590f311173aef641e178ba735e6e0d https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-zq601CobInt_f3bb3e2cWindows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.f3bb3e2c03f3976c107de88b43a22655a9fa69915e8c6e8b96c6cd68b94f7220021053cb f3bb3e2c03f3976c107de88b43a22655 5859a21be4ca9243f6adf70779e6986f518c3748d26c427a385efcd3529d8792 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-us901RoamingMixed This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.6cac4c9eda750a69e435c801a7ca7b8dd53e174b0df2083643bf567cdf0e8886c3e34772 6cac4c9eda750a69e435c801a7ca7b8d 7c6d4d34a237087546d625960973fb2ad17fd8c81bd63cce710aa10e115ad40a https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-08m01GreyEnergy_1cb35f43Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.1cb35f4340a37e75aff1f901629b59f3cc1ce3073937552459fb8ed0adb5d56fa00bcd43 1cb35f4340a37e75aff1f901629b59f3 b60c0c04badc8c5defab653c581d57505b3455817b57ee70af74311fa0b65e22 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-5yr01AdvisorsBot_6c8e800fWindows This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.6c8e800f14f927de051a3788083635e51d8e2f4218acfb6f05932f6b57a814135e1a068c 6c8e800f14f927de051a3788083635e5 ee32c4e0a4b345029d8b0f5c6534fa9fc41e795cc937d3f3fd743dcb0a1cea35 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-ric01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.808b186ddfa5e62ee882d5bdb94cc6e2983e80acbe61c5e4097217c6d33447811a6cf086 808b186ddfa5e62ee882d5bdb94cc6e2 29e309dbb4873fe43e279010932735baff53b32da95263079e06080a29a875b4 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-xhe01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.b4152bee9eca9eb247353e0ecab37aa57771826c19890d967efd3f5e5e233ce411f31b5f b4152bee9eca9eb247353e0ecab37aa5 e629f80c9e393cf0ff02b7097a12f098b94dd879f18283caa70c426087c39a4a https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-s7801RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.f89214bfa4b4ac9000087e4253e7f75404599b2367a3aa9937b5820c8563b10f48578e05 f89214bfa4b4ac9000087e4253e7f754 e3228f9fc6a6bc71e5281010fdc78dcc453401074c95e51791fd9a4ee2affcf3 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-kxp01Ryuk_d348f536Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.d348f536e214a47655af387408b4fca513f11e273f9a4a56557f03821c3bfd591cca6ebc d348f536e214a47655af387408b4fca5 3012f472969327d5f8c9dac63b8ea9c5cb0de002d16c120a6bba4685120f58b4 https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-rdf01NOKKI_88587c43Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.88587c43daff30cd3cc0c913a390e9df1cc8ceeef9a2ea4260fae03368a9d07d56e8331b 88587c43daff30cd3cc0c913a390e9df 07b90088ec02ef6757f6590a62e2a038ce769914139aff1a26b50399a31dcde9
M18-49001RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.46c34be9b3ff01e73153937ef35b076662cc7b2ec891637029f4e108155d2837816f21dd 46c34be9b3ff01e73153937ef35b0766 53296107feaca4bdd0cb320502cbc905f3dff9841a004a2576f7190dbe21e328 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-drx01CobInt_0e01a700Windows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.0e01a700ab4255045e3d29c1fd9776007c3a69cd06707540a7115d4c32a1d26f5fe80424 0e01a700ab4255045e3d29c1fd977600 ab73ad1ef898e25052c500244a754aa9964dff7fd173b903d1230a9e8d91596f https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-4o301T9000_2299fb82Windows This strike sends a malware sample known as T9000. This sample has been associated with the malware backdoor T9000. T9000 is a modular malware that was initially dropped via an RTF document that contained either CVE-2012-1856 or CVE-2015-1641 exploits. It includes capabilities like capturing encrypted data, taking screenshots, and evade security products. The purpose of this malware is to steal information from the targeted machine and send relevant critical files to the attacker.2299fb8268f47294eb2b18282540a955cb57196bde3f520e87c948b4676bf487c0fd513e 2299fb8268f47294eb2b18282540a955 3dfc94605daf51ebd7bbccbb3a9049999f8d555db0999a6a7e6265a7e458cab9 https://researchcenter.paloaltonetworks.com/2016/02/t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques/
M18-bik01GreyEnergy_549ace27Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.549ace2711a324a977be83887f10ed9c10d7687c44beca4151bb07f78c6e605e8a552889 549ace2711a324a977be83887f10ed9c 6974b8acf6a8f7684673b01753c3a8248a1c491900cccf771db744ca0442f96a https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-6q301RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.1cc88a79424091121a83d58b6886ea7a9f7ad6e64c1063b52fe11439fd55f902211b72e3 1cc88a79424091121a83d58b6886ea7a 4e32493e6c87b0e2ef3e6ae32f5c32d75ae36c92524a185eabc88fea3c7938c8 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-mqr01CobInt_9e60c89cMixed This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.9e60c89cc58b3e47d93864433622ae32e99a477d8942b7727cbb8be468039f7bfb34dfb3 9e60c89cc58b3e47d93864433622ae32 eb9d34aba286471a147488ea82eec9902034f9f1cf75c4fa1c7dd40815a493d8 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-71201Ryuk_29340643Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.29340643ca2e6677c19e1d3bf351d6541581fe76e3c96dc33182daafd09c8cf5c17004e0 29340643ca2e6677c19e1d3bf351d654 113af75f13547be184822f1268f984b79f35965a1b1f963d23b50a09741b0aec https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-w4y01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.4d9a7e425f8c8b02d598ef0a0a776a586326ee3221532268e5d26164376408b28292ff85 4d9a7e425f8c8b02d598ef0a0a776a58 c65318aa58c9091b938948b62c4b5d6e47237697d8d2f96863f99ef177b6818d https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-yq901AdvisorsBot_54abb22bMixed This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.54abb22b0b5656540eec35fc5591a324f96760cf48d7af79e7cf78fc90082900059522ea 54abb22b0b5656540eec35fc5591a324 6d73bea291bf6114af8333031187ac05fdfc8afe05025b272f510a6977b2153e https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-yl201GreyEnergy_224c2d88Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.224c2d888bce0c3d19fbef41cb20b45ae3e61df9e0dd92c98223c750e13001cbb73a1e31 224c2d888bce0c3d19fbef41cb20b45a 165a7853ef51e96ce3f88bb33f928925b24ca5336e49845fc5fc556812092740 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-46l01NOKKI_82625a7fWindows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.82625a7fd34aa47602f82d7b1f454ea46ae0969e068e937fc7a3825307d9e66814ab56da 82625a7fd34aa47602f82d7b1f454ea4 4e84f97bb61c2d373a574676fa374131460839ecc7b53064f558ce7ce55528ad
M18-4ml01GreyEnergy_c9d46876Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.c9d46876d5ab346e8921973b719aff58f36ecac8696aa0862ad3779ca464b2cd399d8099 c9d46876d5ab346e8921973b719aff58 c21cf6018c2ee0a90b9d2c401aae8071c90b5a4bc9848a94d678d77209464f79 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-hae01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.07eab01094567c6d62a73f7098634eb89b960d4d85026a52271a31f07e2f1609ab58a947 07eab01094567c6d62a73f7098634eb8 4e26d9e0ab05647c36392c3122e6b5615c96d069d4c708ad8bc02786b98cf1ea https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-wix01Ryuk_c0202cf6Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.c0202cf6aeab8437c638533d14563d355767653494d05b3f3f38f1662a63335d09ae6489 c0202cf6aeab8437c638533d14563d35 8d3f68b16f0710f858d8c1d2c699260e6f43161a5510abb0e7ba567bd72c965b https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-cs901GreyEnergy_e420d6e2Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.e420d6e25bc6a01216de80237460f565dfd8665d91c508faf66e2bc2789b504670762ea2 e420d6e25bc6a01216de80237460f565 c6a54912f77a39c8f909a66a940350dcd8474c7a1d0e215a878349f1b038c58a https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-89i02T9000_a45e5c32Windows This strike sends a malware sample known as T9000. This sample has been associated with the malware backdoor T9000. T9000 is a modular malware that was initially dropped via an RTF document that contained either CVE-2012-1856 or CVE-2015-1641 exploits. It includes capabilities like capturing encrypted data, taking screenshots, and evade security products. The purpose of this malware is to steal information from the targeted machine and send relevant critical files to the attacker.a45e5c32fc2bc7be9d6e4bba8b2807bffb7eba5de0304aa81711e645d6f3f203a1092613 a45e5c32fc2bc7be9d6e4bba8b2807bf 1cea4e49bd785378d8beb863bb8eb662042dffd18c85b8c14c74a0367071d9a7 https://researchcenter.paloaltonetworks.com/2016/02/t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques/
M18-ml601RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.7aa46b4d67c3ab07caa53e8d8df3005c7e92fefd5e4991aad951e9b9ec16be5c0d6633dd 7aa46b4d67c3ab07caa53e8d8df3005c a2fafbb7cb9fab38aa31f1e14a6302ac528bb891b6063c6db12737a53d29cde7 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-5wg01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.b84b0d5f128a8e0621733a6f3b412e191f4b437f985e2c56f06bfe7f538be32330770a57 b84b0d5f128a8e0621733a6f3b412e19 1849e8dfd9d1c03dbe6c1464f9b05492012a6c14a0a5b63feb938f1c8b70309b https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-pw601RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.904b4d615c05952bcf58f35acadee5c104924ecb63f0d30c16fa25d625d6e350fc0b28f2 904b4d615c05952bcf58f35acadee5c1 7595c97eb7f2ff4da237746cdac7992df6a4963dcf2f96c9ae19f7a2dc8c88f7 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-6dy01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.531714703557a58584a102ecc34162ff9030d2bf4fc529aa914b171edbd32970ddd2eeb3 531714703557a58584a102ecc34162ff e58196f94f3b76e6c3d90c4ade26403ac655327385f7b875c29d3abf6ee715da https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-ojw01NOKKI_f9e42414Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.f9e42414fb19fd863fdf7066e01661f30885341bd5a6fbcad2f010b2e839f7e8b47e6b37 f9e42414fb19fd863fdf7066e01661f3 c3172b403068aabc711b7cbe4d923ae1fa705ce11c4cc71271fde83ce751c21c
M18-6hz01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.3ed3b8ecce178c2e977a269524f43576dbd1a0dffdea64a10e95fddaa40541ae5f7867f8 3ed3b8ecce178c2e977a269524f43576 c888118cea08d596daf41ebd518098e2b43c226898a5dd1cdd3760a7ab2723a2 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-g4z01AdvisorsBot_a487b5f2Mixed This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.a487b5f266a5abdca7ebd94c878605cafe7b30e03eb8594a719c667fff0da120c7f2b1de a487b5f266a5abdca7ebd94c878605ca 956eae6395ed5e1b2d49ffa08ff85b42d1fc210531ab9c48c2d76e6ee38c9781 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-jce01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.36b2609a98aa39c730c2f5b49097d0ad4fa838a4c72042f752e40c7ca7dace252abb67b4 36b2609a98aa39c730c2f5b49097d0ad cb93528b0f5465d9402ab0530f4e325693f5c189794d2b5466f85d3703f7e861 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-yei02NOKKI_73be3dd1Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.73be3dd11a9cb73483d22cf3cb5022e17a7840893327535a3b54461051d40e0c7a595a58 73be3dd11a9cb73483d22cf3cb5022e1 fd673703c502be907919a4ff2922b7b969d96d206abc572a5cb83e69ab32ca18
M18-zwb01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.03108e7f426416b0eaca9132f082d568e2af0ce5ed66cd81a403f6d0a8db1ac3f418f6e8 03108e7f426416b0eaca9132f082d568 6f20f227f79debfdae32233b59f4dc15c7faf05036b21e8cd46b24ebc52f0bf8 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-niw01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.307d2780185ba2b8c5ad4c9256407504abd6c061f19b457517301238c3207fdcbb11e1af 307d2780185ba2b8c5ad4c9256407504 e86995febce96d9db7d4963ad4ca4b974ba614e25213850757323d0e4abbb803 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-v3m01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.3e01b64fb9fe9605fee7c07e42907a3b36ea37c47fa27c1a7419fb4367cdf2b071182d25 3e01b64fb9fe9605fee7c07e42907a3b 034fab67fb4d351b524975c75794c8406f1f35d17ca969513d03d9748402d7ab https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-t8501RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.cc1e4d3af5698feb36878df0233ab14a8da871d717417704aadc4cfe32e2503cb526503b cc1e4d3af5698feb36878df0233ab14a 537843714adaa141c2a084041a7f373ecab20d75f63dc7dc522bb59b98c1f630 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-qpo01AdvisorsBot_148166c4Mixed This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.148166c4423934a72db2eb5d88c99483cd7a9e52e101b8a304a5eb767a18022f81c1c691 148166c4423934a72db2eb5d88c99483 1eb1ef64a9b41267e362597e071e181acb86b50e708ede4a9448689da7fb2425 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-c8101NOKKI_27a7d46bWindows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.27a7d46b76379ab025b5166905379e4f87d0dc7d69e79855c7f65164b7bac49c62b09f89 27a7d46b76379ab025b5166905379e4f d211815177ce4b9fd2d3c258d2fc6282c23b8458d71f8f6f0df06a9dda89c12f
M18-3rj01GreyEnergy_16bb9defWindows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.16bb9def4fabfa2ccb3efc1ca5bfc2fa0b5d24e6520b8d6547526fcbfc5768ec5ad19314 16bb9def4fabfa2ccb3efc1ca5bfc2fa 0db5e5b68dc4b8089197de9c1e345056f45c006b7b487f7d8d57b49ae385bad0 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-3sk01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.1b984d8cb76297efa911a3c49805432e9b571558d73df65cc73a169e6be641fad0c456a0 1b984d8cb76297efa911a3c49805432e 9deb2e7f95d73656bd25fe769179e36939f8c18439c8713da27f2e0b356d50cc https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-ybs01AdvisorsBot_4d747171Windows This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.4d7471711185364b8d9c8a19bc6ff3d8ea29bb4405bbba69cdd46c2302fcf7f21dbb9288 4d7471711185364b8d9c8a19bc6ff3d8 9dd12d3a32d2ba133bac8747f872f649b389a9cf3f4baaa9fad69a43d2e4f982 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-9jg01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.3ba4882dbf2dd6bd4fc0f54ec1373f4c2f404a2fc02a05430120f1a24032290820bf9f32 3ba4882dbf2dd6bd4fc0f54ec1373f4c f51084698b9c8f847ae21d443dc709e5edd2033e7b1065ab5d72a0487cd9df67 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-cvs01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.57abbe642b85fa00b1f76f62acad4d3bbe87ba65ae0c699735a821d45533d1827da2f94d 57abbe642b85fa00b1f76f62acad4d3b 00678c811a7b53c8b69cfffe9997a30d831bce50f69ae1dbdcfc635ef176bc89 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-ye601RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.bd90279ad5c5a813bc34c06093665e55884ee61b14a6b81abb99d26965731009cd2fd8da bd90279ad5c5a813bc34c06093665e55 b125ea78fb390950893d146a51f513440314be7648207b59e5d0a1752740f273 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-tbb01NOKKI_04d3b08dWindows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.04d3b08d48bcd7a46e32a70b457c419c3e0cc823edd8302bddb1ccdd4bf75dfab53763e8 04d3b08d48bcd7a46e32a70b457c419c dce53e59b0c48e269dadc766a78667a14f11b72c49f57d95abde62c84ac8d7ae
M18-qdq01AdvisorsBot_a4f80119Mixed This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.a4f80119e61fa5fd0332079466dfb8a8895a0dfcc96ff5d513f07da43a0f5e721499d8ff a4f80119e61fa5fd0332079466dfb8a8 fdf5072b904ba9148d8b98e4ba01987e644449e2b10f033ca4d2f967dc502a58 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-cqa02RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.7714321baf6a54b09baa6a777b9742ef9215e8ac473dbd61b1e1c684d377a031f19b1fa8 7714321baf6a54b09baa6a777b9742ef 08327910f05f30e68f20c2a701a2f36459f31a919effdaf907747fb1237bf437 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-f6e01ChachaDDos_c3b5f4a7Linux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.c3b5f4a742557772fad593412352b014334ad99a11a0c9dd29171a81821be7e3f3848305 c3b5f4a742557772fad593412352b014 8317367e18ffb58dda665c5ff31bcdb679f4c2968b0acd094bb2bf4441e5e2e5 https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-rid01CobInt_61619907Windows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.616199072a11d95373b3c38626ad4c9357201d6d3a8b1585f5855e7d3927542c281b1494 616199072a11d95373b3c38626ad4c93 2f7b5219193541ae993f5cf87a1f6c07705aaa907354a6292bc5c8d8585e8bd1 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-7qj01Marap_744e0a9cMixed This strike sends a malware sample known as Marap. Marap is a modular downloader malware with a focus on downloading other modules and payloads. It has the ability to add functionality to itself over time due to its modular nature. For example it downloads a system fingerprinting module to allow the attacker to perform reconnaissance on the targeted machine.744e0a9c568456cfaed7aa72b6b4ca6ba534b7a3cd26ffa9df62cdbbb9f4edc230f44765 744e0a9c568456cfaed7aa72b6b4ca6b a6a31f6b6ac73131a792daa255df88d71ba8c467abfa2a5580221a694c96c2cc https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap
M18-bgu01GreyEnergy_7552b4c6Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.7552b4c677048caeb0112d9b8225459b3cbdc146441e4858a1de47df0b4b795c4b0c2862 7552b4c677048caeb0112d9b8225459b 4470e40f63443aa27187a36bbb0c2f4def42b589b61433630df842b6e365ae3d https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-utd01Ryuk_cb0c1248Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.cb0c1248d3899358a375888bb4e8f3feb72e75e9e901a44b655a5cf89cf0eadcaff46037 cb0c1248d3899358a375888bb4e8f3fe 1455091954ecf9ccd6fe60cb8e982d9cfb4b3dc8414443ccfdfc444079829d56 https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-a8g01NOKKI_62a20f39Windows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.62a20f3938af51bab9d64ad49f8864fa24f5ad95ad8e26d6b643333083646b25820541ee 62a20f3938af51bab9d64ad49f8864fa 0657f788e89a437a1e6fe2630c19436736aa55dcf255540698864a7576192611
M18-wnv01CobInt_ec9d45b6Windows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.ec9d45b695f98bfbf3b7cdc1dc02f83d068c562c764685ee3df900c39efc07e901dc89fc ec9d45b695f98bfbf3b7cdc1dc02f83d 1fc24f89f1d27addd422c99a163cedc97497b76b5240da3b5f58096025bbe383 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-cqj01CobInt_a3b705ceMixed This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.a3b705ce3d677361a7a9b2b0bdf04a04f3eb833f53dac1cc98b3b411c6d9fd66603cec02 a3b705ce3d677361a7a9b2b0bdf04a04 0367554ce285a3622eb5ca1991cfcb98b620d0609c07cf681d9546e2bf1761c4 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-vig01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.34efc3ebf51a6511c0d12cce7592db735f657a60d5ad9bbf01acc49f2242ec7348065f21 34efc3ebf51a6511c0d12cce7592db73 b623da28673a1934bd61dea94a88c37e5fbe9999ed3d6ba311176d65f64c4a4d https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-fa201RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.ff163a92f2622f2b8330a5730d3d636c85e968fdf17fa9850879114090121e9d9a676934 ff163a92f2622f2b8330a5730d3d636c aa183fda57fde0137ab931f3729215956e6f9ee158d90ed82151948f70db841b https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-bs901ChachaDDos_b81ee6faLinux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.b81ee6fa0d906f44c5567a25e126d26fbd5d0093bba318a77fd4e24b34ced85348e43960 b81ee6fa0d906f44c5567a25e126d26f b2a2a3a9c99f45096ee4b08be3f8f0a17cfed33e8384052bb332ee4941fab9a5 https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-opq01GreyEnergy_e3a2c3a0Mixed This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.e3a2c3a025d1aee589026d09e2a0ca50177af8f6e8d6f4952d13f88cdf1887cb7220a645 e3a2c3a025d1aee589026d09e2a0ca50 f50ee030224bf617ba71d88422c25d7e489571bc1aba9e65dc122a45122c9321 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-r9y01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.13c8dda30b866e84163f82b95008790a114b60e1b0ebd0960ce8a9a35e9bff02dd876754 13c8dda30b866e84163f82b95008790a 6973dbf328a589ac4ceac259231430c3dc66259d22bdfdc02d1b369dcf703aac https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-3li01ChachaDDos_198b7540Linux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.198b75402448a731f11d076a44cf45ec0413f832d8161187172aef7a769586515f969479 198b75402448a731f11d076a44cf45ec b2c5518000921f3f6bd6b800b89ceb51d37359f83dbff2ca120e0cc9bfe52b9e https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-h8201AdvisorsBot_733d9102Windows This strike sends a malware sample known as AdvisorsBot. AdvisorsBot is a modular downloader malware that was seen in the wild originally targeting hotels restaurants and telecommunications. The malware employs many anti-analysis features to slow the investigation process. Like most modular malware it can install modules that perform functionality like running system commands, take screenshots, and system fingerprinting. It then sends this information back to the attacker controlled C2 server.733d9102c99787ecef25db845df14d215624ade8e168052fe90f9856c7306c1a9dc52b9e 733d9102c99787ecef25db845df14d21 c659b00a65a574a08fff64662581a8ecae7eafa38850a6c7c19b88c2085a1c03 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-2-advisorsbot
M18-qys01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.b43335b043212355619fd827b01be9a04081d97e42386d8a9d28c073ad7ed9337e783543 b43335b043212355619fd827b01be9a0 bcb34ee2d1e1083bfbb5062fc8f10de6eece0904c853821f0e8d39086bc31503 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-9rs01T9000_fb1e8c42Mixed This strike sends a malware sample known as T9000. This sample has been associated with the malware backdoor T9000. T9000 is a modular malware that was initially dropped via an RTF document that contained either CVE-2012-1856 or CVE-2015-1641 exploits. It includes capabilities like capturing encrypted data, taking screenshots, and evade security products. The purpose of this malware is to steal information from the targeted machine and send relevant critical files to the attacker.fb1e8c42d11e3a2de97814e451ee33752552c92922e2391246e761dcfc1e4b930fc4ae2f fb1e8c42d11e3a2de97814e451ee3375 d5fa43be20aa94baf1737289c5034e2235f1393890fb6f4e8d4104565be52d8c https://researchcenter.paloaltonetworks.com/2016/02/t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques/
M18-2d301KONNI_834d3b0cMixed This strike sends a malware sample known as KONNI. This sample is a Remote Access Trojan that has many capabilities like taking screen shots, finding and executing files, and uploading files to a C2 server.834d3b0ce76b3f62ff87b7d6f2f9cc9b7a4c3bdcc2b7da50994b4c8ed1dc33512344868f 834d3b0ce76b3f62ff87b7d6f2f9cc9b df2ea575168063c53454b5f07f2741d728276309049a5b8906948cbc653fea71 https://www.fortinet.com/blog/threat-research/a-quick-look-at-a-new-konni-rat-variant.html
M18-o9v01CobInt_bf97e090Windows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.bf97e09016e5e6a65968933f94d10a1de0bf3066f06fef0cc7aff20b6dc3655a40354e64 bf97e09016e5e6a65968933f94d10a1d 8263e0db727be2660f66e2e692b671996c334400d83e94fc0355ec0949dce05c https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-t1m01GreyEnergy_7a7103a5Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.7a7103a5fc1cf7c4b6eef1a6935554b794f445b65bf9a0ab134fad2aaad70779eafd9288 7a7103a5fc1cf7c4b6eef1a6935554b7 6c52a5850a57bea43a0a52ff0e2d2179653b97ae5406e884aee63e1cf340f58b https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-33s01GreyEnergy_73676711Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.73676711f838906a9a64e6528e0481f651309371673acd310f327a10476f707eb914e255 73676711f838906a9a64e6528e0481f6 d4e97a18be820a1a3af639c9bca21c5f85a3f49a37275b37fd012faeffcb7c4a https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-op701RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.2a1da7e17edaefc0468dbf25a0f60390b942e3e6fe7634e3fdbbef1399e493338c6ef8dd 2a1da7e17edaefc0468dbf25a0f60390 4cfeb0169a27990ef25ea453ec31268f7885e025783898e97543cb98e2e26121 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-bjq01GreyEnergy_6ede63d6Windows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.6ede63d6f216affbb57a26200fd3160862e00701f62971311ef8e57f33f6a3ba8ed28bf7 6ede63d6f216affbb57a26200fd31608 b602ce32b7647705d68aedbaaf4485f1a68253f8f8132bd5d5f77284a6c2d8bb https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-p3o01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.6116dc0a59e4859a32caddaefda4dbf4ec972c1c92ed0afd11baf11eadca75767c4d2c26 6116dc0a59e4859a32caddaefda4dbf4 5b8b8336b2261371553c7f9e5fe7ebf49ca0d60a1962eb65b61ae02670e9e1da https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-02w02Ryuk_958c5949Windows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.958c594909933d4c82e93c22850194aad7c5fa9df1c79a7d0c178d0b7a2fe6d104d35278 958c594909933d4c82e93c22850194aa b8e463789a076b16a90d1aae73cea9d3880ac0ead1fd16587b8cd79e37a1a3d8 https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-1d801NOKKI_a64a023fWindows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.a64a023f3fc62193699081b63753ff4fc87c0222550a4694f0c3836c53a3ecbee680f05a a64a023f3fc62193699081b63753ff4f c07bea0928a35b9292eebab32563378d01d95434d098e5c7c076e94866a14212
M18-2w501RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.bf5538df0688961ef6fccb5854883a2060221ed2f3fb7cb25b73f2412d5452e551b6d0d7 bf5538df0688961ef6fccb5854883a20 5cdda0a2f871f3d17c875fe8311829db913eece93082b1d5858d5442007fc636 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-iu701ChachaDDos_10bd68a7Linux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.10bd68a7310b48a1129ee9e13918879656ac7c2c89350924e55ea89a1d9119a42902596e 10bd68a7310b48a1129ee9e139188796 4d23b0365cc2c63e82c4990e31abe5e91462a2f241722773f2be5e5cc0ec1e52 https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-trg01NOKKI_69ff4cbdMixed This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.69ff4cbde674cb3d5d1ba16cf1be8dab03335660592b20b494956692cd4ca50d904e61f9 69ff4cbde674cb3d5d1ba16cf1be8dab d92c94423ec3d01ad584a74a38a2e817449648a4da3f12d345c611edc5c4cdbd
M18-qlk01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.6d5f6065ec4112f1581732206539e72e584f4edac4d171cea9be54e59244a219fb10aeb0 6d5f6065ec4112f1581732206539e72e b8686ab7946a626ed31e2fdbb631ec6dd8d3b8f6c2c8eae40e938e6788563f88 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-txe01CobInt_9270ac1eWindows This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.9270ac1e013a3b33c44666a66795d0c03c80c44d95cca6e94975e1c7b33281b2cdd3b9e5 9270ac1e013a3b33c44666a66795d0c0 dad7b4bfe0a1adc5ca04cd572f4e6979e64201d51d26472539c0241a76a50f28 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-vnd02Ryuk_86c314bcWindows This strike sends a malware sample known as Ryuk. This sample is a highly targeted ransomware attack that has infected numerous organizations world wide. The malware performs extensive network mapping, and hacking. Because it is targeted credential collection is required and takes place in advance.86c314bc2dc37ba84f7364acd5108c2bad20c6fac565f901c82a21b70f9739037eb54818 86c314bc2dc37ba84f7364acd5108c2b 9b86a50b36aea5cc4cb60573a3660cf799a9ec1f69a3d4572d3dc277361a0ad2 https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
M18-j1f01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.6e1926d548ffac0f6cedfb4a4f49196efd1d8b3cfd7002986e26aa47a7fb7b1b69c438cb 6e1926d548ffac0f6cedfb4a4f49196e 9ef653326e0c5f7bbe84bf1d870d5c0ac7e6cc3ec857c5a76a3658c5599960cc https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-qsh01Marap_47205fbbMixed This strike sends a malware sample known as Marap. Marap is a modular downloader malware with a focus on downloading other modules and payloads. It has the ability to add functionality to itself over time due to its modular nature. For example it downloads a system fingerprinting module to allow the attacker to perform reconnaissance on the targeted machine.47205fbbb191dbcab606007fd7612ba7b5806f9c13a41ff3991789a0320519156875efe2 47205fbbb191dbcab606007fd7612ba7 bea0276c51bd6dbccb64110a8655fd623cbb9ebf6e0105c57f62e53e209361b6 https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap
M18-6ig01GreyEnergy_5f58059dWindows This strike sends a malware sample known as GreyEnergy. This sample is part of the GreyEnergy malware family that drops a lightweight first-stage backdoor to compromise the victim. Attackers then map the network and collect passwords to elevate their privileges. This malware also tries to employ stealthy C2 communication by getting the internal servers to proxy C2 requests from nodes inside the network to an external C2 server.5f58059d894e8aaf58b2da6be6f97aa8455d9eb9e11aa9af9717e0260a70611ff84ef900 5f58059d894e8aaf58b2da6be6f97aa8 dcade5e14c26c19e935b13d5170d74f99e75d3e4dba443db1dab8bea78745584 https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/ https://www.welivesecurity.com/wp-content/uploads/2018/10/ESET_GreyEnergy.pdf
M18-kmg01CobInt_61e3207aMixed This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.61e3207a3ea674c2ae012f44f2f5618bc565c95765c0493c2918ac0eff80f0a50284ac7b 61e3207a3ea674c2ae012f44f2f5618b 6ca3fc2924214dbf14ba63dde2edb1e5045a405c3370a624c1bb785f1dc0e8ff https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-4fb01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.9f94c34aae5c7d50bc0997d043df032b4f26a05a51260e6299b29f99de70be152a5db592 9f94c34aae5c7d50bc0997d043df032b cf623ae9585d3faff1b800274066165c3d03971a727316f4ccd22018bed37e48 https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-p4v01CobInt_a983d2aeMixed This strike sends a malware sample known as CobInt. This sample has been associated with the CobInt downloader malware. The malware is modular and contains three stages the initial downloader, the main component itself, and various additional modules that are often associated with modular malware functionality.a983d2ae308fc03f4548f4cab7d608b15827d71019f0570a432a2eec994a825e044f6e1d a983d2ae308fc03f4548f4cab7d608b1 9c0ddfcfb8d1e64332fa7420f690e65a6c4ecbeef6395f4c7645da51098962cc https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-part-3-cobint
M18-4eg01NOKKI_dee3f76eWindows This strike sends a malware sample known as NOKKI. This malware establishes persistence on the victim machine. It then establishes a connection to a C2 server. It will collect information from the target machine, and can drop and execute various payloads as well.dee3f76e4469f6ff00d1898db9abcbf3e0e5e375bc830aa19919b4f4f66c69726dde1c6e dee3f76e4469f6ff00d1898db9abcbf3 0d98ca35b29d2a9f7ca6908747c457ebdba999f0e83e182f770848e2335ade5b
M18-j7701ChachaDDos_798bd416Linux This strike sends a malware sample known as ChachaDDos. This malware establishes persistence during the first stage by adding itself to dhcprenew. Once this service is enabled it downloads and decrypts the second stage binary. Finally the malware performs the DDoS functionality through a TCP SYN attack.798bd416bf6bdd51842a340d749cd4870328fa49058e7c5a63b836026925385aac76b221 798bd416bf6bdd51842a340d749cd487 57078d489642e8b6e434a7b74a4393ef1178e5e2e17606807a759e8a42db6115 https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/
M18-zzd01RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.b7afa4b2dafb57886fc47a13558241998f18958778f9fce9910732c34c599f2bae750695 b7afa4b2dafb57886fc47a1355824199 f57abe6a7d78d2fcac660d2ddaa5ac98dae214ff9b071dde3221b443c723341a https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/
M18-vu701RoamingAndroid This strike sends a malware sample known as Roaming Mantis. This sample uses DNS hijacking to infect Android mobile devices. Originally the malware was located in Asia, but has since spread geographically with landing pages and APK files support 27 various languages throughout Europe and the Middle Eastern countries.e56cccd689a9e354cb539bb069733a43b3f652b1f6cdc46275215e380ea7e41e165a98a6 e56cccd689a9e354cb539bb069733a43 e3be552101422f3a7ea6ae664c1ac3e5e8d58c186499ca277eb6748da6b6cece https://securelist.com/roaming-mantis-dabbles-in-mining-and-phishing-multilingually/85607/

Malware Strikes September - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-y9k01Bredolab_d6f6a54aWindows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.d6f6a54a86f42ebf754cf64ff768a217b297be66731faf4df5c57b61ffdd881a72595067 d6f6a54a86f42ebf754cf64ff768a217 f80624e00b65c0560fd5da5834e4539740d7ac19872c10389dfbee7b1d46cefa https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-e3b01Generickdz_25bb374aWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.25bb374a31b2125341cdc8429c3145669297c277bab8bf3b4ed333ae39021457d63a457a 25bb374a31b2125341cdc8429c314566 2b56221522af3985b09d9ddce4c064a6b157c82698795645a6f5113a177558ff https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-sck01Bredolab_ab2a49baWindows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.ab2a49ba7717a418750864e888e7e856f033b3f83ad704a702b465a2ba6939cd88a47f09 ab2a49ba7717a418750864e888e7e856 e5fce427ec167c53e5b34873596a72ce348a02d578d0951fa22d59b590dd0ebb https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-d1q01DarkKomet_86657108Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.866571086c6ec22e618ebf24ce092e061689484ec1d70ea41008afe0c7e0131dd98fedbf 866571086c6ec22e618ebf24ce092e06 169fe2cad2ab1c592d1e573f4d8d108d1cb842219a1078cfd0bb82cb4419f66d https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-6tg01Weecnaw_e1f5ef9eWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.e1f5ef9ed615faf9edba119eb9593ea528e6d7e3f275930c73fb458c7107e5bf09b8fc5d e1f5ef9ed615faf9edba119eb9593ea5 00e3f5ffeb38495cefce0f1c9522743764adf1ee6ce51b91c9c4726726562a12 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-y9601Generickdz_0674b8afWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.0674b8af14a86ba12ec7f98fabf3a4f889b08a5afcab84b7c0bfa8ae377307c7dd4892c1 0674b8af14a86ba12ec7f98fabf3a4f8 2a45c9616dd0518b91c14c6ace489938010886acc7a9dd9a0c3280717fc8d76b https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-jsh01DarkKomet_4a7dfe36Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.4a7dfe36d914551d5e1cc5c56db5152c79d4b2bd221d3a3a5585a8198a8d65c7a51e915b 4a7dfe36d914551d5e1cc5c56db5152c 1992cad7397af3479dfd7945ff7d12c0abcee4311f043b026eb41172898b1a7d https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-zti01Weecnaw_cc15b8bfWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.cc15b8bfd7256fa46465387efd53ab516093cbc9cab0ec44e0023d7dbad43db540c10988 cc15b8bfd7256fa46465387efd53ab51 035f91568ca2bad43ce3fde98a2ae0418821e5f558c62b919c786c3b07bc0fe2 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-l4c01Generickdz_3d89c956Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.3d89c956db8b10c914c4fd9ebbbf63d995184e995e93b8f4e08d807022285f2cab514728 3d89c956db8b10c914c4fd9ebbbf63d9 2b4b76c60b34230544419025df8bde3521435d2224e6b0953f5c9417068f6902 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-2so01Gamarue_44c8514cWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.44c8514cfdab775cddcefac5a67d874ccb5090f4ee7b647341fde5af4253963566c96b6e 44c8514cfdab775cddcefac5a67d874c 2528df691ef2db7f155edf988ad14cf4a60bdd78725ef482731f798ee9bbf22b https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-cmy01Weecnaw_d36e4005Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.d36e40057084b2fffc155f2eb5a7f8881910c8601ea5e0966909a87e8fd03f0e9bcd4fd9 d36e40057084b2fffc155f2eb5a7f888 0f4fc18209bbb1d979cb504b807142e1a24aa8ee831e33ce8825a5bd350096fa https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-i1001DarkKomet_f4f328feWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.f4f328fe42784de7f4482100b8da1064fbb874edd1c5ffcdb4100ba87162d8a7aa049c8a f4f328fe42784de7f4482100b8da1064 276e71bebd8336e347e3ed2cbe2787a1de99cefa706af48feeccf3395e3219a3 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-nh401Powload_922b3bb1Mixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.922b3bb1161ce11b756c7147b20609292ed13e749fa35727b66ef7d12266b0c6bc974836 922b3bb1161ce11b756c7147b2060929 bbb2a93d92cdef6cdfb04e8cfb0cb911b07190e3db8aa1a32c93326a8fdb90fc https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-nnp01Gamarue_4d94576cWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.4d94576cdf1c060b6147d88bc438ec64b09269028fa0b095afbedbc87a44768b5a29a6d7 4d94576cdf1c060b6147d88bc438ec64 3a3a6db3d266830cd471cbb84d1707e915bf3ffbe54b84abff5ee703d91e6485 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-2w901DarkKomet_a6b5a807Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.a6b5a80752b960222f2ff43c9d21bee3579c3f19890937f9beeb562ce0370cfef8b01357 a6b5a80752b960222f2ff43c9d21bee3 1a05832ebb6c608346f01306db48b0afd4e571b06d9a7c5c2845d7aed1f7d207 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-g5h01Weecnaw_bd0443f7Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.bd0443f74ebcb90701997839083f8f132fcd80147aba827771e7c2cfd9bf4f236db55e7e bd0443f74ebcb90701997839083f8f13 055865fb005e3969e6d9e7feba2e81a8bedbe3048bf2a9cd3a9fbfe8ea6076e5 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-4av01Hploki_2729bedbWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.2729bedba0c3a79c57a0ee2acba0cf9b6392bff2cd73d95a769788c1578e21e5913f6cb0 2729bedba0c3a79c57a0ee2acba0cf9b 566404b1f32cdf120c82cff12ade5b6ec91056a5058fe76a91d2967973aeb2fa https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-qs001Generickdz_ceb61868Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.ceb61868b3ab82afa07c4be2e9c5739af2d00f36d261a7c1e1d75ff311a6d14d553b3c38 ceb61868b3ab82afa07c4be2e9c5739a 1157af4bb297bce9c745c387cd66ac19ae4d9f7ee4b5e7a63a6af74defdd389d https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-ocr01Weecnaw_6baca7a5Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.6baca7a58f335785eebaeb4116e0d2d19b1049cbf696b430e3f1c0b9c05c1a5b7d54f1db 6baca7a58f335785eebaeb4116e0d2d1 1bb84d812e0863ce21398678bf8facfe6864a33237d67d3416fbcab73226bdbe https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-edr02Weecnaw_a845adc1Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.a845adc19b0d3ae1775e1e128409ce321197aefa918121b924fc4dff2547d6e56d441598 a845adc19b0d3ae1775e1e128409ce32 2e7e5b2ac10a3591ab570028b6a230d51f117e1842b6d11f56499785c6faa1c6 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-7py02Weecnaw_7021eb7cWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.7021eb7cb4ac305ed4ca78661d0e4fdc356706ecc38b84aadcd5e7096269471e0c6baae9 7021eb7cb4ac305ed4ca78661d0e4fdc 0a032738a8ffc58b6cdce62ef209b247e008f597b6955d87da71e1654da970ef https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-vqf01Gamarue_ae6c460dWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.ae6c460dfc74d3dc113ceb8d466c53a350e68e7d329900ee82d69cc9da11ae06647ec774 ae6c460dfc74d3dc113ceb8d466c53a3 388a47dd46aa9d35c2875e687594bd053484d6380f8929d175cb6d4b6b293dcf https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-rdo01Powload_fbd6b23bMixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.fbd6b23b2a96153f66c12a874bec3dd2e720d64f9445a44e329e88865205e6a11edb825c fbd6b23b2a96153f66c12a874bec3dd2 c5ba355f641c33f9197bc6b2fa35e6354ed55e98f476c1fe6dd7a68a07a79016 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-cre01DarkKomet_9f94b421Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.9f94b4217a923e81c7c04efad5465c733749a5cfd38503b5206cbd0149f82d919d591ae0 9f94b4217a923e81c7c04efad5465c73 1119d8e1bdd4bdf582a4d8047835bdd5f1fa2bc0f5f39f7e9ddc6421ffd9feb4 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-9gf01Hploki_b42e32eeWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.b42e32eed76906dd395bdb97c8f740be1950cb87c4817f6625892dc16f03429661574603 b42e32eed76906dd395bdb97c8f740be 1f1a8c28d686b8cea19181f2a54794a4d208c606f9fd0c2e5b5b29609d9d5948 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-44c01Bredolab_f73c3c3cWindows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.f73c3c3c4bc98eca15a2ed092770069f8e817a04717b79554996ab56084d1a0b3d919446 f73c3c3c4bc98eca15a2ed092770069f cb397ef75dbf1a3cd2269e209dfb70d1a1910ca2a437d010b2c0a11a3a9dd740 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-w7b01Hploki_01427e57Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.01427e57318094875d1991a331baaa052e43286950dd0f18ca66a2d125725ad4130215b4 01427e57318094875d1991a331baaa05 394196bc5702741978c1473d0ed835197341a2a30da48130764429fd717f1e74 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-dfm01Weecnaw_464ef346Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.464ef3468562629b5830f8d5dbc955e3ba46bc641c9a0324d51675520dc1bf224b3ecc4d 464ef3468562629b5830f8d5dbc955e3 01a7bdfdc6502db6bd237fcbc64596d8f76052e942c2c87e897f1ae786b7cac2 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-umo01Powload_ec2f71d8Mixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.ec2f71d89bd414d1779891b4e0db3cac5c3b353439488a37a9d74f6257111eae3b3384bf ec2f71d89bd414d1779891b4e0db3cac 81ea956fa6739a15975cd95abdb1a7986a7d664dfaa53cbe271a7b5fd1036edb https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-zki01Gamarue_b6060c04Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.b6060c04745041860e467395a9379f3386f06d1599d408bb6c8df5e21f40f42064662b76 b6060c04745041860e467395a9379f33 4be4c1d3f17092537cbb850c669ec2ef939ca70888b5e8aa334f087833b2e58e https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-tx201Generickdz_a39b1cc8Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.a39b1cc8571b264f7b84271ee89b68a4153a8522c5871f21fa7bdff306ceed1337483fad a39b1cc8571b264f7b84271ee89b68a4 36b321fd86f75d186e978708789000e45a2a38e436e862c0814524aff5832a8c https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-0dp01Gamarue_878a1ed4Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.878a1ed40a1711fa8dd6928f62bdb41f5493d5b8f6555c5be408bfc5572bb4eab6448b3e 878a1ed40a1711fa8dd6928f62bdb41f 62025cd8f7561c4bb148c158b34a7dfa4c167847e6ad1079cd923e9edc759b4a https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-n3f01Hploki_67e7886fWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.67e7886fa231dba18158431ca43a39e7194afe51bfe6072a57c7792a48993b7bed04a50c 67e7886fa231dba18158431ca43a39e7 03b77bb507d1625cba273a703d337218eca7acbf7432df38e9318715deb0ae61 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-mn301Weecnaw_237453eaWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.237453eaca5905405efe50fc1cf206f30910cccfd536d3361f8e5c4198c64c822d07efcc 237453eaca5905405efe50fc1cf206f3 2f0184defca0e2583f65e1e6d244a9e3cef8e3c83d02282ef797d97ee784869d https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-wie01DarkKomet_d394abaaWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.d394abaac1cd38ec26c68e06c2972e86b8bd020161bc56d78db3753035ec6dbe2270af23 d394abaac1cd38ec26c68e06c2972e86 0c03079c94b8d104f8056011b896e388166697bae717de5a4fa31f4638e9381f https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-a9a01Weecnaw_751cd520Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.751cd5204353086ef5d8027a8957ec50c265523028495dfa45e5ab2bfeac72b174754cbd 751cd5204353086ef5d8027a8957ec50 1cb1870d583bef0aa1dbb99b30f0819b7490855786a85c5969be925b2719c6be https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-ysy01Hploki_54e7a2b0Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.54e7a2b0ed7bf649780ee680ef04efc96d0fea56e7e62ba7bed322b8209137577536429e 54e7a2b0ed7bf649780ee680ef04efc9 62ffb7c248775b8e6c7f64a093377de2d54c6050063c73486ed3621824068a97 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-nwn02Gamarue_7b5a15b7Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.7b5a15b7d788c68d5f314eda80b12e342b9bc70327670fc41d123d9856a59981a46d9bf8 7b5a15b7d788c68d5f314eda80b12e34 bb54543651b5e69454f4ec905a7edcfb0c16d9ab6a145d8afd100056bfbd84c9 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-u5o01Bredolab_784b2bf8Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.784b2bf877386c5e7b52b3e8da2cf44a4ee8f903969e959aa2d9c0908ecf02dc30d205ae 784b2bf877386c5e7b52b3e8da2cf44a 5db46724856b56cd131601c4e5c39e006c47408b9a5be64fd8d7a8126e402607 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-mwl01Weecnaw_aa4844a7Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.aa4844a70b9171c1656224a073c5931499e1d1d51d8f6d0bbf1314cc004031d5e5fb813a aa4844a70b9171c1656224a073c59314 0afde5386ca8587bca67577727f02c3e71b883b7b5fc72e25a0d542f6c5819c8 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-xe101Bredolab_efdd172cWindows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.efdd172c51f6a6f61aaa45e9729120d93d5ff956ab5359b7e0c5083d42443578fc1d2d7f efdd172c51f6a6f61aaa45e9729120d9 987b509f8ac3f8cf96c5ea2060b1d6026e3ead908168728bd602f00f4a4b73ff https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ol801Weecnaw_fa16c395Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.fa16c395fe3ca06417f14c96eb6a7931280ec0a69ec1748a1f9f81c7f62980892d757fd8 fa16c395fe3ca06417f14c96eb6a7931 081fbe8f1c01676f9765ff7742b5d348433e2fd073136355100fe9f054140e6a https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-teo01Gamarue_6a0e6070Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.6a0e6070cd56b73a8538a039c08ba774be7ac24be0c12aa6134c0e7efbfbac0951f47ca1 6a0e6070cd56b73a8538a039c08ba774 c9504878e0f9a6730f2f218b92c458d3e982a78883b601dfba704b724d539e73 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ctw01Generickdz_dcbc5e9dWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.dcbc5e9d33719bd437cc649530bfc1ee2b42fc43866603cafdb7db862a822e12dd412d4f dcbc5e9d33719bd437cc649530bfc1ee 02acbf303617a6661d7f4e994e70508bfd22664452bf27a40af78d7d6e811a1c https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-of301Powload_ef6c0024Mixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.ef6c0024789a954b679f7fd9f842dd2a22c7962b7c39b1320e59c0d12a7f7ef487835ba5 ef6c0024789a954b679f7fd9f842dd2a a1b3e7b6b3330198ca2cbc5dd8f9a8fc6f7255680629f27c00f552b3982e8770 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-fnd01Weecnaw_530bb656Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.530bb6565f24112710a4a51adb1fa1d7ad9ad907407f95b7c08e578fd3b8b64288caaf8c 530bb6565f24112710a4a51adb1fa1d7 063e213ee0ecae95132a3cea557203b782de3c63b753fbd405ed670e83fbf573 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-m7501Weecnaw_d032df1fWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.d032df1f786f9a5cf62043e1dab9e456a8aec02993ec5ce306d8ee40f4086ea6b37fdc7c d032df1f786f9a5cf62043e1dab9e456 2af2ef163e2035d3503ac8af23ffe8be8ca286dbf9c96aac6c8cebb61e9551c1 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-slo01Hploki_f8134cdcWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.f8134cdc1182d145fa1c6690b076392e7e9edfc59db8c78e8595b17c63fcc0dd7d6c3abf f8134cdc1182d145fa1c6690b076392e 029a61486c99ab399ea8d1d44f7fcec56160651af33261d6bc024e4179d328e4 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ug601Generickdz_b99e79fdWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.b99e79fd37b2f2e9d9c9540cbed0d925cfecefd971b607c2745e5779f734586ec0318f94 b99e79fd37b2f2e9d9c9540cbed0d925 2f62e170384a7960dd937d2242734fd3eddef43ebed31d57d51d69d0eb5ea376 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-o5001Gamarue_9b997bc5Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.9b997bc561813aa401b5a71ad692e2d68c37f697ef2c1c9fe6e5b569aa3f17982091a6ff 9b997bc561813aa401b5a71ad692e2d6 2e9a6106bf248abadc1d1cca31ea98f49b4b7c790d321ad728c12710ae3dfa16 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ge601Powload_2dbd5ffcMixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.2dbd5ffc3d29f05aedad60f94779666a6afdb2fc888a938ccaff46ab0d1c14cb17b5aacb 2dbd5ffc3d29f05aedad60f94779666a ad5fd15f99eedfc43bf9e402569511388e7308bb548b36f2ff3180678c166991 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-nfv01Weecnaw_39d448aeWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.39d448aebf9333cfa5a3f976ddac500d0758996c5708dc0421fe1fdd38bf20262bc7935a 39d448aebf9333cfa5a3f976ddac500d 1343648c8b4748294191cfdca4b4881a57cee96db4051530c514e7c56e1152e3 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-uic01DarkKomet_40d7787bWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.40d7787b43f331d17fd419ea9e46764f726a3934d057740fc41aff47a93485e3bda60c58 40d7787b43f331d17fd419ea9e46764f 0a00f60a8af2d9f32a08376c10f7f624438494aa9213f81f395b3d8f3a1eb65a https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-3st01Bredolab_dfed38d7Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.dfed38d73b0fe2488b3624c5714dcb064d8c3b3dc3a916006699e8a571823761ccda6f95 dfed38d73b0fe2488b3624c5714dcb06 48180ade1a05ee5c2110ee4c71754da73383cd4819289c6c091d519855f1627f https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-in901DarkKomet_328fbe5fWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.328fbe5f06b50ac59db3b441132e30cd668842412b9d5422001139420e7d0e136c2c927c 328fbe5f06b50ac59db3b441132e30cd 1ca18752e5cb2d58ee1de63b9402993558560eff0592930b281a083d1a635f17 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-hoh01Bredolab_216bd325Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.216bd325e1b2f7fee671ad7a3dd84d4a402301e7274f2bcd11d56ac326a413fc33dad6db 216bd325e1b2f7fee671ad7a3dd84d4a bcc49772a1699a5f2858f85f098fabc1adcd8ebb8834d806ddb23509c83c5e4a https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-vvt01Hploki_4c44f351Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.4c44f35161fa16c4f325842a0ef98fc0b4a2efb13c7b4c610a9154b5cf6bf9ae636883bb 4c44f35161fa16c4f325842a0ef98fc0 3b5fe513e2178928fb5f4c07da4cd6e85572332353119c78f276b1aa02008823 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-onp01Bredolab_6feb6816Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.6feb6816a52aba50e7608b4e267eaa41da27e2970dd115e6c016df8d64afd2e12c13738f 6feb6816a52aba50e7608b4e267eaa41 87e20d484f20fe2e21152d74f8a8cbd145c2bfbd501932c23d7be394cf1801e5 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-jiw02Hploki_0ff9db79Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.0ff9db794bb8b64380feb013802c55e8cdfd073b9a97a74fa44b18a88d960beba4ecd4bd 0ff9db794bb8b64380feb013802c55e8 277ad7f890bbfae3a0e8f24d8fbac51963f4bb161487c095b3f951dc1e0034af https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-74i01Hploki_531b6fe0Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.531b6fe0109cf3e30037e53d32303517db7f2d0bfe994b1207b4bb1e4b15926a91edb74d 531b6fe0109cf3e30037e53d32303517 539e2b5fcac0cb124b8963df5eb05a9f4246963b7d4b5dd7d1beb10785fffa99 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-u7x01Bredolab_db11bdbdWindows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.db11bdbd184a0f233875b76978b6195b11dab80c048d85cb00b6c09c5d87554c9310ee41 db11bdbd184a0f233875b76978b6195b 56cc8bd6718775c3b9de1bf381824d1bdc9a15b6b9c9e056e2ed3d93c6e731ec https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-d2l01Hploki_81d201d4Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.81d201d439e0d0b6bd03b16ac45532c70e6ca32052b135408605edb6fdf1ae234cfd49de 81d201d439e0d0b6bd03b16ac45532c7 69b312c7ac1509ee9789fb516d6b1d57d1634e5da9831b31f804a3685bf40ed5 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-fo101Bredolab_7afaed36Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.7afaed3638aefaaa10cd4cc6fc57515ad03d07e0a11f35f6ed7e7caaff4652829505c952 7afaed3638aefaaa10cd4cc6fc57515a e1feb2a427d5f5e40e3b9840f4f1795bb775e1bfbcf0f4d4f7df8a09a4ab0cff https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-acq01DarkKomet_5a770d2cWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.5a770d2c17022ddacc8425da509bff039604d14c778452342b7e6b8b776cce59a8d3ac05 5a770d2c17022ddacc8425da509bff03 03c483310dd297d66e6d5a6638267688b056a5d5b21b667bba8b7a9ab664889c https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-3im01Hploki_75d23888Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.75d23888acd8ad3f3fde5c7c54445921d60bfb01264a031616e0a36c806d3ae741d63561 75d23888acd8ad3f3fde5c7c54445921 32ed5c60cffc9e7b5fe7d740232fdacbd31129e5109fc9db7ff84bb4c07d7898 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-55a01DarkKomet_481a08a1Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.481a08a1c94ead201079ee95aaf01ccb9286f01897de6730242382e5f7c03472b0753790 481a08a1c94ead201079ee95aaf01ccb 28252e1df5f42535c404992c9e65c6c165c938d0c7d9e7062ce06ee4ba42cbb5 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-hlr01DarkKomet_ba204095Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.ba2040955519eff2180e1da5dfb2b6b87237a42fc5f9ef70544dc50cb92f7a93cc7d2da2 ba2040955519eff2180e1da5dfb2b6b8 0d9d0c68de0c21b6c1a800ec3985a2986d88869eb334ab1c6dc0c5dc40119483 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-7wy02Gamarue_f4b49748Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.f4b4974886e769c89d20198dac3c3575423f179083a9bd45c54176c903bd09f88ca596ee f4b4974886e769c89d20198dac3c3575 667d6a7d6e36821428d87cab4b4b22acf80e69d4393d7353ef200b0aadd40b39 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-hzp01Hploki_e5aec98bWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.e5aec98b1b6ae16af7af6c28b4b8b278b5c5fa7a34c8f27f4583110f0b286fe99c053942 e5aec98b1b6ae16af7af6c28b4b8b278 1316a3970c94e825d1d9369a02994c01c1d2f5f28495cb5d8938768c046a2d41 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-h3001Hploki_96343f05Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.96343f0513ca02078013087a65b1c5a318180a1ed2e95dedf5a76aea4320077c661d1616 96343f0513ca02078013087a65b1c5a3 69d061bace29d55f83505a2ab54ee4fce9cb5f56b8dd666b9dea53b7477adee5 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-f1k01Hploki_ecb72f33Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.ecb72f3386d32d2b680cf1f429861b2cbb97775dc235ce87b94d8cd178fe15a99c3b195f ecb72f3386d32d2b680cf1f429861b2c 52ccf4aea5e219eb6d7779f445ef381447eac605db64dc5ad3b28cb0b21f716e https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-08201DarkKomet_dc883d7bWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.dc883d7bc1437d6e465bb8579a295a2749dd9837f8d076020a4657ede7620d8cf0cfb297 dc883d7bc1437d6e465bb8579a295a27 1744294b2eea0b04f59090a13d0a03796498bc303cae65b04129652b8a5b8cd6 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-grz01DarkKomet_2ddb834fWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.2ddb834f91be1986f2ea0719366689995a213e706913516f977fafe5ced26c2cbad3fdec 2ddb834f91be1986f2ea071936668999 179f922f65f7437dc74ab133bd47f4d463cb703cf63dafc59ed4611eef7eb3ac https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-dcx02Generickdz_8b45b588Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.8b45b5882e62dd1ea30d2442f919f5909e64a65a089931887af34a78b0e7acd40119e62b 8b45b5882e62dd1ea30d2442f919f590 00394f8ccd70206920aea6b84cbd14fbfbecd31b9bf7542673793a5c5a35707b https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-y7901Weecnaw_cff77c78Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.cff77c78c60d78f09dd2afadc6cc4fe775cdd2b53c020940dee7745f4b5d1038b23dfc05 cff77c78c60d78f09dd2afadc6cc4fe7 3276ac34b3c9f03cb9f1a259ed09043083e3adeaa82a41fc2dccfc51f20570c7 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-5rd01Powload_559de518Mixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.559de518dac382e3f5c3d77803b104bd59596483ae090380b29e5d212728a5d990c47c39 559de518dac382e3f5c3d77803b104bd c47244459faff7e557ac79b4277b4b8b4bfb550f3d9dbf845af4f352976186c2 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-qvz01Generickdz_1243a82cWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.1243a82cb0ace4c1f728113ade932741fe71735c9d41dfcdedc663163f60f84dde8d16f9 1243a82cb0ace4c1f728113ade932741 24a76b75a5d387f434a1f4e0f4cfc2aea7176b293ceb9a9511f0aa0c64191e28 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-ryb01Gamarue_9e6f1f47Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.9e6f1f47804a541144639ec6bab082074240f0b076d441b95c7953cbefed1ec684704675 9e6f1f47804a541144639ec6bab08207 2e8cf252b1308b94733b3bde811810bf6d4b6ad801cb25ddbe0864cfd2dec75f https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-mb801DarkKomet_2f3ebd80Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.2f3ebd8042ab4c85721574a8daa1ab93b759e9226886bc6f9743ae81991468b011d6b88b 2f3ebd8042ab4c85721574a8daa1ab93 1e2bffa2672a47cdbfd0dfd9f4a531ef5e1c654ee3c262fd21b4fb22630c032e https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-96701Generickdz_a04ad6eeWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.a04ad6ee68b36da1315e5cccef0a7310ff6cef10b693be04cdd0a8b16569a34fc065cfe0 a04ad6ee68b36da1315e5cccef0a7310 29918b68f79c9fb878be4e91dbb81322684b93f0ae9e5743c94de962c7df21ef https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-e9601Generickdz_165c9f9aWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.165c9f9a115b35cac2a504b589cd3e176e6c53ba6e1ff2977e258eb55884aa4d88740a9b 165c9f9a115b35cac2a504b589cd3e17 2c867c08a31b7dd9e4b5c82f16c13431e8a739b983b1e065d40d2768575e7676 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-mqy01Generickdz_3df949eaWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.3df949ea3a03d43c6a810e807227842c70981ffdeb50ad6591ee242e0dd1e792039a05b8 3df949ea3a03d43c6a810e807227842c 1d4c1dbf89ce24cc7716c9a71a9f8564b93777d715ef484b25fa81bb368c944f https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-xh301Hploki_f09c2434Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.f09c2434911562a6e2916a22cabffeeaaea678c0db5fafc96468bed18ec0189ff74a905c f09c2434911562a6e2916a22cabffeea 1f95c39e22609e5d6009de3caab9224f71efe03ffbbf8bdd1433c71546cb4ba4 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-oq901DarkKomet_b664ae81Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.b664ae8179d74d7f4b9c85fe6f5cc6545b9bc658539d5d79c1739f88ed689f235a9527a5 b664ae8179d74d7f4b9c85fe6f5cc654 0e2827de18a187c5ed31e9dcf44ca4f3f407f16a4e6f6a7b01304494514592da https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-gki01DarkKomet_dbef9fc0Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.dbef9fc001c303aa5d697c97da49277b14f73d678e0f62cc49f6e9b789d096bfb11a4344 dbef9fc001c303aa5d697c97da49277b 0f06f2ab0ce310049915962b7961b58b46bca4beba857633ac95b2a13cfa5d05 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-s2d01Generickdz_9efa1a81Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.9efa1a8131fe4b5056cb8d3caed0df6fec6af66c7cdbe3a698c8c441630f3a589c1417f4 9efa1a8131fe4b5056cb8d3caed0df6f 1f4018562d03ff36c05bb9c6691eaee8e4e9ff7965799bd8abc557b86037fe2e https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-ek301Weecnaw_4003d6deWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.4003d6ded596a6b1adf9d11332ec36e5cd7cf144aaa8821e9ba1e9419e8d7397aeab74e7 4003d6ded596a6b1adf9d11332ec36e5 1fbac835a770d9b309ed87d3df0746bd28f1033f366ab35cde9e165f2b069388 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-t8s01DarkKomet_dde7f034Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.dde7f0346cae0f69e909cd0d72d2b7ee7b7735b11fabdff2738b587a349ff91044ef6835 dde7f0346cae0f69e909cd0d72d2b7ee 1e4a660328cf9d5332b4aab97933ed451af7c8925ad8550b7678c9c3c522c71a https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-iyp01Hploki_e839b592Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.e839b592995406ce911ac41dbf33ecae4add07a6b25da26465363195de9e7b832e3b3ac8 e839b592995406ce911ac41dbf33ecae 3ef383fac7b7d0a7c41c92c23e56f5301b852c55f797f8642654a489ea891546 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-7vo01Generickdz_8d7a3b1dWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.8d7a3b1dbb5c75191bf9496f3e6ba40d1f59062185a244c5bc847236ea06e0e6859c5886 8d7a3b1dbb5c75191bf9496f3e6ba40d 0843abfc1b86ea35e3042507656e81ed7edfff6805702bc418189ac3dd5f6f81 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-oas01DarkKomet_c1d70cbaWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.c1d70cba6ce0468ca694ffee359ffe5e44b06afa7cea96dca11c73324250ce765021d516 c1d70cba6ce0468ca694ffee359ffe5e 0f99f662e7bab77cc78547802cdf85d810ce971682f7b50bdb8c77fcbc85aaaa https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-rxz01Gamarue_6d0e111fWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.6d0e111fff6f1c24cc4be993a354ab395bb32b745d485dd19587d5589c7b59980c15806d 6d0e111fff6f1c24cc4be993a354ab39 4160c38ae1dc75fd8ecadef940a522f123f55d2e7930be952438aa79ec97cfd2 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ial01Gamarue_566375a9Windows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.566375a9e8f9d1b7b1bc626085239285b36e775eeec47271e52e6b617716ccd588cfa054 566375a9e8f9d1b7b1bc626085239285 028fd51a51027132ba29e92e35f1a5c90aad573bcb21c22a919401f53c2e1fe4 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-42101Bredolab_10d94884Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.10d9488484135205c635011c14eff3092849769b20f8b90c819a216742b37b77da6e7613 10d9488484135205c635011c14eff309 94986d91cb3d0f3de612a63b4d7e9ad005dab44a05e895499a9cd5e8baa544c8 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-kjf01Generickdz_4162542bWindows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.4162542bd9bbec877a462159add884080b737fac1851f952b4853907ca6d463cff869793 4162542bd9bbec877a462159add88408 315680ac90ad07c9d05301fe99f23e864b1c38cd1950caf9e7f3ca9447b16b13 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-d5c01Generickdz_bd548406Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.bd5484060bf2ff8ac687e6109b521204dc0ff135ec3902e78f7ce1892512ffed589fba43 bd5484060bf2ff8ac687e6109b521204 328ba025dadc6148fb83dc34d03b519642de0122d41baabd046133efcfe69eca https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-s3a02Weecnaw_f55ed3d6Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.f55ed3d6ae021aaddd40b900c8ca743557448d06a885b3a7da42e163fe82e1b8698b5f86 f55ed3d6ae021aaddd40b900c8ca7435 02c5fa1012b9cf0d46801cadcc4fe6814b4f75d50104e948031d00ff3ca7b93c https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-4uj01Hploki_da60d8f0Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.da60d8f06dd08bbe0c50eda00e9ec5b01fcedb6d4f3878938717620d5e1acbd901abbc4f da60d8f06dd08bbe0c50eda00e9ec5b0 39eebb75f80b28445c50aaf25c1c0c757099bca5393fa4f4c7f5fbcf72588075 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-0wv01Gamarue_251367cfWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.251367cf96009110345e129640b04eabe0ee714a5bd67fc6cc68f8419ae336db44fc8a8e 251367cf96009110345e129640b04eab c5c98d6f4a5327dceae54918353096b17205320077347106d3fdcdf8394c4dd8 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-x6401Powload_dcd0f8d8Mixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.dcd0f8d87f7da6094b859e217bfb4a32a5c6b2bf00b996355363520cd1ac9385103203d6 dcd0f8d87f7da6094b859e217bfb4a32 e98698880ec4b02325a7b21119783a2841d7c288a2146c73ead369ea749f27bd https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-38t01Bredolab_3d5768b3Windows This strike sends a malware sample known as Bredolab. This sample is a Remote Access Trojan that downloads and distributes other malware.3d5768b3bf2de4b7989d42479903be777b278264e7c26b33aa8e56a3d8dc521f033f7646 3d5768b3bf2de4b7989d42479903be77 f095a1ae871884b632eb885dd80c9c3d27079abae8c8daa8237b48df41708f5d https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-n7y01Hploki_948fbe32Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.948fbe321e6a07a46593e8d1481e5aa3ea8d17dd1a7494e50d8fb431c27a74553758a9a7 948fbe321e6a07a46593e8d1481e5aa3 2e70ea6467d4fef3c8ec276724fd95c6dd06e7ca5d8fdf4d79732bbcec904326 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-tzg01Hploki_633d1400Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.633d1400435c665b132ccda318c6ebe35bc53e3823b80aedaa2b4d305ae4d3b1628f6f29 633d1400435c665b132ccda318c6ebe3 57cecd6a7451c556cb00ac2dcff02a071f29a83b5ec2ee47ef106ec39b9024aa https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-bxy01Generickdz_4d7c4401Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.4d7c44018fc6cb0108c862d2ac752f4c42a002ed9be76b91cb7454f693abaff183d8cc8d 4d7c44018fc6cb0108c862d2ac752f4c 1a4054a1714bb64958e6823aa2418a9317d25b24b20f0666199aceb39b5c1c8f https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-eol01Gamarue_e8c1666dWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.e8c1666d1123f059ed656bfdb44f8f0c70cb5ecca25f6f8bb59d660c38f0b36da143b3e9 e8c1666d1123f059ed656bfdb44f8f0c 7072e12ef4fedfdc2c015daba59b023b7fe4f9659331939568917178f7354354 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-5t201Weecnaw_51c6ff53Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.51c6ff53ab10a410dba53ca87dd1e5601e2216a79fc209a404412b350ef632b0358141d9 51c6ff53ab10a410dba53ca87dd1e560 17983b493cd46b604ef3846516da1cda1628ec855b896be8b54a9558ae83058c https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-rzx01Generickdz_151f01f2Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.151f01f21161e4f927e6d16b674530f31b33d5833efbb1596738a12734611ff23550282e 151f01f21161e4f927e6d16b674530f3 098766c1ee42b13020947978225d9c48e9666c3b326c1f991daf20cde18fb3e0 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-ti201DarkKomet_dec7e9faWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.dec7e9fa61010a6343ba5e8d648613d40dd5ef203f0180fa9ece513766fbd340b9eb2611 dec7e9fa61010a6343ba5e8d648613d4 12883e0f1911daadb66fbbb66b7be9feb6e02a1c3447445ce1947dd6fc600410 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-19901DarkKomet_0d031a62Windows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.0d031a62990cf38ec7c075fdd231c8fbff76302787eaf05abf91f928dc6a0fb4eed9d4a9 0d031a62990cf38ec7c075fdd231c8fb 2401a683279fd61dffdb81d4f0a946fc129bc72d5c5e8061303323f74d3e19a5 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-lz501DarkKomet_f522920fWindows This strike sends a malware sample known as DarkKomet. This sample is a Remote Access Tool that contains many malicious features found in malware trojans like keylogging, webcam access, microphone access, and remote desktop.f522920f48f9c62ce524e3afaf5b6e4ab666fca15029b7d76a4ddaeba20f0658a89fd142 f522920f48f9c62ce524e3afaf5b6e4a 07e3f9989a69d60372e72b8f25bb82c3a40eb5b10b7d33d0a296b392ba9c5135 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-zez01Weecnaw_0a6395e3Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.0a6395e345fdf92a9b6f91fe775f28ef92ad885f07f27bacca29b76d8ca753cea6ed0112 0a6395e345fdf92a9b6f91fe775f28ef 03970d185025e7e226c704b5bcd13de89730677345d3d57081d07895966567d4 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-xj101Generickdz_ca7c57f0Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.ca7c57f0a14ba026ce77bbe5f0a3a5f1490e2abb798cca4544cb5ef1b87ef8c3d847b490 ca7c57f0a14ba026ce77bbe5f0a3a5f1 14c8abf43a6cd9337a963f408a8057a880a9c64e383d853829e7f3e4dc354d78 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html
M18-4kv01Weecnaw_a0b4f44cWindows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.a0b4f44c4225d6af5c713ba46febf591cff206abf0b9afba99dbe1ca9b4879d18c3d01f0 a0b4f44c4225d6af5c713ba46febf591 08c257d2e5938dc6539b463ba0689982b79c112c8ad0aaf1be247726622ea487 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-8l701Powload_c487a1bbMixed This strike sends a malware sample known as Powload. This sample is a malicious document that uses PowerShell to download malware. It has recently been associated with distributing the Emotet malware.c487a1bba6ff840b8892bf94319447b0e2b563979e7d7e88340b2f611a82d5eb72e84749 c487a1bba6ff840b8892bf94319447b0 6d19edf4fb1031eb9f355b6a769a0a134f62bac5928f7553da1af0cf22eeac2f https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-u9h01Gamarue_b3ade8faWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.b3ade8fac9a908c60b10f145acf1895d730b825abfc75f4bc948ddafa82976d581c24f54 b3ade8fac9a908c60b10f145acf1895d 34da76e36056a82a77bb5c498fa7444d57ab471205176d1aff438c4c285764ff https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-roh01Hploki_9e4afdd4Windows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.9e4afdd45afc46e5cec5728f73b77bcb0d5a196860ad97b75b5199421d859b08091cd64d 9e4afdd45afc46e5cec5728f73b77bcb 56572619ff42dd8a9d58816134605ebf4d08ab4a90972ee5e33b082c9d05e1c3 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-ky201Hploki_43de2e0fWindows This strike sends a malware sample known as Hploki. This malicious sample steals credentials from various user applications like Firefox and Outlook.43de2e0fc68a5e7c7716018a04d7fadde7596536670a95332eb654f0d72a02029fa80a58 43de2e0fc68a5e7c7716018a04d7fadd 3bb8174f1cfd068311b93910f975f0422c775b39097fae2a4df0e394dbec4e0a https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-vdm01Gamarue_ecf1b7baWindows This strike sends a malware sample known as Gamarue. This sample is a botnet that is used to spread other malware, and siphon sensitive information from the target machine.ecf1b7bae9921e0e7f6a2e4c8e6ce70057dc21aac744e334752cb0697c125673c5933874 ecf1b7bae9921e0e7f6a2e4c8e6ce700 c39f50e06a3d18483179c8cb4388b98ae0ba3b78879731c710cf74ed1e423264 https://blog.talosintelligence.com/2018/09/threat-roundup-0907-0914.html
M18-xd101Weecnaw_3baa53d3Windows This strike sends a malware sample known as Weecnaw. This malicious sample also goes by the name Razy. The trojan steals information from the host machine, formats and encrypts the data, and then exfiltrates it to a C2 server.3baa53d31421d02170c3977e15d1372b361fc3afc9064e783de4cb1d610f157b4ad34ad1 3baa53d31421d02170c3977e15d1372b 2b65d21294f9a06d570811d2e7aeec7ab4785e8840d79e8083791cc3684e4a92 https://blog.talosintelligence.com/2018/08/threat-roundup-0824-0831.html
M18-z7901Generickdz_3da233c7Windows This strike sends a malware sample known as Generickdz. This sample is a Delphi application that wraps malware. It evades detection by using process hollowing and employs persistence through an autostart Windows registry key.3da233c7d38398b7ab24751c27673d03fbe07d260c95d4fa0b4563461e6ecbf13ef51ece 3da233c7d38398b7ab24751c27673d03 178d41ab9c193b735b37f10e3ef74df84da6cf21fc1bd6c322116d71f6afceb5 https://blog.talosintelligence.com/2018/09/threat-roundup-0831-0907.html

Malware Strikes August - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-jlq01Bublik_8b8de888Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.8b8de888f22132100333b40d0991fd468de718a5c1daee44a6320eda1ccfdba4b36b7379 8b8de888f22132100333b40d0991fd46 8a82e6490ddd36681e95e2e1079229fe07831279c3c4ec96cb159fb176f276fe https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-uf801Eorezo_aa36d265Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.aa36d265686eabf1a74ab94670d46aea0ade0d7f6df5afe4dbd146157dec4a67b3fd69fc aa36d265686eabf1a74ab94670d46aea 9583c8f1f3c9982a45ed56fbc30f8be06708cfaa8557aa7f5b6117847018cd4f https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-3r901Dbzx_9cc6e5d2Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.9cc6e5d2ca45a1af03dc8e5b092823b6f4ba88e4f3851bb03373ec7ead06dcd08352cb25 9cc6e5d2ca45a1af03dc8e5b092823b6 fdd4cce37fd524f99e096d0e45f95ac4dac696c8d7e8eb493bb485c63409c7b3 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-gyc01Startsurf_2e329e93Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.2e329e93339b55511cb42c790d9d0411082b43fe01f3fc6e22f29b201b4d341c0468a57a 2e329e93339b55511cb42c790d9d0411 4348a4b50eba73d6eb5d0d254241d0e44fc63c975b589ac5276d6dc5cf8bab13 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-r2101Tovkater_7b86a95fWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.7b86a95f3399479b48dc44f746ab9aa800cf3a530bc492e524a6ee9b0180c5ae06cf2aef 7b86a95f3399479b48dc44f746ab9aa8 13de4d085dfb857c5580425dcc787ee73b4dd78d0272e8a72d25915b6dedf9bd https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-r2y01Tovkater_4c70b06eWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.4c70b06ebb9f1ec344e5c6fe8b9f7c7a008c22aa1d5793a3e5babc790fa9b7dc43dc76af 4c70b06ebb9f1ec344e5c6fe8b9f7c7a da88d9c7c8010ea49472872d29c9c2d542a82a1f41e5726529dbdc34c363b6a3 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-n9o01Startsurf_3fe1379dWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.3fe1379de211938454e5b42353d7814b326e9154c792f544f6ce62c106c1ffabf4f5e400 3fe1379de211938454e5b42353d7814b fb2aa3891cc9383631ddcca4076ae800d67d701a7ffb83d48240cc1d72372175 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-fqd01Eorezo_bc59adb3Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.bc59adb38a880ba36114228716ef6675f0413e1ff362a9e95f55ec09316b2c0241e1f6b8 bc59adb38a880ba36114228716ef6675 5c3982a206d40ec00b2029d4bdde1bb37192341583e803556872b97a609411ae https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-s7j01Tovkater_4a1359adWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.4a1359ad7c48ef58de071eedbf2bd9ad020b74ef085d195b09df62852e571365c54036c8 4a1359ad7c48ef58de071eedbf2bd9ad eedfbfa60755288a140b84ee00957c0032baba0bf299cea18d5fcca85e7d41f5 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-6pp01Eorezo_b5c47d02Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.b5c47d0227472f4fbef98e07d90bc01628b68baba696afd9f16ae3a1291137fe8e82b9af b5c47d0227472f4fbef98e07d90bc016 85b36ab50aeb452822886815076c7c90c30273854496dde7fd3473e62119f672 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-cfo01Bublik_b574a817Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.b574a817dd68c69c54fc9e2eb47669f6e41f9694d51eefe3a00558263a6350e52c88cd43 b574a817dd68c69c54fc9e2eb47669f6 804e649a4ec4c60b27ccf828188322b42552e416e84f810177f856c514ca6d60 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-oad01Bublik_c1ed1aafWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.c1ed1aaf1cba516c49eaed7557b9ca0bc7e2e1ed445338d5d6ef9f4892e292026098003c c1ed1aaf1cba516c49eaed7557b9ca0b 79653c2fffae7dac30fb798f011c7b96c348a9b1aad37f2a3ef54d29e03e33d0 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-k8e01Ainslot_f4c8ca63Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.f4c8ca63771d22733533b0c4cb6270564e25c4dbc46a735398952567fd7830aa0f02c27e f4c8ca63771d22733533b0c4cb627056 b411c969228d3324eae00e9468a05bf37ecef76fb81e41620dfc9d19bd067f47 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-u2501Startsurf_1e93bf82Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.1e93bf82020093737f05a407d2cd18bce67fe4af6deaa9932ce6230b9f30da68b9df44c9 1e93bf82020093737f05a407d2cd18bc eac8c3c76e954d8e2be7a5d1570643b4ce6a856e8143faf6263ad50cf53aceb2 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-xum01Startsurf_9eb3e36aWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.9eb3e36ac4eab6602e8d17a0e871bacdc6513fb87dbb6fa261b784dc12ebfc4ce7c73f2a 9eb3e36ac4eab6602e8d17a0e871bacd 3e49b3e58eec40b735124509bafcf434904f5945c9d65a5a860b0950850a979d https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-aex01Ainslot_21666a6dWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.21666a6d52c65c877cebdec585303178766aa90f43241c614914da62a5a627b4c592ea53 21666a6d52c65c877cebdec585303178 fccbb20a19943cac05429361f6ffb51b494e02b86748761e5d26d4bdac3a7ab3 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-qhq01BackSwap_f8ce875dMixed This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.f8ce875dd49e7c20ccf1f27dd68f99709bc4c1d5403ddd90712ce87225490a21d1edc516 f8ce875dd49e7c20ccf1f27dd68f9970 5349a0c06823fa285faa31381b5566b2a3d8990f6a5b6775288471caa35f8516 https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-ys301Eorezo_c76d5e65Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.c76d5e653841ba71bfbe08ff3aee8ce82da6f6eac93416bee02f1799795fd629b4e15ed4 c76d5e653841ba71bfbe08ff3aee8ce8 5112edf0351d70ad31152f67e8996c9c4ad062f0023cfd43b4baecb8aa7b16b4 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-by801Startsurf_42c3c308Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.42c3c308bcca7d4f7f1c71a1bc64215f8c46a1f6af918b2df0d6bc6b002c70fb116c1c43 42c3c308bcca7d4f7f1c71a1bc64215f ca544eaedd654782fa6b7a130bdc58869c2124a59754ed1baf9a5c00fafae12a https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-c0z01AppleJeus_bbbcf6daWindows This strike sends a malware sample known as AppleJeus. The AppleJeus malware family has recently been utilized by the Lazarus group in a cryptocurrency trading application. Delivered via email once the trojan trading program is installed, the victim is delivered macOS malware through the trading program's update mechanism.bbbcf6da5a4c352e8846bf91c3358d5c313aca049a83c362066cd130d6263af1bcd43565 bbbcf6da5a4c352e8846bf91c3358d5c e2199fc4e4b31f7e4c61f6d9038577633ed6ad787718ed7c39b36f316f38befd https://securelist.com/operation-applejeus/87553/ https://www.computerweekly.com/news/252447492/North-Koreans-add-Mac-OS-to-cryptocurrency-stealing-malware-attacks
M18-77h01Ainslot_3aa6eacbWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.3aa6eacb34c4fe6cf98dfef01b293c75a4ea2df72beca049121df462df8523c99ded38e1 3aa6eacb34c4fe6cf98dfef01b293c75 f92ed6167aa17d2d242d5c0a15b63d5a2b2ab354ac0c9988d34dbe47d5138719 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-iuk01Eorezo_29ef3074Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.29ef307463511426969d476c9f12ce61483abfcecc7b9596b6fac3f356e4c3b442288600 29ef307463511426969d476c9f12ce61 47bcf1f1bca23a36e291a0ac4cb8d1cd59c0c80d6a8e3b2cc3d646284cc531d5 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-i3h01Dbzx_f58036f8Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.f58036f83cc7b30879208b21fd27a08b684911121e342de5fe0e3f2f83b98c5bf8e38d6c f58036f83cc7b30879208b21fd27a08b 9435b87c7c91ac98f9f461aeaa6b1630e2270e2d2ccdf6a05d46fa02de91d1eb https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-w1w01AppleJeus_ffae703aWindows This strike sends a malware sample known as AppleJeus. The AppleJeus malware family has recently been utilized by the Lazarus group in a cryptocurrency trading application. Delivered via email once the trojan trading program is installed, the victim is delivered macOS malware through the trading program's update mechanism.ffae703a1e327380d85880b9037a0aebd48a81613b3c0186d563744e79d28c05df49c480 ffae703a1e327380d85880b9037a0aeb d555dcb6da4a6b87e256ef75c0150780b8a343c4a1e09935b0647f01d974d94d https://securelist.com/operation-applejeus/87553/ https://www.computerweekly.com/news/252447492/North-Koreans-add-Mac-OS-to-cryptocurrency-stealing-malware-attacks
M18-v9r01Dbzx_cdee786bWindows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.cdee786ba36d2b09ed8f93170a59cde37a799bc190bb5f6e8cb74a1d954c51863801de03 cdee786ba36d2b09ed8f93170a59cde3 a137c89d2c6f0ae74217724e1cb56aea726e285d0e6e98adfda16617ad51d176 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-xzk01Startsurf_44af6a6bWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.44af6a6be80e18d3db06b50554d35396f129c561b8264f76490486f60f703302306dde96 44af6a6be80e18d3db06b50554d35396 c82eaf2f1f156b95b43b2a984867e486911f6ceb329daea6ac9a6c53fae42685 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-6jk01Ainslot_4cd71308Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.4cd7130855ad472a8137885c067997274e9e3b497f6e7685a89b8b32f3e17798fdc013c7 4cd7130855ad472a8137885c06799727 7659c69ab75e087038e59f6e60a2d7927503c390b212787342b4ba53e6f72fe8 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-af501Bublik_2fab8f06Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.2fab8f06d2059ac8a9f72ca61fafb79bc2426a07c5d4c8d1eebb8e16996c255127d1c58d 2fab8f06d2059ac8a9f72ca61fafb79b 8c6b650941754525d9d0bec9356940af5860fefcc335507a82742e91c1c182db https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-15c01Tovkater_6a11cb02Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.6a11cb025fdb96ef3ec831da84a24e51009080ed6a488cef50547b09b66586a16fe36adb 6a11cb025fdb96ef3ec831da84a24e51 44822b0f38e0a15c2128bc1c58afeccf45916539bede62501117e8ce106b95ce https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-r3201Dbzx_a64d5044Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.a64d504475bd8d3fbdb2cfdfc50c6f257e3c82fc8557162243e12e2c82a41081f95b2f06 a64d504475bd8d3fbdb2cfdfc50c6f25 b3c6a0883d9ed8bcf1bf162c0ade8b16f2cd4ae890e30ba9e9540f4bdf5f5ba1 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-0t701Ainslot_328fa3ebWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.328fa3eb048875bc5a8fa8b9666d70e2712d1f77541ee39f15c92a216ed9f3226672d6e1 328fa3eb048875bc5a8fa8b9666d70e2 7b8fd7667a87cf87691feb2727ed78f832e8b84f4edb123057ac21fc173bdfcf https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-b3s01Bublik_c8df69d6Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.c8df69d620857efa4cc3b438e9fb59dc18e62dff6ec64eccbbb68feac395ce5cda5dc4d4 c8df69d620857efa4cc3b438e9fb59dc 0672fe319c7296a01b04973c0455c4a07691a16a2c933f15c071bba72b155b0c https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-yi701Dbzx_29cabf67Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.29cabf6745feed6ba9920cf9c1d3bdf132d03260a117b919bd1184bf1956c70d04c1a657 29cabf6745feed6ba9920cf9c1d3bdf1 8f08bcadd3a44055a70dbae3308cf18c8d1824e424100eda03ddc71e9417fb5e https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-2mi01Tovkater_2b6912b2Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.2b6912b28f3485da71c8b82e4d1fa5fa010200e070f131c403704fe25fbc8c92e7c89714 2b6912b28f3485da71c8b82e4d1fa5fa 9db3546b5f6f8d60b1f635d07a10e8fc11e3b72f66161ee8621d29829fcbffbe https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-oxh01Kronos_17903c3dWindows This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.17903c3d83125a5fc3e3f77d8a775bfe91da487143d931e00e935245e698ea2a582871e4 17903c3d83125a5fc3e3f77d8a775bfe 4af17e81e9badf3d03572e808e0a881f6c61969157052903cd68962b9e084177 https://www.proofpoint.com/us/threat-insight/post/kronos-reborn https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/
M18-s1w01Startsurf_09f61525Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.09f61525437198d7b763a2445f899fe85db5ab2d53a83ed39c38a2815d3e7137f0dfbf19 09f61525437198d7b763a2445f899fe8 c56e3ca164803c5668cf0b8228c97626c486f5a7063d4b3109840137b67c8f98 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-jeg01Bublik_08135a2fWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.08135a2f4092837e633818a82daea56753f61c9dd29783248f800231c1adba117c39f980 08135a2f4092837e633818a82daea567 049a1fd2db0b1c3d821df7ac882417c951a8a3be6531a05bc284b2373bcd0566 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-r2d01Startsurf_14ebd9e2Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.14ebd9e20523563ce69a5863b86fa897e2461b9ae129ed5b61a348ad170d08b7b19dba47 14ebd9e20523563ce69a5863b86fa897 5f98685ee9098a31ced944840670772bb972db31ac5d1690974e59f566d1adae https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-vvf01Tovkater_0a019441Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.0a01944136b7d7d4676abdc4efc4394600a78ee36b4b738fee584bbdfdca5fd077b041a8 0a01944136b7d7d4676abdc4efc43946 ebb6267a01b66d6741497c9d780da069d6a7d3f17d2bfe287470da5ecee3975d https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-q5a01Dbzx_b399db9dWindows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.b399db9d94a93aabc25b58108d895c2bb7625243df08d76b585b41c296e0d873f1fd5dc2 b399db9d94a93aabc25b58108d895c2b 9634a2afb40139e39da8c8ef0da8f5104229d7bb4c3b95faee5a4396713f528e https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-viv01Dbzx_d4addc71Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.d4addc71771aab03588807824cfff681f0d601dcd56958bddbdce80fc3231fc0c8f6e8bb d4addc71771aab03588807824cfff681 ba5afe1245d10f72637d34a96bf6e365c2f4326da69dcd440beacf421b634133 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-y2401BackSwap_275ecbfeWindows This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.275ecbfe6040038710cb4c6df2c65d1c406f7fb141a793a67e2d430e3db740aabd561b52 275ecbfe6040038710cb4c6df2c65d1c 3f86fe2c77e5f2dabda5f99ef8c41d88a732bfed2ad02933c55c49177b7565f6 https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-p9301Bublik_79e36782Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.79e36782e216063d2debbbe81fff06b1922cd05e48aa43670e509c566b44ae6f294596b5 79e36782e216063d2debbbe81fff06b1 520e488e3f6cbebd0369e024a852cb340920806d40a03e7cc3dfeb7b1502ccce https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-dr201Startsurf_cc3fb807Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.cc3fb807e30126cda2bfdcd614e6320e1d00ae503a4b64f16062b31a31b8b27ae4700e20 cc3fb807e30126cda2bfdcd614e6320e 53366f90f59348b8de81bdc04652200d2dcf8bad5cfc46a533c3b20cd0e200b2 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-ocg01BackSwap_a48b8550Windows This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.a48b8550944bc11f1d2c5f2a59cbc27a109e8ef2efee68673f5271525cb112ad775f2edd a48b8550944bc11f1d2c5f2a59cbc27a d55a6993abe6ef5b3c047ed46036236caab9ad2e60774e72ce498f454c45128f https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-p7k01Startsurf_d5c91576Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.d5c91576037d46f9e5efc7b6d952919de85c6001f9e4a9aebdea257ef78e3fc648d6858c d5c91576037d46f9e5efc7b6d952919d 4ae8cf675d6517b7989391fc653e8ddc96aa81cec4802e7e66de30adf0e96d2e https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-7tj01Startsurf_dbb7c24fWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.dbb7c24f0b58497bb345ac68968cb4e1afe099aeea929cb797537edeca49460a22e3e2b5 dbb7c24f0b58497bb345ac68968cb4e1 70ebc88b9a71c661b68325dd92d0945ea1927e4d115da217640a4efefcf0c730 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-veu01Bublik_0a0ec7e1Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.0a0ec7e155f16e64b68b493bf6347dbf2f929c061e234b1d18ccaf62f46925ba112c8c28 0a0ec7e155f16e64b68b493bf6347dbf 73f2be7461e84cc88415bbe44340a09e02d6bd3dbc396c708b5282da3e589064 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-u8n01Startsurf_dede09f9Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.dede09f9ad4fd64b7531db204831c03e4b2eb3e95a7b3828eecd2fa8ba62c29f1d1178b4 dede09f9ad4fd64b7531db204831c03e 00cc9438408d1b22b0afc57e3b233ff62774cbcb92e58b392403d8c794d988ed https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-lqs01Bublik_f892d82fWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.f892d82f949137b5aa4c1b838067a5af8161a2776f0f3fc804697eafcd4a2ab9c417614e f892d82f949137b5aa4c1b838067a5af b1dc3244cf44aa70d30fa06f7367c90240638c0f0f98ac419dd603b101c10eac https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-bin01Ainslot_3bc0439cWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.3bc0439cc4c399844e51af6b53d740d03b20b24f0f8be2cdce3109f053d56d59f05f5186 3bc0439cc4c399844e51af6b53d740d0 ec72aff9d0f5d5e8735589b554e2659ef8cb1f462057415f8c6219a1ae1b90a9 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-6im01Startsurf_173784ccWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.173784ccee05a2ce70fb4cf4eab4e42bebe93629b86d9db3b7899786dca2117fadebb3ff 173784ccee05a2ce70fb4cf4eab4e42b 61e7c5b6a7f1608cf0bf728d15f8cdfc0f9f5c7c3748ee28452cfa2a496e54cc https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-1yk01Dbzx_e4e2c5fdWindows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.e4e2c5fd0d2cbf4a3ef739acdc52d003f6d8d5c0db38ab3f262ccfb89f939064420d0a6c e4e2c5fd0d2cbf4a3ef739acdc52d003 e2846881f6127d99222144e4ece509bd18522fdd7791bf84d7697b37ffa40919 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-tv201Ainslot_531ce813Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.531ce813167293de2c8a281d1471bb41b7b5788c09698c8e1651b765f0ec3e2568a98ab5 531ce813167293de2c8a281d1471bb41 db3ff8db6b2387a8b4be629c96f4de36288a8945e6b0910ff9823ecaef92d96d https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-ppj01Bublik_f71abe17Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.f71abe17820a3e75f399f6c415e11e3cc8a6bcda037311bf1b2b0e3ed032428d5e3961b4 f71abe17820a3e75f399f6c415e11e3c 1e2c6e7c4a4986a3d9b30fb8aecb4cbacacc103251c9ba35e14905231f104dda https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-9un01Bublik_07299a7bWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.07299a7bef55d6d92c51c8020109935b4c76a80ba549cbc4ccf39e0f9f866115afa38d53 07299a7bef55d6d92c51c8020109935b a42ce1c1929e461d7f695a3790d4021286f03ed8a011013282400c5368ca2965 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-b1d02Eorezo_e29f6ad1Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.e29f6ad1680570565a7655d6ba59e9c4f26ad43fa3d71f355e20608336abb7c073539fde e29f6ad1680570565a7655d6ba59e9c4 2b0c6557b39ad8cca97ea6975aa3f4a8341774461b1bacab05d04ab20a9463eb https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-8l601Bublik_3eb88bb2Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.3eb88bb22848a0ae4174fdc5b80c6eb6fbad11387b06b1c64e02c51aaa7a15a2c65dd25a 3eb88bb22848a0ae4174fdc5b80c6eb6 6e693ce84c1d99035b703791b5bd8708a4ba6510f334907f82fe3d6e674e052d https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-ca501AppleJeus_b054a738Windows This strike sends a malware sample known as AppleJeus. The AppleJeus malware family has recently been utilized by the Lazarus group in a cryptocurrency trading application. Delivered via email once the trojan trading program is installed, the victim is delivered macOS malware through the trading program's update mechanism.b054a7382adf6b774b15f52d971f3799b4d43cd2d81d17dec523915c0fc61b4b29e62c58 b054a7382adf6b774b15f52d971f3799 bdff852398f174e9eef1db1c2d3fefdda25fe0ea90a40a2e06e51b5c0ebd69eb https://securelist.com/operation-applejeus/87553/ https://www.computerweekly.com/news/252447492/North-Koreans-add-Mac-OS-to-cryptocurrency-stealing-malware-attacks
M18-4ze01Eorezo_d412b5efWindows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.d412b5ef5315b7278a1c161fc553a9eedc1c42d68cc92a0d982946395a841c13e7d18743 d412b5ef5315b7278a1c161fc553a9ee 52544303a89f2c4e3eedd64c000504a2ef4c920c20361961fc81cae3f520244f https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-4fc01Ainslot_38fd6fe8Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.38fd6fe86918cb97516ac7d31389adee2e24e1d774dd2ae60be847bbbd797c7a03d0093c 38fd6fe86918cb97516ac7d31389adee 0cc20f105cf4630239cbb192b5085c5323ccddafe2804420d07bdc84e9f69f74 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-31k01Kronos_820d3fb4Windows This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.820d3fb49af10fa714c4bdd5745d865b49b42b7ed9c3db0b1a4d45e37e4a6bc2b8079ff6 820d3fb49af10fa714c4bdd5745d865b 93590cb4e88a5f779c5b062c9ade75f9a5239cd11b3deafb749346620c5e1218 https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/ https://www.proofpoint.com/us/threat-insight/post/kronos-reborn
M18-ij801Dbzx_bc9ec8b4Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.bc9ec8b4fbf1544a189d98941b5fa8de4234ccf5d7c08ed456dd5056e6dee1736e0ab7ef bc9ec8b4fbf1544a189d98941b5fa8de 810fb35557e051a7be3f03b37247c90796595a2d5afa1b2c3034187de2a3f0bc https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-sc801Dbzx_eb4c34f2Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.eb4c34f2e2681626143675f4c254762ee7bfac0f3593960f3f0d6fdb96e5a04cd52746ad eb4c34f2e2681626143675f4c254762e cd3a4783c2795a16c82518c56f955c9b56f415d59ef5bc77e143f6124123364b https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-cdp01Tovkater_34b1a271Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.34b1a2715ca0ac1451f2a676726cf5900148dd222d9d6fbdafae4f60a2b22d68dbf6e362 34b1a2715ca0ac1451f2a676726cf590 2a6753ea1a7a2289589550672980137480eadfc3c5d2a4135cbe152a72817b00 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-r3302Tovkater_d0d27826Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.d0d27826533bdfea14a3818adb040e4701b24545e6e866021ceb910d340d9d987a86a254 d0d27826533bdfea14a3818adb040e47 b760a4cea26c261519ed2a3a0814ae8e56ea10414e10213980e7eb34509fe571 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-9la01BackSwap_b2076cdaWindows This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.b2076cda88f44eacc95b21a741b9a7592dc9760a7c6e9d261c73efb7b2604840734bc058 b2076cda88f44eacc95b21a741b9a759 16fe4de2235850a7d947e4517a667a9bfcca3aee17b5022b02c68cc584aa6548 https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-pj501Dbzx_e519fd17Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.e519fd1779712947bca9f42a3787a5422b96a2625e7a9582807a8cd48fb2ebd53e84e63f e519fd1779712947bca9f42a3787a542 25430a357d53aec77dd1f119b838ceae79a22bb3a60c7a002cb7328b098546a7 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-77a01Dbzx_f3ef4acaWindows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.f3ef4aca9d3ee0f3761db50691de42afb55b12096d0c790b93450329df6cef8241ad8535 f3ef4aca9d3ee0f3761db50691de42af 5ce812ebf77f6d63de37a1e3d261b9688d595aaeadaef3388f4214896bb64892 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-2fq01Eorezo_45f66446Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.45f66446465380be05691bd77f04973ea07b25adadac5eff14972ebf4e02578e92039e92 45f66446465380be05691bd77f04973e 0f8d729821902252b7f7a1c0d51004d3770356969e7181548126f13f1e2ebf2a https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-93801Startsurf_4784e04bWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.4784e04b6c33ae15b3dc31202185388e2b8ceeeab6389de31b1d351de4b0dccb7c09c354 4784e04b6c33ae15b3dc31202185388e 1f270dc860158d63bb400e08f12bce40a9a50494368ea6e44cfd89f7e0dc23f4 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-y9d01Kronos_a301ee7fWindows This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.a301ee7f1cdb9b1f71deda6c29bb0a328d6bc587e3abfcfd6b4a771c85a8af90f528d2c7 a301ee7f1cdb9b1f71deda6c29bb0a32 3eb389ea6d4882b0d4a613dba89a04f4c454448ff7a60a282986bdded6750741 https://www.proofpoint.com/us/threat-insight/post/kronos-reborn https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/
M18-d9l01BackSwap_03694e2fWindows This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.03694e2fa1744fb856e652667d4801fbcf5a74c268661501156663f74cd5e20603b0f261 03694e2fa1744fb856e652667d4801fb 2223a93521b261715767f00f0d1ae4e692bd593202be40f3508cb4fd5e21712b https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-msd01Bublik_a4f381c2Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.a4f381c27f1670c6000e59645a37744b4c457a88563afd7142b7fb20af842a4d784123f4 a4f381c27f1670c6000e59645a37744b 65e7cea81c182922f11360de35f4102b81baaff17ab6fa98125e9397fb867817 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-4rz01Bublik_02d4aff8Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.02d4aff8ec09c0ce8f308c103dbff05be0e376a6679ace69af66fd7a43f4fbd587e40e9d 02d4aff8ec09c0ce8f308c103dbff05b 9f4b64e4d8ac9c139f226c7ee53f86ba7285aeaf83818c0c5408c4814a8daf77 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-c6d01Dbzx_1f280b9bWindows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.1f280b9b49a3cb7558bb7af57b715cea2883299a6c1d9ec8778a41cbf2f790f88116ed64 1f280b9b49a3cb7558bb7af57b715cea d0dbd75a4d8716ba7ca7d025ee1c772aa4ff554214a993b4b874a0a26dcf5a6c https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-b5y01Ainslot_3983b019Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.3983b01905c9fae6eeae233d05491971e3e0928baf0936510a7e4b202e440f601d788f79 3983b01905c9fae6eeae233d05491971 637967a9e3b007d0007035df3344060ac332aed97f5b4a170a1fcfc5e1438672 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-6os01Tovkater_b1452016Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.b14520160969339d74685234d00ed1bf01f3562fd30a5d558aa3498f65c4002269a35b53 b14520160969339d74685234d00ed1bf 27dd184fb1b5505f6bc76c72395a50070c7b594963ad591b265cec17a3b4a6ca https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-dg201Startsurf_20f4276cWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.20f4276c9d549ea65913b52ec8227044de1fa4443a1fdd2044a5566dbb0f7183a810765e 20f4276c9d549ea65913b52ec8227044 f0a9c1c2fc19b4abd905e8a2f187f94e74dfe1e7de2d9a5328b13893b301488d https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-2ye01Eorezo_99f28b73Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.99f28b73393096bf7a809bc7282180fea745f65f2a2b19d335cc985e9699d11710a0c73d 99f28b73393096bf7a809bc7282180fe 4ae3efb9a9cca68c098dcdba33d2aef39888cf229cd02be64cbf59a0b68dae30 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-t9z01Bublik_9707fb73Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.9707fb7372ed28b72125c2aed600e415940b95ada8fe5e0f0c9effc5deb41cfbf3d71493 9707fb7372ed28b72125c2aed600e415 632a3d98fc2b2c1e2b7c733f0e1bc87b9c55b8dce9308f23a459d2d68cb26da2 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-mkr02Tovkater_f753fffbWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.f753fffbbbb46766afd3a65dc9879f2200550145382a304f07f7604145edc551393de82f f753fffbbbb46766afd3a65dc9879f22 a70f8fd943406144850ce26d3a6103c32200dabd95563a2040d73ecf1b37ef2b https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-gv901Bublik_d1fea9c4Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.d1fea9c4b039f4a55eda1dfa5db3e4406453a20c08089f16e9ed38fcdde3d88b546072c0 d1fea9c4b039f4a55eda1dfa5db3e440 49ba74297aa04e0a4167e9c93c4c42a2db7b8019d4cc2cef4e7cd1908d133d31 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-bup01Bublik_10892401Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.10892401fcd440f53247ea6183b2d9c1d4fc3cea96bacff97036986a0594f702b031976e 10892401fcd440f53247ea6183b2d9c1 5a4984a7a98b0fc04b3540d637daa744d0b597174408ce72cb685bf0e2f47710 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-2uu01Tovkater_5a27585aWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.5a27585a7153f70b82029daf6e31fabf00f13dd0ecf1a1d7a421df0d21d91fba3d56be72 5a27585a7153f70b82029daf6e31fabf 8ba4e8b2677e8bff0e3d527fffa0540b5a7ce4eb8dad4667f9426b9b224fab19 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-rsz01Ainslot_d91043a3Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.d91043a3abbdc49fc2d376bb048f7f6ad6ed5915d21234f66cb923a26fe384b553f82f11 d91043a3abbdc49fc2d376bb048f7f6a 05dd67a86f9b9d5afe4c069798350d8114784f25199777bf459fbd244e600200 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-4ff01Ainslot_45fff29eWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.45fff29e72a9c0f27ceee7275097166a1df251ad512162a0273895d3457a030f2dc7919e 45fff29e72a9c0f27ceee7275097166a eb53dfbe1dcb04fd2ad9891f9d5ae3df926d7b9ee6865b06e040ca3ed91019e7 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-hgt01Kronos_b2ddd1a2Mixed This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.b2ddd1a228db47234dad1fb164573d827fd8631ab719eca44457630014674a95bc431b91 b2ddd1a228db47234dad1fb164573d82 bb308bf53944e0c7c74695095169363d1323fe9ce6c6117feda2ee429ebf530d https://www.proofpoint.com/us/threat-insight/post/kronos-reborn https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/
M18-cqc01Startsurf_bd244ea1Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.bd244ea13f9d6e7cf3649d6d2f4fe4530bd8f201a2b2bed8df43f76238f6923cbfe00d6d bd244ea13f9d6e7cf3649d6d2f4fe453 d4ab2cc67c707cab8f7aab0fde94b50670f1b787b049f45564fe5368205ed642 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-4em01Eorezo_5f5436a9Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.5f5436a978d03347c81b99980b0555dea10fbad4f79c2309de9ecd78717300b0120fa1c9 5f5436a978d03347c81b99980b0555de 03c948623cf78efe90258d894ab0e793bca7009bd73d0be0f652575f81bda621 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-h6302Ainslot_544e753cWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.544e753c77c61e875185e7bf2a5cda1be053da4c59c633433b8c1a99f5bb130ec425ddcc 544e753c77c61e875185e7bf2a5cda1b f7c8bec61762fa31fb766f50144cfeecabea3aad4d12818b4ee8969777181f87 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-a1l02Eorezo_797397f5Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.797397f5d774ccb3d36ccfd1abd5e2b3f22f8e63db4b3023ba954b4c18c0497e24486497 797397f5d774ccb3d36ccfd1abd5e2b3 3a5ac5c5ee7985367349d84d60be2c5f94f876c56cf73acbae6fc680ebbdb3c6 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-mbr01Eorezo_39211090Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.3921109051bfbd61bc3ce3f3b4dc01a19dc62ac53811521150b29d2db54c0b2654280c18 3921109051bfbd61bc3ce3f3b4dc01a1 61ee5c724a4c9408e9c8120eabac1babea8e91bf5719b02c78ce129f68239ff6 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-ehb01Dbzx_7096c3d4Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.7096c3d4562ddfcb6a61ec9bebfc296f9999094784729283aa74658733d581cab16cada6 7096c3d4562ddfcb6a61ec9bebfc296f e2116a9a176ff765f1c5ec23003266bfe0f1592e46e41236482ad4c3520ea53a https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-mx501Bublik_d93d73b6Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.d93d73b60293119fa2f6d8021ee8c085b308f4accd084ac588deecf7def7e5449171780d d93d73b60293119fa2f6d8021ee8c085 9b1131872b4d42f9a5540fdcfe06eaa6591ae216eca749f4a98e5fefdc9f5fd4 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-ukd01Eorezo_a3273843Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.a32738430ab3f6f751958f1db5fcbf2db6adaf9963db6bee68eb47b74a245ee274a09c10 a32738430ab3f6f751958f1db5fcbf2d 26f928ef89fde0e3e3fa996073c7c0bba00c2cbfe280de338de15367f4c8f76b https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-1p201Tovkater_843c6502Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.843c65028ea756a9d65ea1e0d23b7c360020f9bfa7bb6e88221c5acb5cf5d9f09c0ac238 843c65028ea756a9d65ea1e0d23b7c36 74f523c55af0e9555345df23ee8e72ee05c44d37fad68950732c033b27aab0e2 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-8ei01Eorezo_a3ecb215Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.a3ecb215c8ac2ca8877593caa0338f714d05b8a5dd994061715f28fd8ef9df4e0928e7bc a3ecb215c8ac2ca8877593caa0338f71 63cc723ad7e85798e9126f5cc933c48d0e3cdfa7504579ef0b0b3cced9cb19c8 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-pte01Bublik_2b7a1e31Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.2b7a1e310f6e14eea05589066945952811fd2bf37207e463f196c09e59d211e5887f094a 2b7a1e310f6e14eea055890669459528 01b6b22ab179d3718bb936f9bd71a33ab75ce980fbcb16a7aef10135204ceb1c https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-xrs01Dbzx_8f7d8a26Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.8f7d8a26147cc7d6eabac276a0c79d8d3f5c513e6ed3c2fe04162a334c341d41905097a0 8f7d8a26147cc7d6eabac276a0c79d8d 54279416f864d374f33fe9a2fe2998db3976c4ff43e8b0da006548489a50bbdd https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-9qq01Tovkater_ab12f195Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.ab12f195d93aac892235f784655db23801eadd1a620a4bcf130265899e91446e4220dd79 ab12f195d93aac892235f784655db238 a7de2542cfb82d489531efc49f65fbc31b1808f2353c7f20b781a66c727a50f6 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-udy01Eorezo_08724d1bWindows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.08724d1b50cef3cd1f910b90e492244119041e33f173f7ef8e0d58c766a35dfd254ed147 08724d1b50cef3cd1f910b90e4922441 71d6d1ed9a5bd71e8dbd03a91151a2965ac12198fa1825366bf19c4b14106cb7 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-zhm01Kronos_5e676453Windows This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.5e6764534b3a1e4d3abacc4810b6985df10ad287f126f577f197070453812a7e88c2cc52 5e6764534b3a1e4d3abacc4810b6985d e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0 https://www.proofpoint.com/us/threat-insight/post/kronos-reborn https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/
M18-v8o01BackSwap_9199edcfMixed This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.9199edcfdc64daa2831b5309d422c095a68901d0d8c1247ff280f9453e3ae45687c57566 9199edcfdc64daa2831b5309d422c095 538fc0332ae0d9721c816cfb2245a6f3f47fe391a4503da3a33839a83ecf1c12 https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-8ft01Eorezo_b5855e73Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.b5855e739f70f8835a4c349e39b53caa0e0f998ad0ff10c44703ead062f5589db16d0bc1 b5855e739f70f8835a4c349e39b53caa 71e3009284ae35a3087ef041162a2ada636b388738033ea62faefc2bbfca9dfc https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-nc101Startsurf_3609db51Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.3609db517768a09b18e4ebd13ff090e24134b9538b4b23f348b18b8f679c078244614ff1 3609db517768a09b18e4ebd13ff090e2 ac86cafcc7062a389e25a4e26dd15df7ce2e64b7a6890bf5712189ab9ec81c8c https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-n6d01Startsurf_984f565dWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.984f565ddc9316a43bda3c69a4bd2450c3b552630348cf289131c82e4bf88590f98feeb7 984f565ddc9316a43bda3c69a4bd2450 9b36f0e70d5f7b4795b1278e052356484d4f2374f49563195f224ade6ce08c71 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-6n001Ainslot_ff655bdbWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.ff655bdb2db9e47eaf4b7df9872ef179f750cb15e97caa9bb028b44ebfef3b96bccb1166 ff655bdb2db9e47eaf4b7df9872ef179 d20f23c05b7781d2e5866336693f81041b8b20ab7135812a495d5f8dfb1e5ac5 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-ii701Tovkater_2a3f0cbfWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.2a3f0cbfa86fc366da2191a4e6b2ef5601625d547fd7902ba1a8cfedae413d8840722f0f 2a3f0cbfa86fc366da2191a4e6b2ef56 9362f6da347323c27790bf53e2423299962a42ba11baec0a9efca344277ae027 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-f0d01Startsurf_ed99e24cWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.ed99e24cbd6d7ec9a69fa56eab93f1db0d19484fb3ea3909e277ffb96e2120daa516c5b5 ed99e24cbd6d7ec9a69fa56eab93f1db 722e86b32635a1cace77ceee414761f28e386743fd2c513650e55814179bdac5 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-k0a02Tovkater_ad4f9b0eWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.ad4f9b0e456b49bc417591551a0e809d014d2196054aad8b9d14812cc264b77a84a9b1ff ad4f9b0e456b49bc417591551a0e809d 122715db6467d64ff21864afc1d5e15f5780ed05dafda8085fad323ca5dd02f2 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-bk101Startsurf_bfc13886Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.bfc13886cc7bc59c8088f903b112407eb847e0ea0082698a7c22966ea9140fd03c71180a bfc13886cc7bc59c8088f903b112407e 527eac30113eb365330ec5c35591fe9ae69d4e1beca8b0ae24666e97d8773e36 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-iam01Eorezo_579d1303Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.579d13038be7668d98dc1d2dda30f7a752cb5d83fcc3d1eabf9ae3ee475ad8135a876bb7 579d13038be7668d98dc1d2dda30f7a7 56982cc1f4b4e92aea28a30684bdfc752122eb78fc545ccc3f4169a1597233cc https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-y1q01Tovkater_47bb36a0Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.47bb36a0d95a671b2ca865f41d5305a901ed913b8fe1c00ed955a4fc605b48c0a8dac96f 47bb36a0d95a671b2ca865f41d5305a9 dc265fc791815328bb9df123c19bced472b4d5621f9331ab679b710fb0da608e https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-hdq01Bublik_78a9fcfbWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.78a9fcfb54d8edbd0e5712bcf0750990095a74a9e8ec1eaa8ef23603b97616d179c685d4 78a9fcfb54d8edbd0e5712bcf0750990 9b5e56c14b1b66d3da0f2535a83b3498c7fb2e41d44b68f3474eaf6921afbbb7 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-izm01Eorezo_d8c43a72Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.d8c43a72490bb8cb6d99b8ee3da27333bc8142f26348d74f9f3cbd456450f33f2935aee6 d8c43a72490bb8cb6d99b8ee3da27333 65a0bb3fd94ec888696598703ed111471bd47962278a5f1006e7e0716bd5b58e https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-2io01Eorezo_a9030acbWindows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.a9030acbc908232dab1c1c54983df4170e9d6d813de64b52272563674fbf01fcc85fc90f a9030acbc908232dab1c1c54983df417 1e64134ff7358ea6e632fd2377532491235cf089f33095a72552e150088b42f1 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-k0a01Dbzx_d1359899Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.d135989924d39cd75128a0ab504d771e4fca7f77205570594ea147ab838646920fe337b1 d135989924d39cd75128a0ab504d771e efc3e1b1d6c13c3624160edc36f678dd92f172339bfde598ad1a95b02b474981 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-4mw01Bublik_e5ec1de8Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.e5ec1de88f218eb1002a2be9e006fac24c08d34808962d0ce27ddd001fe583f5db4685d7 e5ec1de88f218eb1002a2be9e006fac2 58f94794c8deb918c75d14db29ec2858e7289a0dde7bc1adc8e2f889d50acddc https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-xwh01Tovkater_d0481071Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.d048107150d4490b1cefeb0c741f6d0800304f8ac20140cd744cb2dd46729e20dbc6cec1 d048107150d4490b1cefeb0c741f6d08 575fb1eca107f6999105302e60ae24992c335260c8761c9cdf676a3ca56bf389 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-80i01Ainslot_0d3530cfWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.0d3530cfb87dfa8f0627a219c70d0d444e3610b8c729f72d047e121592da8f2ccab8f512 0d3530cfb87dfa8f0627a219c70d0d44 5c4cd71d85e9fc4dabd709b64691acec25c9fba77b3ed6bbee63fc454ed77883 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-u5k01Tovkater_435aa9b1Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.435aa9b15e34ad0b399ab318cdfdb2f9007293cdba57f625f8244ae209261dd96529f364 435aa9b15e34ad0b399ab318cdfdb2f9 5c0a9f3375eff3b50d58092e17c2c9b464cbabbbb531b77069dbdcce59d6e05e https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-i0h01Bublik_84e232eeWindows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.84e232ee33510e9fdf68d1c708356b4cc41698f013a2e61268cf0cf3b31d90af956610a6 84e232ee33510e9fdf68d1c708356b4c 71e3922788784923e9648eb00b51700ca16752fa0fb41a0e50e98bafd1611f09 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-vpm01Bublik_fd745d94Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.fd745d946bba77984c11a6a5cd353d58e209dd4387a207adf47d1656414ae303bf245bef fd745d946bba77984c11a6a5cd353d58 489bede16e3b6142ba3bd19e7a151ff68a19e6fcc7cdaff4013a9f0753e62bbb https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-esr01Eorezo_9cdae8b1Windows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.9cdae8b118c014f541b6e531439fcfa5394221500f4c139c6c637a7aa0c8db07805d9e3d 9cdae8b118c014f541b6e531439fcfa5 7e17ee126754a9306b4ffcf536f384abe5c718672807de1e27e7c7f3846d9e74 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-gz901Ainslot_bd77bd14Windows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.bd77bd14ae490f8c5d034d45a44e72e4e8a518a24c02ee675b4a452cbd331e61643addba bd77bd14ae490f8c5d034d45a44e72e4 18778b49fc35aec08184cd4426dc698bd7b89a47dce15861bb9fa4384641d6c9 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-nxr01Startsurf_08c19437Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.08c1943786bb95db6ba1ed2bf34545abd97843293eb98670bfe0ddefb91ce3b0525f8fc2 08c1943786bb95db6ba1ed2bf34545ab c3883ba74230604d38a638a1b8d0673cc3c91e01b482e6b83a6e6bbd4edd3b10 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-lr701Tovkater_d9010dfcWindows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.d9010dfc52031afdd5cec6802732df99010ec52f0b60bf55dd231513f5d75b1f9ba1c32f d9010dfc52031afdd5cec6802732df99 2c72964b8a701a9aa90f6cc46adbf5da695f990f707e48fe62b5de48c4ea51ed https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-eyo01Dbzx_f6098f01Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.f6098f01f2220b8963f060f5fc6b2ecb1b6c1ef46547ac22b876e8d6bba727c475611f92 f6098f01f2220b8963f060f5fc6b2ecb a2907c7011b20373fd47e03a0f4679fdd51b982b973bb37d1d45bfa4a618bc5a https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-94801Eorezo_5445012dWindows This strike sends a malware sample known as Eorezo. This sample downloads and installs software in the background, and allows for advertisements to be displayed in Internet Explorer.5445012d87ab14ad2569247c9575303a059be81d95d873cf7c4f35bbf2da9a77ba39c59c 5445012d87ab14ad2569247c9575303a 55e181f0e0e88efccf6534949ad8dd93a179e2b94b71e76a9e7db4d938ea2bd2 https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-8i501Tovkater_43428f96Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.43428f96f0d41547e9d3a99287ea8e8800b1c8929b37eacf5c645314e2d49613ca3b79b3 43428f96f0d41547e9d3a99287ea8e88 66f336a2616a16d8891503dd145fb12835497a13f19a65946d6aa68242cc23ae https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-99d01BackSwap_92657201Windows This strike sends a malware sample known as BackSwap. The BackSwap malware is currently being used by criminal organizations to target financial institutions such as banks. The trojan steals banking credentials in an effort to drain bank account funds.9265720139aa08e688d438d0d8e48c9e6251f9ad0e5f551ac4a6b918ef366e86c4ccfdc4 9265720139aa08e688d438d0d8e48c9e f51336e862b891f78f2682505c3d38ea7de5b0673d6ef7a3b0907c0996887c22 https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/ https://www.cert.pl/en/news/single/backswap-malware-analysis/ https://www.zdnet.com/article/trojan-malware-campaign-expands-with-attacks-against-new-banks/
M18-11r01Startsurf_1f4a938aWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.1f4a938a6cd59da549170097d670d2d1472b1b4f005411fce214b2e2c6478c7fee78ad97 1f4a938a6cd59da549170097d670d2d1 118e08c379b0035cef2a155d59d97c6e8cae94b6f46c5e77f58d84c88c689d2c https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-5we01Dbzx_dae74718Windows This strike sends a malware sample known as Dbzx. This sample is a variant of the Tspy family. It contacts C2 servers to upload data and receive additional commands, and maintains persistence after reboot.dae7471812b15327c05d0b8a073d72d685ff043a1ec6624343fe53b6cd55a62b3c390f30 dae7471812b15327c05d0b8a073d72d6 f7df8c9e36cf3440709111a33721e7ac7268a2a80057df08843ba95a72c222eb https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-4r801Bublik_ff3f9b43Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.ff3f9b43c13db2c77a963c296b4491b94498ae91f6ce7af0674184ef3b84b40138dc9ba0 ff3f9b43c13db2c77a963c296b4491b9 30cf07a5ec3d0300ba8e7ce94ebdcde0a3c3539aede029cb39a353e7e26fcc7b https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-i7501Startsurf_af5cbe0aWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.af5cbe0af2de7db07c9cced6476e14c391dd1f12b8763c670a33d68983cd9f2fbb9d5036 af5cbe0af2de7db07c9cced6476e14c3 4a1c1cf9c70b127cc514fa6cdbb0e286ee33bf19f6ff41ca02951c9947dac55e https://blog.talosintelligence.com/2018/08/threat-roundup-0803-0810.html
M18-t3v01Ainslot_3d1c07adWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.3d1c07adc45f48d8509eadae5c2fb5e14ea46c768d3c8bf9538fcb518966e2b555738ba9 3d1c07adc45f48d8509eadae5c2fb5e1 72967919bec8028198f4a79997dcd957a6d6c0a9dfb7dbe5b2ca29a00debb41f https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-2eo01Tovkater_8728c568Windows This strike sends a malware sample known as Tovkater. This sample can download and upload files, inject code as well as install additional malware.8728c568d2c38835b31bd9f1b434f02f01d0b01427d4d6c041bc4d4bc034c90487614011 8728c568d2c38835b31bd9f1b434f02f a1e41d046f3a8386c3115edc57a16c4da82d9607b35d7a635b1c14f1d94d2242 https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-p0w01Ainslot_6a4c004dWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.6a4c004d35a196e7f7fb8bd2f898fda5abd73f83284ee2bfa0553c932cfb21bfa48f076e 6a4c004d35a196e7f7fb8bd2f898fda5 5908a9ebe9fc15e751f7ef39c2479413a96f6086899927d23ea7faa83b521fca https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-wf501Kronos_d475c84dMixed This strike sends a malware sample known as Kronos. This sample a part of the Kronos trojan attack campaign. In this latest variant, the threat now tries to evade detection by employing .onion C2 URLs and Tor communication.d475c84d99c2bf461c294d75769b7707aecaf84953641d835e7c754f559fc555169d8aec d475c84d99c2bf461c294d75769b7707 045acd6de0321223ff1f1c579c03ea47a6abd32b11d01874d1723b48525c9108 https://www.proofpoint.com/us/threat-insight/post/kronos-reborn https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/kronos-malware-returns-with-new-attack-campaigns-updates/
M18-od901Bublik_c0023ce5Windows This strike sends a malware sample known as Bublik. This sample is a dropper that drops CoinMiner, a cryptojacking virus that uses the target system to mine cryptocurrency.c0023ce5a6abb71d249626abe2efbddb9a0d8439b50294b292ecb09abee4d21b0fad073f c0023ce5a6abb71d249626abe2efbddb 425e43eafe61586cd6a4867031f40c390ed4958ca35c2a8d368fb61f479a596b https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html
M18-cis01Ainslot_646a8b1dWindows This strike sends a malware sample known as Ainslot. This sample is a dropper for PonyStealer, a bot that attempts to steal passwords from web browsers, email clients, instant messaging applications, and many other applications.646a8b1d50aeb5e8d4c97d97720bf68a976235b1986eb9e7742f369789d90f6e58f5b596 646a8b1d50aeb5e8d4c97d97720bf68a d333daefccd7d188cffda7c75d589389140f24bfab759368217f2514ded312da https://blog.talosintelligence.com/2018/08/threat-roundup-0810-0817.html

Malware Strikes July - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-h3t01Separ_151d7e59Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.151d7e59e6d5d1bac25e5ac38af09a8c2c0b3856f24e0fddad62381a33b30dc4eecb28cb 151d7e59e6d5d1bac25e5ac38af09a8c 12e2ba4b4a310edf9cd97405541565e20d9ea6259d86d96a36fc8b676babb228 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-xuq01Tspy_e3125f02Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.e3125f0228f852b74558bedf8e280ee13bb556311c76bfc489dc346dfc7067fa1294d2c6 e3125f0228f852b74558bedf8e280ee1 05a6a94d66a8b222553c9210b4e370d02a6fffe8ee49be8142d75dd37c5c7fab https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-fry01Tspy_d9bf7717Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.d9bf7717ff14bac9f895dca35acb082c8164d107d32b88c7df6254d4ed69e599a75b9e69 d9bf7717ff14bac9f895dca35acb082c ea09bb3b764c057f45134b132793654e0937701d4cc731298cc7791b1e1b1b88 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-chc01Remcos_168f9117Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.168f9117259e462ef0e333eca3dff8a6cbe8998ce739c5d48e733b591a095f807dd4c3c8 168f9117259e462ef0e333eca3dff8a6 0e953857e78b91fa30011d345fccf6f86a8697318935b227d69ac4dd4915889b https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-ise01Remcos_2aed469aWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.2aed469a306e099066066784fb9e8042c44a7b2b51b0a5adaab43057b436ff587a145ba1 2aed469a306e099066066784fb9e8042 2a4a9722a20800038438c88d240083b65c729004d30e0c993f67202541f60811 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-xp101Razy_d1c078b1Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.d1c078b1f317b207403465c981a2f3aacc36946ecdafe1d59ed54919477a3e3090073b0c d1c078b1f317b207403465c981a2f3aa 232b077e1df7e90f39f92200c9424918eff1c34d2adf98befb28a2cc664e133c https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-zcf01Razy_7405e188Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.7405e188be71c7865f19680a58dd84794ae490132825014422979a89b8203fa001944ab9 7405e188be71c7865f19680a58dd8479 0931d88de9c4a7af4484d1a2285f001512c83a721d6e7d9177d6fa3c9c2ff494 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-r2m01Daqc_369c9648Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.369c96482c96d8c2372ab18a4355c6c693b1aba258b73ac2181653250a954bae1ec78b22 369c96482c96d8c2372ab18a4355c6c6 69079ab9bf5475c7f561a849a191228e7583c7000f56623f4c2824399ab5fadf https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5ag01Remcos_125a7adaWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.125a7adaec7cc3cc57d6d05edde396cfdd9c299cba35712c0f99dfe19705e55d238c714e 125a7adaec7cc3cc57d6d05edde396cf 192f60438d4707d0edb60c2ab1b69df72943b7812bd77bb393182db0636be982 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-2iu01Razy_b11b5227Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.b11b52274b16f05c49b3b8af567dbd1eee61189f6caf7cd43588e2bec75dec1b7cbce445 b11b52274b16f05c49b3b8af567dbd1e 32d5a8609132a6619c27d5da066d6cd0c01ede44e23ae88b3e1a94c31264a2b0 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-hns01Razy_64842b50Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.64842b50eade74f59a46d08cf3bb394a2116477051a72756443f56b45fef60ea740dc778 64842b50eade74f59a46d08cf3bb394a 5cd16c9b64a18d8b8852c0e113b3347e630518e2c034ee8ecdf11c048a5e82fd https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-ckq01Separ_e2bb3993Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.e2bb399358299453b1b10deab830ec50cf9b2e16e36276a9719f698248db586c3506da0f e2bb399358299453b1b10deab830ec50 354cf3031b2679f885969746afef780bb1765b0f32613afb6490d5e60b7fe6bc https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-9as02Jaik_26761f23Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.26761f23cb3e7d749bec91ca939f2304b394874081a59cd9061cc00b7495dab7f8f54a23 26761f23cb3e7d749bec91ca939f2304 5eb6c33a3e6dbf7067de22799ef42d58fc8696f74a29bef655993508e9b9d018 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-bs701Daqc_784bbe81Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.784bbe81061fc5fb189ba1fb265ee6ab4eb0bb4e30af9ebec113f035aaa423d998bf19e5 784bbe81061fc5fb189ba1fb265ee6ab 60140f334d05733c9e80ec951bbf57d2355e7421197806f3e5373d87feebaca8 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-uo901Jaik_285ea820Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.285ea8202d4f321f5fbf3391d44b1cfc1d784830497e834bfdb2bb7cdae01993199fb19e 285ea8202d4f321f5fbf3391d44b1cfc d0a55070ae9fdb2b7ac3b113025200257d4e02c223606038e5f19e963bf2c9e4 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-dwm01Razy_5bbf432aWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.5bbf432a3f2b806bb3ca295e32609f09578cf5f08a4bfce1006c151ce459cffa2f9184c0 5bbf432a3f2b806bb3ca295e32609f09 40b9d27d3e3e78e52c5df9a060126d0111e6337e86e50962cce38c814ce0c365 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-hsi01Razy_fcf945f2Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.fcf945f227a569cf3822a2c9fda0b064bb96d799c4a38dc239ccbcf980a809e9637f6613 fcf945f227a569cf3822a2c9fda0b064 760a2cb6fae52b26406a38e6a93952d2162c27c6712842c8d125685b2b540264 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-az301Remcos_142503b2Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.142503b2bf35501b32f8c8fd8121492682bf48b3623c418b21d8487a6e0e20656d131931 142503b2bf35501b32f8c8fd81214926 094e5d7bce863dcf7652873c15d18dfce918eca631c471bbe59f739fccb770c8 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-2qq01Remcos_0c011706Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.0c0117061232226b3f5309718c3a7373f1f009307e560ab753f917359778a4ca830939e0 0c0117061232226b3f5309718c3a7373 13aeccc984e1570bf36d8440df9b293277b25f26bb299179d187ac47b3500488 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-2pv01Tspy_b1b6497eWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.b1b6497e3e0ed87077fa30b09595d7ac3df6acb80eeb374111cab1686e31da3602c6b43c b1b6497e3e0ed87077fa30b09595d7ac 87f83003dbefa877b6256c34ceddb4447880d4db632656a3718fea5a0428515d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-a7g01Jaik_b28f7d98Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.b28f7d98c478041e825ab9d44ea3496aa6747e92939059a95c0d98ade4f0aae025064e6e b28f7d98c478041e825ab9d44ea3496a 36ac6881149050ac9aec57972ccc3e8063c51e66529d16b0a2647b9ab8700715 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-6jd01Tspy_7b0d8a68Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.7b0d8a689033a3cb20dc1e37e631c0ada928bbcfcd08bc6de8ee78651317ec63e8058204 7b0d8a689033a3cb20dc1e37e631c0ad 7a93669bdf9192314b505e49e3d80e3974683a024f12f92ba0103e8b640a7d2d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-c2w01Remcos_7d3b592dWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.7d3b592d92a7027f4bec1389de3abbfb409c23a30280d0e907fdd3410743f02e0ec132e5 7d3b592d92a7027f4bec1389de3abbfb 09a7a2aeb1af80aa666c5920765e4409e367a051c161d948f1a193adbe5040a3 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-tmq01Daqc_029d5d96Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.029d5d964709b574f483f117c9421a7da3c165be23f904a3683304ab2c3b6139ee8fea2d 029d5d964709b574f483f117c9421a7d 9cd31bad005306e5586bd20d5c027d15bd2bdc0f904f3f839309a25c30ffe417 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-tn501Tspy_df85bfe7Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.df85bfe768faeacf9d2d7623227b299122ba953957d5e4c58ac326b7d52ac4249717f8c8 df85bfe768faeacf9d2d7623227b2991 86d5dff17cefb0f8c99c92a4e5890086d2674ccfb46ad80bf202df6961ed5d4b https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-9ui01Jaik_ad9bd410Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.ad9bd41038cb6dedbe49587ee9b335999cebea617aae99bff9fa64183743614fb47feaef ad9bd41038cb6dedbe49587ee9b33599 ec67e3754964d9c2ffb67837cf56eacdd51557012e31014fcbf29a01254d6fe5 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-yfj01Razy_bd5c2f4eWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.bd5c2f4e3cc3c7cf59c9bad6ea0d573a637475e806ed393db7d666bdd6dac9494a071793 bd5c2f4e3cc3c7cf59c9bad6ea0d573a 3b65e590fbd2be761a6cbe540c680d63358dddfc838acd3164a1580dfa3782c6 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-x7301Jaik_04c8a688Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.04c8a6889158c2b70c3bcd4b3940744f764565716e922210fb6fa3b8c9138aaa44df5da2 04c8a6889158c2b70c3bcd4b3940744f ad459b9f19ce38d60470ed2889895d23f618f2be1aae8e49b172e83faa69c2c4 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-4d301Remcos_7ae2cbf3Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.7ae2cbf31859f66fcd0d2de9304b94a66eb094f91f6599940a0e079f19251b67a6e88148 7ae2cbf31859f66fcd0d2de9304b94a6 00171a400fb86b6f6489875fdf65079b765255e2240c30f174b1f9aff6a17dac https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-nk401Daqc_bfe98b5bWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.bfe98b5b43ee7af04f11950610f5abbcd94b924bf448b703b437abcd7fe240fb02fa3118 bfe98b5b43ee7af04f11950610f5abbc 49560519bd1ad245ebcf596fa867db44f5460a4b6e952393c222169fae3458c1 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-8xf01Separ_7e1f37dbWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.7e1f37db712a43703f998c79c5b3370deef17e778b1f595eb8627940a3a02fe00c901732 7e1f37db712a43703f998c79c5b3370d 7e4ed04b95f0b07272223308b8e49db2fd64b144db28d5322b51ae879f58f8aa https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-p9k01Remcos_36bd0488Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.36bd04882e53e711570fb7f207a1fe4a5dd410b4f5884ecd29a60cfa22d661cf123b31fb 36bd04882e53e711570fb7f207a1fe4a 318d9318e4e204f378f8ffeb7d831a6f251d6ca4e827f8e48449be0812e2cb25 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-8vr01Remcos_2dc51f4cWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.2dc51f4c6a0106fbaac46a9f56775526b3c7db86125866dcb99e934c62f904f868cba894 2dc51f4c6a0106fbaac46a9f56775526 1623edf8271a3a77d74658adcf67d5f99f6102bf178c0665dd68bc932b0c1228 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-vvk01JoanapWindows This strike sends a malware sample known as Joanap Brambul. This malware is associated with the malicious group of cyber activists from North Korea known as HIDDEN COBRA.The SMB worms spread on the local network and over the internet by brute forcing systems using a list of common passwords. The RAT that is included with the worm allows for the capability to exfiltrate data as well as execute other commands.4613f51087f01715bf9132c704aea2c26b1ddf0e63e04146d68cd33b0e18e668b29035c4 4613f51087f01715bf9132c704aea2c2 a1c483b0ee740291b91b11e18dd05f0a460127acfc19d47b446d11cd0e26d717 https://www.us-cert.gov/ncas/analysis-reports/AR18-149A
M18-yvk01Remcos_109eddebWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.109eddeb3707321d7bbd629f4bf41431a85b1d865df8a479140a493852257d116cee11de 109eddeb3707321d7bbd629f4bf41431 1323533b1caa1537b50c0ddb43b5f692901d2bb3b38f11e0fb380d72149ef53d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-abm01Jaik_bc86559bWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.bc86559b5c592c358f360f035591cec63d5adee069d8a67d1ab564479c9d31c722738d5a bc86559b5c592c358f360f035591cec6 70e53202023b2615c92a7987590161ab2a18410e827a6535ffc1df83eec6821d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-b5501Remcos_8a7512a8Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.8a7512a83bf33c85349c113e436db50610df651d66b4a69ddbdadf2932daba75d05929d9 8a7512a83bf33c85349c113e436db506 2a67165161c7cbeed1fb43aa27b770b627b0eabe7a647387382fa4cff0acbaa3 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-yhz01Separ_314c0eaeWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.314c0eae505fc391d7a90ccb08a29d12bcbbb9dafee755116b91581a627d1d5e1178cc51 314c0eae505fc391d7a90ccb08a29d12 403d91b31d44acb4a67b5b0dd7679971bedc722244f1b705adfa095632d18cf3 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-8mg01Remcos_30bc8b7dWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.30bc8b7d11b226d2dd323b7aa0929460c40510252ed9e66d9b2e02b69b9c44660756b3ce 30bc8b7d11b226d2dd323b7aa0929460 04bb108e21aaa1b3832e2ff483237559c02dda2ddfc03e2b56e7bc818614d0e4 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-f5n01Jaik_86aa2987Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.86aa298787da8bcc7b2e729a4e2d44c877f5f5d2830ad109a6186e66f2375974b0aa3b36 86aa298787da8bcc7b2e729a4e2d44c8 709da9c32f18848efbd955bef0d1717a5adf56435a3bf0d1fdac34aeab25b725 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-mgq01Tspy_8c792b50Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.8c792b5065c691d1a19ce7eab370608938ac6ca5a3b5d3b40d17b153278185d09d245de3 8c792b5065c691d1a19ce7eab3706089 4ed4a8509a45db8c5ff416c738cb25a877b47bd1066b30b1c611644f92b051d6 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-i4i01Remcos_cac90d1aWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.cac90d1a6c0364f6f627a854afd91b9bc7f24c43d266da2cde3b607a661a03778f659a29 cac90d1a6c0364f6f627a854afd91b9b 07b31ec3eabb4967f7ed54d437de2d4a3e9271810f4f9c2b238bb6ba7829f180 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-n3i01Separ_265615cdWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.265615cdd60405bba5e7988d4f1e5de3346892cbc0b89206b7b97e68af4ce226cf5dd825 265615cdd60405bba5e7988d4f1e5de3 3ef31d4a0bccee0994a4ee525b679da1fd2664f3d96d20371297f6f6645a2ced https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-1v101Daqc_c1c74670Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.c1c74670b50b93e76f57302032f95a03590aee639deb67a6502c2f4e730c6ec266f7b10d c1c74670b50b93e76f57302032f95a03 2ce787599acee9837624bfa274d04e659ac1fba27a200e451d8369025a3c3b02 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-gre01Razy_8fc22ae7Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.8fc22ae77ee3d0e766ed9ea5a920bcf2b8963bd112a795b74d2e4f0e64a0bf8a6638e2fe 8fc22ae77ee3d0e766ed9ea5a920bcf2 63d3cf1bbf4e3352033506d7feccd4366361b0ccccf6efc7d1bde38593f396dc https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5i001Tspy_b4d910abWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.b4d910ab9ab3ff1a88dbe0b013751f608c0c60a9a6c75a7ba706a7894b316f6727ef8cf8 b4d910ab9ab3ff1a88dbe0b013751f60 61847bfbc04c932876fa453db940c2ae04c71476f4852f1799fd1de2e8a649af https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-4xw01Razy_1ef4bf8aWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.1ef4bf8a247700a091b55357b8fe68e9b90b98fd81f42a9fd9e43105a7b798e4ad0f9a0d 1ef4bf8a247700a091b55357b8fe68e9 751269d78fdf8e244295d87a76a839b15672f5d0e6e7bc62cdd31f1deb5c0fa5 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-pnj01Razy_852e1db0Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.852e1db08a57ab9b4e50313e9a462414d4c4a09e2b222ad4dcd74d6745adc2864fc6bb71 852e1db08a57ab9b4e50313e9a462414 2f670ff3dd609f23f4c7213a20e5f87e01d1895c08045b7ff70b746b11d7797e https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-vtk01Daqc_b84e4979Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.b84e497993467c812119a4534a999893df14589d6c462ff0aafc4501b020f4a655066a1e b84e497993467c812119a4534a999893 8ded9c78e10011fcc6fd9c7501b54510d64be29ea7a9512018d22a43f9e3b5be https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-c8w01Razy_770ce5ccWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.770ce5ccc6e26f924d16f533fc65c160af80ff604755955344afd52d4226ded09f1d7334 770ce5ccc6e26f924d16f533fc65c160 79cd4f4accadc3edcfa90b11b19e56fa4a6a6a5150c3e2f9a467154523ff1870 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-sfj01Daqc_5634b45eWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.5634b45e1adf58b7cd1f82d75caf93349d251f7a1f50966ae7bd975748c68ec310a37cfb 5634b45e1adf58b7cd1f82d75caf9334 5309ac8962997edc05e88bc99f259d4a0788f08ed0ab92bfeb2075410a0f53ce https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-jo601Remcos_f7acd977Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.f7acd9770fe84c1a04efbb14aa04f9ca33f4a23b9c1e75e6a542d63cfa5f263acc3297e6 f7acd9770fe84c1a04efbb14aa04f9ca 2bbed3835b0efc4efe05d8fc806ab9fa5313202d566d18060542d23a3cb80fed https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-xxv01Separ_c0d66ee3Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.c0d66ee3d32f5aa2b0189a38a23f6716fdfbfc7efe5825bfd872cc9a4da07f52dc9329fe c0d66ee3d32f5aa2b0189a38a23f6716 64a76e220bdff00633c5cd8e0282ec61836a60cf6b2f9f1b135ce3a3b040ca52 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-87v01Separ_bc70776aWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.bc70776a84a8f2868f066f611e7513b10b0571f38ecfa2feec7c22193ba1cbe6c956ec50 bc70776a84a8f2868f066f611e7513b1 7eefcb90a82546e4b71895a11a95a8dc38f49fe4713fa7d7a52ec68f511533cd https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-huf01Razy_1822258eWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.1822258e215748efa59249ccd9b8d7182818666cba0196ab32e8e3ad001183084ff936eb 1822258e215748efa59249ccd9b8d718 3f0ce29604df46a478183cba3fe075ac92fbc70221b7163833c9bab62b216aae https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-lok01Tspy_f35a2fd5Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.f35a2fd559a6e5dbbc16470e456ccd42c748ffa5eda58b435aab73616f7cca83539d5c6a f35a2fd559a6e5dbbc16470e456ccd42 6dba2d229e5170601495ae923bff1f46ec581b6d858bc2b19a8db3ed210b8791 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-g2401Separ_aa52e05cWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.aa52e05c3b7092f703c29a02f6e1a2b1f1bd896e9a720c4fdd86e451ced644d89f5a6b96 aa52e05c3b7092f703c29a02f6e1a2b1 6d7019e4f1e02713046fedb121d15c9a423b8502e792ff42c7896c3b4d9f826d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-odr01Remcos_ff1b5b41Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.ff1b5b4172ffd2d88caaf0bede2fd0b53bcecd9e21c2bbfbae644c4449d80569cd6a9f69 ff1b5b4172ffd2d88caaf0bede2fd0b5 0913592e52b43087d0f2a23700e5c625c0cdd4d391354233dc692a5477416ca9 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-5e101Razy_9e532016Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.9e532016943c12ce37d89d686a2f358d0ca02cdc9fc3bdc5e783e3cc9cc72a68217de386 9e532016943c12ce37d89d686a2f358d 385ebc30d9bf602ce39b8b2d7d09787fd859fca5391f7e282f9a57fb1a7792fc https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-nil01Tspy_1027a4eeWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.1027a4eedbf352b34a789f7e4b914e42e81774534c4ffc7ef34d146681419da4ffb1e450 1027a4eedbf352b34a789f7e4b914e42 d454f075a83bd4d4541ed25898a4cb8ac5ef903b5b4269790a911450ff0a76ff https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-sg601Remcos_2cc1c37fWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.2cc1c37f81d03bd4dfb765878bd9176df26f3b3ea3bb26632315019bda69ea5ddaaa7233 2cc1c37f81d03bd4dfb765878bd9176d 074dcfd66274bec7d3ac3e23fd77d21baca17efa497eb94d748e46add97e8c27 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-g2k01Separ_f6e56e09Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.f6e56e0973621360d441533dd2a31e1094932a5583b61cfd6338e0ba4816bcd894fa39c1 f6e56e0973621360d441533dd2a31e10 5b4afe3563869522e85cfab2ae3d2e57a55f98a9c565c915dac81aaa0282deb4 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-azj01Separ_4cdebda9Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.4cdebda90fe89c3f23ce1eec5919eb3b1c978d651e981c162fd79c5332452b93551ebefa 4cdebda90fe89c3f23ce1eec5919eb3b 81ca06e244e541b585ff763df011560dc2b58eb7ea434eeef74439ca8bfd01b2 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-vc201Tspy_ef3b8521Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.ef3b85216f6751f21c49496e1d4ffbb35e1cc53a3f4265dd399a0125c06d540713d6a330 ef3b85216f6751f21c49496e1d4ffbb3 9617d56a748b5f29e7e97260fb61ee99b9035521ec4e4d134fad9411e74d950b https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-kz101Jaik_ccf99579Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.ccf99579e8d70aee6f16e8b947da4e9175d5a33e2826374b00a58eae833e6e5d7fc0c7d4 ccf99579e8d70aee6f16e8b947da4e91 58a9f5613ece73717b322ab7518d887fdd391011cef6afbcb311eef74b677df9 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-nn101Jaik_da7f8a23Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.da7f8a235f2621c19ce13be10733f8949b3117f596701ea8004a50e689c2e8045e652025 da7f8a235f2621c19ce13be10733f894 49646325555c83e70ced5a1b4b2ef7f128ff912593c95c017703f332c83e0914 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-sau01Daqc_bdbf6867Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.bdbf6867142ed7968a4fecd3d086dc3c07711e892ef5f567641b33879a5049680176f278 bdbf6867142ed7968a4fecd3d086dc3c 00c8e16c0153a40945b77692bbc28d765e6fc1a5d7100ff67dc7d4a3cf7c250c https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-yba01Razy_2ca15a19Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.2ca15a19a85b94c2fd06acce0d8ae7b7c4eadd3e9e5c42a74a458e259584ae18a794db94 2ca15a19a85b94c2fd06acce0d8ae7b7 72f3289960744faf657f7f84e98d8f1da3576451aa23f3813e00fcf956920cb1 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-y0r01Tspy_2b67d553Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.2b67d553f679e95a48f903ec411a8ecba912b436a429994f00098c33e048e3abbf10e121 2b67d553f679e95a48f903ec411a8ecb 5b037ffcf5d7627fd5e722fa9b24f9a7108fd65069f47bed25e0c72618450774 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-4qt01Daqc_ce1838d7Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.ce1838d7f4c624121531c1a477f5ca9465ac7ee69ca8d1a222e71d6530ef055c0c9cd917 ce1838d7f4c624121531c1a477f5ca94 8f6841a0f19f1626723f297a3ada097342ff10b6f4242e48e3b14c8528381de9 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-o7n01Tspy_5f5e7b99Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.5f5e7b9977ae7f7dad1d4f7a3cf4259e646fd906d3c73ec7a41c2ce49dfdf893efffb8a9 5f5e7b9977ae7f7dad1d4f7a3cf4259e 505086a1799dc039d72a0e691641af6660ed9b2b97e7ff9b1379b59971fc9701 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-ojd01Remcos_d3af8755Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.d3af8755642361b722f88c4ebaf262a22277295b29923d5d1a1e6fc40cf633bf7775fa94 d3af8755642361b722f88c4ebaf262a2 31aa91dfa01203239b8aa25649c05a084e62de8814e101c24f3fbd5f2d234014 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-fzx01Remcos_af9311eaWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.af9311ea5f2b62e9a688c948937fc328ab577dd53b2767d8a22cd7e7ed87d9b673b5a8f6 af9311ea5f2b62e9a688c948937fc328 13fbdc096406f0f975d02a160448d98fd9d49d3ce7d338151668001017dbe397 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-lac01Separ_b7823814Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.b7823814d99ad4e77e123894595172f3c7c4d8deb7bcf29ffa017b08d1f04fc141974dc0 b7823814d99ad4e77e123894595172f3 6df2b4fc352d822b4df9c164e7282fe387adc6ab0b7e036a12f4c3c57641564d https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-g6201Razy_6d423ea8Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.6d423ea83935e6a3b126bfe2e17baeec4f1cf18a416ac31214ef02e5ebd4299fada369e7 6d423ea83935e6a3b126bfe2e17baeec 419c206b2701529e1475fafde37adad222eceef28a5b6b0ba1e34232ec3e95bd https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-nkg01Razy_be69e631Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.be69e63115c667377129c0d74ffaed567b68702e0a93c1f7ed522570ead73e34eac249d9 be69e63115c667377129c0d74ffaed56 058f2a286b9dbce25b14efa7a4321505d443a97c11d773024b2e222c54894dfc https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-fhb01Daqc_e8641a7dWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.e8641a7d2481762eaa5bcb1d9915e87e803fd111b00b9ad917910aee269b5e523c84def1 e8641a7d2481762eaa5bcb1d9915e87e 011e0b204c466885b489a18062a763a3eab681d1f6d3ddc7584ad89429935664 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-n5001Separ_38e3b021Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.38e3b021f5cac0bc19bcdd76f6228771a6f23a56b70ef3ed327277bfec5eaf37d1505d89 38e3b021f5cac0bc19bcdd76f6228771 61540809d55eaa23ba0ac82ff4b530823c93fbc8e7097ccaeb8329e0eb1e48c1 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-27801Daqc_bbbf640fWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.bbbf640f1d981f1b2fdc42628612d8060f860e6692cef9ee44d371463c45ea10b0639a1f bbbf640f1d981f1b2fdc42628612d806 4278d609c70419e054b5d514e847f05d9e854a6f67c8ca4a17ce02f14d18980e https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-2gy01Tspy_47059d31Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.47059d314065f5b68bb4c6179394278a2f9675cdda5726941aac100d181b32b20def18eb 47059d314065f5b68bb4c6179394278a c421dd4f20f4b7d99e740352db8e727a0b3c88c34ab2053849f039b508d73f71 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-fal01Separ_f4035d64Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.f4035d644c785b3aab9684926a17ab88a42cb72f1d10214eb9511e3fc9aab9d80dfc01a1 f4035d644c785b3aab9684926a17ab88 82a5963922e08c70521648fbec9849f621bfd0d25b0d6193b1e9a39ecab05111 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-jkz01Razy_d7944f0aWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.d7944f0a4c0f733c3e45ae91a62470a699f11d422b648f05a94b3947880e1c8ea323f9d5 d7944f0a4c0f733c3e45ae91a62470a6 61ac9dae3f72b71a6128af5207f00d2e48243423596fde881811e5525a53d509 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5fi01Separ_d402dbafWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.d402dbaf1fce836507f18abd908029adc02ae3e2879af3346478fa6c48e21c5dd8dc3222 d402dbaf1fce836507f18abd908029ad 3f735ba16d51af841f5a48c9be5a2cb004df275c71cbbdd3497bfe34460f9c93 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-u2c01Tspy_712add83Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.712add83c12600d3f1fb1be0e119fc64b62b314a85157fd75b188cbd5cad1047886bc0b1 712add83c12600d3f1fb1be0e119fc64 0f11515c0a57068b0636a8a4283b8e25bf7c72fe55c486fc108a8cbf02b50c41 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-68i01Razy_fb3acc99Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.fb3acc99e26c99683a8a4562456eec3229077dd1c20ee7fe166698b976ff0894b39ecfc9 fb3acc99e26c99683a8a4562456eec32 608b6dad966c287cdb214acc6883a7bbbb2a0bb12f0dae2a4eaea451186aa899 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5cy01Separ_c77d513eWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.c77d513ef7ecc05945527cb254d9a26fff2dbcae743a500aa097569c12c45048e96db904 c77d513ef7ecc05945527cb254d9a26f 79789706985bcb5afeffed63805994cbe09966da0544e18a0a059a57064d7039 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-ea401Tspy_2878bfacWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.2878bfac1ff5c4c8568ceda74fc53b53d70597049a7f64502e9bb2eb76f2f10b8594a626 2878bfac1ff5c4c8568ceda74fc53b53 7e113d90f3f9a6dff9a99479d7377ee1b19fa3534ba3874c98495cc8b5ef3a3e https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-uxh01Remcos_5cb5a216Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.5cb5a216e2674a9b483481da7283d6ac051aab897792786291922dbf1107d4c305850c74 5cb5a216e2674a9b483481da7283d6ac 2a0d2df8c466bbe5bf538e9745286f124f3ca426d3ece80fbb675863281c46a5 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-zm601Separ_80ca117cWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.80ca117c026e41e60957db0fa84760acf8d8815cd04f8e991f9adffbc1ad2100e9326d69 80ca117c026e41e60957db0fa84760ac 6f13c5e83ae42cbb755a44c3c45075043983d0eba2846b63442471577bdf6a98 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-6mo01SmokeWindows This strike sends a malware sample known as Smoke Loader Trojan. This sample is the Smoke Loader trojan. It contains and installs plugins that perform various functionality. These plugins, read database files, search directories looking for files to exfiltrate, inject into to steal cookies and credentials, steal credentials for ftp, smtp, pop3, imap, and attempt to steal TeamViewer credentials.2c99759a02ca32d1a7e8afa09130633fddf98971664eb7b554c86b4ab2e2ba7d469f893c 2c99759a02ca32d1a7e8afa09130633f b65806521aa662bff2c655c8a7a3b6c8e598d709e35f3390df880a70c3fded40 https://blog.talosintelligence.com/2018/07/smoking-guns-smoke-loader-learned-new.html
M18-rxi01Daqc_675d43c3Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.675d43c300c77e2267e9540b485840fbf0507a3f4c4850fd4e0770f88ae8ff7055160d28 675d43c300c77e2267e9540b485840fb 7f2167ad8d2c8523477e5c89bff7e43c4aaa63bb67738c99f3dcf699f5d23878 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-8hc01Tspy_e3cca419Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.e3cca419668ac9572b1344d4fd2b1e241264285dfdf18ba25e3a194467be29da3ac3281c e3cca419668ac9572b1344d4fd2b1e24 4ec361e23ab8e05a13532c2c669bf8a37adb1e918124b308f83e3ed59a4c2abc https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-xti01Tspy_3b9e6808Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.3b9e68088742a591d2db70d1f2fc42a235c9d2e461fecf7fc24c6657568b201ac1af78e9 3b9e68088742a591d2db70d1f2fc42a2 36f23f39d5bf737e10c2a253f046741f530ebabe20216ec535b3aab4bc9efe5c https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-35v01Separ_1efcb8bbWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.1efcb8bbe9444303d9f0d88fa37e4ad0c95c9923997ef30d6959e16d0fa2bb425b72da1f 1efcb8bbe9444303d9f0d88fa37e4ad0 675402f0a4a31c59011e4356207a3189b171f0dd81b0117adf59e6e120b90295 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-k1c01Tspy_25d0181dWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.25d0181dd7f067ea9955f8e997760782a6b78481af9d4c3200006072374500fc907504f6 25d0181dd7f067ea9955f8e997760782 b29235fc7596b5ba81c8edac236b03e8ab86b0457297151b4f410277939f12ee https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-gtj01Tspy_820b7cdaWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.820b7cdaeed2efe1041a4fa1876b8e0bd612067caff14be25276bc773ac1c4f3806b2bfe 820b7cdaeed2efe1041a4fa1876b8e0b 16ae2ef60aad481f1a340a9e6e7421258a57e7cbba46d9dca8c1dc063a699ef3 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-6sn01Razy_ba67c755Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.ba67c755457340fafda4fb514221d27edcf16ff716ecac350b3d3ac10cff9ea9b4c2e9ac ba67c755457340fafda4fb514221d27e 447ab1be7b297d6b592cbad8f6c35cb269e25c817d6900726fd131234427b898 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-zpu01Jaik_b5c2e996Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.b5c2e99683185f6db4548c153ec01160434cf38a3d33750589004c2dabad67b2fb92fb75 b5c2e99683185f6db4548c153ec01160 2ae2fcade0f57faf7fbabbde56e60ad080df9011ed70dee957aa7fe13a961c80 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-lhs01Separ_0b09448fWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.0b09448f9b70810945c3798447b31c5e68c6a7cddea81b0cdffef6c75f0a0430ee25b259 0b09448f9b70810945c3798447b31c5e 4f7b768262e30ac52c97566a03646de84081ea148c932aedb84ca5bb46a10da0 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-57t01Daqc_7ca36473Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.7ca364731260037f8b69a8b7f7a790297fe3bdb9285bde2593be0b94bfca4cb92d689e97 7ca364731260037f8b69a8b7f7a79029 273c7bc44acc510531dafb34a25aa0463ce28c262c360596f2387f0b3067c0fe https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-opc01Separ_fa7a309cWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.fa7a309ccb4375436323c5ce3219b5104e28ca0b366cea7ba8c47f25252dcd684954a9db fa7a309ccb4375436323c5ce3219b510 21d006b8f12a6b2e3126f3a6cef4f621c314a9dc21be6ffe51950f816f6a88c9 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-zvo01Tspy_bbe41f65Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.bbe41f6581678751f083283ab4d161c31ed6859048275770571fcca5f7e124e317346efe bbe41f6581678751f083283ab4d161c3 574e0c9876b887373cb06e5873f99decb58c10e97d87f930b86d4156a4585e97 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-z6h01Daqc_27b8967aWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.27b8967a92f94ebc7f1d3051911b23adc3207eab96abe3e1eb4e727a97b5270c24aa2d51 27b8967a92f94ebc7f1d3051911b23ad 331dd1d9b1f53c72bb628913a0d173eb701cdf68de713c1b94bcfef1be8be8f1 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-lox01Remcos_366eef0bWindows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.366eef0b809358cf146845368221b55043f8776fde1bb3aadac90d116cd351ad37dd741b 366eef0b809358cf146845368221b550 1a6c169c82fd99a1b607100c42cae0c39f964ea2dbe6e0216479171d479275df https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-x0y01Separ_58d95ff8Windows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.58d95ff843efc2de412591d591356eea9ffb3cd4d7278e38bb9f21fe8dfd980013813486 58d95ff843efc2de412591d591356eea 09ebe700700a0e5e49d994093786f6c1bc9d3c400edc94b31693ef5961250d81 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-d1d01Tspy_b7ceb64dWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.b7ceb64d7506c15252e24e0e9827e854576408a180dbb682f08ab47e361d5d205d06b090 b7ceb64d7506c15252e24e0e9827e854 3651567230a6f02d69659133e1e915d87903994f20ac3108310c214d9cab163c https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-l3p01Jaik_f8438bacWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.f8438bac59be6828944d4b226e97780ebf4eb1ccfa22b53898aff5942984d8f44c1aefe5 f8438bac59be6828944d4b226e97780e 5c20c7e6b9aa1dacafff644088c71388374329a9e0a218fdc944fb802fc5928c https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-zhv01JoanapWindows This strike sends a malware sample known as Joanap Brambul. This malware is associated with the malicious group of cyber activists from North Korea known as HIDDEN COBRA.The SMB worms spread on the local network and over the internet by brute forcing systems using a list of common passwords. The RAT that is included with the worm allows for the capability to exfiltrate data as well as execute other commands.4731cbaee7aca37b596e38690160a74980fac6361184a3e24b33f6acb8688a6b7276b0f2 4731cbaee7aca37b596e38690160a749 077d9e0e12357d27f7f0c336239e961a7049971446f7a3f10268d9439ef67885 https://www.us-cert.gov/ncas/analysis-reports/AR18-149A
M18-m8s01Daqc_9e3c6308Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.9e3c6308b81f00c5da7ab398bec6a00e5dcc57fa164a77774f7632e0bcb440a1185e47a3 9e3c6308b81f00c5da7ab398bec6a00e 748374631d589f14126473dee5faabbb03de6f436be9ba1f4e9db4a43ad5f335 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-e6l01Jaik_9f4b91daWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.9f4b91dafe4b05f411ad8a873d6aeca9fc23ec7b4eea52385fc57d31e5bee313c23f4c18 9f4b91dafe4b05f411ad8a873d6aeca9 e35cda507a9d6fc95a409f8e9946bae206a02063d51296017d82382ff28ead88 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-2wp01Jaik_c7529b80Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.c7529b808223a545a874a8962a3c5881fcf13ee1db04260473d886f918bfc6953c3d1e6c c7529b808223a545a874a8962a3c5881 2bab01741cc5796155d61543a7efe5cdfa96bde3507f1d85ea2c96ec0f1f7c0b https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-db501Remcos_5a0f9da3Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.5a0f9da36edd261a7a1fee7fcf5bc543d1eb1bb967cd95cef2c1ceb4ddfd68a8f7bf3ae4 5a0f9da36edd261a7a1fee7fcf5bc543 0007bb868ae54ff5be81cf04d7ff4c38c1d36ee18fbc3ee166d1f6298b8e4176 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-6w701Daqc_7ec491e3Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.7ec491e37e86851c283b115b6d08390fd0e332cec5e0b3938aa9fedaece3f01dc5ec6c9d 7ec491e37e86851c283b115b6d08390f 2a63210f0832f22ff67bc5333c3e2f8e327c6353920d6d687c1dec8558e50a83 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5um01Separ_c56ba0ecWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.c56ba0ec71222ed7354dfaafec5cf7664922a8e60d98cb595d7e854355e9e78bb1894a61 c56ba0ec71222ed7354dfaafec5cf766 7115ea1ab97a7187b2a1bb6936fe3df44bc754ec06f70c9f880d9787e605ea60 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-4t901Trickbot_742a42ccWindows This strike sends a malware sample known as Trickbot. This sample of Trickbot has been identified as being downloaded by the smoke loader malware Microsoft Word email attachment. Once downloaded Trickbot acts as a dropper and proceeds to download the smoke loader trojan.742a42cc9d2daa22f4f9b135ea1ccb92d36600457c22b895cb559788c47eb2f360e40837 742a42cc9d2daa22f4f9b135ea1ccb92 0be63a01e2510d161ba9d11e327a55e82dcb5ea07ca1488096dac3e9d4733d41 https://blog.talosintelligence.com/2018/07/smoking-guns-smoke-loader-learned-new.html
M18-7i001Tspy_be343064Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.be343064d87ed490534d474abb44452e98509a6a5f46f36994781ab6a0a9e166d949f383 be343064d87ed490534d474abb44452e 2ec87871a0a83639fc814ab764d69147f2dccc13cdcd6dd6af4a9aaaebdb5283 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-sgs01Separ_814c5cddWindows This strike sends a malware sample known as Separ. Separ is malicious spyware that collects confidential information from attempted logins.814c5cdd8a7a6540fc6ffb4e5aeab89adcbea0d39db4b4d665b27128c25adb247c4efad0 814c5cdd8a7a6540fc6ffb4e5aeab89a 14c4a3fd18cad81c55ff4aa192803b748d8810900602c89c26114eb80c9db988 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-8vy01Jaik_d943da9bWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.d943da9bc7139ce42c8737eff5f226b992790edaca860db6a99d1313800efed1c10f28d1 d943da9bc7139ce42c8737eff5f226b9 af9f5370fa6758440ef40215c4412b1b266c33effc541c97766b7c6f4dd076b8 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-i4i02Tspy_2db07529Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.2db07529e7d579ed4b9be48ea488948d3101fab0de7ccd9843f3b27a85f721a7c4b5be93 2db07529e7d579ed4b9be48ea488948d 1d8cda39dcf193f04d41ca364e038ddf7ae51ff5cabc56c687a38c41773b5d95 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-m7j01Daqc_877b2a87Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.877b2a87a028f7e6abe456d3b859699ba4ccbc5d778ef3ef1d5bbd6a50d49162e060986a 877b2a87a028f7e6abe456d3b859699b 36dcfa6c8cb09c85d25b9cfc4ff655a6b7d4ad77b4f75107734e956b2c0c4c52 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-cr601Tspy_99adc1caWindows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.99adc1cab732d831e9e6c4108c481601adac5cabc9a2e4b979770d4335a9c235b4de7dbf 99adc1cab732d831e9e6c4108c481601 19c97ae2501ccebf5e2e4e5f88d3323141aeca73e9016d69eacc11f79fd4e803 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-her01Daqc_77f5fe2bWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.77f5fe2b9c93c33551192371f0f59de5d0317c53e8bd51c97fa96e5d438bf3568cad59c9 77f5fe2b9c93c33551192371f0f59de5 1bc4781824a84300edc2f1fa97e42cddce96b273c09fda794f9e30a44ae4c6d5 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-bt601Daqc_c211137aWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.c211137a09d0f7ebdcc63ff77d5621094d38191ceb366062f5d577da76d6692fd216a008 c211137a09d0f7ebdcc63ff77d562109 0681fbcb805b64a7a85ad6883e8c66af4d1cbd0cbc983e8c7c57868885c8eddb https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-ley01Daqc_d91db0a2Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.d91db0a2ac1a5855259e172b1e67106c7c035a516fe3c9862b90025388bfebd865e87472 d91db0a2ac1a5855259e172b1e67106c 43957c1ffbb1ae837e2fe6d97603fa0c686f131beebe5c8c17e9c384bd2e5d9d https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-i4p01JoanapWindows This strike sends a malware sample known as Joanap Brambul. This malware is associated with the malicious group of cyber activists from North Korea known as HIDDEN COBRA.The SMB worms spread on the local network and over the internet by brute forcing systems using a list of common passwords. The RAT that is included with the worm allows for the capability to exfiltrate data as well as execute other commands.e86c2f4fc88918246bf697b6a404c3ea9b7609349a4b9128b9db8f11ac1c77728258862c e86c2f4fc88918246bf697b6a404c3ea ea46ed5aed900cd9f01156a1cd446cbb3e10191f9f980e9f710ea1c20440c781 https://www.us-cert.gov/ncas/analysis-reports/AR18-149A
M18-sr201Razy_83ecaa28Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.83ecaa28b664cd9b4a9636b78e34aab4dc209848c330fe83aeb0bff63aaf4d6ea1eba1ff 83ecaa28b664cd9b4a9636b78e34aab4 5d97798b9fbc7692c9dbcfb0643da0de491b36e2e0cf51060254a2dd6238ea62 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-x9l01Tspy_97fce230Windows This strike sends a malware sample known as Tspy. The Tspy malware family remains persistent by executing upon each restart and boot. It uploads data and receives commands from C2C servers.97fce23091cfb62862ed568a7458f6c7a6e386fdfb3b1031b4fb466d76c7eece6d96759f 97fce23091cfb62862ed568a7458f6c7 4f44cbd14878c3f8d6415c0d7d103224354323d624ef3e0906f3695d3c9c06e9 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-yuo01Jaik_323aa456Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.323aa4566fbd6984317d408c2d54ea18af633cc4777b7b53e707b29a66afb91b48b7e31c 323aa4566fbd6984317d408c2d54ea18 3329a848c569b7048f60a733cdf217d84baa1820fb4c1c423662e799fa1b9331 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-jc001Jaik_54b6c389Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.54b6c389cd0e05a8b50a30d1730e56e727b56c6cccbbab0a9d51cc548c83e6c9dda3a7f9 54b6c389cd0e05a8b50a30d1730e56e7 622fa10ffe94bff99be638991472cbfda178d186d6d95adc2bb87c39d2f9c1fb https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-39101Razy_4c2f3c6bWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.4c2f3c6b5825579d773d9446cbacef1b5d7343993a57da3138ce9dcfeb42ac791c4a14b1 4c2f3c6b5825579d773d9446cbacef1b 75bdd5417105c495fd111bcaafcbed1f37a1e77c64d788f5884df5018c82a4e6 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-39y01Razy_4cf09dbfWindows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.4cf09dbf2c5d7de4c294831ddda9d8be2dcaf1de777e1b4c52975d32fff2c182bad1c251 4cf09dbf2c5d7de4c294831ddda9d8be 0c1609585500a71c55999ca82ff617cf209e09ef640d35d8b334bc0949e1f5c1 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-ve001Daqc_84f08315Windows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.84f083158695f8d627fad1a73a314a82e12e8cdeaf8e3db11659cc9829358a5e26618818 84f083158695f8d627fad1a73a314a82 2a9be0b39fc7f3cd3214ba6854699e6857ba853b175b98d0fe10e151dbce9f4e https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-zwl01Daqc_d6d6da2dWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.d6d6da2db3369c4ebf85e06506c8e0ef1ff59010b53316a2283084f6ed66089055865cd2 d6d6da2db3369c4ebf85e06506c8e0ef 87e4364c1075f01bbb5d2e71532eafa03319925cc76a81175f1939e865d73a22 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-s6101Jaik_812a4d34Windows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.812a4d34669a533ade69d81db596dcad4cbc5e3e8ed995a8b996cbe7b6296f7c2fc6d0f1 812a4d34669a533ade69d81db596dcad f10fd36eb803b00e3173b20a2c19fc99a82a51fdecb7eb5b41417ca8365a98c4 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-wqa01Jaik_8ecf6d6dWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.8ecf6d6db0da86c8d8c9e5a5de32a2e38105e2a86cb373fd9e924392fdf97ceaab4cb6f4 8ecf6d6db0da86c8d8c9e5a5de32a2e3 db5025e926aefee22c19bea499ed4e79c8d28dac511ac82016823a34ae9f20b3 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-2da01SmokeMixed This strike sends a malware sample known as Smoke Loader Dropper. This sample is the Microsoft Word email attachment that contains an embedded macro. Once executed it initiates the second stage of the attack that downloads Trickbot.50b1f956d89248fbe3e69e37489157fb2acce53e344df33fea8553888695baeeec6ea647 50b1f956d89248fbe3e69e37489157fb b98abdbdb85655c64617bb6515df23062ec184fe88d2d6a898b998276a906ebc https://blog.talosintelligence.com/2018/07/smoking-guns-smoke-loader-learned-new.html
M18-39c01Razy_76cbf2e3Windows This strike sends a malware sample known as Razy. This sample of Razy has been identified as a generic Windows trojan that collects information from the host, encrypts it, and then sends it to a C2 server.76cbf2e32e97a590d1359a100d468bd12bcc40edd54eb422e2c03d3daad3b15ce4448cfb 76cbf2e32e97a590d1359a100d468bd1 73f6dee570c360d0b2c6b4f1669aadbe1fda320838f80c8ffa030ba3b6f61738 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-5nz01Jaik_92e156cdWindows This strike sends a malware sample known as Jaik. Jaik is a botnet that communicates with external domains as well as injects code into other processes, can perform DDoS attacks, and generic credential harvesting.92e156cded6c1d9d89b12f46de8b316358c9f770c3b87e1dd04daba4df97eddbbeb3b20b 92e156cded6c1d9d89b12f46de8b3163 07bef3ef1d45fe1bbc7c16f7e7ad211e1e81264cf9ef119232d10bfd2245e778 https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-9hi01Remcos_889eb494Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.889eb494c169114f84ccc2f06aba478c4979d865dfaf30a299e20a79c2477bfc7599f314 889eb494c169114f84ccc2f06aba478c 2d834a721aa72e59378d795f16b179e6cc8fc0040441d72b293f19d863cd22ad https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html
M18-0tt01Daqc_fed035abWindows This strike sends a malware sample known as Daqc. This sample of the Daqc trojan slowly exfiltrates sensitive data to a C2 server.fed035ab67a413d0cc77c74644d712ef4d898a1897370572274b51677ffd2d6be41e5658 fed035ab67a413d0cc77c74644d712ef 0a0c092a8a390432b9b31b8d7cc9b4780fad2b8878d0bcfdda09f7f9322b1004 https://blog.talosintelligence.com/2018/07/threat-roundup-0629-0706.html
M18-o5v01Remcos_28a86190Windows This strike sends a malware sample known as Remcos. Remcos is a Remote Access Trojan that can be configured to have anti-vm checks and hinder the analysis debugging. It can receive commands via C2C communication like recording the microphone, camera, and keystrokes.28a86190f1c3aeb09ca86ab715d9843d6dc8d8abe780b011a50dfb1f11d9f31a6cd8854e 28a86190f1c3aeb09ca86ab715d9843d 10173267784ffb1934d59ce8bd822f9f9260bbc7420eeafd0c8affa8a62e840b https://blog.talosintelligence.com/2018/06/threat-roundup-0622-0629.html

Malware Strikes June - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-inb01Telegrab_defb8871Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.defb8871e9fdcf7ebe93b13b880e4cb5fa18e32e340a356e407b89c936e3e223c5dba3fb defb8871e9fdcf7ebe93b13b880e4cb5 2be87bc7e1cee08a3abc7f8fefcfab697bd28404441f2b8ee8fafba356164902 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-wze01Telegrab_0ef5ed96Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.0ef5ed969490bdff3569a83c25e41d518d83dadc890085698ec5d22d2177c8276ccf6245 0ef5ed969490bdff3569a83c25e41d51 6344f5fe0081dcff6345055d2f90e163ec8eb214edfff44fe56fc2d1ed14d322 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-zqh01Fareit_be42c5f9Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.be42c5f90ff696f16004e793428268c9a392c434053d5c3d5422a5bde857f0f4cdc0a507 be42c5f90ff696f16004e793428268c9 77f546ee92e7466eb3950374e5afad7af73daed911af1c17482b6ab0abb44500 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-8tc01Snojan_8fcc71e0Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.8fcc71e095d99a648216c94f51253e48d51543902baf615d75a2a60dcdaccd0c4d2fa533 8fcc71e095d99a648216c94f51253e48 e4b12046b82cdf5a6d30f08b11134e3e1caf321fabd2424f2c3873041eb1c1b0 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-hc601Telegrab_ee403d5cWindows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.ee403d5c57cf6b31c7b6762e5e56a6445fe0e73fc4fbf66a2b728c9592ef131b2a330f56 ee403d5c57cf6b31c7b6762e5e56a644 3e5dea4055b80ba3903b5ef0a4ad6130775337d3a068b721671e982ae4effda1 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-vn101Johnnie_4a743032Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.4a743032a09aed88ed00743bb0229b1c353fecb4fbc16f4bff3073434dbb0ef70a94e4ed 4a743032a09aed88ed00743bb0229b1c 6491f8c7234d1a92befb8eb01c8c7ff981b3a51cd5a4eb187e82911a01ae3327 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-t5u01VPNFilter_17e5e5c2Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.17e5e5c25eef807a08f02b8e435dda308c29ad07039b6d5b672743efc007fc07f4197b68 17e5e5c25eef807a08f02b8e435dda30 4b03288e9e44d214426a02327223b5e516b1ea29ce72fa25a2fcef9aa65c4b0b https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-x8401Fareit_621c4defWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.621c4def4ee408d388639ef19c67fe78879f7c99769f1904029fba661e2b9b7eba7622d1 621c4def4ee408d388639ef19c67fe78 aed6353688be80e822dd4d9c214d939632fe0db9930a3149b7bc865c9daa5b01 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-s2401NavRATMixed This strike sends a malware sample known as NavRAT HWP. This malware is a Hangul Word Processor document that has been identified as targeting Korean users. It contains an embedded object that executes shellcode with the purpose of downloading and executing the NavRAT payload.ff9eff561fd793ddb9011cf7006d5f6cbd71832af30d337d9a1dea0eeeba0e07e2535d44 ff9eff561fd793ddb9011cf7006d5f6c e5f191531bc1c674ea74f8885449f4d934d5f1aa7fd3aaa283fe70f9402b9574 https://blog.talosintelligence.com/2018/05/navrat.html
M18-r4g01lcloader_0763cb71Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.0763cb71c9d289a52d6531bb35ab5d37f21526ed688d148731e977ed8c528a05b967662c 0763cb71c9d289a52d6531bb35ab5d37 81102d69100b4ee91bd1247a22ed5959f2da57c2bcc064bdd531264284a8763e https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-c8n01Prepscram_a0bbcf3fWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a0bbcf3fa5446b937bf89b883188da2cfb5a4c95811bd77cf535d6254ed8f37edfcebaef a0bbcf3fa5446b937bf89b883188da2c bad3de4948f6a8c08555cd0224713fa7dac6c5845548ee4148cc486a6cd49adf https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-klh01Prepscram_be6e8224Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.be6e82248509e76690164d0354c6a8d299f9d442bee774cf4a6a9d78e4ab68a2f4c407fc be6e82248509e76690164d0354c6a8d2 98a1804a57bb382d7b68128f282c8186046e8d7ffa71f7a955cdeb16ad1c8239 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-n1701Telegrab_8bfa0da9Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.8bfa0da9838b906ca69119df51b82364487637baa92c4169b9c93f48b1e39e37d04fc6de 8bfa0da9838b906ca69119df51b82364 31dd4401c496ceaa8c5d75bc0e8f7f5a1b648f5e5942e074fbb5c683d9eaf408 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-52f01Prepscram_57cd0d9cWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.57cd0d9c3436c890a09208403ca68a33410bfb90d6a4fb48c41632befca0c084171eb6ca 57cd0d9c3436c890a09208403ca68a33 faefcf1da92c7c554dfef22e4f719f73517ae636af0b47b319635239af6657d4 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-hb201lcloader_01f7013eWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.01f7013e8530b7681fd3abe66effb59055b550ad606b5338123da6b5a2ef6b37b31ea591 01f7013e8530b7681fd3abe66effb590 1e7bfdd44e0e8331ce3f03cb37b6ae8f30667a4ab0fc5fa7b417cc9feeb4a7f8 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-jbh01lcloader_1b24581fWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.1b24581fa9cb47e902022fad78f861b837260c5716e8929977e486f203a7a9bafc7bb74a 1b24581fa9cb47e902022fad78f861b8 572fd355a7ee18c8c3b3f14f4864597038eb76beca81527128e4eeba0d630706 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-el001Fareit_779ecf07Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.779ecf07005a00769759fe5b49b7d1724e8a38e64839ee04d986b7832046ca2007943896 779ecf07005a00769759fe5b49b7d172 1f3f15ea6539c98148ef586de273b29d698986317354f2312e2dba6c4c5c5cbb https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-sj101NavRAT_0664698eWindows This strike sends a malware sample known as NavRAT. This malware is a RAT that downloads, uploads, and execute commands and keylogging on the target system. It uses Naver to communicate with the attackers by sending and retrieving files through email and attachments.0664698e08d34417e13ff94114564a51335eee8851492d8841c9b995702a2fc488b4bfbd 0664698e08d34417e13ff94114564a51 4f06eaed3dd67ce31e7c8258741cf727964bd271c3590ded828ad7ba8d04ee57 https://blog.talosintelligence.com/2018/05/navrat.html
M18-6u001lcloader_04074b2aWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.04074b2ad2282b2634c20b841d9bb159fa837b0e6a2e4dbac998b29487f91a229516ea1a 04074b2ad2282b2634c20b841d9bb159 0a5fe807dec1750e12787b96aa1fb5f8ddfc46f48d36af32049a2f1750ae9bff https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-n7j01Betabot_b5f34d27Mixed This strike sends a malware sample known as Betabot. Initially a banking trojan, this current iteration of Betabot leverages CVE-2017–11882 as the exploit entry point to deliver the next stage payloads. This exploit allows for an attacker to embed an OLE object in an RTF file which then executes commands on the infected system. Once infected it employs anti-debugging, anti-vm, and anti-analysis techniques to ensure it is safe to continue running. It also communicates with C2 servers to relay sensitive information back to the attackers and receive future commands.20fc1511a310ece324e40381e49f49c237a7d6ba1505eaef3ee38dbf69f330d5a0b76ab5 b5f34d2752ec82aca1dd544da7990448 1ddf5e48bee0559b5cb3b30c5bd4106a28078adb594b072c56ce9aebb06ade29 https://www.securityweek.com/multi-layered-infection-attack-installs-betabot-malware https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39
M18-i3z01Johnnie_496dc49aWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.496dc49a4e6e68d48032374404ddd52f80b6228576594e8715cb9b1d17c27c37e43cc8b9 496dc49a4e6e68d48032374404ddd52f 2ecf1771778fce31ff2c6004c3601be6d372189166fec6511a0f393fb684bff0 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-ee601Fareit_715d605aWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.715d605a37cfcfd0dfc9c2619d93aa201fd2debf505c2a39fa11fa57e2ffedaa22624cf3 715d605a37cfcfd0dfc9c2619d93aa20 b666016a21c083b8e528f8175ae2d6417ba2ec3e5dc2a6336e29e52efe960a89 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-wss01Prepscram_045dd621Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.045dd621232c1e80f3542f1894553388a4d1bbd1ab4713d76a78f3639aaac65140c911f5 045dd621232c1e80f3542f1894553388 f7d7d01c4812ba9cf1fa71958dd395b120ae9a420437767b4ff9aec2455d0447 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-q8001Prepscram_befdef70Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.befdef7072cfa7f8dcac80859b02ea413c0e9a9a3c8c1f5679522f3adc00c66f2744fed1 befdef7072cfa7f8dcac80859b02ea41 bc879aed2577aa152064a167e312287d59575d510f7a56eda7aa66e170baae80 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-ght01Prepscram_5115185dWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.5115185da29dd6a581eae9e8d5ac9fdddd0e61327f9109065ed87b79bef4c088d1a34be5 5115185da29dd6a581eae9e8d5ac9fdd eb732a01f5f2a3fda038a10ce62a0f1d3068aaaed4ee2b44f351007f4c063a7d https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-lks01Prepscram_a53b153cWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a53b153c72acd881755ddef1149e6f7b3fa9340235b2569dcc841069764830ad41d0a9b7 a53b153c72acd881755ddef1149e6f7b 6ff6df3020263a78db2719e427e037264873559522b49506b7532fb72c8ceec1 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-2xl01Johnnie_5cbc9ae4Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.5cbc9ae468ddfef039fafe51094d6dcc63647a878e926ce0d1f662c2a5dab7e8647df251 5cbc9ae468ddfef039fafe51094d6dcc c10e952f5ad87ee0685409c2f6855009e069b181ad7e155f118f524e09de621a https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-nrt02Prepscram_b27c877eWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.b27c877eea0ff0071e29376255393bc7678bb028889b93b51188b85b38d8ef6432558e13 b27c877eea0ff0071e29376255393bc7 01b2027c7a7e3888eb84a0e7c3bacf95b9b6e8da7a79bc578464ec9627f7a9e0 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-1rs01Johnnie_b0d5fc63Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.b0d5fc638b3b55edb6f0249ca62cf22de1c1738bf14270615467be07b3712050e7f85d60 b0d5fc638b3b55edb6f0249ca62cf22d 5308ee082f975bd750aefa0c1cad84a517a48a7dcc1e72ad665e2a6ae1a6e73c https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-cl401Prepscram_aca056adWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.aca056ad225265394512b96a022d8d574ac19221f271a38f96e9705195e722639c5aa376 aca056ad225265394512b96a022d8d57 4431eebcb86a10222171eb6b678ae19bd59aef22644a842681469dbd2ab85e4c https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-dq101lcloader_239835ecWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.239835ecb703895326b6807e0df033b538b2c2c7a5f4b11f7996387d1f452d4411c2f4c0 239835ecb703895326b6807e0df033b5 54765436d9bfea2116fbff7a9069e4ca643f55eb5e722237cdd5d3a350e4b0ac https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-pli01lcloader_023a3bceWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.023a3bce70ce42508a8610eb5aba11b87a2fc38bc887e04e669bf800a8effb0a515d3c71 023a3bce70ce42508a8610eb5aba11b8 554098adf01c6e799494a0415fff359bce2cf1543c23d7b46c464c9ec49982d6 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-gz201VPNFilter_87049e22Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.87049e223dd922dc1d8180c83e2fde778a189f0c6a69efeaed1916860a0ff74e424563f6 87049e223dd922dc1d8180c83e2fde77 d6097e942dd0fdc1fb28ec1814780e6ecc169ec6d24f9954e71954eedbc4c70e https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-tgi01Johnnie_e933fefcWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.e933fefc1589347aec7acd307ec03d564b672f3364c8d8c6cd2d127384a507d0e34c71bc e933fefc1589347aec7acd307ec03d56 8de212ff8c8364cfce48bf818b245eaf46db049e2fb4f48b4ef839d6160ed245 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-0qc01Prepscram_592030d1Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.592030d1cb40a9f68f58761053ce1197b7f4344e65158b3a1b516f45cc23701e44bc926a 592030d1cb40a9f68f58761053ce1197 ed114bd563038ca504de06b1a0629c493d886d6419205da69eb9730f82688050 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-t6a01Fareit_8c3bb7aaWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.8c3bb7aa1e0ed6b303664ac460725e556fdd614085f0f52102a8bbbe82964487b3bf149a 8c3bb7aa1e0ed6b303664ac460725e55 38fa0b6386e446ee7e1678f3a883bdc93681d5038da66486cfea4a2d9d9c4fc0 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-4j001Telegrab_1d994c13Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.1d994c137c93f6788db5ad9f1b0ba375bd479cd67627a7673adaf7200702e35a77f8f84d 1d994c137c93f6788db5ad9f1b0ba375 c0b505299214d21c5f89aea4d381dbd76ef5ce9a38770b693578d4647e61a471 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-nec01lcloader_5ac84a51Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.5ac84a51bd1133a568593b553c8af69d63ca1886b13513b172bda7a88d58a4d58f3b46d0 5ac84a51bd1133a568593b553c8af69d e35d8a62870f2d1ab0fb56fe6e35fb50f980aa2dc83c01e8509b4fed170ee1b4 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-kpa01Snojan_f0d5e3d4Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.f0d5e3d4ede5b46289747a10ef7a8a39752a20f1611e397231acc58a3c02d876cad1a726 f0d5e3d4ede5b46289747a10ef7a8a39 422851acbc75b521896e06a5158e32d94a0a652212843fd87a00d88bc47dc52a https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-nst01Johnnie_49c12a27Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.49c12a276c849a0c59ec063a061ca85327a40004c44bb7848aff4f0b5aff058fd1a4e110 49c12a276c849a0c59ec063a061ca853 0e73d31d6db3dd82988313fe3f463891b24d0e41286d93a89df6a8a56aeccc8c https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-i7t01Telegrab_30f47375Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.30f473755488e9ec7817ca012d0feb85d46122fd49017dbb904401a898da35884d84a16e 30f473755488e9ec7817ca012d0feb85 5bc214d0bf18ded3bd18595e96b609137207aeeb0786778f86191fbdfdbc0522 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-73501Prepscram_42c98821Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.42c9882145ea5f1e603f58ab5b0845baf77b08cad6a58a5a6750ed6896557132caeed5e8 42c9882145ea5f1e603f58ab5b0845ba f91c4b1034ea7a193aef5ce586a1f6ba84e735b55bef91d9f4559816b40c3321 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-t4y01Johnnie_2cc0dbc0Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.2cc0dbc06b540e88354839ca3a4a47066ba150f401344d76e7d78e6d72ca08338815a43f 2cc0dbc06b540e88354839ca3a4a4706 6964abdc0a2daed0a51ca023392ac96b809584a8f1e9014f159e670e2b4b12af https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-fdr01lcloader_36c3756fWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.36c3756f68f55d13082c4d49f18ec88c56eb44f59488f1d317aa34c1c4ba6ce809402d39 36c3756f68f55d13082c4d49f18ec88c 0698f016609e0c86abe57e6e5ebb547802d3ac77ac63714cfdbe0eb3c8eece03 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-gmb01lcloader_6d5ab7fdWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.6d5ab7fd9c7e0a755f150d71ddf833ce1187afbfa0a16fbe7de0e6214d7439aab1c1575e 6d5ab7fd9c7e0a755f150d71ddf833ce 743375f8d3d42ed1fb2b02193e4366d718edd0b8b6b70ad0c69d937392bb82c9 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-t3j01Telegrab_a5674177Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.a567417724ae27331bf7cfca92f45b0eb8702e5dc54fdbe19f33bdd1c69d61ad6335c808 a567417724ae27331bf7cfca92f45b0e b8cd344fd7d8dd400db31f981b8a11b0aabe6b118d9aa498aa269144b441eb96 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-6ca01Prepscram_a4bd12a5Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a4bd12a5b05889224e74cb7fae357577b2036a272d15037cc9d28704521de1fd2dce9fa3 a4bd12a5b05889224e74cb7fae357577 f4eef29cd1e43843cfc1d0533d2c518dbbb5982093d6d1c6f576e02549e28b60 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-flq02Johnnie_87415e93Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.87415e93b076103606aa7c1d6b3a25c6bfa94a43a49fd02ea1a43f75350648fb75747410 87415e93b076103606aa7c1d6b3a25c6 9eedaac111db1f28fc90300e2ecf417368595ebca2763a211fe1bb356527f06e https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-8vf02Johnnie_8bbd2da8Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.8bbd2da831681bc36a787fafc5ebf4a27a16c99e3ed598627cd55d73d65f890e9fba80be 8bbd2da831681bc36a787fafc5ebf4a2 3f78f88330bfd6eaa889ffc2332b91235a4fb8bb364d0b076b6ebfb51f8f02ef https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-ijd01Johnnie_3eea8bceWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.3eea8bce112ec9e8b1e44e86898209b739c6c68ae839a7b8a81f64812727d101635fae3d 3eea8bce112ec9e8b1e44e86898209b7 d89080318573953ea0e0c2654a14252c70daa368ed3c81f6fd1aaeb2b2bcdeeb https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-nv201Snojan_4f681589Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.4f6815892d0438e73f1ba6dd717aa2ae1b5eae44a54491c2199bf88d16486caf3755afe7 4f6815892d0438e73f1ba6dd717aa2ae 8c28892b44b95c2f04ceedb0be68e8fdaa6eb444b2f1fd9f1db5eed9be8a4147 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-17f01Prepscram_103c27faWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.103c27fa758f6f9ad15455ed5f638790221d2c04ba8815a8cb99ada416ce5ce2dab41124 103c27fa758f6f9ad15455ed5f638790 e5946260399e55af6a5e21a696c3790e7aaf6653869b73885ab7b93116dff677 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-bw001Fareit_af3c06f0Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.af3c06f050382913e38f4177345a8808e3d77111887e85f2b2c5a0975876c8954a49a9c3 af3c06f050382913e38f4177345a8808 1b6d23ded662ec5bfb5d34904fda6f337be2069557dddc139e69d48672bf5c96 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-lh001Telegrab_efd2fbd9Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.efd2fbd9bfccc94d9bfb3be9430d218b3c567b0f5bf0f2010b8aea09186312507b9fb226 efd2fbd9bfccc94d9bfb3be9430d218b 683aca7614f51d52e2121e240dd2d5fc72858d7dbc6e27f97be83a987f9c5103 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-smu01lcloader_8d3cd586Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.8d3cd5866ca85b4008507fdb445e0a3dd092ab86ce83a79f0a580488239459b16268db1d 8d3cd5866ca85b4008507fdb445e0a3d 524c3716396d539e0ab0b4801fe784e81a32395a9ce0222cd4ab8348831c2a70 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-kv801lcloader_cc7fb184Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.cc7fb1844e3ab2bf0b39bc625c91ab806d38dd51548bdd9003e8e7d38123d58c71bc9ec6 cc7fb1844e3ab2bf0b39bc625c91ab80 f573a18c7b57275b2737e62c5c0468acf688a9c2fad9a3c5b83d5209bc96cceb https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-ma101Betabot_b01137b5Windows This strike sends a malware sample known as Betabot. Initially a banking trojan, this current iteration of Betabot leverages CVE-2017–11882 as the exploit entry point to deliver the next stage payloads. This exploit allows for an attacker to embed an OLE object in an RTF file which then executes commands on the infected system. Once infected it employs anti-debugging, anti-vm, and anti-analysis techniques to ensure it is safe to continue running. It also communicates with C2 servers to relay sensitive information back to the attackers and receive future commands.b01137b556e968582730f9fe4186de087eb8bb9e4a63cfbfd9ac421f68a37a34e74353cd b01137b556e968582730f9fe4186de08 0f16a492f4444d0ce3ebf781a8ac1247e6bec6d8e2b91ee0e0b1fa886f251d7a https://www.securityweek.com/multi-layered-infection-attack-installs-betabot-malware https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39
M18-48p01lcloader_5f2bdd77Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.5f2bdd7760cfd638e7d606fa26336e65551e1988b54e62dba95499e1f7cab223cab7d801 5f2bdd7760cfd638e7d606fa26336e65 800a0533147b774a1fd6940e948772ec20114ad4d2856ae1160dd09708695b38 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-sbj01Betabot_13ae5af7Windows This strike sends a malware sample known as Betabot. Initially a banking trojan, this current iteration of Betabot leverages CVE-2017–11882 as the exploit entry point to deliver the next stage payloads. This exploit allows for an attacker to embed an OLE object in an RTF file which then executes commands on the infected system. Once infected it employs anti-debugging, anti-vm, and anti-analysis techniques to ensure it is safe to continue running. It also communicates with C2 servers to relay sensitive information back to the attackers and receive future commands.13ae5af773e63f65d5b0748676fcff75c3f979f797284114452308751a7aaa163501357c 13ae5af773e63f65d5b0748676fcff75 a26df1557a76f75dc81bfde9e5038097df129bd2ece1a6a0f61434321fd73e4e https://www.securityweek.com/multi-layered-infection-attack-installs-betabot-malware https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39
M18-lro01Triton_27c69aa3Mixed This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.27c69aa39024d21ea109cc9c9d944a0466d39af5d61507cf7ea29e4b213f8d7dc9598bed 27c69aa39024d21ea109cc9c9d944a04 758598370c3b84c6fbb452e3d7119f700f970ed566171e879d3cb41102154272 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-ks201VPNFilter_19dd8b95Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.19dd8b95fcca498582642f5a0b2fc58b0752c7e01025cf3689ce283e0389d388f7268048 19dd8b95fcca498582642f5a0b2fc58b 37e29b0ea7a9b97597385a12f525e13c3a7d02ba4161a6946f2a7d978cc045b4 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-zat01Fareit_a2e59eb1Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.a2e59eb136406bc3bb5c88784c43c7344aa6abfca24c568ff88ca45b29c37dee5bf4aaaf a2e59eb136406bc3bb5c88784c43c734 a9ae093f49608d3220681a69f8873156369f86a4b5dbb135a5ed295dfb01a6df https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-3x401Snojan_dcad2ea9Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.dcad2ea93cde58fa619211dede708ace64434820bbbaf522a7a949923bd812ba6378e29d dcad2ea93cde58fa619211dede708ace 80382158e2bb303c7e046d5144fa0f49d3c525f84fde81f4bb9fbb8e162927f5 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-csq01lcloader_29d0c225Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.29d0c22533cb5f17982e0c61f6835f20ba8f5190437c3b85e2003f81036686587f51803e 29d0c22533cb5f17982e0c61f6835f20 ac1164f631b5ca03ee6e2dd39a492ca0b49c9d14a2ae4b2714e135ed48669dbf https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-vsc01Telegrab_cab2fea4Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.cab2fea4a7b22afe32f681ac789261b937b6297980725e5f0c62cf35b843fa804f923779 cab2fea4a7b22afe32f681ac789261b9 0f44cbc19862c6a2208d506564c3a3676e22c8203d2f3055a88c00c00ebf1c1e https://blog.talosintelligence.com/2018/05/telegrab.html
M18-ztk01Snojan_9c06e769Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.9c06e7699bdd5f4163e7cfa86fdcc8620cc99cdc08fa29fe2f351c475e82b7195958980e 9c06e7699bdd5f4163e7cfa86fdcc862 cf30e3d3df78f487c056a09d220ea29ee17f1478304146f1395dcd4273db6deb https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-a8b01Betabot_76c94647Mixed This strike sends a malware sample known as Betabot. Initially a banking trojan, this current iteration of Betabot leverages CVE-2017–11882 as the exploit entry point to deliver the next stage payloads. This exploit allows for an attacker to embed an OLE object in an RTF file which then executes commands on the infected system. Once infected it employs anti-debugging, anti-vm, and anti-analysis techniques to ensure it is safe to continue running. It also communicates with C2 servers to relay sensitive information back to the attackers and receive future commands.76c94647524188152c6488600cc438b07ad2e8fb058e9c49bb24585ec4e55ee245f583ac 76c94647524188152c6488600cc438b0 3b15e835ec20c66ffebdd3486cd8673c833e07ff2816bec17fa8b1343e6cad7b https://www.securityweek.com/multi-layered-infection-attack-installs-betabot-malware https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39
M18-oc901Fareit_2cd3107cWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.2cd3107ccc49c68ff0b2a376f2d0a75a3c0a4f7ba290b725e5c680c450aa8ddaa177a472 2cd3107ccc49c68ff0b2a376f2d0a75a 2e7d24541da31ab5a130cf7df030e1c3d2ee31241713cd2a55733ac2557888fb https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-1zh01Telegrab_5d096a99Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.5d096a99c597457295bd44c1597f3e053741cedcfc6e810767413d14b9b29ce18e0ede96 5d096a99c597457295bd44c1597f3e05 e6fa65c97244ff34348b958bb53c2046897d4c5137d06a9dff327597f5b5430f https://blog.talosintelligence.com/2018/05/telegrab.html
M18-n3301Snojan_841d1734Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.841d17349909f02a561d847f8628ae67f4840ad7a800564e7886b8ae4db4d1ffb0d7a828 841d17349909f02a561d847f8628ae67 5a6a4807e91e3a706999d60a44cadd362f89ec94ff19088b24aad9239c676f78 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-hcx01Fareit_6ed25474Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.6ed254744f0d92f3baac916b30a9ffae0e29bdd0b2772fb135e480e5d3b1d37b0ab61e8f 6ed254744f0d92f3baac916b30a9ffae 87cd1118be63b7fc999c715f5a54877b72db273cff33d95427518a489959a755 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-ylo01lcloader_73b8864cWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.73b8864cff3649fc5a41189ab8346821dd4b52e9f349fc0bab24acc487e8c08dac2cd98e 73b8864cff3649fc5a41189ab8346821 c08e6b6708db6621a434275fa085516873cdd6ff39e818b741891b2377dfca2d https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-hpx01CVE-2018-4990_bd23ad33Mixed This strike sends a malware sample known as CVE-2018-4990. This sample is an Adobe Acrobat Reader Pdf parser zero day vulnerability. This vulnerability allows the attacker to use javascript to escalate their privileges on the victim machine and execute code.bd23ad33accef14684d42c32769092a00d3f335ccca4575593054446f5f219eba6cd93fe bd23ad33accef14684d42c32769092a0 4b672deae5c1231ea20ea70b0bf091164ef0b939e2cf4d142d31916a169e8e01 https://www.welivesecurity.com/2018/05/15/tale-two-zero-days/ https://srcincite.io/blog/2018/05/21/adobe-me-and-a-double-free.html
M18-89z01Johnnie_2ad5fb97Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.2ad5fb97059de2eb57382f3ecbd7a415509688f40911edf983052cfc7df0c9e0fcf8438a 2ad5fb97059de2eb57382f3ecbd7a415 26e6871828aba6f30916bbcc6d8d60d9320f11d791993fe7fec1c7ecfa1cd733 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-0hw01Fareit_156d6c7dWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.156d6c7ddeb6b8b52ccd818d5db22b8712a0633786b3fb1331c7532f103a64085330732f 156d6c7ddeb6b8b52ccd818d5db22b87 bb8213867ea8ba9a16071d4e4f817fdf66f70e2a18a7fea1791efa885701ba87 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-n6j01Telegrab_78b83cc8Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.78b83cc8c8a51c2fa8f24a445de5eab52cefae78adf0f66e0eb978ac69dc2b2230cdc547 78b83cc8c8a51c2fa8f24a445de5eab5 cb5abc9a8ef7936892e4627fe4d94d28120bb653002c1fd6f1a449ce86d9e909 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-11s01Fareit_27a3a50cWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.27a3a50c60274ccba96c4e78875d02af2d71e4bda765b0ad4e98d674e84f4f23f22e520e 27a3a50c60274ccba96c4e78875d02af 47f7b3ccdc0a8a91da054181d31a15f756762608e577750bd4c90c892fd47768 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-r7601Telegrab_1147d6e2Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.1147d6e22ec5865dfa510e2feed7ad9657c82eb1882d54497acd2654aa6d71b2330b2322 1147d6e22ec5865dfa510e2feed7ad96 3e6044de4c65c6e4290d22a03c8c67c18dbc264de0b8da0f4a8711415073fe15 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-f0001lcloader_5c95be5aWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.5c95be5ab1b08c1a60b65588af2fde52b7cccd1caea42fa5da226d98f6599fa895febf2b 5c95be5ab1b08c1a60b65588af2fde52 7b7bce1098190011792b81b744fb21870fc99f3060882112a305b153d7140d4a https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-24k01Fareit_9f481f87Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.9f481f87c945651c2dd129f32240f561f57735f82b5e175f50df8043c9bdfa7551c6dc0b 9f481f87c945651c2dd129f32240f561 90c33b025fea52ec12cab793625eccf08fc55e544976d8aeed82c883c78ea8d6 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-okm01Johnnie_80278898Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.802788985b6a46cb2ccce5cd04d5d0196d2f54b0dcb0599c9a1769e13cf76abc176d50f6 802788985b6a46cb2ccce5cd04d5d019 cb9be6bbc4bf545cdbfb87585289197202bcd5cfb31aa88813bad0277756a175 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-fuk01Telegrab_4c4529a9Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.4c4529a917c628bd1f9c89934f03c73bf59ba84892709f6091b95913b3c456493c4b5785 4c4529a917c628bd1f9c89934f03c73b bb3219959f1e25a415adf56481be96da1145c03e347d8852de310070256a09cc https://blog.talosintelligence.com/2018/05/telegrab.html
M18-xvo01VPNFilter_92d47495Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.92d47495c92d8c5dba107163df2bb21260a5b825c197a8788b8934c31e7453bd9a87e452 92d47495c92d8c5dba107163df2bb212 8a20dc9538d639623878a3d3d18d88da8b635ea52e5e2d0c2cce4a8c5a703db1 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-c2u01Snojan_3a6b77c6Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.3a6b77c6b8fc8d5046f03a5883853a7d067692b7eed7f525ce2bf02f4fc25702569b6b0c 3a6b77c6b8fc8d5046f03a5883853a7d ad71f36a2cfdd5cd113a12009ef4e56e21fe028ac449841ab2effa87292292ec https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-f7401Telegrab_1bb01194Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.1bb01194f9eb7ca39fab94d820c19fb765fe7d3a04e96cad57bd534f042e63184cad9434 1bb01194f9eb7ca39fab94d820c19fb7 a9e4d7aa5b6d83943aa4845dc467040ae4cd223ef603a5ab2d1896d9c2573932 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-fz501VPNFilter_93ff3674Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.93ff367439becebd9d71c3e12041c95ea0d9f148e319fb604d7a70f4b482a2d9d06232fb 93ff367439becebd9d71c3e12041c95e 0649fda8888d701eb2f91e6e0a05a2e2be714f564497c44a3813082ef8ff250b https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-wzm01Typeframe_77b50bb4Windows This strike sends a malware sample known as Typeframe. This malware has been associated with the North Korean government group known as HIDDEN COBRA. It has the capability to download and install malware, install proxies, RATS, and utilizes C2 for additional functionality.77b50bb476a85a7aa30c962a389838aadf466a1f473c7c5eba5f22d90822fd1430b6a244 77b50bb476a85a7aa30c962a389838aa 3c809a10106990ba93ec0ed3b63ec8558414c6680f6187066b1aacd4d8c58210 https://threatpost.com/hidden-cobra-strikes-again-with-custom-rat-smb-malware/132375/ https://www.us-cert.gov/ncas/analysis-reports/AR18-165A
M18-ajy01Johnnie_e785debeWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.e785debe1def27b788eac5e737004e053fc63ccb4015e6c0f8b36a87f16de3d4441eb0cc e785debe1def27b788eac5e737004e05 5fbe25ba6c8e8a52932053adaa22028ac2ddc3f14b187884bd40f8a0f3d02cf8 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-34l01Triton_28816695Mixed This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.288166952f934146be172f6353e9a1f5d6e997a4b6a54d1aeedb646731f3b0893aee4b82 288166952f934146be172f6353e9a1f5 1a2ab4df156ccd685f795baee7df49f8e701f271d3e5676b507112e30ce03c42 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-qj001lcloader_0906b7d8Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.0906b7d8eb1bbece6cb2cfc287ecd0ea3ee6fcbbb88b94bb5608c4994f961e8d03483289 0906b7d8eb1bbece6cb2cfc287ecd0ea 94afc3856a03eab297025cfc6f5f3ed81cb81a925b745103b619d409baeb4b13 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-3jq01Telegrab_e65227a7Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.e65227a76685fed53ad88e5a1da851b6be3955886fe802c0c04c5c5e4cee3e72f6e2fe7b e65227a76685fed53ad88e5a1da851b6 2a990c1e97b0329b2c4f75766314d1fe91f554b3ac524d4229b6068d007c8e33 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-r9n01VPNFilter_42d891bcLinux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.42d891bcdee9588f8ed5d27456896a5eb0e0853d1aa3c318627f92bec64fe7d42490cb3a 42d891bcdee9588f8ed5d27456896a5e 9eb6c779dbad1b717caa462d8e040852759436ed79cc2172692339bc62432387 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-9pa01lcloader_06bfde89Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.06bfde89502a746ceeda9c9ee99ecd8f581394bdc62db15297b04cb2b40b5bc221e71f22 06bfde89502a746ceeda9c9ee99ecd8f 44eeef3be66e7530c1201ade7a5e9e8ea15066bc91916173aa104d4576ce4b18 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-xt001Telegrab_285a0a18Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.285a0a18b1538be114eb834d4a10dc75d854358be4e4d3cb5f454d2bd257260adb8e88af 285a0a18b1538be114eb834d4a10dc75 831b7b91b48c5c745b04731949c1ed32a2e9e68df66b6cc7f9e0b1fb0c6df5eb https://blog.talosintelligence.com/2018/05/telegrab.html
M18-49601Fareit_28b9d06cWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.28b9d06cc8f83132266d9897d4a6c45bda2c43b53803afe8a7752bfb743f5903ac23e1c2 28b9d06cc8f83132266d9897d4a6c45b 3c2c7e48c16c4f9ba5238d397243f0aac758a37feea57f08ae0df78a957324da https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-p3j01Fareit_9a98af19Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.9a98af19bd82730a0bb170169b59a42571ca51e0693c09517ddecaef44c23ce08150df1d 9a98af19bd82730a0bb170169b59a425 27d159cc11b0eab97c37e8cde3c13cd2d7e9720e7ffa41a7e8451d08c8e9da0a https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-ad501Telegrab_9ed45e95Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.9ed45e952a0150c487aaed9b97d3eb4bcc49022afd7cc4c90c5a8b684d769ae5c692b1a6 9ed45e952a0150c487aaed9b97d3eb4b 57bdbb582ad09382aa3d4e015269eddd56f7d712d11cde58cf0debac9fcd1829 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-0e901Johnnie_8678a08fWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.8678a08f960ae6561d8f4ea9dc5183ae7a35759b6033da68494519f16a24c956d77448ce 8678a08f960ae6561d8f4ea9dc5183ae 62e97b12781c36ac029176ce7b10cbfcf6fd58ff4552025aa1d8fc60bcde4bee https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-el501Prepscram_8c20ffbcWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.8c20ffbce869f50bf08df5cc9d5ebcf4ddaade1086d77cfdaa0b15105e75cd1401c52485 8c20ffbce869f50bf08df5cc9d5ebcf4 a1d8ff6306950d4a55402737a42f613a0eccc5fce66c7aa0a60d11c2ca598525 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-c6m01Telegrab_6e9212e6Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.6e9212e6f1c8d08891e325b33549037971ad6de1cece3cc014627f5780ee61d8a0fd93b9 6e9212e6f1c8d08891e325b335490379 6d728e557152d8f5613ca8ea06329f1a08e8e13923ed0fa0a5142c3dd7cb0155 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-67f01Telegrab_76c06910Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.76c069104ecbf8f71840fde95a61b897becc8c255ec4b70087a49c28ae2bcca61fda3502 76c069104ecbf8f71840fde95a61b897 4ebf3e5afa85a48a34cf0e344c685c9f97d59c002d54eb3ee19d6b79bae9e4dd https://blog.talosintelligence.com/2018/05/telegrab.html
M18-ax001Telegrab_8dd7b27cWindows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.8dd7b27ca8d407721ac023132556e768b5fd990207d82c21cac12adab8df53349927853d 8dd7b27ca8d407721ac023132556e768 a5dbbbc7996967cf7f16f998fab6dbc09a087082a0d17287418b8ffc2b6228f3 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-1zf01VPNFilter_8e74e36bLinux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.8e74e36ba104389aa6dc4d4429bcf0cff16c48ead435d2574abd2e18836681ba2ce788e7 8e74e36ba104389aa6dc4d4429bcf0cf 776cb9a7a9f5afbaffdd4dbd052c6420030b2c7c3058c1455e0a79df0e6f7a1d https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-fqv03Snojan_0a8951f3Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.0a8951f3995432c4e4e4963bbe9bc6b6dcab0d7dcddbd2c50537883ca693e45e9f8ecbc7 0a8951f3995432c4e4e4963bbe9bc6b6 c6739a0e1151cb69ab43089901da6c5f1b932dc41048d02e4bd242b0e38e91fc https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-l4s01NavRAT_7c53c4d2Windows This strike sends a malware sample known as NavRAT. This malware is a RAT that downloads, uploads, and execute commands and keylogging on the target system. It uses Naver to communicate with the attackers by sending and retrieving files through email and attachments.7c53c4d23f2f92f6c5ee9c1d0158a6c947e676f43ae179e825e4a5f2bdf30c67f1732f54 7c53c4d23f2f92f6c5ee9c1d0158a6c9 e0257d187be69b9bee0a731437bf050d56d213b50a6fd29dd6664e7969f286ef https://blog.talosintelligence.com/2018/05/navrat.html
M18-50101lcloader_e3e16ea9Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.e3e16ea93eea5e5a12dad06206793757d4121f457df8e4c6d9e28c1450c76812bc5abb1d e3e16ea93eea5e5a12dad06206793757 2f6f1cf599cef00e89b826b408f62d0949dc3dd8a1f6ef7b64a4d3368f7f0e6b https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-dni01Johnnie_fd55d185Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.fd55d18583c73c88b5453aa5a197b102273032e5bd7112d56f84c30fbe92c0fbb740d801 fd55d18583c73c88b5453aa5a197b102 d7e0958d2eaa5f17e0ffc2ee6a4549401c30b381499df3a52384ef04023e0c80 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-n7b01Triton_f6b3a73cMixed This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.f6b3a73c8c87506acda430671360ce15a6357a8792e68b05690a9736bc3051cba4b43227 f6b3a73c8c87506acda430671360ce15 5c776a33568f4c16fee7140c249c0d2b1e0798a96c7a01bfd2d5684e58c9bb32 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-mee01Prepscram_a99dfa9cWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a99dfa9cf18a8f05f72471d84a01be0ab97272370f72e7f7a1f8ca2e368cd6d954f3e11d a99dfa9cf18a8f05f72471d84a01be0a 3bc6b0ea5ea71bbb67be5d06fb4d6bc7f5398f11bf2802bd381a645033e45922 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-86601lcloader_f4650df2Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.f4650df2560799597c82f05ba564c45ca4dd689ff7f67703fa4a99d23be87b840aebba29 f4650df2560799597c82f05ba564c45c a4f236efc26615e3ade5ff9c961d698b0aafc40b1b257a441dccd8ca060dfa90 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-sxs01VPNFilter_97444b52Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is the stage 3 of the malware.97444b5209278ed611e6a94076e814c8a5e0d0ebe41683619d1b9802149f0403b1a7d8be 97444b5209278ed611e6a94076e814c8 f8286e29faa67ec765ae0244862f6b7914fcdde10423f96595cb84ad5cc6b344 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-f5g01Telegrab_2e3a97b1Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.2e3a97b13373c357c320f2eb4ba44f8ac7fda35b8a847ed8bd2773547c8f8af207414256 2e3a97b13373c357c320f2eb4ba44f8a 005bdb6b31dc26406694749f1de59d5cce330de603e8b407c80e8ff7dddda4a3 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-s4e01Telegrab_49d9db42Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.49d9db42163a25b5dcaec2f9021506b88d4396d25617e187ac1c46a20b94abb95868350a 49d9db42163a25b5dcaec2f9021506b8 c9c46a0f78abc1de95af1f26dd7c357146ce8ce462bd450617c138a81c2e119d https://blog.talosintelligence.com/2018/05/telegrab.html
M18-69r01lcloader_52900583Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.52900583bc73310075a1ea79dc7d7084b0bcdb34b335959ec296efc17fd098000f458e05 52900583bc73310075a1ea79dc7d7084 d721a98df1592e152d2a096ca936bbe776d76e013478ceebac99114b07330e89 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-ugx01Johnnie_1799a8d3Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.1799a8d396ffde4388cb1bc449b945003bb6638efdbac8fe480bf0ab98fb73e3457ea08e 1799a8d396ffde4388cb1bc449b94500 36b5297734e9ca147c71985b649d0f49fcc0324d2b61cefda1135fd9a5ffa0d2 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-bwu01Johnnie_21c4fd53Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.21c4fd5316b6b5e3406f3b33c2a8cb06e33e4cc19cac474c84bff9f29cce4f5aa3ea1328 21c4fd5316b6b5e3406f3b33c2a8cb06 25c14e5ea990fee7091433ea8050caecb60be93c81d54100506ed23bb472bb8e https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-3q101Fareit_960b304eWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.960b304e5604ae26a1727e81c9f158dd88bd8bced31288ff35e35ba2dc81dbca7d95f753 960b304e5604ae26a1727e81c9f158dd db88e8ce7f0015c132e1a5924c0d51888b3c7edad698d7dd99a62408dded21d4 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-iu801Johnnie_02c1b455Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.02c1b455b6d8ea93c7343ae87dbf10ee68e4116675161dc33a1551a650d5f33898327d29 02c1b455b6d8ea93c7343ae87dbf10ee 50dcb2e7e9f7443099dc66ea5f0c1c73f25af3425c7365fc8f58ec43b0f28d71 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-72f01Johnnie_34647139Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.346471399a069ea886a231b6f5461700f711dcaef5333d83f76c8cf990bdad49f4c43f42 346471399a069ea886a231b6f5461700 023789cfc258b2d9bae00e94de0f1ee96f33f20a98415421d63f64be90e4b236 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-o8301VPNFilter_5f358afeLinux This strike sends a malware sample known as VPNFilter. VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This sample is the first stage of the malware.5f358afee76f2a74b1a3443c6012b27b4ac8d962c6072b77f157c5d6459b887a658d66d5 5f358afee76f2a74b1a3443c6012b27b 0e0094d9bd396a6594da8e21911a3982cd737b445f591581560d766755097d92 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-r0801Snojan_5ad21cc0Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.5ad21cc033b7b24ec8e473548a5d2f419341bdeb461a1c285ee079263a2170d4117a6463 5ad21cc033b7b24ec8e473548a5d2f41 5761e20e73dadf7be05f7fafcb40d9b816885c8331fc69448eab3965ac8ae940 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-zcw01Johnnie_743614ffWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.743614ff54d5a439351fc41e1f9cf0cb25c92c3308acb82de505e47dc585c6b351fd2661 743614ff54d5a439351fc41e1f9cf0cb 87ee726e7e84443d44cfcaaf2151938d7cbb04b2dbb60669c6a843ecf51588e6 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-l8801lcloader_29e4e21aWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.29e4e21a2002abcf6075a572f6930c27ef1cf1a563c92607d80b1113c2e9f2723619ba67 29e4e21a2002abcf6075a572f6930c27 8054fdaa9d6c198ee592d03b236c3e78272f699e3149b288f8a1a4109a5aadd9 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-vr201lcloader_62c7c24fWindows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.62c7c24f6f9b1d47083b25a7941fb9e5f9c0e5b780ed24e86b7f7a81f69d122406e53a15 62c7c24f6f9b1d47083b25a7941fb9e5 2b0fb049cb28726bef4586260e67d28e627ddc5421691d0fd32cce9a487d35ce https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-yuk01lcloader_2668e631Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.2668e631dbe392bdf751a518950d3a69c674afb80d82d11badc23e6b8fd9a295b128ccd9 2668e631dbe392bdf751a518950d3a69 7b4abf2b425c28e2130cb43022fb18ca52c545f28cd74fff09db9a6ff4082b56 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-rzt01Prepscram_bd8ac9a3Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.bd8ac9a30d2354323ce9ab295bcb5018577e8123471149ee31cce3243b078d8f5e991747 bd8ac9a30d2354323ce9ab295bcb5018 42691432711dfe36fcb46fbf93395e41bcb7afc7c6b57bf7295471dbf1928e9a https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-52x01VPNFilter_b5dc9760Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is the stage 3 of the malware.b5dc976043db9b42c9f6fa889205c68a4fcb3f9cdf5a6150cc111ac8f6ae0b273c0f740e b5dc976043db9b42c9f6fa889205c68a afd281639e26a717aead65b1886f98d6d6c258736016023b4e59de30b7348719 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-hy601Fareit_5f97eef1Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.5f97eef1dd8f1fe5c73fa3464b6e0ff2cc7d68cfc86f9576bd38e45158a1e193499095d4 5f97eef1dd8f1fe5c73fa3464b6e0ff2 c7f53968de7b8c7c0f8311c9df55717844afe6f63a8e4ab7f0fddc6b31c5aa7e https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-ed501Betabot_20fc1511Mixed This strike sends a malware sample known as Betabot. Initially a banking trojan, this current iteration of Betabot leverages CVE-2017–11882 as the exploit entry point to deliver the next stage payloads. This exploit allows for an attacker to embed an OLE object in an RTF file which then executes commands on the infected system. Once infected it employs anti-debugging, anti-vm, and anti-analysis techniques to ensure it is safe to continue running. It also communicates with C2 servers to relay sensitive information back to the attackers and receive future commands.20fc1511a310ece324e40381e49f49c2fade8742aff2ec995852ae4044606fb1033a5df9 20fc1511a310ece324e40381e49f49c2 aa60923ae33b8627654eb9bfb9979cb80456a3ff4f35101e81fc9744da814c52 https://www.securityweek.com/multi-layered-infection-attack-installs-betabot-malware https://medium.com/@woj_ciech/betabot-still-alive-with-multi-stage-packing-fbe8ef211d39
M18-y8j01Telegrab_73eaa00fWindows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.73eaa00f19c779466d97d4a3a8f52b9762136a06e7f3c8f505da10bb92adcaf8709d1731 73eaa00f19c779466d97d4a3a8f52b97 2c365caa7c41a871c5a32c357ffb832ef9fa1cf72f0033c84e9a4a4bdaeae992 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-qt601Prepscram_a123d345Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a123d345b730755d4aea16bb64bb11f2958941d51120b13d8d7e62180bf0573bfd2bf38a a123d345b730755d4aea16bb64bb11f2 6fd913f9e1684e763628aa1faab9b414688f62692db53b3d6edcdb041a598445 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-49q01Prepscram_03ae7821Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.03ae7821379e7c3972b1bbb027a3bc3bf132abaf75bb945515e7df79a75381fa88b2828e 03ae7821379e7c3972b1bbb027a3bc3b 14a27e53d748dd5a180f31283a24c420e0cf201f7deaf77140c9e07954fbc7e1 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-j8701VPNFilter_45871badLinux This strike sends a malware sample known as VPNFilter. VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This sample is the first stage of the malware.45871bad3a9b4594fc3de39e4b5930adcbf45c52046564af6fa40b65bc41725e23935cd7 45871bad3a9b4594fc3de39e4b5930ad 50ac4fcd3fbc8abcaa766449841b3a0a684b3e217fc40935f1ac22c34c58a9ec https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-trr01Telegrab_0e128af0Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.0e128af01efcdc96c6114e3317e1f01eb2a9d03f50cad11f4d691aceb5eaf162822007f5 0e128af01efcdc96c6114e3317e1f01e da0d0bc24c204e5771f4d7334b322caed6cb0021b719741900b94d91fe01a7c4 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-b7s01Triton_e98f4f35Mixed This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.e98f4f3505f05bf90e17554fbc97bba997e785e92b416638c3a584ffbfce9f8f0434a5fd e98f4f3505f05bf90e17554fbc97bba9 2c1d3d0a9c6f76726994b88589219cb8d9c39dd9924bc8d2d02bf41d955fe326 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-9o501VPNFilter_4912aad5Linux This strike sends a malware sample known as VPNFilter. The VPNFilter malware is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. This is stage 2 of the malware.4912aad5e79c78bc143e71633df9c17b4abb20f92c04e1118e356936f36359620e998de7 4912aad5e79c78bc143e71633df9c17b 9683b04123d7e9fe4c8c26c69b09c2233f7e1440f828837422ce330040782d17 https://blog.talosintelligence.com/2018/05/VPNFilter.html
M18-82w01Johnnie_e14c8286Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.e14c82866520db0232738719d1513723462aab0944a9b500f8249b0632989bedbe8bfce2 e14c82866520db0232738719d1513723 6ee5b5dcc0bbf0ea59be2a87d413f31c7775b44fa50787c6fef594f34666e757 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-sre01Fareit_6447cdc8Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.6447cdc8ce12d1f7fa1a84c6c710fae49e76aded2dc46e3b85cbf448671f2d2b4d35e0da 6447cdc8ce12d1f7fa1a84c6c710fae4 c98038f1367e8fced0f902e73ea97dfe07d6b2863ce5fad439e87f3a75eee2d2 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-xdm02Snojan_cf2a17a5Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.cf2a17a5201b19b505cbbfda659a608f7260dc13654a9242248a8356154e79905f59c615 cf2a17a5201b19b505cbbfda659a608f 3e7df4da29ac871c46a77e4bbc4dc1c080f73370a7db820cd6fc87884db7bf89 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-aqo01Prepscram_dbc747aaWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.dbc747aa10c5e3a290f7c77af6d5e8e43179dcd4f81c3de7bca0648741030fe5ac251fe1 dbc747aa10c5e3a290f7c77af6d5e8e4 5c1d23211ee3e6fe222ad1e017aa56f00cdfb64678f1ffb457489e70dbbfa511 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-96501Prepscram_093983e0Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.093983e05bec3760c8438a8fdfe8a7c9a102492d891bca14d6842460d0209deadd3296e3 093983e05bec3760c8438a8fdfe8a7c9 e47008ae92769ad08f74ef5ff7b6f97b0b018479adff00a5041b02adb71f3bf8 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-3gj01Johnnie_07b843fdWindows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.07b843fd0ace78912cfd1bc8d2e3ebe9dde7d25a156e3f9cfa83ca5ba227e298ed084d3d 07b843fd0ace78912cfd1bc8d2e3ebe9 2c874006199614655a153045793254888ceb0d0aa68c0d40b56351f54b0fab68 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-fd201Johnnie_44baa0f6Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.44baa0f6d0b05dbff6c40ae23ac65cfee4903728b6e191200a4c0bd9163e2234a1edfc80 44baa0f6d0b05dbff6c40ae23ac65cfe 1ff912cfaf566f4e5a76a8a53f5e423a78df1dc9e187c5485b894665f847e563 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-ear01Prepscram_a7b746a3Windows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.a7b746a3ceb4e821b0eea7779faf75c245cfaef6539fbbc214fd6e7f8f760c911ee8b74a a7b746a3ceb4e821b0eea7779faf75c2 afce18cdd76a0e3e36dd2d9639fa1ba4f616952c1cc69e1d06089155d773a947 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-htw01Prepscram_f8536bebWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.f8536beb4387ef5834ffa4ed90c40b64412ed2fe78da0919864a9a052990e9c3f3724c75 f8536beb4387ef5834ffa4ed90c40b64 d7fe56e6ce270a796adb2d14db0d2d4c7b02845737fa1973c6f790eefc3260ac https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-9oy01Telegrab_3d4b2979Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.3d4b297960c1cbd19ab5f6bbd118f2eb846062421a29fa93585fd0b672af46c355c5bff6 3d4b297960c1cbd19ab5f6bbd118f2eb 04235dc68d798863ca1177864c7dba300cf1def2c6eb79885338fc8279b8aa49 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-hyr01Prepscram_2bcfd52aWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.2bcfd52a5722d20d4d5c70647ecabe81ff32c816ecaccbd774e0e2975f9d5c2ff8931fbe 2bcfd52a5722d20d4d5c70647ecabe81 fbc0a54ab9d6e1317867d478f765c4648ee0c3f156a4aaf29d851fa20b48d61f https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-3gm01Johnnie_47913652Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.479136526f50f9023262253c0c9d66bb66d0bb7b7e03753800252625a1878df95748444b 479136526f50f9023262253c0c9d66bb 9e9b6c508e2d483b6ca8461a9629e9f0f7b452c7463248bc8879b880a5cb40cf https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-khv01Snojan_d6b981a9Windows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.d6b981a98055927e501d00e9de448e49bb2c1d3bf47f278f51ed1e9631e45644b7da5b0a d6b981a98055927e501d00e9de448e49 5a74303325990d5beb7f46f91429a6178fb1fbb0daf64e82d72906608b8a1e90 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-pye01Snojan_3c52608dWindows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.3c52608d4cc67a6e03dbe4ecfda6e9f108d15b59514ddf276312a7f9cb0724dc714c7a13 3c52608d4cc67a6e03dbe4ecfda6e9f1 cec042b98f1ca6d223a4a3ce911098493ef656c7f628e0404325b5f143fd26b8 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-dkq01lcloader_0b21e209Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.0b21e2096c16628022453b25ef21d4fb4c8cf44666b1e3bab2c4553f54a659605b74c605 0b21e2096c16628022453b25ef21d4fb 9148c9000dfd4a1fe9a1fb64301c84eba312b578bc2c605ca1644169f8ab8916 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-cv401Johnnie_16204082Windows This strike sends a malware sample known as Johnnie. The Johnnie or Mikey malware family is known both for persistence and having a plugin architecture.162040829bbec6c20f8d89a7433902943419a68177c6c50466b5dce1cefa14421e513607 162040829bbec6c20f8d89a743390294 a14c508538dba4e05fcac66ddcfc1aaf4454507907523ba7d0983380e0a153da https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-mbb01Telegrab_5d317d35Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.5d317d35fa28721ad3c6e71180eb8b70a800cbbf890e9e7aedf4524cb5dc56c40769f76f 5d317d35fa28721ad3c6e71180eb8b70 a9822090b68066332178fcd8fbaaf706ad478e0a7a5b50e1b99bda52bc6ab081 https://blog.talosintelligence.com/2018/05/telegrab.html
M18-5g101lcloader_d8ddfe99Windows This strike sends a malware sample known as lcloader. This malware is a dropper that downloads and installs other malicious applications.d8ddfe99893d0ca81ca7703dccebaafde88138530620890e3f60403e762d17968c1e83dd d8ddfe99893d0ca81ca7703dccebaafd ef50d5e5dcc2a1ea6f546304b266b5c8960b0ee9c87305fc63c3cca26019d7d6 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-k4m01Telegrab_7543e861Windows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.7543e86119ff9e36669093694059567eb765a6b998c5c7190f237ea8d7f29e48fcfb2b2a 7543e86119ff9e36669093694059567e 286b7bf5ab74a5ed919b2caff250084e35ace2df1ed1b1c9e4ea556ba73f9e1b https://blog.talosintelligence.com/2018/05/telegrab.html
M18-otd01Fareit_c13cc2e3Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.c13cc2e3d78d8ebaa6a6e9156b7c0093987e05ee30e7f9b2ef3c31743461ddf8b9b85efe c13cc2e3d78d8ebaa6a6e9156b7c0093 b5eee79eb0cddb48fedce82ed4ae4ba364b995a97c536d528c739b01d7503eb4 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-oa101Snojan_0f8050ccWindows This strike sends a malware sample known as Snojan. Snojan is a downloader that downloads additional malware to execute.0f8050cc67eadf105266c85755210f25a0305d00f9c890d2f5b230fd9b92544acf7ff984 0f8050cc67eadf105266c85755210f25 5c712a999755291a8cd0204a2e18cf876117e10074d89c8ba1f4fbafaf4fcaf0 https://blog.talosintelligence.com/2018/05/threat-roundup-0518-0525.html
M18-h8h01Prepscram_1c5609ffWindows This strike sends a malware sample known as Prepscram. This malware is a software bundler that installs other unwanted software applications.1c5609ffe66501dfc51df8e28610dcea62f819548d07ee7162224389b8a24c1a3f76ae36 1c5609ffe66501dfc51df8e28610dcea e7010999238fd3cc2cc144b4ba09e0affc6362811cd76d27dd55848b266f6388 https://blog.talosintelligence.com/2018/06/threat-roundup-0601-0615.html
M18-ps001Telegrab_6456e99cWindows This strike sends a malware sample known as Telegrab. This malware exfiltrates credentials, cookies, and text files, as well as hijacks the target's session, contact, and chat information from the Telegram instant messaging service.6456e99c2391858484317ca4346d346d31308de4449701e05e3086fff255e8003cf7e6ec 6456e99c2391858484317ca4346d346d 2e608a18562ad0427b02cc225db8703eb55be189bf2bccc9250b3b30022fdd90 https://blog.talosintelligence.com/2018/05/telegrab.html

Malware Strikes May - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-ahq01Gandcrab_fec25d8fWindows This strike sends a malware sample known as Gandcrab.fec25d8f61087a4b55cf5d0299b6d37c79480e0f6b896d8eb9105f02cd47652486ece2d1 fec25d8f61087a4b55cf5d0299b6d37c 9ba83f1273348883e47f60b3497d14f259656d366cd9c38be1b15c99a4887433 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-nyk01Trickbot_5fe7ef0eMixed This strike sends a malware sample known as Trickbot. TrickBot is a banking trojan which shares similarities with Dyre banking trojan. It is used by crooks to target customers of Australian banks.5fe7ef0e15a4e9468018e0a76457d159e07fca5f3053740be0eb6fb4ffbcc1c20671b2f3 5fe7ef0e15a4e9468018e0a76457d159 76338d11807ec055ff238c0dbfcd9a7d68d8297713a90ee87b07fcfc248ebb53 https://myonlinesecurity.co.uk/trickbot-delivered-by-fake-natwest-bank-you-have-a-new-encrypted-message/ http://www.malware-traffic-analysis.net/2018/05/03/index2.html https://isc.sans.edu/forums/diary/Malspam+pushing+Trickbot+malware+on+Friday+20180511/23653/
M18-kus01Gandcrab_f6784398Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.f67843981e331b4034352506bee0229366a193c0b3e4df38f86c926dcbf3d7f7a74094a6 f67843981e331b4034352506bee02293 07adce515b7c2d6132713b32f0e28999e262832b47abc26ffc58297053f83257 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-4pz01Gandcrab_a9a0ec2fWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.a9a0ec2f171b9aa400912a80334b247069f9dbace88d98bc0f04b7c417db14a41ca8d97c a9a0ec2f171b9aa400912a80334b2470 0f8ac8620229e7c64cf45470d637ea9bb7ae9d9f880777720389411b75cbdc2e https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-2al01Gozi_1157a7a7Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1157a7a75d7d16ed2aeb80e631d4f33a21714237b26c5002491c082928563c9a17d44100 1157a7a75d7d16ed2aeb80e631d4f33a a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-c9a01Gandcrab_c8c5d8d3Windows This strike sends a malware sample known as Gandcrab.c8c5d8d3c888b6f1b37a66d4aefb16cdb966d1e794d2dd3e23a875f3bcf1deb5b7b144b4 c8c5d8d3c888b6f1b37a66d4aefb16cd 5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-1i201Tiggre_0463b0f4Windows This strike sends a malware sample known as Tiggre. Tiggre is a trojan that functions as spyware. It communicates with an external C2C server to exfiltrate information from the victim machine.0463b0f4bbadb22c5ad2ee12c61d775fe311db6bbae2cd1e8d3e93c26e4a07430e510438 0463b0f4bbadb22c5ad2ee12c61d775f 939d208be5589007d24178a92620411e2c6d84387c790699e57cb52e063a5348 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-yl001Tiggre_1953a870Windows This strike sends a malware sample known as Tiggre. Tiggre is a trojan that functions as spyware. It communicates with an external C2C server to exfiltrate information from the victim machine.1953a8706763f9914ad99f9b3faa894bdcbb45c5f196c4757d0375066a272bb242cafb82 1953a8706763f9914ad99f9b3faa894b b5ace9a48d9b304066b4d355921495cf32d3a8b303b2f82800ef11556b310474 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-auw01Gandcrab_c855f0f8Windows This strike sends a malware sample known as Gandcrab.c855f0f81d41363566223a019989b4e8658003452a03f481f22bd219bf924304340b38ab c855f0f81d41363566223a019989b4e8 a17fba572e8a74bc22061711196df78b603d6a857f8b687f55da21296b3cbba3 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-jq801Zbot_d20236bdWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.d20236bdd97732d43cade1ff0bdd9d4f91b5b15d8e45d7b11ad1327e73431c9a95523a23 d20236bdd97732d43cade1ff0bdd9d4f 28a2e64885f1aa2d81fefb0fda91ae7eb2801dfdbf4d9dc65f3848e4bdbf4d65 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-ov401Trickbot_35464492Windows This strike sends a malware sample known as Trickbot. TrickBot is a banking trojan which shares similarities with Dyre banking trojan. It is used by crooks to target customers of Australian banks.35464492a9b2e63ac10e12d3babc89a7f07111a7819f527581f46d08b5f14f8cfc6b9d11 35464492a9b2e63ac10e12d3babc89a7 bb2e040bb2652fab5eeb175daf2dc69ce2661087e21cebd166bdcc501b2f0986 https://myonlinesecurity.co.uk/trickbot-delivered-by-fake-natwest-bank-you-have-a-new-encrypted-message/ http://www.malware-traffic-analysis.net/2018/05/03/index2.html https://isc.sans.edu/forums/diary/Malspam+pushing+Trickbot+malware+on+Friday+20180511/23653/
M18-6jv01Yakes_ac0583a3Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.ac0583a33033f9fd6f098e452ad4bba5c76dfba9fa26645c3c573e9e174126733a662057 ac0583a33033f9fd6f098e452ad4bba5 ed57490c6876bf5d420841bdf5bf79002c323ea29b1e4b74093eb40290abb821 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-ro301Gandcrab_d795ec58Windows This strike sends a malware sample known as Gandcrab.d795ec58b5fb7b0bab59d30ea4f91cbbcb4e0c967caa7d41108121e8ea0f159448d087c2 d795ec58b5fb7b0bab59d30ea4f91cbb fd2de37d51a398725239f1c9943604506d52bb623ecfcbc40f6fb474cde9fbd0 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-7wy01Zbot_fafa6a6cWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.fafa6a6c17ae6a340c7bc95ed8852b1a875a89c20f0cdd74877ea59170570463f3783a3a fafa6a6c17ae6a340c7bc95ed8852b1a 158a7f507f494481083c4137dbb11474d7d8625c4ca45d0554caa4fcbb903992 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-1au01Gandcrab_b28cbc90Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.b28cbc90bee7153a2050a476b9f34ce12cc0ef187f9220986019f5887a0a65f368f8811a b28cbc90bee7153a2050a476b9f34ce1 ee24d0d69b4e6c6ad479c886bb0536e60725bfa0becdafecadafc10e7a231a55 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-9cd01Gozi_0fccc1bfMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0fccc1bf870df0df3b48e0b0ed50e5d5b3a442888010182a411a7b19ebc21d55da83aecc 0fccc1bf870df0df3b48e0b0ed50e5d5 b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-80101Khalesi_19593933Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.19593933c209eec2099dded69a90f2365ce28621828a5a2d5dd990ee25c63df5e97899a2 19593933c209eec2099dded69a90f236 093bd942ba8d60e579f1f6ec68f997e609d1ec2d1dee37369ea61e33d175ab0b https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-csh01Yakes_72b43077Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.72b43077691804a095d5292fd23f09387c5d31f7c94e4462c2616930136dcaaf6c981c4d 72b43077691804a095d5292fd23f0938 ac7b2901d2dffff27e27c4e2889f729496b94c4ffef3802391f7aefd837f6109 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-64q01Zbot_7ef1998cWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.7ef1998c5c0089b2820604cb047275dba669f261b36fa4c7aef7fbadda7a24eb6ef549e0 7ef1998c5c0089b2820604cb047275db dd8c0af99b112521bfebdb19afa5fe130925d158703180063c2b2c027b8adbc9 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-qyv01Tiggre_013012fdWindows This strike sends a malware sample known as Tiggre. Tiggre is a trojan that functions as spyware. It communicates with an external C2C server to exfiltrate information from the victim machine.013012fd487edc318eee686e02e012f8f43c45c4b6ec6b796899b16dbf56ca4a2d648b52 013012fd487edc318eee686e02e012f8 9cbb5dbb783671ffbfa65ce3b5053259536de48f0d64312e5c46e6cf49d9c901 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-met01Gozi_2938c7b0Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.2938c7b076107ec91b55067eb4d46a369cc180d0c4da14cf4458f2f493401b8a7127f265 2938c7b076107ec91b55067eb4d46a36 ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-an401Gandcrab_1af7f05cWindows This strike sends a malware sample known as Gandcrab.1af7f05c890dc620832bda0fb9a24507e40e442c2286ee13af43795ede7375abcea38e14 1af7f05c890dc620832bda0fb9a24507 e4b1789755f543b508745baaa7325e337e6b7f132cc5e051985ca677836cc571 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-kyg01Yakes_94f816c4Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.94f816c478fc8d649d3ab94c98dc3cfd26d67c7d41360af1db0f7dd8962f6a6253eaa4f0 94f816c478fc8d649d3ab94c98dc3cfd 3a5cff60f6dce5a0f264921838486ce9a7f48c2d897eb57886211bc99130d132 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-llw01Trickbot_99246603Windows This strike sends a malware sample known as Trickbot. TrickBot is a banking trojan which shares similarities with Dyre banking trojan. It is used by crooks to target customers of Australian banks.99246603209088dc1a80d4c9cd30f2dbd1a7f86f975b6d80f7663397c8558d04f0e663cd 99246603209088dc1a80d4c9cd30f2db 8bf06a4c2ef57383efdc8fe9b9860c8ede70c63f158b1f58ea9f1fb564710f50 https://myonlinesecurity.co.uk/trickbot-delivered-by-fake-natwest-bank-you-have-a-new-encrypted-message/ http://www.malware-traffic-analysis.net/2018/05/03/index2.html https://isc.sans.edu/forums/diary/Malspam+pushing+Trickbot+malware+on+Friday+20180511/23653/
M18-vce01Gandcrab_bbb97ca6Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.bbb97ca6460707a4f0fecd302a33c9ec3d48df2009d98d75dc88874cf95a49a5e58e4953 bbb97ca6460707a4f0fecd302a33c9ec 0b8618ea4aea0b213278a41436bde306a71ca9ba9bb9e6f0d33aca1c4373b3b5 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-zu101OperationWindows This strike sends a malware sample known as Operation GhostSecret. Operation GhostSecret is a global data reconnaissance campaign that has targeted a multitude of industries. It utilizes multiple implants, tools, and malware that have been associated with the Hidden Cobra group.d1cced59ad97f0f7c0fad78a46cca1518f2918c721511536d8c72144eabaf685ddc21a35 d1cced59ad97f0f7c0fad78a46cca151 ae65288f5c96b4656402853b14acd1d060b2a6303d833df5b1f10cc7a34b0025 https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
M18-qyn01Tiggre_0183d96cWindows This strike sends a malware sample known as Tiggre. Tiggre is a trojan that functions as spyware. It communicates with an external C2C server to exfiltrate information from the victim machine.0183d96c2394af160ad0b0a029743ad90b26f7e1d220b9814da6bc20d3ac45ec8ec780fa 0183d96c2394af160ad0b0a029743ad9 876b2e195cbc70915501f15a41b6f4e5b447985683427ba36d392bb0907ad021 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-7fn01Gozi_7ea4bef6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.7ea4bef65f98165b6d04252025b0c9a511757e130582f7b9ed748f5f870264efa2af618c 7ea4bef65f98165b6d04252025b0c9a5 9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-73e01Gozi_1f3383feMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1f3383fec72b09050d5433266233ba0c1b196a21b3146d6711528c27c4be0fc2bdf947b1 1f3383fec72b09050d5433266233ba0c 91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ia701Gozi_94ec8bacMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.94ec8bac411ca35917a304d48e8e6cd6fc60bcd6b753cc65c7f3e333a7c5b3c9edd92222 94ec8bac411ca35917a304d48e8e6cd6 9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-rur01Khalesi_0f0bc639Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.0f0bc639456214392d100f9ca595842e0604c072716a53d2a2c734c2ac9475509a92d007 0f0bc639456214392d100f9ca595842e 8c668d6ec3c6a619342d674e6f696403bcb872342fa17d7b18642861b4c9b596 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-pgh01Zbot_8386f43bWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.8386f43bd354f0c1b034669460c1ad45360b03db629b3eedaa94cd012ae5902d4c5d6fa1 8386f43bd354f0c1b034669460c1ad45 5f9afad7831895772534737ac2c036b1b65d02a46bc0f91ea0ef2879de3ba8fb https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-odf01Zbot_6c726d6fWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.6c726d6fe0772001721380cfbe8cd9b27a2038c1b829c45cc76c51f4578a79e408c89208 6c726d6fe0772001721380cfbe8cd9b2 a3a4c038aa654a5dac595465222404deef3f133828f6209f42ea8395156205da https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-ct401Gandcrab_b5dc95bcWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.b5dc95bc340047eba2440b61212cb8d128e5f4690222e413b847b3ca3e7982df14ea662c b5dc95bc340047eba2440b61212cb8d1 521fcb199a36d2c3b3bac40b025c2deac472f7f6f46c2eef253132e9f42ed95d https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-jpy01Gozi_557b1b7fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.557b1b7fc85e307b26f3cad2aabcfbbc4c9984a254c5c453a591fbc09edc916a43bec505 557b1b7fc85e307b26f3cad2aabcfbbc 9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-v7501Gandcrab_e9e25680Windows This strike sends a malware sample known as Gandcrab.e9e25680aa9c7a8f13fb91a50363e70e767d48b8622074b8f6689635c122aaf9db5861e8 e9e25680aa9c7a8f13fb91a50363e70e a332b560a01b6e07a5810ec6428314c23e426ea4292280ee0d06bfc2201ac47b https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-qze01Gandcrab_a0704048Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.a070404845b2028aa7a3f1c6976dfb17f4e9450d8c33a518785759e02287cb3493f0f563 a070404845b2028aa7a3f1c6976dfb17 a62bd1ff7efca64002d5831c3ea43cb713f8501e2c83bd30ab60d91047d45a72 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-opd01Yakes_74dc67adWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.74dc67adf3f446709dc7a2a2719ce0f2ea168f8331ce30c38b5800e13bc2fe5a857c422e 74dc67adf3f446709dc7a2a2719ce0f2 26498d8b242924cad96dea24b39d5df88850c24c5e567db646c8d20891e87ab2 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-m1r01OperationWindows This strike sends a malware sample known as Operation GhostSecret. Operation GhostSecret is a global data reconnaissance campaign that has targeted a multitude of industries. It utilizes multiple implants, tools, and malware that have been associated with the Hidden Cobra group.87a9511137154886ee03610c7a346c59fe887fcab66d7d7f79f05e0266c0649f0114ba7c 87a9511137154886ee03610c7a346c59 45e68dce0f75353c448865b9abafbef5d4ed6492cd7058f65bf6aac182a9176a https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
M18-vaa01Khalesi_29f92283Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.29f92283750de72e762be0defcaaf7bc2375cd5381df116fcd4e548065a1a1f8e6d9d4f3 29f92283750de72e762be0defcaaf7bc 214252466a63120c1473180e5f4d2558f59a6a12aa8f3c38d3d5f45712965d7c https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-54d01Gozi_22d01354Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.22d013541f27c6b017f805caedc7e1b0f78e584d918e74e8e7ff343a8801b50324374cae 22d013541f27c6b017f805caedc7e1b0 ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-jbb01Zbot_d4d7d671Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.d4d7d671d710093a703dd619ede3076fe8af2c1d9324657b8f3e551894c63626d94e40d9 d4d7d671d710093a703dd619ede3076f 03eaea48946117d85dde3d2a4668eb24b94323a255bc1fb7536b1de2bd888e74 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-z3601Gozi_8cc99c96Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8cc99c96034e8ceee56d25c5be6d34cb18bed7f3557e84c93c4e7837171bc655385fcdc6 8cc99c96034e8ceee56d25c5be6d34cb 956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-53101Gozi_c507c9bfMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.c507c9bf763fa29ecce8b09e2987707d0d0ba39278fe0baea8c5b58777c98d9ec7dc8de6 c507c9bf763fa29ecce8b09e2987707d a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-hhw01Gozi_e0cc6866Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.e0cc68661299ee7f8b728b502b068dedc1c6daa77ca105f36a52de957bc6336e7e637a84 e0cc68661299ee7f8b728b502b068ded ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-7my01Yakes_a1c17363Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.a1c1736310b46a2d7f58bfca1a625cc5ef6deb667ce0695e653a9b43aa7f2485847cb354 a1c1736310b46a2d7f58bfca1a625cc5 39cd2440d772085b1f2b84e524363a6e260eef6f2031300b9b6e02e433010419 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-jqw01Zbot_4f081c61Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.4f081c61edfa65080a2499a20270ef40ccff9c543efa4ab05558b198375871d48546e569 4f081c61edfa65080a2499a20270ef40 59de88ff962f019ad7b0bc2b242120ff0c916743c975f74c169247809ae2cfa5 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-rh201Gozi_214cf043Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.214cf04320b749b795c189cf7cd2d804462dcfe908d67f60c19d4a5b94653ab87b2078ef 214cf04320b749b795c189cf7cd2d804 9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-rj601Gozi_2d3f197fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.2d3f197f5e7dfc7c56af4d06fbccd6989131894f6864961f886b08e94276014385a6806b 2d3f197f5e7dfc7c56af4d06fbccd698 9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-32i01Khalesi_2517ebe0Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.2517ebe0c580891adf464e0ea24d9be8096ebbc7fafca6ed4cc00bb0dd95adb70adb391c 2517ebe0c580891adf464e0ea24d9be8 db560e6239674b9b4ea242d13e83269bc7cc26972bfc36d1ca729a95bec86311 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-bq801Khalesi_c4700969Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.c4700969a40e6a1235f92a4c08c52a22330e727a55b2ca6687ae32cbadbe07d463869190 c4700969a40e6a1235f92a4c08c52a22 f047a66647005edfb80ce99ce23dfab6874989081d3ff33c0795ccfddb47b0c7 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-unt01Gozi_769bfb1fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.769bfb1fd8f5eb181846c6d55845fec639212552a49b7097a7f6409f80141adb14ef04be 769bfb1fd8f5eb181846c6d55845fec6 8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-cf201Gandcrab_283586ceWindows This strike sends a malware sample known as Gandcrab.283586ce7ad44c33edcfb429ec5d3fc11edde685dc8c738144dca19ecc5a2efc7485fe64 283586ce7ad44c33edcfb429ec5d3fc1 4f5d759ad38c44b01c5442a985f25c10b2863ac890d26f42a3661a39eb6233d3 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-rln01Gandcrab_568a7adeWindows This strike sends a malware sample known as Gandcrab.568a7ade9b4b0d68cab32cdba71f63fa1d867b5887c25c4c19ce8a7a84f3f43ffe1dbbe0 568a7ade9b4b0d68cab32cdba71f63fa 722d9b3b235c118fd93c35d76535310f32ef383037645f9539dd46eedbe908a1 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-p3q01Yakes_8a8d85abWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.8a8d85ab018fd30f5127dfacb48dad68daf1a20f61a3aa054e7adfde29566e48afd31982 8a8d85ab018fd30f5127dfacb48dad68 c2ff1b2e48e269a22f10d7a89d2483af007fad5ac21d417e213802aaa0403870 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-0bw01Gozi_3a58e1ecMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3a58e1ecf150a64992b851b7142d895c4d022d61ff4b5935a67754ecf030bba117c63128 3a58e1ecf150a64992b851b7142d895c a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-n1e01Gozi_7e402697Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.7e4026976a304ad0530aac84e5393dc1b2d4507bcab81d3038726eff176ca4fef28bd6d6 7e4026976a304ad0530aac84e5393dc1 a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-1or01Gozi_c9fd0454Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.c9fd045485efe0eefabc6d81b4369d2c7caedadb59379ed1d502a391e37b4869425a2e58 c9fd045485efe0eefabc6d81b4369d2c a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-rjg01Tiggre_089379c5Windows This strike sends a malware sample known as Tiggre. Tiggre is a trojan that functions as spyware. It communicates with an external C2C server to exfiltrate information from the victim machine.089379c51b84146e32dd5c8da027e4a85fd75f156fa232633bc81a0a13b2c89a48ad9dd8 089379c51b84146e32dd5c8da027e4a8 ae6f4e3c68704c99db60617c09405ffcd914141f6147f7234bc5639105fb702b https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-f2o01Trickbot_f0bd265cWindows This strike sends a malware sample known as Trickbot. TrickBot is a banking trojan which shares similarities with Dyre banking trojan. It is used by crooks to target customers of Australian banks.f0bd265c4732a39c800c7f36c4f6d5cc664b0bb2e21dd167d3fd5ee6f804b188773f9ded f0bd265c4732a39c800c7f36c4f6d5cc 609cc34749da7ce6e8dbb3de9b7d0be03eca4cea63a4f3b1c383a3d483d0ecd6 https://myonlinesecurity.co.uk/trickbot-delivered-by-fake-natwest-bank-you-have-a-new-encrypted-message/ http://www.malware-traffic-analysis.net/2018/05/03/index2.html https://isc.sans.edu/forums/diary/Malspam+pushing+Trickbot+malware+on+Friday+20180511/23653/
M18-dn101Gandcrab_e0e54e43Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.e0e54e43e3e06a67f73178e18abd65d8ca62959be02a0eeea5f77dbebaf6a69e6cc3580c e0e54e43e3e06a67f73178e18abd65d8 4b53ebc0f9a4678c012151171718731e98d45f806b170ca04c7b2510b0e7c116 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-3g401Gozi_147b20ddMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.147b20ddc572866fe34695b79fb70047b5c236c5040ecf8c24a09c47ae73307953fc130f 147b20ddc572866fe34695b79fb70047 ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-8gm01Yakes_00c90337Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.00c90337756cc68be0ba22c6fdb182cff2500f8b40ce92373e1556d8aa5918e753cf007f 00c90337756cc68be0ba22c6fdb182cf e5bf1ff23ec9b7977e28643ba1102adb96576166de6e749c15f0fd54e8379a45 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-xhg01Gozi_9b6b9239Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9b6b92395d9cf055dab9b7e66f846ee50bf1aff8aba805b348731ed52b047aa2e0982147 9b6b92395d9cf055dab9b7e66f846ee5 ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ltb01Gandcrab_f11c2c3bWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.f11c2c3bd013d10f8cdfc43018327725a68da9e5696f18e5972665660553b72df7b79550 f11c2c3bd013d10f8cdfc43018327725 812a7387e6728f462b213ff0f6ccc3c74aff8c258748e4635e1ddfa3b45927f0 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-cyh01Gandcrab_96dc3e20Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.96dc3e20ed8581139d1ee270041fe050a5909db80d5e1c1149d213bb1c29185fda4080a0 96dc3e20ed8581139d1ee270041fe050 ad48c3770736588b17b4af2599704b5c86ff8ae6dadd30df59ea2b1ccc221f9c https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-0tx01Gandcrab_915a65f6Windows This strike sends a malware sample known as Gandcrab.915a65f6454abb500fb45eed10a9049dfec6a781a66789f98f46abfc02d9e3046b8dd237 915a65f6454abb500fb45eed10a9049d ba7cc79a6b9ee4973b90ce17f4552a6c8a869ebcda495109e7558788f5dd4581 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-z5q01Zbot_592bd612Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.592bd612a4f4cf06c17b62ea9b1919bb9bfd3a632d9fd5555a7c1b22cde06867d13fae59 592bd612a4f4cf06c17b62ea9b1919bb 908f86c043b0bb012e639d6c2b102a6af11288b7596c574abc4734213f5d95cb https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-7q201Yakes_8c886e8cWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.8c886e8c458c2343f83b120f1cefbbfbd9106fec662c8e4a31a45b642fb925ea1f38d9c6 8c886e8c458c2343f83b120f1cefbbfb 50d4bc39a6a426f9980a64bc464703dabe3ea4fa183265c66cb3d1c8adf82ddf https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-a1x01Gozi_94d2add6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.94d2add64b1e07760e8e4d19f5990a6d2304d54247853d33128b1606929b55c2e178b947 94d2add64b1e07760e8e4d19f5990a6d 90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-g3r01Gandcrab_265c7eceWindows This strike sends a malware sample known as Gandcrab.265c7ecec8d117a39b7480ae37d8c635dd42da294b64c6d455f7f75c32d99af1b6b35f45 265c7ecec8d117a39b7480ae37d8c635 a7250b307556cb0e6716312dce166ce8d6329cdbbe1e7a7ec7d9ad8dc37bef1c https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-oow01Khalesi_6d1fa5fcWindows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.6d1fa5fc36cf6dce7a44b002caf39794af193c9757fd499ff1859fb77f8b7b49ab15c2aa 6d1fa5fc36cf6dce7a44b002caf39794 f40486fa225ebc8fdfc133136453d84649860c55bdb03966f58500030c4d50d7 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-7bs01Yakes_2c2b99adWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.2c2b99ad896bb3ea3a79f8b04adab2f681a24d4bb6cccd310ed4749d8783be7fcc9f3d63 2c2b99ad896bb3ea3a79f8b04adab2f6 76dc4a0faea60ed479dca96a57faa6eb4249665d32f23530ae57ebe63a1911b3 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-r7001Gandcrab_d87b1a40Windows This strike sends a malware sample known as Gandcrab.d87b1a406d3af5d9c512d270d11e24a517e8a3585cda464afcf0fde4052cfbf6e0024631 d87b1a406d3af5d9c512d270d11e24a5 6637106cacc9767350a3ad1518e513996accbf45daeb9bebdffb699ae2d89dac https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-d9x01Zbot_be863b62Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.be863b62e2e65ad4805c121e29f37e4097e316f8a383a00026d21df5b3abbeb2c380ade6 be863b62e2e65ad4805c121e29f37e40 48fcb5ce8670e1829205abd6a911937a9b591d079067c8b25f6867bac059897c https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-u8201Yakes_f228aa96Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.f228aa9699a7b2fb309d9cbe5d86543cc15000828019a7baad9c54bccd42d9d9b1d83740 f228aa9699a7b2fb309d9cbe5d86543c 3015144e74631e7990953621367f33a673dea745154e904147532239ae5fedc6 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-mz901Gozi_3df21381Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3df2138116d2fedafb91816cd7167012d938099905038f767c2492672f489e5e66b8c39c 3df2138116d2fedafb91816cd7167012 904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-0l201Gandcrab_11cff7efWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.11cff7ef24061d8d59c6e1c2981a40e44a7f533c3206fc4fcbed10b3cf43e44a45db4548 11cff7ef24061d8d59c6e1c2981a40e4 d25d1aba05f4a66a90811c31c6f4101267151e4ec49a7f393e53d87499d5ea7a https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-f5801Gozi_4a1eb334Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.4a1eb3343df894ef4d6c4d63362896caf7fa8cc65e936f5a7d7f62a9b4eeb35d964eaf3e 4a1eb3343df894ef4d6c4d63362896ca 9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-hsa01Zbot_d28aaf9eWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.d28aaf9e33387807d3c64a72136da64a3952a0d1b003d8d2eca86fe893a2d243049dee40 d28aaf9e33387807d3c64a72136da64a 7326ec6dcf89d8e86d797ab70d4a8ad1a08b672af0c0a45cfb315ef83685cf43 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-7kr01Yakes_07050297Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.070502977eae54e84de1f7017ad6d4cab754c853e09f8827548fca9691b4e63f36d27aff 070502977eae54e84de1f7017ad6d4ca d77b972781dcf37a1c6a8f3d17077db8ef83f01f0e6449595836dafde9dabd13 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-20801Zbot_ef83ac1cWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.ef83ac1c99aeb5cfc8a33e87ee7bff09007f15c528e3d146d3ecd79fd69ec9647caae088 ef83ac1c99aeb5cfc8a33e87ee7bff09 f92989215865e61e5cfed94d716d37b4b9fdd92ddd3699ab269b2dad39d0e93a https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-8dx01Yakes_08d603deWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.08d603dee6afb84312549c2a33b23561c4f30a40a2bddbde503804e38962f867e839a2a5 08d603dee6afb84312549c2a33b23561 c4a606577fe097b9f3eb9ad1bf3e3d95f917383c765ba929b428fdb8bd17f44c https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-j5701Gozi_a494c62dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.a494c62d136444826d33af373c59305c31082b96d15f45cc5408ad044ba03191a4bab937 a494c62d136444826d33af373c59305c 903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-uxc01Trickbot_45de8d04Mixed This strike sends a malware sample known as Trickbot. TrickBot is a banking trojan which shares similarities with Dyre banking trojan. It is used by crooks to target customers of Australian banks.45de8d0447d08540f140480468b61e80f0b3aeaddf8cbb0ec98309efcaafe427c8843eb2 45de8d0447d08540f140480468b61e80 64a73552356e540436bf362e68118615f3bea4e3bdb987e2bbd5b51570aa1f6f https://myonlinesecurity.co.uk/trickbot-delivered-by-fake-natwest-bank-you-have-a-new-encrypted-message/ http://www.malware-traffic-analysis.net/2018/05/03/index2.html https://isc.sans.edu/forums/diary/Malspam+pushing+Trickbot+malware+on+Friday+20180511/23653/
M18-gc801Gandcrab_0cddd7f2Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.0cddd7f2e0f61895e40df348aa3c01ffb5bee3462c052963223681118d71f10c7d8c8a34 0cddd7f2e0f61895e40df348aa3c01ff 6a623b1e016fc0df94fe27a3eb9cc1128c5ee3831a7dcc8e4879427167a41501 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-hw701Gozi_1e0220c4Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1e0220c4b3b7df9f64f35de39aa9886c25b03486e53fd57f21be2b2dad2ff6375b60d9b6 1e0220c4b3b7df9f64f35de39aa9886c a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-cx101Zbot_e04bd333Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.e04bd3333d506e459f6a4c63f85663acf753268393f59aa0f5c1025522bfe79b0dfcb40d e04bd3333d506e459f6a4c63f85663ac 8db0ff52b62f3f07bc3c7a359dd06cf78e875a18f8b5120107a7f39bed3243b9 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-03v01Gozi_e6491fb8Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.e6491fb88600c6dad54a9bc22374d697b055ab57f2b0276d859be243a9240965637aa4bd e6491fb88600c6dad54a9bc22374d697 9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-2ll01Zbot_43bd5b45Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.43bd5b45e6df150410a70fbed737cb80d9a9ecca496a742ae21b9dd76aba2dadc18f0131 43bd5b45e6df150410a70fbed737cb80 1392b5afc478adfc11e6690ff6b6f9d55658bb2edf064b1cfbf655e674dcdc0f https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-jb801OperationWindows This strike sends a malware sample known as Operation GhostSecret. Operation GhostSecret is a global data reconnaissance campaign that has targeted a multitude of industries. It utilizes multiple implants, tools, and malware that have been associated with the Hidden Cobra group.35cd770bd67168229200933511eb45f433ffbc8d6850794fa3b7bccb7b1aa1289e6eaa45 35cd770bd67168229200933511eb45f4 05a567fe3f7c22a0ef78cc39dcf2d9ff283580c82bdbe880af9549e7014becfc https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/
M18-uyy01Gozi_314e533eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.314e533e5f7af75fcb0da934290ae6e151575e91aeb11ad7fafdc25983c50f587f5b4a56 314e533e5f7af75fcb0da934290ae6e1 92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-n0k01Yakes_0acbab83Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.0acbab8343a3d181fc3b4010f76e17195151677dae4845c732d8c1da6c40ff1cd33bb123 0acbab8343a3d181fc3b4010f76e1719 cd5ac2fd508dc3db95995fc643090f73581d937ac7620e058b7bef011e5c7eed https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-cjg01Yakes_230bd074Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.230bd0740782bd06802816e0bbc31c16a5e262d650cb9fc78f25b1b3db925fb45a3bdf71 230bd0740782bd06802816e0bbc31c16 0d6f846d3a96d84279a28b990201473882ffa08d733300b0da19e7897580d0e1 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-5os01Gozi_0b42241dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0b42241d62892e79ba105f81e2132c7ccd1d007ec54c80fd222d6e7fb847546af539deb7 0b42241d62892e79ba105f81e2132c7c a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ae001Gandcrab_7d24d9e0Windows This strike sends a malware sample known as Gandcrab.7d24d9e09f7b1313f5c5ef460864d6ea6174808d680374c03cf756fff66ba2ff81dda917 7d24d9e09f7b1313f5c5ef460864d6ea 82128b025ada18df07ae8ea6b24f3cb3a22ff91d8795a697cf03ca28f0601eb3 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-jwj01Gozi_a55555ebMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.a55555eb16d14828109fc31285a8fca367eca0a4a2e2589007d94ee23fc0f8d16a659572 a55555eb16d14828109fc31285a8fca3 8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-dsg01Yakes_32f79689Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.32f796899006a838053f973f78999e8af3350cc9edb2712c6b56782a264202f86d64d392 32f796899006a838053f973f78999e8a bf131b8194cdc3073adc2913e3133d049361cc0d8ffd09161e71c537abbc9b46 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-9wg01Zbot_c19c8f9eWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.c19c8f9ee84867cf641fd83b1e35d3df8f8bea90bdfa1508c24296c7cdfc66520c2150f1 c19c8f9ee84867cf641fd83b1e35d3df a6b52e4b6803092c91f81aeff5093cdee346b810b415b7b82a24afd63a33c309 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-1ax01Zbot_7ab30c72Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.7ab30c72c20c0333f319c24c8e2f1a417caedd204b194ed7f37c723ef01652596ee03c8d 7ab30c72c20c0333f319c24c8e2f1a41 38a951f8f57f1028a92d658841df63068d0a59aa9f140087870b2b6450002baa https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-vbi01Yakes_2fd05317Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.2fd053173602ba48806ec0620dfd94dcfab45fea8603fb7b5c35c000e4f8cacf96ae1732 2fd053173602ba48806ec0620dfd94dc 1d0a138b233dd25cfba925034778bc05e911407633385de30ebe15be61984bae https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-f3f01Gandcrab_a7af2c9bWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.a7af2c9b8c040970b886bf255757c9deda1e95499d82b4031d3df5beb3a3f7dba034a519 a7af2c9b8c040970b886bf255757c9de 692c023850bbd95f116d5a623a5e0de9ad0ad13fadb3d89e584cc0aa5dc71f08 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-wzn01Yakes_24b47947Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.24b479476594147d8f2a1501702dff6b92c285dd54acaa9a779221c37510dfa48a694f71 24b479476594147d8f2a1501702dff6b ff06a02731588c4dd5b78584f5342739f4b65c37cfb34d73380d8e98a66fa18e https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-nv401Gandcrab_bef96830Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.bef9683038c472c25817cdb80ae4441afb1d50070923986e18b341e0b27386b32881954b bef9683038c472c25817cdb80ae4441a 022995fa1ce1451aac2d87c8b85cdddd68f5bea4563c3af98987c4d3dca2f824 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-y4a01Gozi_b90d4398Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b90d43982901803c61b3ab1132e376768bc267785b484d54047ec8352995b3b0dd8ea85d b90d43982901803c61b3ab1132e37676 98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-hom01Khalesi_12c3c469Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.12c3c469d6928d9b82da23e984cc88484da8d082a4b4294b92d221a1607714d8d8d12607 12c3c469d6928d9b82da23e984cc8848 ef52d2737ded930694deb98880041e97a22be13240e143e9fe7c665dd8ba486d https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-e7i01Gandcrab_ed33e32eWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.ed33e32e29b9562954495895005715d43457923f5e072f51dcc9dceaeda7bf077f09c9bd ed33e32e29b9562954495895005715d4 3486088d40d41b251017b4b6d21e742c78be820eaa8fe5d44eee79cf5974477e https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-4jn01Gozi_10a9c654Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.10a9c65499b1921019f9704b9d461f5af6229c6a1b417d24451b86e7d40318f221d53b32 10a9c65499b1921019f9704b9d461f5a 901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-69c01Khalesi_04875ad7Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.04875ad7817929ec688a06af7c89add8a76b65dcd1c2152e167129bd59b9ca78e5e6d5b7 04875ad7817929ec688a06af7c89add8 ba8e4a8555628171ee51b9730e3d5fb549936921645b34e4bc5669573fa1fccd https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-pt301Yakes_40efb899Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.40efb8990ac61a319a2faba86cfb546a4f137da0324f1e091cc4daaeb9cca24f313671f3 40efb8990ac61a319a2faba86cfb546a cc52ae1383c424b2481b3e975aa0b6c93061e63c28b7f93935222e474b75fae6 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-lbf01Gozi_f2e43e55Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.f2e43e556ec1d89e283cd22af4d3fca95f42072c970484a09da377c8bb3b2b651ba1696a f2e43e556ec1d89e283cd22af4d3fca9 aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-46201Gozi_13b32557Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.13b32557ffd89f5b79e73c235bb242f55f3af6334f2518cf32c7e4dda4e0d1b513c3dd91 13b32557ffd89f5b79e73c235bb242f5 9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-xe601Khalesi_429eec4aWindows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.429eec4a4b674d0922d72aaac8adfb971d84014a3f321f8d90a02da72028f3a8e3515dc2 429eec4a4b674d0922d72aaac8adfb97 8aeecbac14b07c7498a0a14ec5f6faba3586ef253e63a6ff035090e937cee4ad https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-3ws01Gandcrab_38807c11Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.38807c1194045999a6d798446b6273fc43cccbdc420b1b21fe145394f3b666e4910e7d92 38807c1194045999a6d798446b6273fc 0678aafb4eb91d68de4c9354e4a254ece02422cbb43157ae06b5b925a1165992 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-9c201Gandcrab_babdec16Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.babdec16c40c2e6997ce71ece2d223b445e7b60ae1c592820603682e183d59b4445c04fe babdec16c40c2e6997ce71ece2d223b4 d1901ded57b17e405c68f235db33d7be48cef6b0a9a45eb58de7b771b7582004 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-vo701Gozi_65783e3aMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.65783e3a26527fc07f3bbe65d546383c7557fbbe757946ed3d519abd470fc951d6b2cd60 65783e3a26527fc07f3bbe65d546383c 9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-yhm01Gozi_b28f3adeMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b28f3ade5237a99db046b52d00a4e12cf670e53a32369cba2da1efa3e0560b03b54fc56a b28f3ade5237a99db046b52d00a4e12c 90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-y1m01Gandcrab_1d08ad42Windows This strike sends a malware sample known as Gandcrab.1d08ad42c54673829c340ff29434d0b322a7d249eb0e9b44a0dff7dcb2900b9096c8f930 1d08ad42c54673829c340ff29434d0b3 1c69810013cb87242df28f48ff1b80bd006b2bd0cec8bdcb3ad0c0441a9c48a7 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-vmq01Gandcrab_07f2ac3cWindows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.07f2ac3ca63b6eff0761e0184123c492d4ef54c4c223e10782a60037ddfd446bd6d13021 07f2ac3ca63b6eff0761e0184123c492 27431cce6163d4456214baacbc9fd163d9e7e16348f41761bac13b65e3947aad https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-phg01Gandcrab_b081e5f4Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.b081e5f45cd118d68e51e26dfa8665b34c4b4cbd493def32f9964d5cdcf04fca1012a38e b081e5f45cd118d68e51e26dfa8665b3 4b64922b694e26c5abcd2bf8ba9954520009e4c1088e4ce9417fb2d06a2c79db https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-vhq01Yakes_41642e28Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.41642e28db0281aba6e1a61843c70c6d8b02fba415f4b39c57bb5f650e90e22ea1176440 41642e28db0281aba6e1a61843c70c6d f8d14cf852d1a450866d4749733dca06ce08f0b48534874b46218d671526eef5 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-y5d01Gandcrab_d82121c2Windows This strike sends a malware sample known as Gandcrab.d82121c2a303d3e7cda5178f67310393193efd99a35fbd16a9752915b4bb2dc119f1a7a7 d82121c2a303d3e7cda5178f67310393 749cc6d350bccd23970b70463abcd9efb782a35da7c03bc8de5c555f2bdda430 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-5gq01Gandcrab_a57143d3Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.a57143d3e1b381531850738b2317ee406fa5180c2df4a45e5fde734e9655683f40b379af a57143d3e1b381531850738b2317ee40 d71337186b871ad011ae9b1f568290997ec445f468702273a68a7f5366bfb2d9 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-40a01Gozi_24309e61Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.24309e61b949da868ea5f31b3f064c4018d64a9b1df49ccabc13344cbf57e94ae3f4b185 24309e61b949da868ea5f31b3f064c40 b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-za801Yakes_0ab0d945Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.0ab0d9458353d09d20430e9440eff2c4ba5a683b165db323f340bf11c60eafee65d49806 0ab0d9458353d09d20430e9440eff2c4 14b2f4fb032f20cedbdd692dcc1a8cefcd445a94198f58adc474fee8dc7d57af https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-8ze01Gandcrab_a2bbae61Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.a2bbae61bf0cf64b9d04b18cdd2a419dd8eb074db4eabe9d48502b4a6ba8183c5337527c a2bbae61bf0cf64b9d04b18cdd2a419d ce9c9917b66815ec7e5009f8bfa19ef3d2dfc0cf66be0b4b99b9bebb244d6706 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-04001Gandcrab_1e631e76Windows This strike sends a malware sample known as Gandcrab.1e631e7635702a857b490331d7d0a8e4faa8ef1ab9001777412a4ada4ccf9a3c83f16f3a 1e631e7635702a857b490331d7d0a8e4 8b0122198f51599af74f7e40783bf8f8273e8c5bd1a0e0747161bb3fb74bff75 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-lds01Gandcrab_e9d24074Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.e9d240745860b54cdfa5ca95f2d3e4d593d03cb1a1a1b83885d833a0c4d21a137f49b691 e9d240745860b54cdfa5ca95f2d3e4d5 8b59359e89fbddfd85ac6af0641ebec1881aa7c28a6479205b876abdc47fc8bb https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-y4g01Gozi_45fde170Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.45fde170eec6aca0c6db4c4044343e238591d082074590978cf8477a727a72a19dd027a7 45fde170eec6aca0c6db4c4044343e23 a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-98r01Khalesi_d6250544Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.d62505441bdd04ce2c35cf34877f193fd51aa28438e4dd564152357e56b4c6f2a0df35ae d62505441bdd04ce2c35cf34877f193f cf0425375056e906b8cb739d432d724ac30870995915342bc275d047637ea54d https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-zyn01Khalesi_aab2c2dcWindows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.aab2c2dcb96a62e6116eca779be3a0ca1a6d16c2c6e0c6871914c841c6d3ec875aa794fd aab2c2dcb96a62e6116eca779be3a0ca 6972e8b418b60905c630c80c8476b43c941eafab0e0f79ebe6a985e3e60bdb00 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-4ss01Zbot_99e3474bWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.99e3474bc7fc4c9a998037663f6e3dd4e998344819efdf36ef8703267471f0f64f4d43ef 99e3474bc7fc4c9a998037663f6e3dd4 6baab60dcfdbd2ee3dbb012b1a00d063a4b05305a444f7ffe633d6175dca6852 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-ob001Zbot_164a7cd5Windows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.164a7cd5e3cce2a842708a433640ec19e2412f9077c5b24e8f78c5f3353ea47c99e2b934 164a7cd5e3cce2a842708a433640ec19 8298f4cfb3d5d6838bdebc4642e6b3aba2b1e74562014be11f6fc106af1be491 https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-9ax01Khalesi_115ac163Windows This strike sends a malware sample known as Khalesi. Khalesi is a trojan that attempts to steal information from the victim once it has infiltrated the system unknowingly.115ac163b96548eba530675c351bb27cfff4a29cfcb9d9dc0ca19981a8ec3e47cd22880b 115ac163b96548eba530675c351bb27c 58182cbb334d50f9758cd669ead059ddd8902fe0902bc8e3a9b5d9ad21906a0d https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-24e01Zbot_b0f99c8eWindows This strike sends a malware sample known as Zbot. Zbot also known as Zeus is a trojan often associated with stealing banking information by keystroke logging and form grabbing techniques.b0f99c8e081f5576851922dfd42925d6d2e35e0bea659e1ce4014edc0edff74165cfb6f0 b0f99c8e081f5576851922dfd42925d6 f5dd87d465516dd03308ae2e7673681fc497d4c30751e5a0fcefdf320761b56e https://blog.talosintelligence.com/2018/05/threat-roundup-0504-0511.html
M18-oit01Gozi_20cf15ceMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.20cf15ce96e40c5f79778259b23d1eb36ae7a39fd3d8d192118a68a01c23d0d181029e94 20cf15ce96e40c5f79778259b23d1eb3 97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-wpx01Gozi_9f139853Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9f139853e3b03ec7b833cd731cf9b1719d45536fcca3da6c12d36337a324d864121ddc6a 9f139853e3b03ec7b833cd731cf9b171 a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-na601Yakes_bdd20908Windows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.bdd20908b9ba939cfd8708c7cb0a84cab5d5b3be9c6c343168b9d683de132f069e54b85f bdd20908b9ba939cfd8708c7cb0a84ca d76273353bf949dafe1afb1ee27c19efd1221e8cc3bc9eb7cba1d18089b7ff4f https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-jgt01Gozi_461b57e5Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.461b57e5434e0d87d2f673815cd1285e0757b4581ac588ed47a7349fcf71c931c26631b3 461b57e5434e0d87d2f673815cd1285e 9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-fbx01Gozi_567e9750Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.567e9750bf01828f3e1a5385768ecb150bfff87f65f9eedd23f522f23433a4c359fdb16a 567e9750bf01828f3e1a5385768ecb15 9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ig001Gandcrab_acf45229Windows This strike sends a malware sample known as Gandcrab. Gandcrab is a popular ransomware that utilizes both spam campaigns and exploit kits like Rig and Gandsoft. It exhibits common ransomware functionality like encrypting users files, changing the desktop background and communicating with TOR.acf45229a5811cd888942277c45e2c3f8b75d7b1395e57ff39d9e2bab65b245921e97148 acf45229a5811cd888942277c45e2c3f 6b3a7117a457273d4016243892b86456ae9d1acd35eb770702363ce55b938e1a https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html
M18-yei01Yakes_1dd02afcWindows This strike sends a malware sample known as Yakes. Yakes sets up persistence and modifies Windows Firewall rules to allow for external communication with the attacker.1dd02afc30a471c25caf2db10f6e7c30a7e51d52fc58bcf859b668cf4fd382bb5fef113f 1dd02afc30a471c25caf2db10f6e7c30 35f0da1890f512f1185cf1502306c641cc9a6a28060b387e33d638bda22a5e96 https://blog.talosintelligence.com/2018/05/threat-round-up-0427-0504.html

Malware Strikes April - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-nhv01Gozi_8bb3ba30Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8bb3ba30f2d004437b878829c54c84bf36bd8afb99dc238c2b90d61f43219be331714e5d 8bb3ba30f2d004437b878829c54c84bf d1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-pac01Neutrino_86e461c7Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.86e461c77c398bf314605556bb03cd9dd29cbf86f56d0cddab991028f941f05d49a2b1e3 86e461c77c398bf314605556bb03cd9d 3431065d2208123137714d2d432427d33cff576d202e1fc7ea2990b21847cce1 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-3xv01Fareit_d0f9b665Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.d0f9b66595164fd1c9dac24d60feeba3637fd31d870fda81f19378df838bf639dcfd3492 d0f9b66595164fd1c9dac24d60feeba3 9c6def0cb6963372a10888e6f702d80381559a29db1da32ab149273b3d10ca34 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-9u101Gozi_402496b3Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.402496b36984ba7d4f384e6d37f29e2fbf781f9ca6bf84691af81afe2377f3e953dc6c98 402496b36984ba7d4f384e6d37f29e2f cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-cyo01Gozi_acdb52baMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.acdb52ba10e89aec5fe717f428636875df4bec2c8db28c8d5a9892c9b716825bb82ce467 acdb52ba10e89aec5fe717f428636875 d156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-qgx01Gozi_9e9019bfMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9e9019bf73721932fae204e518434f9a615223858659a63d29e41606003fc2c099d24bf3 9e9019bf73721932fae204e518434f9a c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-6ur01Fareit_4e70fdc8Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.4e70fdc8daeb5407f94ae0fc08153a691bf33d2d59953981ceb693ae5a2c83f5050965e8 4e70fdc8daeb5407f94ae0fc08153a69 3ed671f4ea7e92ef0e0bf61e7bacc0b7a2a82ccea73a53e7cde66e3497a86520 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-11l01Gozi_046c3f9bMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.046c3f9b6ef9e9ea743428f2da359966a2c531dd0692088e1afdf22b9624335f2e72b930 046c3f9b6ef9e9ea743428f2da359966 b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-35001Gozi_231d4f2cMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.231d4f2c7eb9b8af7915e3ca4d4c1d2b55e714a36a7922274733ffaf8ddbb9ff77787c22 231d4f2c7eb9b8af7915e3ca4d4c1d2b c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-joh01Startsurf_01cb31d2Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.01cb31d2516e8a3e4d4340dd698809addb2c7e74092e6a4499fb8bfe53985850f2121c0b 01cb31d2516e8a3e4d4340dd698809ad 41bf7b4e4d7a87395cc8867e026ed9d586830420a70325a672d07ea9c1a351e0 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-axf01Gozi_0cacb65eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0cacb65ec9da1de3c40dc0415e3ebc120d2002f4b7132a675ed7513d8a076a621539b466 0cacb65ec9da1de3c40dc0415e3ebc12 cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-dbj01Startsurf_0b2e3b4bWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0b2e3b4b0f7966745eab9308f9c7f5631ec05f2f0fd5cadb5ebd4d85d50989f69ad08661 0b2e3b4b0f7966745eab9308f9c7f563 66af9dc27feb2b69729b82e4076dd699cc504c3c8dce943d2023c7bdeca00f2a https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-ow601Gozi_32d09598Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.32d095989392b0aa877729ca11e66e609c3774494d1a4550276d7507aa9e77409d302b1e 32d095989392b0aa877729ca11e66e60 ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-63w01CarberpWindows This strike sends a malware sample known as Carberp variantD. This sample is variant D of the Carberp malware. It employs the Early Bird code injection technique to bypass antivirus software.29872933e896d0b77fb6a3613f5835440d432597736f2789ed75419b374cbe96f1f89b1a 29872933e896d0b77fb6a3613f583544 a82c9123c12957ef853f22cbdf6656194956620d486a4b37f5d2767f8d33dc4d https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-b4j01Gozi_249a5fb9Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.249a5fb9382f9b42fc5b09c14cfb469e2b3a9ad7772c5592c2ecb4380bada0ee52000b56 249a5fb9382f9b42fc5b09c14cfb469e bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-bcx01EarlyWindows This strike sends a malware sample known as Early Bird. This malware sample has been identified to use the Early Bird injection technique which allows code to run before the entry point of the main process thread and bypassing antivirus software hooks.03e662753b2c4a05c40ad3525eeef903084de9501d126b1ba152d4c52ebec53704a411fb 03e662753b2c4a05c40ad3525eeef903 165c6f0b229ef3c752bb727b4ea99d2b1f8074bbb45125fbd7d887cba44e5fa8 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-q5e01Fareit_ee9803daWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.ee9803dab96dba5f4acc1323d9dfc2c3b4d3075cf211fca5556a5ceb4e59672052860a43 ee9803dab96dba5f4acc1323d9dfc2c3 85d0021f75a2d312a27bc1c17702d09520006aff590d439a90d8045d2325a04e https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-rb501Startsurf_0a2f5b36Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0a2f5b366536bf0d7c2d9bcf04ba0281e7ca93029ce7c3e83cfbf2f5ee97e0e813092c29 0a2f5b366536bf0d7c2d9bcf04ba0281 4696ddd4a7ed96a86a09413f14657c7e01053213f6f1f6008a3a3bbe4fe45229 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-et601Gozi_d16db9fcMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.d16db9fc78598014d0dda258c84377e438149c57f239b678c4a1ab44cda8639db576c7dc d16db9fc78598014d0dda258c84377e4 ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-l7201Gozi_672104a5Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.672104a5544738f88e98ca2dcadf15b5c9dd0aa112ed4fda6fdfb13e9a7b17843ee58407 672104a5544738f88e98ca2dcadf15b5 e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-axx01Gozi_3944464cMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3944464c989438ff54697b4e190c9b19e0c315a7c217cb7cace5f307e5e1ea4d3761f899 3944464c989438ff54697b4e190c9b19 e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-zju01Fareit_8d0fb621Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.8d0fb621ee78ad8e35aa4965cbf4e4759b3389de25b4f5248760ad9c520d4e52db0c0b9e 8d0fb621ee78ad8e35aa4965cbf4e475 ba0a2f6e001bc9c02ee8c5fbcd6cceaa74ced5ec058dfda71623146f06ff2490 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-vnp01Gozi_340f5747Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.340f57477a1e9b238ecc22ae4bb60b4fc9d4dadcd7f6851d0a249274530ee09808f7b9c2 340f57477a1e9b238ecc22ae4bb60b4f ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-jp401Gozi_847994b3Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.847994b3a270208c427f6a8584fe494d079cfe48c45f90318bb4c819b246957b7be10e1a 847994b3a270208c427f6a8584fe494d c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-5jl01Gozi_6693e904Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6693e904fdd23b36f443613cba5735a6574c0bf112d0d15a6579652c01ca0c1c39d93424 6693e904fdd23b36f443613cba5735a6 e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-mpg01Gozi_b7060ec2Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b7060ec29c4020b340be54997845187dc46cbf8fb7b6066e4a9b2ffd6daf52eb1395e801 b7060ec29c4020b340be54997845187d ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-kx301Startsurf_05c9bafdWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.05c9bafd172cd4832bf57ac9bc7e37c9fcf95beedf57b54a8891eb8b1d91d9d9762e052b 05c9bafd172cd4832bf57ac9bc7e37c9 04ead5ee82c762a26e1dc0e6a8b21c54669c771cca0291b5d41282d2e73a7fc0 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-i9z01Gozi_00cf83eeMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.00cf83ee91654990c031ce1b1de05435696ae9e32c7cc085d62336d910abe45111280f66 00cf83ee91654990c031ce1b1de05435 baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-rhv01Gozi_2b9bead7Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.2b9bead7066d932743ca82e2e90e482a97b132de05a2ccca487bdc19ce10db493c18bba2 2b9bead7066d932743ca82e2e90e482a bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-uqw01Fareit_aa971830Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.aa971830a71ac5ed72a41008e817d68e545674151c18be26a234873cabd26836a0304aab aa971830a71ac5ed72a41008e817d68e a854a9702c14be3508d35873e80577ee9b1296c993ee2a4269c283884775564e https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-2s901Gozi_63074bf4Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.63074bf458228184828d9938941dd12c81e9ad0bb72e459f2fd47c89cacd01c0efe3fb30 63074bf458228184828d9938941dd12c e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-5rf01Gozi_1a292f55Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1a292f55814ef9e1f70049df9334fb5793ce5a6a664312b6486d000077fcdebe3fbddb9a 1a292f55814ef9e1f70049df9334fb57 d8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-fqv02Neutrino_053e2d24Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.053e2d245b3192f430ee06c33865f531120718cc4ca8df9dd7b11108e632bb7b0981f2ce 053e2d245b3192f430ee06c33865f531 174286f1a0bd66552237da989be39ef821b11fc6acccef5eabc00448991d1876 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-79501Startsurf_0236820eWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0236820e0e54b9db96afebbee3719673ab279e125a2aa2cd86934da9f27d36184a01813f 0236820e0e54b9db96afebbee3719673 f1dbfaf0378434cd1758feaabe050171df1c234ddc6215df494c6592a9e92547 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-oft01Gozi_bf362810Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.bf3628109b384926c0daf5ef3444628203cb29686389c965dd0176c318ede853e547054a bf3628109b384926c0daf5ef34446282 b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-6rt01Gozi_8a0ec9cdMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8a0ec9cd97b84b45be7c72601e6256567e09feadb08692ae98f1d5c7effb0074acbfe93a 8a0ec9cd97b84b45be7c72601e625656 d4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-msg01Gozi_9ab3d830Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9ab3d830514a2619ae98d4449cf088603b2974b7901f51dd935a0a606e7ce221565518d0 9ab3d830514a2619ae98d4449cf08860 b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-uvv01Startsurf_05bef52cWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.05bef52c0d184f19d99d55e90aa2a40f052c2631b3af54323f2514827b1413084fdaa62f 05bef52c0d184f19d99d55e90aa2a40f bc782f40d16fd6574c1e84edd0728470f426a31d2ff94e4bbb87a19cf3992048 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-cve01Gozi_6d64c1e2Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6d64c1e20c8953304a76f313f0e36e8ea83d6c9f14f0e5104492498fb98e91096ec9b9a0 6d64c1e20c8953304a76f313f0e36e8e b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-x0402Gozi_1a75be6cMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1a75be6c77ffedd2cde402495ddbe668b8a3f39c3f8e61b4ea3de7973b749ff470da162c 1a75be6c77ffedd2cde402495ddbe668 b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-y6y01KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.fac94bc2dcfbef7c3b248927cb5abf6d20b7e624eaa2da04867a9229e9aca41f952917c0 fac94bc2dcfbef7c3b248927cb5abf6d 3e7181fd3e893e6b13cc40ed70afa549c8aaf37fe9bee22445b8bd912d7bc522 https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-e7j01Neutrino_bdaf573fWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.bdaf573f5f56f4542196d69e9af17b600700816b242e950ca16e58e33f8c31d173b9371a bdaf573f5f56f4542196d69e9af17b60 973c024f2af38334bfe80a5c1fc2f96b2215397124ff08110e3c96aa986e7440 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-cvk01Gozi_edcb2629Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.edcb262923c5d492034f6db5dba88cc549db9d14abe36ce23a24209eb3070038a6714e65 edcb262923c5d492034f6db5dba88cc5 e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-uh501Gozi_4ddb841cMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.4ddb841ce0b99075668e22674716c8d4d049a2c4cbdcf5f742b012fdd24e81078878d197 4ddb841ce0b99075668e22674716c8d4 e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-5bt01Neutrino_36661ea7Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.36661ea762fcfb7bfee99a90696c5caa16ec8afa964a524f40e4dcfd285415c299a3315d 36661ea762fcfb7bfee99a90696c5caa 4632c1023c0baaa1e227defd4923098c4f3c49317964ff1cb088b40b9df7a605 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-gyb01Fareit_4ef158b4Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.4ef158b4573016629ad7e98ac8745bf68084b94e5dfab7e19e9f55c20f66db700af70949 4ef158b4573016629ad7e98ac8745bf6 b4abd9556f093b7d80bdc755d502917310a807d5ee9d9f9bac19bb0c8d596dbc https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-dju01Upatre_015fd375Windows This strike sends a malware sample known as Upatre. Upatre is a downloader used in exploit kits that retrieves a variety of malicious executables for the target to execute.015fd37556083555fe11ad6dd0a144e057fb04b626594b1ef374073a4c4f85dfd4dd4543 015fd37556083555fe11ad6dd0a144e0 79a50327843a8ccf58147971d1c86945f9a40cd0d4ee35084b8af26c9f5ab210 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-hw001Gozi_9d095bfeMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9d095bfe4e4de6a0ff97f683fb3355f113e758afee7ee7fabbdb5191a3b699508a91e388 9d095bfe4e4de6a0ff97f683fb3355f1 c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-csm02Gozi_0afeecbcMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0afeecbcc47c0cf76c36e5b4c6412122a6a231c081b7bf58316b24aa9a43bb982962958d 0afeecbcc47c0cf76c36e5b4c6412122 caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-a6c01Neutrino_f361c249Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.f361c249ee3d8f4e5aa365e7dc8eb1cb6f6eaee7ae811898f9e9bb30715ae3d8303c7687 f361c249ee3d8f4e5aa365e7dc8eb1cb b1d0bfdd95f168cea0df0e138ee627cb7feb0a26ac7a736baa031547bb6fb08d https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-rgx01EarlyWindows This strike sends a malware sample known as Early Bird. This malware sample has been identified to use the Early Bird injection technique which allows code to run before the entry point of the main process thread and bypassing antivirus software hooks.706630a77f06ef8fb90eb312fa2cbfe67b1a8cbd4a860bb14bcd690681fe856de2457d98 706630a77f06ef8fb90eb312fa2cbfe6 9173b5a1c2ca928dfa821fb1502470c7f13b66ac2a1638361fda141b4547b792 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-6f001Gozi_051db7e1Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.051db7e12077819ba14e6ac0fb63102ec5e582b4fda04883c2fead58c5876b30a83c04f8 051db7e12077819ba14e6ac0fb63102e b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-qld01Gozi_359745eaMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.359745eae11ef65e0bf88700ea5b94aa63046f4fdbbd5dac4f06e146fbfcbe87ea0c464c 359745eae11ef65e0bf88700ea5b94aa cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-exo01Neutrino_ab282b76Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.ab282b76982e4d9dc477732a3aecd93a3ee8a12b2110b21ceffb54942a0b925bc5a44c26 ab282b76982e4d9dc477732a3aecd93a 2df889657dd28f91ea10c08d5a72cf890bf142a6fb4928520ecdefcf708cc2b5 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-10t01Fareit_0a72951fWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.0a72951f5e1ed79de9f470ba42cdd6062be592e359a630f45b5a59b5953c1cbe9c7b3308 0a72951f5e1ed79de9f470ba42cdd606 7b24f0523af239668ee8946c433c53d0c233b0290bbaca405885d39dff86fa1f https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-1uq01Startsurf_0f102fc1Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0f102fc1cc92f69ee36e08fcdd3e1968a0d18993251ae90c83bf97008cf08d35188a6714 0f102fc1cc92f69ee36e08fcdd3e1968 0863bf4a5476b5de02a15c3bdec1604c7d8ab7c8ca1c0546edf2f16a756e0d8f https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-lyc01Gozi_be781592Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.be781592db7b68fcc27aeefe5dbec8b1d4925c4922a8a989617812d58bac72dfb3e59212 be781592db7b68fcc27aeefe5dbec8b1 c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ku701KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.6277e675d335fd69a3ff13a465f6b0a83f5ea936f02187e3e6297c410e260e71ca11e14b 6277e675d335fd69a3ff13a465f6b0a8 6f7173b7ae87b5f3262e24a5177dbbd4413d999627f767754f08d8289f359bb3 https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-qu801Gozi_0b08cf45Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0b08cf45db88cdaf34b088daff9ad54db37f6583310053975dead7cd6d69044799d891af 0b08cf45db88cdaf34b088daff9ad54d b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-hug01Upatre_04b1767fWindows This strike sends a malware sample known as Upatre. Upatre is a downloader used in exploit kits that retrieves a variety of malicious executables for the target to execute.04b1767fc8c7576329d0d9f130570483d564f1a814aa7ee497506900e9f6f08dac802a62 04b1767fc8c7576329d0d9f130570483 e122d91eb62a33c8b4ef56b2299caf2f58fd4e48694c97e06c92f858497cf860 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-vwq01Gozi_151c2c24Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.151c2c242a9ee4e72a0731df6f56c921dc98c1d9f891b5292cc4e8d8d8d63702d516f996 151c2c242a9ee4e72a0731df6f56c921 eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-8lo01Neutrino_edfaea51Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.edfaea51fd99182341fe5c0b503b738cfe6bd0ecd3dc1be10d3fbadf08075e22bac98ca3 edfaea51fd99182341fe5c0b503b738c 530607f9b54be981e420a7bca1d33d0fa180e6c42877beddeb23836cc440f062 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-0sw01TurnedUp_8953c846Windows This strike sends a malware sample known as TurnedUp. This sample of the TurnedUp backdoor employs the Early Bird code injection technique to bypass antivirus software.8953c8469d9f364928a686d9175c3bf729c06165805855719f710c9f7f7393d24cba1e4c 8953c8469d9f364928a686d9175c3bf7 5e4a563df904b1981d610e772effcb005a2fd9f40e569b65314cef37ba0cf0c7 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-1oz01Gozi_d5dd0189Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.d5dd018912ab9082c5589de04bac629f4a4afbe594e40e5bede5a23d633807310e150c31 d5dd018912ab9082c5589de04bac629f e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-jvp01KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.0240ed7e45567f606793dafaff024acf2646a18fdd6a7a2063b3443283ec1159696c1339 0240ed7e45567f606793dafaff024acf 14461260f9b3988d4eb4e46bc7d9861172266a9a01bf15c57916a9e4f9dc0618 https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-cy301Neutrino_5d02896fWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.5d02896f184bdc95400b10d02227177ca129959a7e2b279273942088665fbebf521c2a1c 5d02896f184bdc95400b10d02227177c e9bcf85599744033e320f5031ecc8157e0498a42d699cb175d7242c95b9f4358 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-7tm01EarlyWindows This strike sends a malware sample known as Early Bird. This malware sample has been identified to use the Early Bird injection technique which allows code to run before the entry point of the main process thread and bypassing antivirus software hooks.8cac249e2a9ae6ae8c5d90a9d52dbb884c6d6a3ed59b8f8b4e3fb7c9bb5d119305800503 8cac249e2a9ae6ae8c5d90a9d52dbb88 c54b92a86c9051172954fd64573dd1b9a5e950d3ebc581d02c8213c01bd6bf14 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-52z01Gozi_12317118Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1231711812ceecce5163337c82aa1e7d99e2f9906d4480a1471853abb1755c44d414e749 1231711812ceecce5163337c82aa1e7d cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-q8p01Neutrino_9de2f18bWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.9de2f18b09633a5aa822df9df7cd52d24c244838fd8588e6cc4b5107067e0025a01d536f 9de2f18b09633a5aa822df9df7cd52d2 24281907f8904bf6b9af4116f52ae2ba8b4b97ce586cd3b2b2777a8f3c76c8cc https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-1uk01Gozi_d38bf4f8Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.d38bf4f8675fc8e27d533e6c489bac03ede200073e2e9db262b255a1fbe7bf61c5436075 d38bf4f8675fc8e27d533e6c489bac03 e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-3zd01Gozi_15b184dcMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.15b184dc5f5e2c6cafdf3edce8334a837ac5151f5704d285f8b08339cb63cd44d0e96e86 15b184dc5f5e2c6cafdf3edce8334a83 ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-5tn01Gozi_ce9fd40dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.ce9fd40d404d258405e38f78f08c09120936f307d2aa64cc6236726a4b906bf6ce605c50 ce9fd40d404d258405e38f78f08c0912 d158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-e9l01Startsurf_05d7f6cbWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.05d7f6cb4e4711de53515e9587442dee662ac4eebb5060027016d9875594832741d0e687 05d7f6cb4e4711de53515e9587442dee 739f27ac00dc449895f589ff28e86d78ea17ca298ffc0b40021136d7c77ed679 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-ok001KwampirsWindows This strike sends a malware sample known as Kwampirs Payload. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples are the payload dlls and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.939e76888bdeb628405e1b8be963273ca59de3e9f8c0b684575df7cac9cfe2d84ba26d6f 939e76888bdeb628405e1b8be963273c 7bb12284fc28fbb270507c410afdc21c60bde5d34d59de67f78796c09f5ccd9c https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-7nx01Gozi_8c5ecc13Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8c5ecc13e19fecd5215e191f73e40bfe6d1d952a34b0a40f44adbfd08ed1970cda0a1581 8c5ecc13e19fecd5215e191f73e40bfe cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-6zd01Fareit_7de3b448Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.7de3b44801868f8da4e983f9818f1e0b48f0481cbf046c32f240376aaf5d5dd5d4d90e13 7de3b44801868f8da4e983f9818f1e0b e981fd64b4c1f1d50cdf3f21d3cd07dfb04dec58c518bee8697a187069997498 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-d9901KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.3b3a1062689ffa191e58d5507d39939dce3e75f6f8b187656d18618756da68aac135b334 3b3a1062689ffa191e58d5507d39939d ea61bcd4774ce2b6ab364a7831f36e010214be2ba2e6daa7dcba10b7e229ddfa https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-4uv02Gozi_1b3ecd95Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1b3ecd957973c315fbab3aa1bccd3ace6cdc4027a5dc1219e26a2a0acbc2fcb7d4c5eddd 1b3ecd957973c315fbab3aa1bccd3ace e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-7su01Gozi_350b607bMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.350b607bad40d521cbfffcba0023d4321e733b782ae647c79e0097a3f1c150f4ecb7f863 350b607bad40d521cbfffcba0023d432 c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-pc001Upatre_021828ddWindows This strike sends a malware sample known as Upatre. Upatre is a downloader used in exploit kits that retrieves a variety of malicious executables for the target to execute.021828ddd4e024644001a759bb4829bfab2192f0ac57ebfb3a16062b1aad790c7acc9e96 021828ddd4e024644001a759bb4829bf 06c65a259d7c96000fcec97a7d8c5b6c4d0c8b8e52ed1d45c934a50d0369b3eb https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-dm801Gozi_82d5bc54Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.82d5bc54464e1d903cb806b9cc66faa7f7a48cdfc7dccc4db70fc2d96058020ade558264 82d5bc54464e1d903cb806b9cc66faa7 e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-y3s01Gozi_3e2c9fe2Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3e2c9fe205543b825746ebed07976b65f63603f75fc2c562df52a8dfefcff39538cefbcb 3e2c9fe205543b825746ebed07976b65 b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-dyj01Startsurf_01721c6cWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.01721c6ccbbb56f63476aa17a3cb7dbae537d1bc24836778059e89a891232feef7529fc0 01721c6ccbbb56f63476aa17a3cb7dba 6c8ca3ba14ee685739ea32a3ddc613d4544c69194a97c55365c570c053609938 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-kz201Gozi_6217b0f7Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6217b0f76209446747f02f379915acb43a9c86ce483a1c05925f6fd602302d8015d7409b 6217b0f76209446747f02f379915acb4 cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-hao01Neutrino_9164bbb5Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.9164bbb56803391261d42d9ee69b42dab8aaf98dca8a84eee3bb4151fa66ae61d51e5331 9164bbb56803391261d42d9ee69b42da 2593e0c6d66d36c7d8b3061f3c242875113310a2939f89aea73eda1397e44e31 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-3lm01Gozi_c2ac177aMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.c2ac177a2399449ba13389429fc9b44a6c1b558e91ad4e48f2d6f4b997a52100d3648d24 c2ac177a2399449ba13389429fc9b44a ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-f8b01Gozi_ad41641fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.ad41641fc3eb31fe2130b5358e39b724d448756c51b53ec040d4b80f02fa59276b26560b ad41641fc3eb31fe2130b5358e39b724 d7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-8vi01Gozi_0d609854Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0d6098544b53298c86b99ce5890bb3985b90a1b7b095bc7343079fd7fece1ad80a668efa 0d6098544b53298c86b99ce5890bb398 d69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-zeo01Fareit_ed1ef915Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.ed1ef9158da2ef353c31613b649d906b3766378217eea6e7047771e0108983000c697321 ed1ef9158da2ef353c31613b649d906b 61ff6f5d48f02c0a5b7a28936f8aa9ebad2344f3552608fae2ce3f14a9bf14d4 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-baa01Fareit_aebe8f53Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.aebe8f53070a8e5687641789666e948250f9f2eae65ccb06723a3f470ebf338978b23277 aebe8f53070a8e5687641789666e9482 97702356739358d428d1e7c7ddcc8aa08379562b290edb12348cae2bc0ddbb32 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-ug401Gozi_9845ccaaMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9845ccaaf3c4fe109bda24adc6b93dbfd229149bc19716ec4edaf3be9929706116953cc0 9845ccaaf3c4fe109bda24adc6b93dbf eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-isk01Fareit_0bccb0c7Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.0bccb0c7a3e542a36ec6448c02efc415380d90a3fd1606c22c16ddc9f3b04426c37abee0 0bccb0c7a3e542a36ec6448c02efc415 a7d667e9d67d4b7db00c52572ca1e945b1aba8139dce9c647b8b9bce89ba45e0 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-f1g01Startsurf_02d70e30Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.02d70e303afff2a186d4459bf384ddc7b71a6988660ac18b1ad6fe0667f958727eaed6ec 02d70e303afff2a186d4459bf384ddc7 e586da2bd9fd73223281176033b97e6e4e137249f9aff8430004099b31508e12 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-o4o01Gozi_b6396acfMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b6396acf9a09c594e9ab140d82f3d0495e03582d68dc08d555cc787e289f64831712a6b6 b6396acf9a09c594e9ab140d82f3d049 ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-w7v01Fareit_0dceec9aWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.0dceec9a6b080d4bd9d14696259386c9fe6672e154b70441b6d144ede426012cffec2e02 0dceec9a6b080d4bd9d14696259386c9 444147472ba54f1f58776a84e98152ae28dfbca23602cb440a830fddd4a283cf https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-pdp01Gozi_52504984Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.5250498499d2bf02620df74117baf4769f1c2ba4061f9e527f85c1aa0573c9577f82a3fb 5250498499d2bf02620df74117baf476 e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-lqf01KwampirsWindows This strike sends a malware sample known as Kwampirs Payload. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples are the payload dlls and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.5c3499acfe0ad7563b367fbf7fb2928cd1e791f3f8c79d76d4629b9360e1104156682899 5c3499acfe0ad7563b367fbf7fb2928c c5b9406fdbe2c7bb1d516d1d270568c54a6e0002a4506668aaad9ff13298c3f2 https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-9g001Gozi_0eb8580eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0eb8580ea0c1634a11e2fcd7fcfcae0403f59b018acbda4c6e63db913a78c70499323bc0 0eb8580ea0c1634a11e2fcd7fcfcae04 b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-p1w01Neutrino_4633642eWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.4633642e88630f65f9661d01175354469d47f46a1e364eda6b2ead54e22a9ffc61111027 4633642e88630f65f9661d0117535446 61cb5cbccb6d1c329cb1a641c3a74fd4a4521dee0d2d03e810f3f12303e0f1f1 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-a8101Gozi_17bfd2e6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.17bfd2e6a363c52192da32afe98786e99d91e7a1b12ddbcef885c025c2309fffb48a65c7 17bfd2e6a363c52192da32afe98786e9 d3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-abu01Fareit_6ed420bcWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.6ed420bce873b34153f076776fe6b91d43d1813f848e5d1fa639a8b09c964e33e95d8dee 6ed420bce873b34153f076776fe6b91d f68b0c32da95c0fb06c4cefb992e1a0039afed32f6cfcef083db39a0702a06c7 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-bjk01Gozi_418a530dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.418a530d741325eee659d030ef26f991d7b1e8e6b5a493b2449ccd978131729fa741dda1 418a530d741325eee659d030ef26f991 ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-7fx01Gozi_b0d0b281Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b0d0b281554f8fbe9f6af749a0bd92395be7b445857ba4091ca81b768dba7e09698fce76 b0d0b281554f8fbe9f6af749a0bd9239 ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-zyk01KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.cb9954509dc82e6bbed2aee202d88415c6a56cd07bfeb45b2fecdf938927e3c5a5a3e38e cb9954509dc82e6bbed2aee202d88415 f8022b973900c783fd861ede7d0ac02f665c041b9cd0641be7318999fb82ce8f https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-rlz01Startsurf_057f0c2bWindows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.057f0c2b9a3377366ea36bc8f4454b409c385db869ef98dbe7df24e509f336d2307504c1 057f0c2b9a3377366ea36bc8f4454b40 1d70d1eb3210984b8d2c3c62ca6ade7b018f44688d009cbde3c2c214224a3ffb https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-nhb01Gozi_36027b6bMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.36027b6b489adcbbd12dc845f193cf37342d96b456046c71cf7371d64bc8c07d77edacf1 36027b6b489adcbbd12dc845f193cf37 d10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-jhf01Startsurf_0228d240Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0228d240888782fa29a9d1902986eeaa491ed32451e271c68726c60d47dd0e6d4e87da77 0228d240888782fa29a9d1902986eeaa e616d1e7e2b6e1d4f1ac2fea3e2041b842d27f5de05ff941b5661997cfe8a856 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-46t01Gozi_fdc33a07Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.fdc33a071fff70798295b2ec22cbf735723da0bf4eb558853763d4b4ec58243709d7e0ae fdc33a071fff70798295b2ec22cbf735 d1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-tr101Gozi_6bfb69bcMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6bfb69bc644a2ea5303a0f6f24744fec5c0cf042a0219bd28b5cfe20b30221e978aecb01 6bfb69bc644a2ea5303a0f6f24744fec b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-d1501Startsurf_107fac48Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.107fac484f2ba8f2b8b80a52a8631707c50ab16bb0fa34aead71090ccfbe0d5f5556cfbd 107fac484f2ba8f2b8b80a52a8631707 39974f2161bc0151692ae2f380d38b626f2b47904f92ce5706e29b2fe05122d3 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-nax01Gozi_3974f65aMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3974f65ad10cb0f98f88cbefccb12d6a44bcaaeda395e40e9b8a2f6654268d8a781d19fc 3974f65ad10cb0f98f88cbefccb12d6a e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-zph01Neutrino_91bea40cWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.91bea40c811de97826177159d8bbdde1307eced0088f03a1c535a050f794e49e3cb6e248 91bea40c811de97826177159d8bbdde1 ff5d541f260063a88b04a892cacfb3bcb13b8dd83c5f29ed5000737dbd6662c4 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-x9201Gozi_a755452dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.a755452d568062234058f69114bf3ee2cab8950cc622639eea40ffcc0356d22fc8d0cac0 a755452d568062234058f69114bf3ee2 b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-yqy01Gozi_b53ef9daMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b53ef9daae55e9850bd5c41f7ef4ea38f4e221406d2339df73b44edb795e426b8024ee93 b53ef9daae55e9850bd5c41f7ef4ea38 c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-xsh01Gozi_adc3f050Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.adc3f050e41ce0dcdfae7070838b5350a227fca87c1bb0ac4e0094101ce96c5d7987a417 adc3f050e41ce0dcdfae7070838b5350 b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-eoh01Neutrino_d4ecd35bWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.d4ecd35ba98595ce86442c472ef2113d78dc8028af915547543310b96a79e69b861da70a d4ecd35ba98595ce86442c472ef2113d 9af34cdb7f0b01c044fdeb64f0b733d78e8b9be854c4beeee679f8ee083530b1 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-8k201Gozi_21ab6e81Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.21ab6e815063f66de014230f2d13bda126ab72a7420d6538c6aa6186c23a27eb874e78eb 21ab6e815063f66de014230f2d13bda1 dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ie602Gozi_fa7c4c89Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.fa7c4c891eeea64acb6b517da7cf2615861fd776cdad3147e66cd7318c5656fabae5d310 fa7c4c891eeea64acb6b517da7cf2615 d2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-wux01Neutrino_ad21e171Windows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.ad21e171d278d27ccebfbc9b2d4d09928cdfd3e94086a82b4fc9579d7e6fbe42c0b253cb ad21e171d278d27ccebfbc9b2d4d0992 ba975d346f8f543f348e1e42f03bf50167045740b321ae6dc8a8497e608e8766 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-lxe01Startsurf_06475fb6Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.06475fb6c697ecbe07baad0014d507f592ead94fed5ef97166bf31b318400dc83f7c5b69 06475fb6c697ecbe07baad0014d507f5 404746279f7d963489d1d7d2d9be4bd1b1dd82e81e21f6ebf09091ee7b059988 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-yy601Startsurf_00613dd1Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.00613dd1637c16fe5abc5a7d3e838626bec0a96f3877b587656be58aef2da475032343ec 00613dd1637c16fe5abc5a7d3e838626 b622971e681f9e2fa5f84bfcb9e7144b6198d3fb554de8d4488117ca1e3f51c8 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-hs201Gozi_cf6c098dMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.cf6c098d4eff4facdc4212f5c1ccba0578f9eb44e86d5e48dc2211ded1c43083fd908bc7 cf6c098d4eff4facdc4212f5c1ccba05 ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-ou001Startsurf_0d2372f6Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.0d2372f66e72cd334751ad39f95776863c792497664d6244ed4593d7c1a7ff47706aae24 0d2372f66e72cd334751ad39f9577686 4694e19504a1bbc0335c213bad487727ab75faab3bf29d92cb7e3d14a2d3a8d0 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-xfq01Fareit_665a7013Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.665a7013308c25b7b08173d58218e34c37998b9399096642ec6f961f9354f9dea4a067de 665a7013308c25b7b08173d58218e34c afcdd2fda5b3c9e78a977df31be307ea7323b746e07e35e4d3c39a3a3f4b4b79 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-5m401Gozi_8da11c75Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8da11c7503a0054f90db43dd73dda94b4147d86b5939bf8e77e2126c8edc64f573bc1c36 8da11c7503a0054f90db43dd73dda94b d11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-iol01Gozi_113920d2Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.113920d295806c64d572d3fdfdcde1557eed79144d9d22e809bb7242e38fe47f5bbae44d 113920d295806c64d572d3fdfdcde155 bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-dxy01KwampirsWindows This strike sends a malware sample known as Kwampirs Payload. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples are the payload dlls and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.290d8e8524e57783e8cc1b9a3445dfe93adbb352b23e8750d993e3df27904b0e5a466016 290d8e8524e57783e8cc1b9a3445dfe9 15fc575b0278281541212e393f03278d47ea03d26693efeec8e16261735bc634 https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-7qz01Gozi_a7efde4eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.a7efde4e103890f2974ab7e9eab9d1c29f9d34ff665c799ae2ec996796f5f7b18d7500f8 a7efde4e103890f2974ab7e9eab9d1c2 bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-7h801Gozi_136c2578Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.136c2578fdd33600a0a41f4e4f52ab9c4b5f0137640677356f0a93d09dde53ef7b9afd3c 136c2578fdd33600a0a41f4e4f52ab9c b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-jut01Gozi_07bb7384Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.07bb7384fc75df9e7287736aae4049c7e2ba239cf29bd9713e59797b2de06c3c04c9ac9b 07bb7384fc75df9e7287736aae4049c7 bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-t2y01Gozi_76f9e428Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.76f9e428cef62823b24fef1027b0e1a1b86f5bc56ec349271819792a85b4f906d7a6c5da 76f9e428cef62823b24fef1027b0e1a1 b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-k7301Fareit_feaa9e91Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.feaa9e91b65701090f24d63b6454206a074e44100027996f616253eefe6ae4185b585899 feaa9e91b65701090f24d63b6454206a 7c83266775aceac7e54b9d7db2620245520a52e854a5e61f5c5f2452a60432de https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-f8o01Gozi_29ceb929Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.29ceb92955f0ffc8d347f51555ae46a579321be62ec5edcdb3023b460125939d41e541cb 29ceb92955f0ffc8d347f51555ae46a5 cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-7qw01Gozi_150c7891Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.150c7891677c165c26418fb313cf33d04fe88dba4bbedab222c2276b85d9fd6171403373 150c7891677c165c26418fb313cf33d0 b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-i8301Gozi_1a453d07Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1a453d07485b6cb2c889d2676d4cf67ebad636002e12d41fcc6e0f5ca38a5b8879d3d412 1a453d07485b6cb2c889d2676d4cf67e dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-u7g01Gozi_afc23d6eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.afc23d6ebabe021ed4ce772a7d50d11845a3c50a210f4b16afea250d50f1784cd7ee046a afc23d6ebabe021ed4ce772a7d50d118 d00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-u1d01TurnedUp_eaa4b5cbWindows This strike sends a malware sample known as TurnedUp. This sample of the TurnedUp backdoor employs the Early Bird code injection technique to bypass antivirus software.eaa4b5cba278e00955059bf30202cd1842548c9c67fbda329d788cb4e8b88f55475cde11 eaa4b5cba278e00955059bf30202cd18 d17dce48fbe81eddf296466c7c5bb9e22c39183ee9828c1777015c1652919c30 https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-oyt01Fareit_0e42f545Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.0e42f545f20a7066e80b1cb0ee73c00a880afff080d249f26514e4d26a8211d43f7ca1fe 0e42f545f20a7066e80b1cb0ee73c00a 1ca88b2c00b625bf596b93abafae873a6aec5bf1afeee1e116dc402cae69f83a https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-s0j01Fareit_818a695cWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.818a695c9bf2b107c4394695a2f575288fbf05caf42e5618cadb0343bcf4b249e33ceb22 818a695c9bf2b107c4394695a2f57528 431e6a8252837a5e1c7c98aa9b72c1df4b21e34ae8c7e73882294097f140466e https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-ee501Fareit_4f08735aWindows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.4f08735aa600f1c9ac4ce5af469e994e70de718c364af5831fc7227d394df71424786f7f 4f08735aa600f1c9ac4ce5af469e994e df58773cc519e82a8beebeca8035018168cb3cb26aa491aae89c8d68cec835a7 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-74601EarlyWindows This strike sends a malware sample known as Early Bird. This malware sample has been identified to use the Early Bird injection technique which allows code to run before the entry point of the main process thread and bypassing antivirus software hooks.e1383bea710422248b7e1edc4e0ff6ec4903780091874b4bde18b2f71bc0d8d23662d457 e1383bea710422248b7e1edc4e0ff6ec 368b09f790860e6bb475b684258ef215193e6f4e91326d73fd3ab3f240aedddb https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/
M18-17j01Gozi_0b841d3eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0b841d3ea970f05ddf1009711d82572d0317909ce88167641bda95d27d7890afe346d0ab 0b841d3ea970f05ddf1009711d82572d dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-2m301Fareit_bf09e291Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.bf09e291cb6a4aff8e1eab04efe7bf13699171ae82700a702a02ba5cc0743f08814e4f18 bf09e291cb6a4aff8e1eab04efe7bf13 09574981553c2729c9779beee8e6007734f932a155de278eb46d9fc557c39400 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-79301Gozi_c1bf4051Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.c1bf4051aaf7f5b78d5825c333769c3f2c61002849ee203cc068f5360875096a2c14fb60 c1bf4051aaf7f5b78d5825c333769c3f baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-nq001Fareit_7cdaf947Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.7cdaf947fdcd6dbfc03f975a77d4a12d3415c7bfc040b417006f5f4ca6dea6080a19348a 7cdaf947fdcd6dbfc03f975a77d4a12d e5d34b53cb6e4e111e167cf13b608b87f7ab7d43d7f08f995ae9f2c1139e8f51 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-6xc01Fareit_d5d05a68Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.d5d05a6827c5dfff19ae5726295afef70763ddfca3fedcbadbf91f2946d6701e7425e7de d5d05a6827c5dfff19ae5726295afef7 1d7a1a4181706379a7f80ed926c47cb0ebc7beb953739c9b41cec20093c63914 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-yqr01Neutrino_4472d7dcWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.4472d7dcfc811e1b0da7d62fa3ce486bae79399cc079dbb20d6ab3b50b30236e9d015038 4472d7dcfc811e1b0da7d62fa3ce486b 86746d7dfa923b5b1e0e5a0d27f19eb40979dcf342f2fba01ccbb09175b9363c https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-slk01Fareit_4a6b63f1Windows This strike sends a malware sample known as Fareit. Fareit steals and harvests credentials from the targeted system. This information is then exfiltrated to a C2 server.4a6b63f1b4efaf59a4343f3fed89602659e38dbfed36c465202cea50f908d445da969098 4a6b63f1b4efaf59a4343f3fed896026 3f2925b26b0f0b0f141346d8a654a74704d9326492537de17518bd6fb11671e8 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-uzj01Startsurf_01ebe810Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.01ebe810b6d69d0f6588191c333d6106af14fd59d99d16ff6fd967986d000bb8a773b6ba 01ebe810b6d69d0f6588191c333d6106 f0bfcb581935377def575a18a89290427d335c95da6781b11d1ad91711cb4a81 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-kp901Gozi_9357ef16Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9357ef1690f7d4435d37553c760acc3e6b10b9c7a6e9e156171b775f2a5a7cd7a84e9d93 9357ef1690f7d4435d37553c760acc3e be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-tgm01Neutrino_d939dc2dWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.d939dc2d8297c32805f7182f13c568911c2c3f3d4efe36ab51263a502a4670c444041121 d939dc2d8297c32805f7182f13c56891 1a1144444adb05aee9ef8adfb3c892a97d32b870d1ee300975a5f3597f2ed638 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-61m01Neutrino_e65541feWindows This strike sends a malware sample known as Neutrino. Neutrino malware likes to employ various sandbox evasion techniques. This variant of the Neutrino family targets point of sale terminals.e65541fea778be35e24b5dc27b86681979d8b1df541e1aadae1a59a4a10e24749803986e e65541fea778be35e24b5dc27b866819 e9a7b16189e27dff9ff67e31d09fa05e7f32658dfa56bb51feff8ca0cfb4eb85 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-gmw01Startsurf_00169225Windows This strike sends a malware sample known as Startsurf. This sample is a trojan that gathers personal information to steal from its target.00169225291abe1864627a2da79125a97a589eb3487062f60ac1f98a309aed5227be1221 00169225291abe1864627a2da79125a9 0fee9d67ef1967d2bee1f67b1dc5ae24dff5d6dba17b9247e33b87f5bf6e6856 https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-krj01Gozi_8281a8b8Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8281a8b8a324aa55c22363912af080aebb982a9b37330741202d807504224c852314e91d 8281a8b8a324aa55c22363912af080ae c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-sxi01Gozi_3b687c51Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3b687c516e1269c54c04e709ce0826a0aeffe4e76999e2f738ea72f2d1979f5e0c9e3bca 3b687c516e1269c54c04e709ce0826a0 d942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-kl801KwampirsWindows This strike sends a malware sample known as Kwampirs Dropper. Kwampirs is a Trojan horse that creates a back door on the victim machine. Once infected it attempts to propagate itself within the target network, gather information, and provide the attacker with remote access. These samples act as droppers and have been identified in the wild as being deployed by the Orangeworm group in an attack campaign targeted against the healthcare sector.7e5f76c7b5bf606b0fdc17f4ba75de0320c30a82cc974cf1ef21dbcd94dfba73d7c4b723 7e5f76c7b5bf606b0fdc17f4ba75de03 a37bf368f0285ac938e1477c1c0230d28e8f39717ddded2fd82b00190cdf090e https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia
M18-mbm01Upatre_049be077Windows This strike sends a malware sample known as Upatre. Upatre is a downloader used in exploit kits that retrieves a variety of malicious executables for the target to execute.049be07740c4928fec7cee21a07cc414bd1c84b7fa1baefcede8e4be89b7cc73001ca3f2 049be07740c4928fec7cee21a07cc414 6b6eb4cc4aa8e3d71a97a8657ffcd27d2bd12466faf3b1f7fcbcd274a4b9561c https://blog.talosintelligence.com/2018/04/threat-round-up-0406-0413.html
M18-g3w01Gozi_9ce80da2Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.9ce80da250a8eddd660d36a050c71b8292d149b1776c35ddd8255b075e3a74b9ceb7c117 9ce80da250a8eddd660d36a050c71b82 b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-e5p01Gozi_918c7b59Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.918c7b5973b7205ca1e065561e403a29a098c3094d73821f609be84ee5043fd3c5605d95 918c7b5973b7205ca1e065561e403a29 bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html

Malware Strikes March - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-wa801Win.Trojan.Generic-Dropper_11b9c78aWindows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.11b9c78abb0330036a200e4cf33c60edeb2dfa76e8d6260331133f62bae6d653c86579f2 11b9c78abb0330036a200e4cf33c60ed 3b0e9faf07e32d593b54cdfebd725707988bdaa7d81ab2ab396630384127fdc9 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-ydd01Gozi_981c8038Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.981c80386599f9922c4f34fdc7a4d49a3935ba570fb257c255efd433251b2234b0a3f771 981c80386599f9922c4f34fdc7a4d49a e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-xq101Gozi_3961de98Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3961de98d1abbea525fbce184b53862438d8d3a9be1128e3f2e6656ba011713d4ae92526 3961de98d1abbea525fbce184b538624 f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-f8h01VMProtBad_bab5318eWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.bab5318ed3d7561d55f3d63a30d0b5b42ff11c513e696308a752f6e7743e7f41cde63c33 bab5318ed3d7561d55f3d63a30d0b5b4 e8e31878a125c47e835ceea2f783fe7938bc9882869a98d9d2cb67c756c8cf97 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-kvy01VMProtBad_de5fed9dWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.de5fed9d6a68a3cfbf8b79082086aea66ca819b3d65d2434f5ab0d165b958c29354424e2 de5fed9d6a68a3cfbf8b79082086aea6 2e20f3dc237275d5579b96c46195aa05f79b206a356918a0e1bc990a42979111 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-c7o01Gandcrab_00891e2aWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.00891e2a94330956e31f0523c38fd8f54af5e829fbbab9f747205dc89bc731f58766c2a7 00891e2a94330956e31f0523c38fd8f5 14426a13dc4620932fd0af40005fb3f508d6a6d69eca897ef5af4f58f7761d3c http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-7e101VMProtBad_d89d8435Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.d89d84358c3af62f62b3a4b71e17baca9385e27f2b207a7ff3ed1412e2657cdf85d8c5d7 d89d84358c3af62f62b3a4b71e17baca f9225972bdc9d23e545a4f530f79760913eba49f8a78e53fc6b361cee499547e http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-srx01Gandcrab_f3788597Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.f37885972222feee8571f1d383d0fae0a1f98094dabe8b25c3cefd25b41e3be79d1ce186 f37885972222feee8571f1d383d0fae0 1cbcecc05259b821d7d82f6b2e779de2f4d4dd1561445a213a91db8617e61c4c http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-v7t01VMProtBad_bc2e6119Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.bc2e61198ea9ee52735414d728756d363af83bb095eb4384b58dad5ecacac423efb6c3bc bc2e61198ea9ee52735414d728756d36 28d599079555f858bb7496dc8fe8fec7fb450aa083f039e90a1c9e11ed7d9094 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-yvg01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.0d9af6d18d7447a714225c2e931778732773bbde621556255a42e4decb270e6b30ac9ba2 0d9af6d18d7447a714225c2e93177873 184ccb64f12601a3797e9c73ce77c89d05b50f2a668f94ec8cfd1c7414906c0e http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-90y01Win.Trojan.Generic-Dropper_50787cb0Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.50787cb08c0f499fa16d27f3a4ad8e677d65e47c4258d036184d47d8eace2ae404c2df98 50787cb08c0f499fa16d27f3a4ad8e67 fddbec3a6e8fca4f3f388ff5856b8030005339967ffda594035f9353f5c71bd2 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-63r01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.01a890a87580e73210cd4104021baf250f0e1f02a030674de69c9eb143663ab955ee9eb3 01a890a87580e73210cd4104021baf25 1e7eebcaf485682da709a94fb1c679555a9090592cfe54564f5eb396c7458044 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-e3v01VMProtBad_26a887deWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.26a887deb12ef27c995566b0ccdd98c111c99967baf24c70021269c33217d9df99843bc6 26a887deb12ef27c995566b0ccdd98c1 5aad686faa09afc69b067b67cb3db992820f96d3cadb5e160878255510194dc5 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-rhp01Gozi_12d070ebMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.12d070eb94b43e5ea279f913b1b888888e8ee386d56f308511f69045b9b06160f3cc40f9 12d070eb94b43e5ea279f913b1b88888 f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-44o01VMProtBad_e1341b1cWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.e1341b1c5b78dee9f58106d0d1932b1aa79d8d898e82ce775543e63ead7cc368533bf363 e1341b1c5b78dee9f58106d0d1932b1a c55447abc07f82e59c4573b50038117d494bc8069bd868e2f4755cea405ec104 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-sg801Gozi_735eed3bMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.735eed3bd45110f9bc21dfb3bf3406a8296d79ab15c935818b5689d42da022803c8fd045 735eed3bd45110f9bc21dfb3bf3406a8 f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-8wx01Gandcrab_42189447Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.42189447f3f1b3c5a9a9dbdc097edfa9ae020f16aea472eeded0331cbb84d81f7fafb24a 42189447f3f1b3c5a9a9dbdc097edfa9 1f941ec87c3d98827d051ae46d626702960a690bf1f62645828b0ea5cbd6c5ec http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-05p01Gozi_802be047Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.802be047127b51467ae4300276a6f2d81139780b91c6052cfcc2ac8f41df55855bccbef3 802be047127b51467ae4300276a6f2d8 d5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-h4001VMProtBad_5bf60b9aWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.5bf60b9ad4900ede4497e1d6fa0b211048cba7240e82a93671664d0d5372d834521ce7ec 5bf60b9ad4900ede4497e1d6fa0b2110 67694e083c8b54090afe2a580da0242d9d05746953832b34af1c11290efe544e http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-wme01Win.Trojan.Generic-Dropper_93bc7e9cWindows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.93bc7e9cdb7d0b859e67b0bb0b9ef37e661d1023cb74b62e139344bd0320047cf395c92f 93bc7e9cdb7d0b859e67b0bb0b9ef37e 2d1cfd1ae428729b32af03264179cb7640d4aa7b1e3c299cb106a77cfe42d216 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-1zb01VMProtBad_a4b89d1cWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.a4b89d1c33c0be3fec820c1398aa9af5d7b8d563ced2092cba04a1e3c32882a8d64227f0 a4b89d1c33c0be3fec820c1398aa9af5 66c9cd00579297128b36295f8c13cffb5a6d805f73e3086cabceaedfb361c37c http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-1a601Gandcrab_ac321b0dWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.ac321b0d6326ff027e3b5f0867ee5ca190ae8e7b70519251f2f4455175523dc1ae7657fc ac321b0d6326ff027e3b5f0867ee5ca1 22ddc024bf53ae71ff42cb79564f1bf8c9eb4f59d7c2ce3bc378c70ce067b250 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-a4h01XMRigLinux This strike sends a malware sample known as XMRig Miner Malware. This sample is part of an XMRig Coin Miner campaign targeting Linux Servers. The malware specifically targets CVE-2013-2618, which is a vulnerability in Cacti Network's Weathermap plug-in. Once exploited, the malware drops and begins to execute the legitimate XMRig coin miner.70eabd2763d2309fc46b463bccc0741767edb5cdf777416c0ce13b3f61d6a3d8e79edbf0 70eabd2763d2309fc46b463bccc07417 690aea53dae908c9afa933d60f467a17ec5f72463988eb5af5956c6cb301455b https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/
M18-svc01Godju_630d7c62Windows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.630d7c621aac0cbfd2a7d0c450af75da9f7b34c4730234476e39ec5a6950d957db404609 630d7c621aac0cbfd2a7d0c450af75da 9a1794d3ae09b0a8c7a36fb27514760bb0227943d1ee37a7e81ffdfa9f36ec48 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-p8401Gandcrab_00d8564bWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.00d8564b33568eb487367d0205b00ba0df79b94f5c82e0fc71bb4d8d4ca6fee320e50f8c 00d8564b33568eb487367d0205b00ba0 15b705ee101e26b1ba39d62d6c816409e059f395de8a1a5bfdd35d0e20b705da http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-7a801Gozi_7d3b215fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.7d3b215f3fa77a0e6bb20612aecbacfa771c75a24462f8eca232d23456b297b1dbce1f79 7d3b215f3fa77a0e6bb20612aecbacfa f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-w9001Win.Trojan.Generic-Dropper_7743f6a0Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.7743f6a02d4943f37ae9911e266b03165064f32aa1d3d50d138a069cf8bae10633f540e4 7743f6a02d4943f37ae9911e266b0316 013ede62c35998c847f9248bcede46dce801480743a064d488341f95094c0d4e http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-3qv01Gozi_2eb34962Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.2eb34962194c741b1b5cf7319e4d31df5b2c33a879e0d74b01ce6c72e7ecff2eb822a0b9 2eb34962194c741b1b5cf7319e4d31df f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-mpz01Gandcrab_a2c25e6cWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.a2c25e6ca41124fd24ab470c21827f19b1049363ceca9d3cb367cb7ed2512bcccb6f91c4 a2c25e6ca41124fd24ab470c21827f19 299edfd4bbf81f20fb8f8e2dd9d0fc4d26c925dbd1cf4372d9172bc2644d3ca5 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-fnr01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.0baf0db96ca395b8b1e0f95af91293190e4608e4c7f09277b80e4bc492506f81d3b42f46 0baf0db96ca395b8b1e0f95af9129319 19cebd1722376f2c62a1922214903052a964ad1d2505fa698376c5f3b4d0594b http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-zjh01Regrun_03b35351Windows This strike sends a malware sample known as Regrun. Regrun is a Windows trojan that hides itself on the target machine and hooks into the Windows shell, disables specific actions and enables persistence.03b353514a67cf54f6f11d1b23dec33edda79836a918e373b9ddfa0b44268b94f8ab271b 03b353514a67cf54f6f11d1b23dec33e 59695cfe42cc0d5418a4568d946949af5fd9de14bdc160d1a5d12d5916a9b411 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-5m101Godju_0f8ccee5Windows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.0f8ccee515b88bae88aa3e4799d2265d4a237e6b8b6cac2dedee3c17e311b5c3918e0e6b 0f8ccee515b88bae88aa3e4799d2265d 0622fcb172773d8939b451c43902095b0f91877ae05e562c60d0ca0c237a2e9c http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-zvh01Godju_38ddf749Windows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.38ddf7498b83c64efb89b7d7953de77aa7acda719c6a92fff6a9b620ae45e087a45f283b 38ddf7498b83c64efb89b7d7953de77a 36bba27b1fffbecb4f37400ec3368995e39dfabbce61422531a55a36c7696c33 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-97b01XMRigLinux This strike sends a malware sample known as XMRig Miner Malware. This sample is part of an XMRig Coin Miner campaign targeting Linux Servers. The malware specifically targets CVE-2013-2618, which is a vulnerability in Cacti Network's Weathermap plug-in. Once exploited, the malware drops and begins to execute the legitimate XMRig coin miner.5aeb79a353888fd552dc7cc129e696a68558d71fb7009dd1d6feb104cf7a060e50ab8d61 5aeb79a353888fd552dc7cc129e696a6 1155fae112da3072d116f39e90f6af5430f44f78638db3f43a62a9037baa8333 https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/
M18-hby01Gozi_4fd9ccd0Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.4fd9ccd0bd6e296a356d5e4ed06eec4f133af28ead4b2ef10f05f4cf8aaedb819a0b1bc1 4fd9ccd0bd6e296a356d5e4ed06eec4f fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-n7f01Gozi_0d4c1fc6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0d4c1fc61258263a829d21e99affc6cd31b6714de2f8087067c2454d72b91c72dc8c0562 0d4c1fc61258263a829d21e99affc6cd fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-cu601Godju_7ffed972Windows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.7ffed9727a4c90f3a244141cbc16ca90225e9dab8a46458474ef05eef40ac366e318dc92 7ffed9727a4c90f3a244141cbc16ca90 4f888e9b613765653355f7dc2be015e7f32d677ae25fa7ff0298dc252339dce4 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-uxa01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.2090c66a0742e7c2646f50770c32047ec4d0e614849ea2c4d2dd122d960dab728c815894 2090c66a0742e7c2646f50770c32047e 18dd0a662f77ca2ec235b3ae761cf7f4e6a3adb3fe32b2c994c080b6b7f10389 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-e9v01Win.Trojan.Generic-Dropper_621d2d7dWindows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.621d2d7d319c79ab209d663f9adc9884a192d168b58ef1a0364801e5de8fcc6d6423dc2e 621d2d7d319c79ab209d663f9adc9884 ab1c0fd38656ae73d1ec96bb5b3ee5e354022feca924653c606ad5dbc3ae0c47 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-6el01Gandcrab_d09b8363Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.d09b83633fbd149873b6eaf1b96bae574f95200f1e971d4db1958f7bd9f59b4b956b8d5a d09b83633fbd149873b6eaf1b96bae57 1bbee00688a4632749b40312e4109fdc58afa0b5a9e8603718d386fca095a015 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-r2n01Gozi_6e1e89c7Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6e1e89c787c27e62567cc32ef684e0136c02d3acaafdb4f9765f062354bd6f226694f48a 6e1e89c787c27e62567cc32ef684e013 fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-aj701Win.Trojan.Generic-Dropper_97b69663Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.97b696632cc402913ee7d70f2e2468381aa3693216a86124a437846882a25ad93e6d0b64 97b696632cc402913ee7d70f2e246838 38cf958875c3eb34a07f15163e7ceb8294ada5eccb765aa37ea69aba4fe79cd8 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-29d01Win.Trojan.Generic-Dropper_204efe1fWindows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.204efe1f3c0f1a41539e78ca96ea40bf9811ec0b3b9f6d79c72b375c9194e7d00a226366 204efe1f3c0f1a41539e78ca96ea40bf 5943eb982b5def7773628c728369398d5722c39f67b978c10782311eb00a50bf http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-9mm01VMProtBad_d5517d03Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.d5517d03e0bd665e3f42510eddb8fbe84c3f90c141f96630c48761c3857a8cb968274f42 d5517d03e0bd665e3f42510eddb8fbe8 8ee03ed6082b418b4ea91cc8e63848ac8113ed29c65ec9e3403e8f1f90c41b4a http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-mvr01Win.Trojan.Generic-Worm_8ee1bdf6Windows This strike sends a malware sample known as Win.Trojan.Generic-Worm. This trojan is a worm that makes an external call to a C2C server, and exfiltrates information from the victim machine. The MD5 hash of this Win.Trojan.8ee1bdf601ae27f311eff9861fdb8b79a09ee04751bd9a479200df5bb02dfa2d2e75229b 8ee1bdf601ae27f311eff9861fdb8b79 eada793b386002f297ad511a2ae780cd011b189f1dccbd6ca62d89345095d6e6 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-fcy01Regrun_0547e900Windows This strike sends a malware sample known as Regrun. Regrun is a Windows trojan that hides itself on the target machine and hooks into the Windows shell, disables specific actions and enables persistence.0547e900b8d385306e6522c12a6fe9e5860d2d7689810023b17876c52e218bff5bfc88e3 0547e900b8d385306e6522c12a6fe9e5 d86831a343b89136da7a224b0abfae57a79b1ce5d0ae3447bef628d262fb0f12 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-qgg01Gozi_3caaa4e7Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.3caaa4e73ce36a5a784722e8f3414779a8498b821900f38185d4c06020c1947c128e3386 3caaa4e73ce36a5a784722e8f3414779 f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-c2401Win.Trojan.Generic-Worm_ec1d2857Windows This strike sends a malware sample known as Win.Trojan.Generic-Worm. This trojan is a worm that makes an external call to a C2C server, and exfiltrates information from the victim machine. The MD5 hash of this Win.Trojan.ec1d28577d98caa817b98f4dbf67dbf0209ffb1fc2aea7d49c219d7f7a49c0db65817efe ec1d28577d98caa817b98f4dbf67dbf0 46a5a182b94569e4db66ae877064a18a1ca470aa0302d400eaed02545d83c1eb http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-szs01Gandcrab_b6a47fd5Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.b6a47fd5a74326b86fa1eac0ace7c82108c5d456c3394d851a569d50342a7e06ce508042 b6a47fd5a74326b86fa1eac0ace7c821 052a7544e45619190ee911406cdaff1708951c9d0a4070a5f7a69cc541f2e558 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-tzy01Gozi_1ee0336eMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.1ee0336e030dc9d11b09d43f33cdb9edcf76616a5b3a58055407d69df9e2ebbba460ed48 1ee0336e030dc9d11b09d43f33cdb9ed ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-vgw01Gandcrab_ccdd4315Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.ccdd4315f56994d591b64b0175ac450a7571205ca029f57a90323340793bf9befd826e27 ccdd4315f56994d591b64b0175ac450a 04ef7221209f5ea957312704743139e6000e24dc4399ccc46d5e102ecf2ab3db http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-bc801Win.Trojan.Generic-Dropper_6cad1510Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.6cad1510d9acb0daf67f1c647bea18581cf4319acfc7f6f3389329fb8097bd49594f13b9 6cad1510d9acb0daf67f1c647bea1858 166ee27653415896013b0e775c03ffc27db5a7b6daa7a4c78976fdd7bc166416 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-al301Gandcrab_c4118a27Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.c4118a27c9f291a55fdee8c611dfb000a4a728e9ad8b28c165a8746498977b8a5f092993 c4118a27c9f291a55fdee8c611dfb000 29a86b3a5c2f1a7a5ad325ccf5c906b532bb2275b79071e2ec98a281a290aadb http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-92a01Gozi_0bec6bc9Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0bec6bc954b25143f321d42b7dc8ab7af5ad792f0b7c0e4235c7671c381cbb97bfe81932 0bec6bc954b25143f321d42b7dc8ab7a f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-tld01Gozi_d4b6fc64Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.d4b6fc64a83cde8f4a8f58dadae2652ed9ca71ac2e1074c9a7321d9d07a0f007ee74b860 d4b6fc64a83cde8f4a8f58dadae2652e eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-uel01Win.Trojan.Generic-Dropper_dea49e5aWindows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.dea49e5add62110ef1444817a9b87ad4c25c626fa3513fb6b0e521803bd7dee4dd49177a dea49e5add62110ef1444817a9b87ad4 4ca97c879d841e79a5588f350cea663272bdfab1a1e7761b109c6bc72da523fe http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-vg801Win.Trojan.Generic-Dropper_ad8df4b5Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.ad8df4b5896201f00979b5f1cc67c15675c2214bacadcb6e6f944cdc87167ec561310334 ad8df4b5896201f00979b5f1cc67c156 9414096ebca4dd3e948014b7348578e5adfec4729e5a9f15f6b06dfffbd13408 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-oul01VMProtBad_ebf0d6b5Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.ebf0d6b5841dfdc9d38363447f48cb8bd55b8b670ac65ef4801b914568fb6f1a5fe7d180 ebf0d6b5841dfdc9d38363447f48cb8b ecb1e4e860ea7612793420677588c7411fc5717825470c956f1e21c30b5325d6 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-ei701Regrun_05c3375fWindows This strike sends a malware sample known as Regrun. Regrun is a Windows trojan that hides itself on the target machine and hooks into the Windows shell, disables specific actions and enables persistence.05c3375fa24baa0328d2ca06c4b8c94dd51b0eaf18ce50f3a569eabbb5a8c37ab54b19fb 05c3375fa24baa0328d2ca06c4b8c94d 13cf35842c9ef3f362bb7d3c6c8c50957f5b156e865b45b57e2e420416a3f656 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-4km01VMProtBad_afe05cdaWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.afe05cda61aeeb19a885855a7d6d8986d9734c31572d7b31cf1d80cc7bf4e721263377bd afe05cda61aeeb19a885855a7d6d8986 09c953e9fcc681daee3f311513308988048049bc687f3d10d9ae4e6462cdd4b8 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-lxf01Godju_168fd9fdWindows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.168fd9fdcccc385b78913b18b7e644f013c207c1277030bbff5ce8dd2e13764423a4bcbd 168fd9fdcccc385b78913b18b7e644f0 9690fec193714171652f8e0c7498d8ee3581fd0b074693a3a0ba07e5d95a141e http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-4q901GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.01ef2aafc7cea348552ed7b67c9dbaff1f7091658fc59bb92cf70047f8c22b020632dd60 01ef2aafc7cea348552ed7b67c9dbaff 32ee0ff7fbec042edbb9420e522eda1a126e1872da2b7a13b0627a03be4d1d59 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-3eh01VMProtBad_2c292dacWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.2c292dacb339fd464ce42bf360f9eca5520092abeca38054ecfe4d61462e348f5573730b 2c292dacb339fd464ce42bf360f9eca5 4e2624a133a42107d3def6ae7ffcb5e1a5c372ca2d8638438a03a4a040802517 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-t9p01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.200914872736a72a37d2433460f4dfb7c9d8bb9fd2472f1af12bfb3a9594e4ad767e8361 200914872736a72a37d2433460f4dfb7 3570b95ea454efd6735bf4942d69521d608ab7d0c9745cfa636f1107acc6a23c http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-vys01Gozi_ec8bae15Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.ec8bae15417dcc2ba4b92a03904ef297f1879f675834d2ac2db61ca72033b5e7ef892881 ec8bae15417dcc2ba4b92a03904ef297 f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-4a201DofoilWindows This strike sends a malware sample known as Dofoil Coin Miner. This Dofoil malware campaign launches a process that pretends to be a legitimate windows process but actually drops and executes coin miners that have the ability to mine different cryptocurrencies.942faeae9f5b5442bc89438c437b749388eba5d205d85c39ced484a3aa7241302fd815e3 942faeae9f5b5442bc89438c437b7493 2b83c69cf32c5f8f43ec2895ec9ac730bf73e1b2f37e44a3cf8ce814fb51f120 https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/
M18-qhr01Gandcrab_ad7b4240Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.ad7b4240854cfd31b56eee2e36c91bd53fbb7d0d4ea30bc3f038271cc9e2021787dd16d1 ad7b4240854cfd31b56eee2e36c91bd5 0a2ebbf4d5ba25049b8225cb253f7f99423b706f9a239c877595eaf696058f56 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-ewl01Win.Trojan.Generic-Dropper_a44ca498Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.a44ca498971eec7f99e564b77f0d865c8e6024e9da2d0b3cef1cdafa519b5c0ac6badfc3 a44ca498971eec7f99e564b77f0d865c 45b40df9bc6508a11c7fdf06de88a039485dca91d985fb667a91a4af35a08b2a http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-82b01VMProtBad_906c8fd1Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.906c8fd114f0820c0a5acdbf6116241f162a1a07f8df7a87e852c6aed64d7a6b9801d430 906c8fd114f0820c0a5acdbf6116241f 59880ac464244c14deea6569d4d79377fec91f63b7951f137bd457985528f3f7 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-cad01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.b4faf1965caa433a5dc10894c8040ebd1bc9f4f400dab4198d72b31f6f1d5380c19f5c88 b4faf1965caa433a5dc10894c8040ebd 29ce80f75b8877e22cdcdf3fbecb01d2d1a65161f18311facdbbd090769b5ee6 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-iux01VMProtBad_3a20b788Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.3a20b7881d50f299f88674997697a927150a2dcffd8842d41adf17ac7cd25aa69febe506 3a20b7881d50f299f88674997697a927 b2e43a6ac8301d5304715b8528c40da58c5e2f473995738178d9f5444d52785a http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-1m101GhostMiner_dcf13317Mixed This strike sends a malware sample known as GhostMiner. GhostMiner utilizes Fileless Evasion frameworks in an effort to spread itself to other targets. The mining component is launched from memory and uses XMRig miner.dcf13317db595b6114ef90659f3860dfb73c9ab9f12e5481a892217e28480a8713014827 dcf13317db595b6114ef90659f3860df 40a507a88ba03b9da3de235c9c0afdfcf7a0473c8704cbb26e16b1b782becd4d https://blog.minerva-labs.com/ghostminer-cryptomining-malware-goes-fileless
M18-k7501DofoilWindows This strike sends a malware sample known as Dofoil Coin Miner. This Dofoil malware campaign launches a process that pretends to be a legitimate windows process but actually drops and executes coin miners that have the ability to mine different cryptocurrencies.53bee1572d43897c55e2df143a66da7cba84eb93a12e8a6bae1e29fe02d2c5b04759263d 53bee1572d43897c55e2df143a66da7c d191ee5b20ec95fe65d6708cbb01a6ce72374b309c9bfb7462206a0c7e039f4d https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/
M18-4gn01Gozi_12b22e4fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.12b22e4f0733f2b4b9804ac3bb8e4a5a2f6ff9751a790141c0e2e3b82f5dbc6e840594e9 12b22e4f0733f2b4b9804ac3bb8e4a5a f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-k5902Win.Trojan.Generic-Worm_4a370d54Windows This strike sends a malware sample known as Win.Trojan.Generic-Worm. This trojan is a worm that makes an external call to a C2C server, and exfiltrates information from the victim machine. The MD5 hash of this Win.Trojan.4a370d54a912cfe6a9a017fe33252b6240aa3638d61ba8dc4a9f01f3727571a0e708e5a2 4a370d54a912cfe6a9a017fe33252b62 4c54271a9c1fc98d0561c6f8ab45be77121bb382453e07d49f2b56d89bd263ab http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-hlj01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.63904c4c1196d7a7274a9fef219f00fa294aa5b201b9acedc091c9fa26932034a5c1c3a7 63904c4c1196d7a7274a9fef219f00fa 14944d9db8baace4d7fb97cdf285009b5e0472bd6aa4d9cb530a1f3893287682 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-u2e01Gandcrab_1154eec2Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.1154eec2c27091268e16db59fcb491e6da8bd7f19fc476569c12ba37a173af089c303242 1154eec2c27091268e16db59fcb491e6 261fd62f71e3b566c8ae77e44760f0346c4f353a25f879ee5401e4755745ba10 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-s0l01VMProtBad_d5574ea5Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.d5574ea5b6655af24b7cc74fc0be762b84f022316c785e8618d9e4c719223c6625187d42 d5574ea5b6655af24b7cc74fc0be762b 246569246bb8a4694f7b48e9c7abdc6e732b7e1c73b2c802c045d5cda03ef3da http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-0hz01Gozi_bbf3be06Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.bbf3be06a6f4b6b34af48f55072da8374ee432a723f26b76fd7f91991b297e57b0913562 bbf3be06a6f4b6b34af48f55072da837 f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-qwt01Gozi_88aeb1bfMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.88aeb1bf08ade97d24ea8e379cb923a8b189ea64e1a3054a1b2e617624e06649e912d42e 88aeb1bf08ade97d24ea8e379cb923a8 ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-p1m01Gozi_00a7b967Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.00a7b96790c3ca21f7e5bdcdfe7a15e733b861b31419dbc6b21d2fa4444a8a78b988ea13 00a7b96790c3ca21f7e5bdcdfe7a15e7 f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-wa001VMProtBad_a646c214Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.a646c214cee2f6db3df0d6ba0c96c866aef259b74b081efdf49116bf5a0aed640e781c34 a646c214cee2f6db3df0d6ba0c96c866 0412d1da28e300a2677e46ea1af64d664ee47f845336d1081d15df58d3e9016a http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-nrt01Gozi_d6229a6aMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.d6229a6a24180bbf601015d9a14d4b1ac5184154b100074ef4c743409ecee20f4b41b78e d6229a6a24180bbf601015d9a14d4b1a f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-wo501Win.Trojan.Generic-Worm_db602aecWindows This strike sends a malware sample known as Win.Trojan.Generic-Worm. This trojan is a worm that makes an external call to a C2C server, and exfiltrates information from the victim machine. The MD5 hash of this Win.Trojan.db602aec1381d775c174f99ecf614a3cd2b7f16a5d9be3483b3832048198eb60b53347f5 db602aec1381d775c174f99ecf614a3c ba1d8858e7863db19f04cf44cfa92906887833a84099f2bc810ed5c6863b46b1 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-3e201Gandcrab_fc2e6154Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.fc2e6154756d329eaed7f099d18b91daa9d01c428332ed9f9ee43bf01c320faeac004c6e fc2e6154756d329eaed7f099d18b91da 03c8bece3db3e2d6b26cc9769d2a694071117cbcf21830aa143507b03b402681 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-jme01Gozi_8ee304efMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.8ee304efa087574c9df940ab2ca5474e024652ecbfa0bad984f890fd3cf94e37cf783e01 8ee304efa087574c9df940ab2ca5474e f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-h1e01Godju_d62d87fcWindows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.d62d87fcd8fc52dd64c101f6df5bc05b33f050ddb5f137180a6a673d2734f088ffe64ccd d62d87fcd8fc52dd64c101f6df5bc05b 412ce2fea4821c63074f3cd6223c9e9d7f074f18d5cd88dc1d7a36a1bb2f919c http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-6x901GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.0a218cadbb446ced377affcfbd9e6276e0780f26a5b13fde96b0c65628f5cfe919695f74 0a218cadbb446ced377affcfbd9e6276 1eae0edf899f881fd86f0500b58f9b6497d5b94a99ac439307d61c0f24cb1573 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-m0z01XMRigLinux This strike sends a malware sample known as XMRig Miner Malware. This sample is part of an XMRig Coin Miner campaign targeting Linux Servers. The malware specifically targets CVE-2013-2618, which is a vulnerability in Cacti Network's Weathermap plug-in. Once exploited, the malware drops and begins to execute the legitimate XMRig coin miner.6f87973abb1cb978fbb2f59be7daf929b398e371770efdcfd56b61e5564b8b7ee4921180 6f87973abb1cb978fbb2f59be7daf929 2c7b1707564fb4b228558526163249a059cf5e90a6e946be152089f0b69e4025 https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/
M18-unn01VMProtBad_5acf350eWindows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.5acf350eddd24517407a9db1e3c6e8b4e1d2927bab1b77939d8c681403d4de6d2f6e573d 5acf350eddd24517407a9db1e3c6e8b4 fd7fe9120abfd3da2124357680acaf010d1768fdaa570e471b30207a4e8d9dae http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-dph01Gandcrab_af889676Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.af889676466d8ea91d9e89264e16c672891d740f6488e4d1f2315bf4d55cea7d5d5f1963 af889676466d8ea91d9e89264e16c672 15b3a69b86710122a8824ce17996c3301e96b1c629b7db3d9919012954903c85 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-opj01Win.Trojan.Generic-Dropper_23cb92a3Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.23cb92a3a247bb538413bf625e761945df9fbf25183ac4466d80a69e2bb385ac1df2ef0c 23cb92a3a247bb538413bf625e761945 1f1ec9a132226bc4eac25a6e999cc9b937718cb356c8d41b2bb08266ca1c5a38 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-dcx01Gozi_a190d9f1Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.a190d9f1f987ec7e7845d8bbb766b45db1e303d44b81ebdb4efd6e25438a9ae753d0a0b7 a190d9f1f987ec7e7845d8bbb766b45d f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-s2e01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.0b28c7f03f230c29383c1918397a285e2b4e8413a061ee896d2fa85decbce2060e7dcd40 0b28c7f03f230c29383c1918397a285e 1257a5650f02a4cbff43c190452517e17f4aa46284b7063162e4a54d318aff79 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-3uj01Gandcrab_bb281189Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.bb281189b366b439e99fa1ab1866e85ffbd684c21c57b84f39a84799339adbabba35e21b bb281189b366b439e99fa1ab1866e85f 084d5c8161764da9af2b1dde0146a7f9b51491c562d8036aa28b85a4a1a32aaa http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-fu001GhostMiner_f94d5386Mixed This strike sends a malware sample known as GhostMiner. GhostMiner utilizes Fileless Evasion frameworks in an effort to spread itself to other targets. The mining component is launched from memory and uses XMRig miner.f94d5386f58f663a40b3aa444a024855eb9e8203bfe096d37258fea68c5a650449a17f48 f94d5386f58f663a40b3aa444a024855 9a326afeeb2ba80de356992ec72beeab28e4c11966b28a16356b43a397d132e8 https://blog.minerva-labs.com/ghostminer-cryptomining-malware-goes-fileless
M18-js001Win.Trojan.Generic-Dropper_32cc3da6Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.32cc3da6eb18696d7b6cf797500eb8cfdffa22dba6fdd7454bc579bb5f4726b9948f3f6d 32cc3da6eb18696d7b6cf797500eb8cf 3ff03a32f5a944c6655789bbfa124a7d52bb17df771c975685a5dce69c124d04 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-4tz01Win.Trojan.Generic-Worm_6d111706Windows This strike sends a malware sample known as Win.Trojan.Generic-Worm. This trojan is a worm that makes an external call to a C2C server, and exfiltrates information from the victim machine. The MD5 hash of this Win.Trojan.6d11170602281c8b365c638901f67369bc7f34e80f06c34872fb8df4c19ec8e9c4aca4a9 6d11170602281c8b365c638901f67369 dde1cc674ef61703752be1d3354f0f766724678aa0fdeb6376e7448a901d7f78 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-f5t01Gozi_f143d252Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.f143d252ab3c1ee86aee33f3e1eb2f8b20cb638150ee953c13a391cbb6f1f0045b82b651 f143d252ab3c1ee86aee33f3e1eb2f8b f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-xru01Win.Trojan.Generic-Dropper_0465b1c6Windows This strike sends a malware sample known as Win.Trojan.Generic-Dropper. These samples drop various malicious files, including cryptominers on the targeted systems. The MD5 hash of this Win.Trojan.0465b1c699c8cfb95b43e0e0276fcb4beab93b24c1eb6f0c2e3712b28b33637d6a3eb532 0465b1c699c8cfb95b43e0e0276fcb4b a6a9ec0af4abe94b72e557f4b9c9d4d0b59b4296aca3175a1551b84efefed856 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-2xj01Godju_493640f0Windows This strike sends a malware sample known as Godju. The Godju ransomware family uses Tor for C2C communication. After it encrypts the target files it uses the extension cypher to delete them and clean up after itself.493640f022a7ac07ad4e8d6f2cd3740e4c4a1df308e415ab356d93ff4c5884f551e40cf5 493640f022a7ac07ad4e8d6f2cd3740e 7005535e034576fdb66b5b32eb198b48d7755758e77bd66909f8dd7288c1e069 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-l8w01GhostMiner_6883db2aMixed This strike sends a malware sample known as GhostMiner. GhostMiner utilizes Fileless Evasion frameworks in an effort to spread itself to other targets. The mining component is launched from memory and uses XMRig miner.6883db2a29856e4e88a944ad962683dc5a9740c6c1e0db3f1f32fb49d06bf5530bf21a3c 6883db2a29856e4e88a944ad962683dc 8a2bdea733ef3482e8d8f335e6a4e75c690e599a218a392ebac6fcb7c8709b52 https://blog.minerva-labs.com/ghostminer-cryptomining-malware-goes-fileless
M18-anp01VMProtBad_ea1baff5Windows This strike sends a malware sample known as VMProtBad. This virus is a packed file injector that installs unwanted web browser toolbars and adware, and also has the capability to detect many Virtual Machine environments.ea1baff59f0673cb691612c12b17482c703e30cac6d24c0960a887caa32083b1014d56d3 ea1baff59f0673cb691612c12b17482c a4cc65474efd0b0e3aeaee8614b397dbc9bd3ecf7a95a8526d8ac84ed3848ee4 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-s3o01GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.cf85b692e58a94538052047ccaaad00608c9f04c1002311ae51671427be6994ed604e797 cf85b692e58a94538052047ccaaad006 3732c9fd5ff38c31fda2492dd81584819f12cce5731f7361f536bdf8040c724d http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-boj01Gozi_6f347d19Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.6f347d19fcc0d336809ac1c49fdef3c24443502cfd80dd39d3c49943df0264872a7bc4c7 6f347d19fcc0d336809ac1c49fdef3c2 f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-t7d01Gandcrab_e49a2983Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.e49a2983f432472d5e64fd970bb68a88638fffeebb259f7055a319db622606d6b65eeee5 e49a2983f432472d5e64fd970bb68a88 289d660ede22b4062d102307d5830a2af10da669ce573c279db8e055e6fbdaaa http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-vy301Gozi_b06572a6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.b06572a6b4f3261b6cf355225b7d139c7873067b2442d577078d6bba33838e750dd422ef b06572a6b4f3261b6cf355225b7d139c f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-r2c01Gandcrab_ae3ed37eWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.ae3ed37e2a1252582adbc4b4092d11a18eb194eb9a028cad16dce58ebd2e77ba9acb1a07 ae3ed37e2a1252582adbc4b4092d11a1 0664a3cca1d5c0c9f2b7f0e6b2f0f20e99b3f902e98e9e709f0bb8ac1cadb867 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-7pw01Gozi_0d32128cMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.0d32128c5b6ae94200a79e41384ad7f324fc1f5a56fd9542ec8fb63c8c69c76f53b0ecee 0d32128c5b6ae94200a79e41384ad7f3 423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-1fk01Gandcrab_c1f93966Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.c1f939662db002c454f43b74db7841f92336ae922d4651359510da460fc8503e69712d99 c1f939662db002c454f43b74db7841f9 02e90fb6cd303ebced661c5c7c9af249241835285e0e64b1092731485584ab8a http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-vul01Gozi_dded59f5Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.dded59f51a5d04c60faea5fd6150661aa73edebf73f202815466aedfb4c51bbefd217e4c dded59f51a5d04c60faea5fd6150661a f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-iwn01Gandcrab_06c96441Windows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.06c96441f93299addff5fb44506a3e9fbc1de7f70f34ad5db88b0b69ee6c6bfe26289a67 06c96441f93299addff5fb44506a3e9f 075c9b925c8a0c5cea4d26b1f3c23666c99cede647c9769503f8e35a96c098b9 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-fqv01Regrun_05044912Windows This strike sends a malware sample known as Regrun. Regrun is a Windows trojan that hides itself on the target machine and hooks into the Windows shell, disables specific actions and enables persistence.05044912df5fc8d7f8d6e752bfd55b25a4528d68b0382a178869b9c0ed97746a98c7090b 05044912df5fc8d7f8d6e752bfd55b25 4a66e0bfcdd2addfccd8ba68c50d2b803beb2b8120a6cf4f8fecf4a0b0cf1678 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-id801GiveletWindows This strike sends a malware sample known as Givelet Packer. Givelet is a Windows Packer that obfuscates malware. It has been seen with malicious samples like the Gandcrab ransomware.056225eee12cca9813de30bb8074e5693a266b4ecba535dc496625e27afba30f52324a44 056225eee12cca9813de30bb8074e569 10f2ed852befc9c9c15e5231b2167bbec66e3700c44bcf324312a32e932fa819 http://blog.talosintelligence.com/2018/02/threat-round-up-0216-0223.html
M18-ji901Gozi_223b43c3Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.223b43c3adf88f89c86c1f1e6da1d2e380ddd53193e956dfdace98b42e3d085ec94c7edd 223b43c3adf88f89c86c1f1e6da1d2e3 f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-gtr01Gozi_2c90625fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.2c90625f84a51b57e75049beee698252a1cb2dfc25dcaa41ecf093c85187f25aec2f6227 2c90625f84a51b57e75049beee698252 fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-wwh01Gandcrab_a1fb858bWindows This strike sends a malware sample known as Gandcrab. These Gandcrab ransomware samples attempt to encrypt user files, and then append the extension GDCB to them.a1fb858bf56af11a5ab261bffecb81da92e6e136ad1240ff446234d34176f8af1d0c7d2f a1fb858bf56af11a5ab261bffecb81da 022024c7db211df7da83d533d24c795eb4178f5a7b9a27acf752874bcdbd5477 http://blog.talosintelligence.com/2018/02/threat-round-up-0209-0216.html
M18-lk701XMRigLinux This strike sends a malware sample known as XMRig Miner Malware. This sample is part of an XMRig Coin Miner campaign targeting Linux Servers. The malware specifically targets CVE-2013-2618, which is a vulnerability in Cacti Network's Weathermap plug-in. Once exploited, the malware drops and begins to execute the legitimate XMRig coin miner.07b28eee8623cd2905db82a6a8580265c4577702ee18f7b7674555b7aa688e37d847aec6 07b28eee8623cd2905db82a6a8580265 48cf0f374bc3add6e3f73f6db466f9b62556b49a9f7abbcce068ea6fb79baa04 https://blog.trendmicro.com/trendlabs-security-intelligence/cryptocurrency-miner-distributed-via-php-weathermap-vulnerability-targets-linux-servers/
M18-97c01Gozi_01ed114fMixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.01ed114fde71c5f9e77dfdcec884767a1ef6aed3d369cf10977426fab35e78886469ada3 01ed114fde71c5f9e77dfdcec884767a fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-qn201Gozi_ea592197Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.ea592197a398714700eec0b1b4ee8e3385c1052f392c6f39c368dcf5d5cc39890cbdabf2 ea592197a398714700eec0b1b4ee8e33 a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861 http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html
M18-3xd01Gozi_228a7bb6Mixed This strike sends a malware sample known as Gozi. Gozi is a popular banking malware that has been around since 2007 and was recently spotted by researchers in specific targeted campaigns. These are Document related samples that have been related to the malware campaigns.228a7bb6a6d10523afff39da47621133a7a638420c84ea2957df25d9798859ff9c6d7744 228a7bb6a6d10523afff39da47621133 ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html

Malware Strikes February - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-x0401Emotet_88d56e1eWindows This strike sends a malware sample known as Emotet. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.88d56e1ee7509ac55b284fb6ba0c55b9817a3b85975dfe5da49c4289599c201a25bab398 88d56e1ee7509ac55b284fb6ba0c55b9 57ed7d6ee9ae8b07783bd1df207521cf0f3e1365951c29ac04f1afc1d4f3c048 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-akh01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.ecc2f0f66e5fd9132c8878178bc7d40dfef671c13039df24e1606d5fdc65c92fbc1578d9 ecc2f0f66e5fd9132c8878178bc7d40d 2981e1a1b3c395cee6e4b9e6c46d062cf6130546b04401d724750e4c8382c863 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-7zy01Zusy_d3c685d0Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d3c685d09cb54e892b30507e12b2ca8a855dad48d25b0f8eb27c4bfd5c5b6243006e9f37 d3c685d09cb54e892b30507e12b2ca8a 07927ef357ebb94200b9ec784db1337f2a2012a9591bcdf2f27387e7992983ac http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-cqi01Adload_89b8f7c6Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.89b8f7c667fab8fcdd1667e177f68f8f047d795c4efce5ede8d8cb26b257b2c7b2003752 89b8f7c667fab8fcdd1667e177f68f8f 19d41761096fdb20dc412af13a00c6ec752ca7bbb8444aa9c546aa0fb5385782 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-tva01InstallMonster_26b20b94Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.26b20b94a5e985789d33c459dae02f8e41a36d19b429203cfe562690c33dc25bf498e709 26b20b94a5e985789d33c459dae02f8e 1901b7872887beca319f88ded466061762dcce27b82964e0771bdc239d70a04a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-n4o01InstallMonster_7efe33beWindows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.7efe33be41ecb9b9a20bf6b1a85253cae0d5c23ad72a34373cecd33386c2971c415cd48a 7efe33be41ecb9b9a20bf6b1a85253ca 05827d9b842370ad0172bbc21189956edf6a3aeacabe455c3386fb294c91cbac http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-hob01Zusy_d9794fefWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d9794fefd371397e874cf226faa803ae5c49bf413971c44ca871cc6b1a52b14288ace81e d9794fefd371397e874cf226faa803ae e88b52ba0a0047a297855ce56115eacc07ea8b34a06900eef9890a577482ea7c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ll101ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.3182dc6627f756935a6590ec54f89be2f4ef07cad540a0c6b7d54c024fb3f3021aa38d82 3182dc6627f756935a6590ec54f89be2 87dc2f7b36c4423f641516068c94feb3c9a634fbaa9196244cbf03bed8f2c85a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-3wl01Adload_518393d3Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.518393d3fc6bcd54bca02858d89ee38a7c48356bd1de405ba84645799d60c7c83a78005d 518393d3fc6bcd54bca02858d89ee38a 1474c9ed8ea883047a1f069ad93cfa3516d3a337fbbf93ae9248c17f6646c3ba http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-va401InstallMonster_2bff5127Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.2bff51272311efd6208b43a4c57d0caef74d6969f4d7110939b7cdb990807ef3f2c6e8aa 2bff51272311efd6208b43a4c57d0cae 0d10201d5be9135b7bb1676c30452fac1d82019debcf3170655a0719ba3e0d59 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-rcg01FlashMixed This strike sends a malware sample known as Flash 0day CVE-2018-4878. This 0day Flash object is embedded in a Microsoft Excel document. When the exploit executes, it downloads a Rokrat payload from a compromised site.111d205422fe90848c2f41cc84ebd96ab03f6f336c07d514edb15d6e3fefd98432cae7e2 111d205422fe90848c2f41cc84ebd96a fec71b8479f3a416fa58580ae76a8c731c2294c24663c601a1267e0e5c2678a0 http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
M18-ms301Emotet_cc59ed6bWindows This strike sends a malware sample known as Emotet. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.cc59ed6b6c8693c26fe41bd0130c9120a866702fe0769d0ca39b48116dd2932f2abea2c5 cc59ed6b6c8693c26fe41bd0130c9120 08f3c988473aea98d4ca8ab627cd5e10f075455b5f6a538a13dc53871d29a04c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-k5901OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.8be90fc18186415db4f49bb281f70c626e13875449beb00884e07a38d0dd2a73afe38283 8be90fc18186415db4f49bb281f70c62 ee7a9a7589cbbcac8b6bf1a3d9c5d1c1ada98e68ac2f43ff93f768661b7e4a85 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-u6c01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.35133c3610cbfebff4bd12a96f8f9e9e4f58e6a7a04be2b2ecbcdcbae6f281778fdbd9f9 35133c3610cbfebff4bd12a96f8f9e9e 7334209ace81d67babbbb37f5a0d2af24160f637a8559483e14685927df6b7fa https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-two01Adload_b986c81fWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.b986c81f86e5645f68d1950eb66b223b72037fd872532e9994cecc07cd3894a8d5c9ec0f b986c81f86e5645f68d1950eb66b223b f854f72ac2f61de681be53b78c6c5050580c19c589104c3efdedc8a4838e6932 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-dr601ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.9715ce865dcdc64ab717378be537804652aeefc43f1bbfcb34c10b825665bb8f63d3edc3 9715ce865dcdc64ab717378be5378046 43e7bcef39f88ca7d3b9b67d09f9264c4946e0e12a337c23e043bb8e9f634c2e http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-apo01Zusy_d089cd3aWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d089cd3ac616428075501b6262565574afdc89407dea5ccebfa640ba555fe81e0956c3c4 d089cd3ac616428075501b6262565574 6e9516009a6da7c3247f058783b6515d66c11c440bd60394452112a28a815272 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-8k901ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.7bdea527c2e5775e52feb8c52c40d7f23507d756273c876c8376c49ab3d977ddf8ac9e81 7bdea527c2e5775e52feb8c52c40d7f2 6e2460dab20fcca216798641dfa821e73b5bccf510df487839f542a198740778 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-vio01Adload_558467dfWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.558467dfe6883eb962dca5a347c5ba841450919c0e6277a354d5df5ebd176ddd8b70f3d7 558467dfe6883eb962dca5a347c5ba84 1d5c26af77f30dab347de49c91146a6d2d3b95df5ccd532fc1d8aee0ae63eda8 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ezw01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.33df74cbb60920d63fe677c6f90b63f9539acd9145befd7e670fe826c248766f46f0d041 33df74cbb60920d63fe677c6f90b63f9 94aa827a514d7aa70c404ec326edaaad4b2b738ffaea5a66c0c9f246738df579 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-1ca01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.1ef18a696db0a4bd8ef98ee74797a26856ffeb3383f9bfef0773bbe6dd5d6d6a71887469 1ef18a696db0a4bd8ef98ee74797a268 a77e40b03e814c6f554929a939839416d80f73228a123ab953be37a1f25780b5 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-3pg01Zusy_cf903025Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cf903025b26d361fe34890c1eaf52bdf88ccf4613e8a338c048fa7b510b9db977fb3b1ce cf903025b26d361fe34890c1eaf52bdf 219c813aa7aefc3db6d7de37898dfc9cb31a915f0c97d9ffd204b03df6598145 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-wm801ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.b4099b23667943ecab3de377f8a51ebf595a48b04b61ec46dd30177aa0883d94c431326b b4099b23667943ecab3de377f8a51ebf 853ce320b07e88db313df40a05307921594d83f568ec7cb5981e180d24a7e510 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-v9g01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.21de71411ed3d5fffa4f9222057be82cbf21667e4b48b8857020ba455531c9c4f2560740 21de71411ed3d5fffa4f9222057be82c 9097b372f7f844c430aa8c1b217a50754b28434172d5af5d992bfcbce9dfeb4f https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-ctv01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.c0cda1803c734c0531afe93247db0a1eac04a2f87cb8752dbe26fcf6dec58a39a79ea021 c0cda1803c734c0531afe93247db0a1e 6755c2d4855a8b5ec2eb9dd9ab20edc55230c9cd12c372080bae52997899cf2e http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-uiy01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.92001e9cebec0f0f0ac2b7c7e04f017da9eb9a1734bb84bbc60df38d4a1e02a870962857 92001e9cebec0f0f0ac2b7c7e04f017d 98ccf3a463b81a47fdf4275e228a8f2266e613e08baae8bdcd098e49851ed49a https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-75e01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.8aa6fbeffbafd1f6a884d8e210ca3e522655389bee1a47414f0be75d17701e2fae296d79 8aa6fbeffbafd1f6a884d8e210ca3e52 d007c2ec4483fcd4dbf67233956b194d3a3a46426f700282ea7b01785a10fc50 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-a1901ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.25cbf8def29ef839a2852b38815df1cc8652602d79fe9a948da3af4e2aa315acf7d1b66f 25cbf8def29ef839a2852b38815df1cc 74b66767a723949e5b0837eb281bad34b6f6132d9b4aef0b3d36651193edd3d7 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-jxr01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.99986f0ec2b36763560a01925af69b7511a38a9d23193d9582d02ab0eae767c3933066ec 99986f0ec2b36763560a01925af69b75 90eba6416f5e1b35c9bf41b4a25ac880c491dd2f10d993d8a65091f1adf68ee8 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-zro01Adload_8d751461Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.8d7514615d641712e7321a6beab5d23b4b30a94c906aac94403998a06e8ea96cea8cf177 8d7514615d641712e7321a6beab5d23b 051826260a52420903d9c17d973a0cc78dc5706140df1af05cdafd9321d2764f http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-zv401Adload_f8b0de90Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.f8b0de90ac3340c5cf4661cead716efe82287ca50315e90f584d57cbce2b679270b5c60c f8b0de90ac3340c5cf4661cead716efe 1f910886460d291aa28ce33dff560b291ee3a9040c1ffe125134d01cb8673bd3 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-4fx01GenInjector_0803c211Windows This strike sends a malware sample known as GenInjector. This sample is part of a malware family that injects code into the address space of another process. It uses techniques like process hollowing and sleeps to hinder analysis.0803c21104a02be4c611f0f2d7fc8e4b798ceb3ef93a9b783f7b11b0259e0fa5b5933fd8 0803c21104a02be4c611f0f2d7fc8e4b fb237b7fc75cec8180f4d853c44911dc0dbdb705be39c3e6f1f2a523b79ff9d5 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-56u01MacrolessMixed This strike sends a malware sample known as Macroless Word Email Attack. This sample is part of a multi staged macroless malware attack. The malware leverages CVE-2017-11882 and attempts to steal credentials from various programs like email, browsers, and ftp.11b28d4c555980938fe7440629c6e0ec0add65090ef957aa054236ff6dd59b623509ec8b 11b28d4c555980938fe7440629c6e0ec fcc1bd24951b5dca31147bbc33d3566c23fb1a78a9afcbb62d0ae9e7695517ed https://www.trustwave.com/Resources/SpiderLabs-Blog/Multi-Stage-Email-Word-Attack-without-Macros/
M18-9jh01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.012653803b956165ce9142668e38b223bf8f2637614b1b2eaaee8360405e9c2497ed88f2 012653803b956165ce9142668e38b223 86b774067ba5911413c1125626056f32d4e076c0c15aa38e78c606573b3f730e http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-98m01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.cad31e09a016fe6cdae36cc948ba3f586a5f7b22c1b24325f10057e57a01b9b0e05726e4 cad31e09a016fe6cdae36cc948ba3f58 46acbdf64873613dceff0d9d5af2169ef6af5b71576a312d3cd2320bc2ca4f34 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-9mp01InstallMonster_bffa9d0dWindows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.bffa9d0d464eb3588be94e8d5ca0d32e0e98cd71e2c4cda6fd83b33f892ad6318b12efcf bffa9d0d464eb3588be94e8d5ca0d32e 1e1f00584ddd324467fd0e2b9f06d1320efdec7253f63833d19d960acc598975 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-7oi01Adload_d4acd5a9Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.d4acd5a9a64c9ee9ef35fdd40a2bc90ec9db885e2cab06ac94b0f14d9e3194389e75361e d4acd5a9a64c9ee9ef35fdd40a2bc90e 10b8bbff557792a03e71fb766b075cc6281976e05694b11bfac31a375863d6d6 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-6b801ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.a9abed0839514dc2e6e0c238630bbe501fa4135c15145b32235e690cdba37ee87e7abc7c a9abed0839514dc2e6e0c238630bbe50 72d16e5244d6e31f29a0ce765df09b6e9f8cc096a4266458001ce1cff345a398 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-cil01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.d61f883a59c3e0729a3ecf78b70044cfe68f43ecb03330ff0420047b61933583b4144585 d61f883a59c3e0729a3ecf78b70044cf 2230edace3f42a5750f738f28814759b670922f16aa778e97d039d10fe9bab02 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-o7y01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.18f4700c63f3688892ac1135b10544fa4f06f5a7d030c086935c9e364f35212348fc66d4 18f4700c63f3688892ac1135b10544fa 1d869439f6a5b2e51a92b579924395478263b897822bd76124639a0d78fe361b http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-1l101Zusy_01284c4bWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.01284c4b2bf2782ef897197c75fef022c482d9be7ac77b6c847b6f3df088fc542b7a1a8d 01284c4b2bf2782ef897197c75fef022 b9c2b5cc1df590e197d3df80584a8c077c2d68ef9aaea4888af8598541aec0f2 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-0j501OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.2bd4380c9aabe58812c9088d40bf127d3a0c617d17e7f819775e48f7edefe9af84a1446b 2bd4380c9aabe58812c9088d40bf127d 0ca12b78644f7e4141083dbb850acbacbebfd3cfa17a4849db844e3f7ef1bee5 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-5fk01Rokrat_d2881e56Windows This strike sends a malware sample known as Rokrat. This sample is a Remote Administration tool. Its purpose is to exfiltrate documents and manage infected machines.d2881e56e66aeaebef7efaa60a58ef9bc09c1be69e5a206bcfe3d726773f0b0ddecb3622 d2881e56e66aeaebef7efaa60a58ef9b e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
M18-syw01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.69c4b61883bdb954d96b03793df9e03abc01e3c859882a69a7f314192a70be27910acb6a 69c4b61883bdb954d96b03793df9e03a 4c6203f2c7d3590948d783ce0dbf181927a3645b82167fefbad5d34a203112d2 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-knu01InstallMonster_cda69de1Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.cda69de111acb8a3278ddd05a822c0abe99e654c3c9a029be0c53bc96e7717e38726874a cda69de111acb8a3278ddd05a822c0ab 16ee6d3da75a3527ce741fbcbd8424b52826fcd89510a1206d9e30df1e441ff6 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-qac01InstallMonster_a0c8e548Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.a0c8e5488d8dbc0ac145da655697e765c2c6d99c2ae0200c51dfbe148c1157a71488a41a a0c8e5488d8dbc0ac145da655697e765 0b20d5bc9b5f22fde1fd769392a8df02722cb30f12954a18fad2570f6c2fcedf http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-szg01InstallMonster_5b00750aWindows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.5b00750a4e4c758cd421320e6665e53049abfbe35953ed98ff76caead6fd5d2151478164 5b00750a4e4c758cd421320e6665e530 13353b13d483f3096a3c4cc98bbbecdf5f67c86e13d1af3627b9f61b8a37c058 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-26b01Zusy_0a81ec88Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.0a81ec886655e4aa03165765e082b80e7607412999f91b006b57c8a56e8bcbd16b2106ef 0a81ec886655e4aa03165765e082b80e 4a6003e3c1930cd82f5be9f73b6b4554777ab453dd7783fb21cfd94478787ab1 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-p4h01Adload_28f90dbdWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.28f90dbd718c0c4ef3481e3ea73c46098844197dea61d16244b91df95b1f59bb8fa02a98 28f90dbd718c0c4ef3481e3ea73c4609 150a103d11bbc8638116a30427620db833d926e6bd74fcda12ec90d6e89dfe3d http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-yru01Zusy_d525741aWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d525741a6b067e9c4f9a140bc618c2c5cc2958ff23b99d44d9c5339705ea1f10551b1992 d525741a6b067e9c4f9a140bc618c2c5 4f318f15e17c6839069c53c5cc9594f50cc805867aa9d04df688daa10c55a28c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-jiw01Zusy_cec6a3c0Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cec6a3c01b00d66df2deb665a726861c4189963a821d9300cc172a27e835171cf28486bc cec6a3c01b00d66df2deb665a726861c 191281b087c742f6a99e05356bf0d8fd6e30340754c7b8ead6ae4051a595744e http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-5n001Adload_0b5a69bbWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.0b5a69bb603dae375bbb94782169767e7787492d5734defd57e0af6a34fe021dec98329a 0b5a69bb603dae375bbb94782169767e 0bbff365a4284eb3ab0932cb80f5d3d35880ec2a0c473daa7a75ac46c091bb3c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-52k01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.0c2de7cca796f760be377d701485e5c159a4dcd2dc8317e21e6e4a5bae5bf392656b0025 0c2de7cca796f760be377d701485e5c1 35de4cf3ed429504e8b8695b33f386d2ca84017373af99b76f41d5df69f5f84c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ujf01Adload_4c273369Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.4c2733695df20268e0a19c15f81d4f329198a1e087da010d7f94ddac9c707c0bf3687282 4c2733695df20268e0a19c15f81d4f32 0dc1235368b24fed46e7f744c6b9f9c486d3b36a3e6fa1a20d7ec869ac656310 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-n0y01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.5a6d034b9f656bd60cc29688d2eba61883706ddaa5ea5ee2cfff54b7c809458a39163a7a 5a6d034b9f656bd60cc29688d2eba618 2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-ihe01Zusy_dd59244eWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.dd59244eb20f3f517eb513d9d69c2a51d3022b68bcd4020331211e7cf0bf0916dc365ab5 dd59244eb20f3f517eb513d9d69c2a51 a7af202e3d506f9f52a3cec09238bc8aa8096611206807e2c3f2b17d7976db96 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-8xb01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.edf723c8e404cd67041e7dfbbb1a6eee96a2fda8f26018724c86b275fe9396e24b26ec9e edf723c8e404cd67041e7dfbbb1a6eee bf2534b2f059547967bb453d67909921a41c10cdd19c1ec346a193060b094e2e https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-5yx01Zusy_cfa19e83Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cfa19e835504176c81b69c882e9dad234de6b98b8f766c705ad6f1aebf3754ab91607b9e cfa19e835504176c81b69c882e9dad23 217fd7e2bb21f0f0023f1c557bf29bd7578ea92159232e20d2d9cf34b6dfe976 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-23f01Adload_b8cecb37Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.b8cecb373e1d5bb5aade20d116a3406ae4b5041f93b9b92ed499d507ee3b38da136779c2 b8cecb373e1d5bb5aade20d116a3406a 1f9c34ceeb4600837359be13415e95783f4e5f7ea8d3def87ce3b06ec6a047dd http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-gub01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.0f0eb3c733a664c53695ea7fd1bc15199015ed3922be9c6e43e647a72014de74d73cb984 0f0eb3c733a664c53695ea7fd1bc1519 6f9034646e6fcead5342f708031412e3c2efdb4fb0f37bba43133a471d1cb0e0 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-eda01MacrolessWindows This strike sends a malware sample known as Macroless Word Email Attack. This sample is part of a multi staged macroless malware attack. The malware leverages CVE-2017-11882 and attempts to steal credentials from various programs like email, browsers, and ftp.edb27cc321df63ed62502c172c172d4fc4aa4e70521dd491c16ce1fbab2d4d225c41d1ea edb27cc321df63ed62502c172c172d4f 69bde8f8a0f2a23956eb9c0fa8782dc1e89f534eb8e01e0c8e193e07e72ac76c https://www.trustwave.com/Resources/SpiderLabs-Blog/Multi-Stage-Email-Word-Attack-without-Macros/
M18-xn001ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.8f37ae5b1df0db242f93f2834dac55daa200494f23ad28b42aa0b6e4d58b9c99a90a4910 8f37ae5b1df0db242f93f2834dac55da cb7ce3342987424ea1303adb8172f0172f4bbead7a348263f67bd84630b01059 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-al701Zusy_cc6f631eWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cc6f631e2c7292e3d898b4550b1bc62eb7aa006c32be3efcc18a5d96fc9b969e059d0602 cc6f631e2c7292e3d898b4550b1bc62e b8dbab7f7429309272e6608b9bae6bdc6ff75f95c130b93c78bb8a9b619a5cb6 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-xop01FlashMixed This strike sends a malware sample known as Flash 0day CVE-2018-4878. This 0day Flash object is embedded in a Microsoft Excel document. When the exploit executes, it downloads a Rokrat payload from a compromised site.3f98c434d7b39de61a8b459180dd46a31584b3ce64835a3c7b796139fbd981a9f2cddb6c 3f98c434d7b39de61a8b459180dd46a3 3b1395f620e428c5f68c6497a2338da0c4f749feb64e8f12e4c5b1288cc57a1c http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
M18-4nu01Zusy_c4d20fb9Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.c4d20fb9aefc244bdd1b6f91264486ede8b4a0abeba906fcd16dc1e791a8385a0de987d8 c4d20fb9aefc244bdd1b6f91264486ed 742d600c5e784c8dd2d54a9a6b74e3b67a20da1a6f9355511ff0c05ba48121c2 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-jzk01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.1989f0b5c1f3281b2ce8d8087e5d81105e1326dd7122e2e2aed04ca4de180d16686853a7 1989f0b5c1f3281b2ce8d8087e5d8110 82645e88736e11321774db7a7b28bd62d4ab133f859ecd35a4b2fa1d471412b7 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-8ge01Emotet_ee89e82cWindows This strike sends a malware sample known as Emotet. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.ee89e82c51798054330bde81a91b90bdb595851947765db51c023cb8459fc8b0f43c17d0 ee89e82c51798054330bde81a91b90bd 75430b8cd13f3974be5950f0a84bcf23b31d4199c17e729e804d9dddffbc8b3a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-hgd01Adload_913ff792Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.913ff792a899ed302bd3b7f044d83b80c385473f16b993cdb79a7610f13095ca5acc9207 913ff792a899ed302bd3b7f044d83b80 0b2c3b28e73b96ab473d6e5f4c24c8c427e9639d7efe203faededaf09480c2e6 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-r2601Zusy_a0348569Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.a03485690ef4755d27a96ba44b90daa41a264d35114b0411b4522b2c384972888083c1b2 a03485690ef4755d27a96ba44b90daa4 3d9b06a7e27337026085feb880489db6fdf9d92eff63412385a784977825e165 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-iso01Zusy_d36a77d6Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d36a77d69ab68b68c4ec2dce1f5b25f95575bc4337b147132c980a2469efef89735d2790 d36a77d69ab68b68c4ec2dce1f5b25f9 bdc949c5324235de7179b823d967220b3e92dcaaa21ee98ff452a3c80cd1c2c1 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-0iy01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.d4fd104e9a92840eca53c03a44ff53ac7e74f034d8aa4570bd1b7dcfcdfaa52c9a139361 d4fd104e9a92840eca53c03a44ff53ac db350bb43179f2a43a1330d82f3afeb900db5ff5094c2364d0767a3e6b97c854 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-7z801ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.6befbf5dd929763232cad0b66043c6b3dab90dbaba18e1e44f42f53d5c5cf0d7f5d67da1 6befbf5dd929763232cad0b66043c6b3 c462b00bfbd8e3bd79fe54c2bd74850b3a4a6d67b36cf3dc088462910b593b81 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ilu01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.8e6f94a7555cc00a383930028ca9914d11d342ea41c305945e9a2a8cf07c5d21d47c7366 8e6f94a7555cc00a383930028ca9914d 290dc3abf2bdb619f6c8d2abf79d12483dc8b0ae420ab5ccfca178baeece5089 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-krl01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.8be00ff87450712164dcfcfcb601bcb67468b8f82fdfb2f59b943aad7c4fe853d716cb8d 8be00ff87450712164dcfcfcb601bcb6 b62230042f02ecdff4a53e7d3cb77023c1d4bdde332d568cfc2c1001500c314d http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-imc01Adload_2054e87aWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.2054e87a8a8ab9a13311f927b9db33fa38cfe13cfc33d88b64e1364cc21ba6d21b643c79 2054e87a8a8ab9a13311f927b9db33fa b99011d4fcafe5ed1e022534e5dcc18835fae5a86c873039a1a56617414689ec http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-n4g01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.341381d3ac281fc1b3900be117f6727406948ab527ae415f32ed4b0f0d70be4a86b364a5 341381d3ac281fc1b3900be117f67274 29431dc086499c7ee64236a365615be5e5c861452f047ffac5656120ece59266 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-swh01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.ab3072fbeabc1ac55878ae2e4e92f290423fbf7cee0fcb3f3d047f049d7e426fb0772732 ab3072fbeabc1ac55878ae2e4e92f290 2f82036da229db4a9600179aad8e967edb06d1c0bfa2ea8f857bcc781ed30e08 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-8fb01Zusy_cae73739Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cae737395a2c956fdb1fbfde433d3248a041efcefec5c0d641dda914c6fc1278e2a20f76 cae737395a2c956fdb1fbfde433d3248 d4ff1da63afb7b0008d655bc2387f5f00452e920d6e253f23792f928ff6ac875 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-nnk01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.ebaf83302dc78d96d5993830430bd169bc6cb78e20cb20285149d55563f6fdcf4aaafa58 ebaf83302dc78d96d5993830430bd169 5cbc07895d099ce39a3142025c557b7fac41d79914535ab7ffc2094809f12a4b https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-66w01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.a2f2167e0eae1a6f8406b1d8dc21d46454ce0c1cc770384d0e451b87a15603b823a04546 a2f2167e0eae1a6f8406b1d8dc21d464 9f84428908f16511529c2589a917e7f53b3568cd7a7832d966cf06333bb26bcb http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-exn01Adload_383e888cWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.383e888c4ab7474d21a4ee3def1428a97f65b2a4a7427662b8c49470d2f7e799e3290a2f 383e888c4ab7474d21a4ee3def1428a9 1978e7025d0cff47a798ce59da8e3f5dafe6b9ec39aa46ca1882fdef2a0b61c2 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-4k301OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.c605b7c3e4c339642db6a33c5780b49bc2f01355880cd9dfeef75cff189f4a8af421e0d3 c605b7c3e4c339642db6a33c5780b49b c54837d0b856205bd4ae01887aae9178f55f16e0e1a1e1ff59bd18dbc8a3dd82 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-wxc01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.d674aaa1c87c7522f220b899d8cd7d3c7d341274d9a16686d2e6d254f8c687f2941b8b0b d674aaa1c87c7522f220b899d8cd7d3c 281ae4e896a0fe96ab28bab6a1da4d9a9d36f2b4d4ff88167df990e50735d0f5 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-jtj01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.b182fce35c27dd32e7f7433e4de583cc465d48ae849bbd6505263f3323e818ccb501ba88 b182fce35c27dd32e7f7433e4de583cc e7a542312ec718300ed9f229aaa60e5e2ec11aaa99387b76ed2e377bfad8b86e https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-1lu01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.d3e2c0943952285ce359fcbf28472491d63c7d7305a8b2184fff3b0941e596f09287aa66 d3e2c0943952285ce359fcbf28472491 45bfa1327c2c0118c152c7192ada429c6d4ae03b8164ebe36ab5ba9a84f5d7aa https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-er801ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.558953147430c6976574dbb38e4ea58814b82839562e274fcb8be22484581552e2da6f34 558953147430c6976574dbb38e4ea588 4e9624a45f3419c398f9fc9c7e8ec2e8472b432382c11c984aeb7860e1297903 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-kp101Adload_a392b8bdWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.a392b8bdea4e48f9c358796fe9f9a47deef26f98d28daac1abf34fe1fb44aa1ab4155234 a392b8bdea4e48f9c358796fe9f9a47d cf5249a37d8c7526cd7daabb01e8df29eaacf7cf93759ac09b48e08db8b26c2a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-pcd01OlympicMixed This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.5ba7ec869c7157efc1e52f51577058677ae731d666e547b4f3442fe5675c8e8719d8d862 5ba7ec869c7157efc1e52f5157705867 cceb8abae023acf0db3e98f4aabfc92ab3ca933483f4370d621d957fcef0e2b4 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-a5v01Adload_8b3eec5fWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.8b3eec5f66ac2a5bbeafacc8a3702dde3507ab8ca086244e60cc8d734deff6b398685e9e 8b3eec5f66ac2a5bbeafacc8a3702dde 25b2aeddfe481e574ee14ead95537de4d94b18d3654c8d0866dbe42631aab64c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-5dz01Adload_07525e4fWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.07525e4f3f15b51360641da5249e04bf16576133553f896bff3645c6bdb89e0a18fa8daa 07525e4f3f15b51360641da5249e04bf 0c00f2e323696cc3f39832b7da538701850d28998610711d8d70594314436399 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-o4u01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.e93617f1c88e3e1b7100ae2e521228fbbe8d188bc6cd3254d35c08e73c9e07fb010315ca e93617f1c88e3e1b7100ae2e521228fb b6600f389bf52796db5fcba03ef991df5a395a1a70b0f4096445469f9553ecde http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-66r01Adload_afdf0779Windows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.afdf0779791b83f481dfd25fc580b84d73b53c6ea10560f7690cbb0b560e5780439a3438 afdf0779791b83f481dfd25fc580b84d ce37d2dc789a535be7af9a44827ebce419f8637a09bb7e352696d474e07786a6 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-qpc01Zusy_839efbbaWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.839efbba8768f1941d004f98f355665e98e1822568b8419f73d9ea6bed90481ef3d55769 839efbba8768f1941d004f98f355665e 0328c4576287299e56877f254ea46a78f902c46fefef26c4bef7f2e9914ab378 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-xbp01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.13aaa5c6814602b7ed379812f63c86b0adbcb557eb4d30e20e9856080dd8755e1404da7d 13aaa5c6814602b7ed379812f63c86b0 7c344293212b1de4798beb0cf70c9bec493460d5befba2eef1ce26a83c04ad2f http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-zpy01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.9c1cb76a3ab63abe4f45c20c0c90cdc93e6c7c5111fb6d91ab1f7152d21a09e885e993f3 9c1cb76a3ab63abe4f45c20c0c90cdc9 865e660b5d65cfea1cf8d595c281363bd399c0a47b0270dac8bb9b8e7dd9fcf1 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ums01InstallMonster_2140de54Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.2140de54cfe723f88e30326de193232ca312ef2a56077b5f9436427b98b0b726dbe63ba4 2140de54cfe723f88e30326de193232c 25750ae1857c77a233d43bad1ca56b7287efb31d568c8788cddfd56e8f161f22 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-xgy01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.05c3376df5d3b8594a990d1a2725e409615447f458463dc77f7ae3b0a4ad20ca2303027a 05c3376df5d3b8594a990d1a2725e409 0852f2c5741997d8899a34bb95c349d7a9fb7277cd0910656c3ce37a6f11cb88 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-cnq01Adload_bfb23f8dWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.bfb23f8d9e9cf0d9d11874cd2ddd0898d1b469909f864b673ba5e139a18e090a0b4ed5a5 bfb23f8d9e9cf0d9d11874cd2ddd0898 0473d1632bda43d83bc8fdb65d095479a5ef49ad816725b84aa9a7bf75356d42 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-nj401ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.49151982cfa0e86eba55b5103fd95120902e71658a6fbddcf4104d1d7d6eddf225bedfce 49151982cfa0e86eba55b5103fd95120 1aa7436383c71ed5bc878e1e52bf66a017cb6b82b4ee6fbe23b67b11403efadc http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-tqc01InstallMonster_0afa553fWindows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.0afa553fdbd7f5003776b0028d606a52dfebb7d4d8da99f9e4169518ba3cd7eb8fab50cc 0afa553fdbd7f5003776b0028d606a52 16f734eac6b1360142b4f4602aa7543b0af21440e0c6d06f635f6f685b6d951b http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-95s01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.9a9c7eefca053923ceb0351fdc1b359d56a9c7c5782399411457f176993b2c9fa55315e2 9a9c7eefca053923ceb0351fdc1b359d c412ad121682d33210402955ad330fbd182c5c57155bab2db659c7557d4a417b http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ehe01Zusy_e22755bfWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.e22755bf01b8592a518346329dae7df3491345581c6a2a0b19806e9ab08a9e605b8ad564 e22755bf01b8592a518346329dae7df3 0e40b1eaf8bb90fbc2401ff200edbf7930957235af98d5c58ae7f1562d3a3d93 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-6z001ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.44a4dd701ac9bde0c5165373603885e0b18e5493139b835867f181d7b8a91f4f4db75129 44a4dd701ac9bde0c5165373603885e0 4d31f25c4da2b05fbacc21035e0a2284be60e10ef103d3a1d412234717706550 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-6rb01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.b5ef40222a2d8cc09e0153a4d9bb53827f8287bd48af27a9e633856abed8fef78cdca2bd b5ef40222a2d8cc09e0153a4d9bb5382 54144d97c81096fb6cd6464b12cd1b6c48e5f2b0ce0d8b1f16e34af0153a98cb http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-xqs01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.db6fb0bfb4bc958e9faf7bc0cce12b2dcf2070d63b1c9559472a6b71ddbd06662f2c35a1 db6fb0bfb4bc958e9faf7bc0cce12b2d 6cf585b16de1edb9dc313886ddb4b32d617290eef1c9ce1a2ef6160336c1eaad http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-rnd01MacrolessMixed This strike sends a malware sample known as Macroless Word Email Attack. This sample is part of a multi staged macroless malware attack. The malware leverages CVE-2017-11882 and attempts to steal credentials from various programs like email, browsers, and ftp.79bcafd6807332ad2b52c61fe05ffd220d8215f88c75cd8fbf2dfab12d47b520ece94c52 79bcafd6807332ad2b52c61fe05ffd22 e6c9b4ac3c1adda9733eee44e638d2127ab6ff00176c363437263712c7421f66 https://www.trustwave.com/Resources/SpiderLabs-Blog/Multi-Stage-Email-Word-Attack-without-Macros/
M18-fg301ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.f79b50bfff9d65937b2c60a1b037be8ef3b98f974e8f9c1591a773681a7a78a0d80e65af f79b50bfff9d65937b2c60a1b037be8e a8c75f9b1e601c4c77b67ddd1bdb28bf9164c4f507b9530fa31861f2c72fb2d7 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-tkn01Zusy_deb09a08Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.deb09a082a881f252b53573590ca8e7bd034f4ae0017cf8bc5f5039f028594d08c331429 deb09a082a881f252b53573590ca8e7b bc61b85b359f344f7a00eae0d4015889fca2cdb623569fd25133400db2f2015a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-g6v01Zusy_04b6eabbWindows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.04b6eabb4be59f776dd24c21449a78cb86f6f8ecf3799a9068e0291090cdb3d2761f6d95 04b6eabb4be59f776dd24c21449a78cb 961af12739f5f34051d10edeefb90ba81d7509135de72c16fc8afefc28febdaf http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-3cx01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.1083256b95a697f4e3248c5c741eb9c65a7fdfa88addb88680c2f0d5f7095220b4bbffc1 1083256b95a697f4e3248c5c741eb9c6 496841be8fb9d0042180a2bccf205e1e0bd0b41c537798265da7ad8f85cc35a2 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-a1l01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.4887ecaa5911dfd7be4545e5a022567ecc75b1f43a6f379372c11ea450e1ac0d1c08f8b9 4887ecaa5911dfd7be4545e5a022567e 6e4a276dd2d745f57faa6e18ba90e255836ef4976c65cdfd831412b8ae4ab91c http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-bbt01Zusy_d9dc31c8Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.d9dc31c865d14e44d4743c7d0d0a14663dbce7e4ab21c48500b6cc23136cde28f07ea79f d9dc31c865d14e44d4743c7d0d0a1466 b067ecbfb6d02654c42fca66e4cf6dffe14a171a42807fd354f9cb7e7cba775b http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-b0v01Emotet_53a7ad5cWindows This strike sends a malware sample known as Emotet. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.53a7ad5cea62e77378d3ad8912c729db9a6acf004b5d16103afe92e4893ff524d7157a2c 53a7ad5cea62e77378d3ad8912c729db de3b898b771d6e1abfbd5c4cacf7db4b806ab8048e021eb18d8885108839fe77 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-usx01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.42b9f65fda3cbb613f726c9a4f26069e71f337dc65459027f4ab26198270368f68d7ae77 42b9f65fda3cbb613f726c9a4f26069e 111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-wo201OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.8a0467ab4adbd2b678867c9636cf6526389db34c3a37fd288e92463302629aa48be06e35 8a0467ab4adbd2b678867c9636cf6526 2a4d985b72bee59a02399ff647bbe7f375de8fbec0367e87773840a2618b9d17 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-bnq01InstallMonster_0a764450Windows This strike sends a malware sample known as InstallMonster. This sample installs unwanted software, and displays advertisements on the victim machine.0a764450171287d579551e2887769342b180fe1dc12b9ce3ab51fd7d50856fc356a35bf1 0a764450171287d579551e2887769342 049fc0a7cece52d6f40d34a5ec7f1e55e1a00b15d78fc831397f050785a92e5a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-tkf01Adload_335ecc6dWindows This strike sends a malware sample known as Adload. This sample of adware opens many popups and error messages in an attempt to lure the victim to unintentionally install additional software and adware.335ecc6db809cbe76cafdc77c5dc4b7dde6528ca13de0ac149b640b195ea39bfca9f6760 335ecc6db809cbe76cafdc77c5dc4b7d 1eea07045426f602a8ec956cbe99556c8b54c1d51610fe7a6806941a79deed84 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-hup01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.8f6d83377f9a40dd22251615028083198c5f5e21a8648a3150882989395f04270ce7f215 8f6d83377f9a40dd2225161502808319 a317da8fffca78122bc24c3c39d4c6af965aa9e1bae00a0705c7cee8c231dc79 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-p1101GenInjector_ba278ec0Windows This strike sends a malware sample known as GenInjector. This sample is part of a malware family that injects code into the address space of another process. It uses techniques like process hollowing and sleeps to hinder analysis.ba278ec040eb5df044a5baf5ca95fb2f2cd4a508be34ec1be76e47c6891bbfcd579bc9b6 ba278ec040eb5df044a5baf5ca95fb2f d90dc3f22cc7bd92f22bafa9d77b0e373849386eae57606b42239f915357084a http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-kgc01Zusy_b00b6d73Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.b00b6d7393884100cf96bcfdaf88bb52f6867d0604439c415ad577d774e3b11b2bb9dd60 b00b6d7393884100cf96bcfdaf88bb52 be31db615f5a4aa48517252c57022a2fc9582f7740801e00bd8d7858d89b2bcb http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-xdm01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.38ac59fdfa95cdad4682044bb61dfa817716bbb1b824cbdc985008c25e92424ef12d863d 38ac59fdfa95cdad4682044bb61dfa81 5602ba9c52386806f8d723f63265fe94d15303d3112a2c0b6bd7b6319626c32f http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-eqn01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.86b9784231e2c9be17a33e0ae39bd4fcad08a60dc511d9b69e584c1310dbd6039acffa0d 86b9784231e2c9be17a33e0ae39bd4fc dee482e5f461a8e531a6a7ea4728535aafdc4941a8939bc3c55f6cb28c46ad3d https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-osd01Downloadguide_08481735Windows This strike sends a malware sample known as Downloadguide. This sample uses XmasFred installers to download other binaries.084817350196b8a6831d829e04310f42cb0f34b846a62cfa5628aafac99e9e3545812622 084817350196b8a6831d829e04310f42 1bf58f0bfb9ae73d0735519717731e2aaf159b975b7ed6442565fdbbb496cd23 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-w9i01Zusy_cd7ed3b2Windows This strike sends a malware sample known as Zusy. This sample of Zusy includes a binary, God, that creates a fake process and adds an entry to the list of authorized applications in Windows Firewall.cd7ed3b2394c0234d3979c27b529fa49ded44d231c82537c9e1ac8f3730a20553f2e1467 cd7ed3b2394c0234d3979c27b529fa49 e445e0d7f1a46b98400693a28c9ec427450abc8f29df4c145c1d860205dffa57 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-ar901Emotet_ce20647fWindows This strike sends a malware sample known as Emotet. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.ce20647f8023b8a36bad173299e5ec45af418c58a1b52dee92849e4781d80708a7463d72 ce20647f8023b8a36bad173299e5ec45 e45c52c8115e6d396504667f7dfda58c55760eced8847ad4938c77e6128323f8 http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-r2t01ImageMixed This strike sends a malware sample known as Image Dropper PhishingLure. This sample is a dropper that attempts to lure the target into enabling dynamic content via an image.1cbed824b17b5570adea77489079aee5dd6490201980336b9d9c99da7de266d7c6cc4bfd 1cbed824b17b5570adea77489079aee5 3927f8d5492927df58b6ea3a97197592cb9ce4ef9fc98f5e93952805d6ebbdab http://blog.talosintelligence.com/2018/02/threat-round-up-0202-0209.html
M18-yjr01OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.107824f43817ca299baf2ab19ecbc87d35e5310b6183469f4995b7cd4f795da8459087a4 107824f43817ca299baf2ab19ecbc87d ae1b32aac4d8a35e2c62e334b794373c7457ebfaaab5e5e8e46f3928af07cde4 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
M18-c3001OlympicWindows This strike sends a malware sample known as Olympic Destroyer Implants. This sample is part of a file-less implant attack on the Pyeongchang Olympics. Once the attacker gained access to the targeted machine these implants dubbed (Gold Dragon, Brave Prince, Ghost419 and Running Rat) gain persistence in an attempt to ex-filtrate data back to the attacker.e2b9e490fe948a643d1bed89278ae7d0761b0690cd86fb472738b6dc32661ace5cf18893 e2b9e490fe948a643d1bed89278ae7d0 7aa99ebc49a130f07304ed25655862a04cc20cb59d129e1416a7dfa04f7d3e51 https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/

Malware Strikes January - 2018

Back to top
Strike ID Malware Platform Info MD5 External References
M18-w7g01Samsam_fe998080Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.fe998080463665412b65850828bce41f203bb8ec1da6b237a092bab71fa090849c7db9bd fe998080463665412b65850828bce41f 036071786d7db553e2415ec2e71f3967baf51bdc31d0a640aa4afb87d3ce3050 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-4gv01PolyRansom_ac1122d9Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.ac1122d90f4b75d0fa10028375f1037f7358b07cc5ca02b47684018c1d03e9dcd9b26291 ac1122d90f4b75d0fa10028375f1037f 8957b057803dd6369f877c359b96423b61129fa3f68257c272644e1d56c7c667 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-io301NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.49488fec4b7c573ca5d551b5ec09b2ed668958411a50e4274584ee3b2cadf727a9880ec4 49488fec4b7c573ca5d551b5ec09b2ed 241f83caf5c5a23a1d7adbeaa8c392da0edadff362f41bbb5727dc71887048c4 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-i6p01SnatchLoader_dce94fa9Windows This strike sends a malware sample known as SnatchLoader. This sample of SnatchLoader is a downloader malware. Its main purpose is to distribute or load other malware on the targeted system. It has been seen recently in the wild loading the banking trojan Ramnit.dce94fa98fb323874622b13a5ba9e1bc9e56cbfa63e66917330cef99fb0b24188df0e87a dce94fa98fb323874622b13a5ba9e1bc d38945a93a926169cbe878afa6b292a5b52c570b61dc096725a0ddb8fdd5209e https://zerophagemalware.com/2017/12/11/malware-snatch-loader-reloaded/ https://www.arbornetworks.com/blog/asert/snatchloader-reloaded/
M18-7py01Triton_6c39c3f4Windows This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.6c39c3f4a08d3d78f2eb973a94bd7718dc81f383624955e0c0441734f9f1dabfe03f373c 6c39c3f4a08d3d78f2eb973a94bd7718 e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-yet01SocStealer_af5c18b3Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.af5c18b378a16b486d3cd78e70ffb3fa19334afc038f82b452eb4ff4a4733f2afa758b8a af5c18b378a16b486d3cd78e70ffb3fa 0bb012ff4961c880d3df768e1374ae4bafeabf453dd3d7ae2d4065bc58f52bcf http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-9g601SocStealer_1d1c6410Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.1d1c6410404931795f6abe576520a521d021c5efcf21ca27a8017bbab3e08fd9a3d208da 1d1c6410404931795f6abe576520a521 3389df5d81737fec0e3eeb43c94e2210a14b4227b88c94d7fcff32474d38a19f http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-jle01Win.Trojan.Generic_6e03a435Windows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.6e03a435f1d481758e2ef9be8b81f2f3b33014019399864c85777f494d223638b059e709 6e03a435f1d481758e2ef9be8b81f2f3 d1e6d2ba273fed39c272d2d944dd244bd6566f38b5dad94637af147c44355e80 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-s4x01Samsam_038fb413Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.038fb413f51b0ab7eb088e0f3ea7be905db38eeb9d3dfba2e382cccb1364ec7ce436aecf 038fb413f51b0ab7eb088e0f3ea7be90 8f803b66f6c6bc4da9211a2c4c4c5b46a113201ecaf056d35cad325ec4054656 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-gz301SocStealer_094e9e9fWindows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.094e9e9f648ef273d098727c4da134c15771ca64a4d80a412c7622ad26f05d8d40280a26 094e9e9f648ef273d098727c4da134c1 043d07796535fa5f9ee2bd33139d442c824b5e251471f8d4b54c8f15bc2d0165 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-bue01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.1fb4e51b3a7c3501d0319ed4bbd1bdff52b1fa6cbdbc04c0aa0e63068fcccca8c8e68d4f 1fb4e51b3a7c3501d0319ed4bbd1bdff 8f36a3ebcb2714d7f6d99d8d0672bcdf16980da788331953cba52c21fde64efb http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-udt01EMOTET_abb6a21bWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.abb6a21b3d8e542a7c32ae38755917e44d5f22b6d246764675f7ecf8a40dfd2e8bf44e60 abb6a21b3d8e542a7c32ae38755917e4 2d2582eba24d58be4ca332a30daf4fd42d95e25986446b464f465c8dbcc08572 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-4cv01EMOTET_e0b474deWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.e0b474de11f8d3bfb2f0b219b8f5b245d16d498a11f6afe9e8aaa15c7d0b824f29da8135 e0b474de11f8d3bfb2f0b219b8f5b245 ee2b22547da7ebcef73af0dcd8dccb1b25bb2a13f09b2b563015b34c24562ebc http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-aty01Win.Trojan.Agent_c06d4a8dWindows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.c06d4a8de7d861952ed13d7bbfbfd39d9fcc332152ecff54dbf9e9ee4337e2153b5f37f5 c06d4a8de7d861952ed13d7bbfbfd39d 55ebfbbffe1cb77efa39b0c7b5348b0aef03a251349c88cb8bcf4358bbe73558 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gez01Win.Trojan.Generic_15c3c9ccWindows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.15c3c9cc08c1912578a887c5a787fe112988e2bfb75e3125c986e6a99ef352dadeb95fe9 15c3c9cc08c1912578a887c5a787fe11 100c808616f05668a9c73101e9dce21702e8bf241f82374eb5aa5f0646cca3e4 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-75701EMOTET_b4663ab1Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.b4663ab1f1c89ef9ccd0884be8608aada9ab08c2bc3759ea73df1d59754818cd0998a721 b4663ab1f1c89ef9ccd0884be8608aad bc2451362e8658b64bdf2421c4c73e9c35cfbdcf370944e9482fa496b6a91d5a http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gyx01PhotoMiner_6b422988Windows This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.6b422988b8b66e54e68f110c6491474458e5509e705abcfc99d83c1d527fe4da2a87e8c6 6b422988b8b66e54e68f110c64914744 8a2a28d164a6d4011e83ae3f930de8bf1e01ba2e013bee43460f2f58bdaf4109 https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-k8i01SocStealer_32560162Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.3256016294d3f04f04874b899a3d957fbfd661e5ffdc9e77dae4eeda302cd3ea6834ed54 3256016294d3f04f04874b899a3d957f e134c3dd3e4e39e6c6a373416f5969ec56dfb90c53b6ba847dcfc4f7626de995 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-oxu01Triton_437f135bMixed This strike sends a malware sample known as Triton. This sample is part of the attack framework that was designed to interact with Triconex Safety Instrumented System (SIS) controllers. The attackers have controller over the SIS functions allowing for the ability to reprogram its logic, interrupt operating processes and shutdown functionality. This poses a great risk to human safety and operational downtime.437f135ba179959a580412e564d3107fb47ad4840089247b058121e95732beb82e6311d0 437f135ba179959a580412e564d3107f 08c34c6ac9186b61d9f29a77ef5e618067e0bc9fe85cab1ad25dc6049c376949 https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
M18-5uz01Win.Trojan.Agent_79df429cWindows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.79df429c90de9062346f50aa187845e69140db2e6c13e8be8d3100ca568a603e8e3c1ce4 79df429c90de9062346f50aa187845e6 e9c1fa94dd30f4ef9ca613f62acb3fcf2fb61c4c3fac0b866ae484cd5dc578d7 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-ov801SocStealer_807306a3Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.807306a3c269c1390f46019af2fe123995c24ea2003cb50b1c2ac12e09490def072cbb9b 807306a3c269c1390f46019af2fe1239 115767f49767127544b6365e2551f5b3977af593b222619d8ebe1603b550a4e1 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-q5o01PolyRansom_b769ddc6Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.b769ddc6f7e206c85b100ee776b9285f564d214723f803115811283bcc67b201ac7b497d b769ddc6f7e206c85b100ee776b9285f 78286db82473a9f1eddba51f39333a77c2b30fb582e9fe3e71d2924e060eb273 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-m0a01Win.Trojan.Agent_fde9e3f1Windows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.fde9e3f165a51467ed625804af50675a4d4bd463bd8eed4486b69d14489c89142911da5d fde9e3f165a51467ed625804af50675a 3ad3991209de094faf8bbfac835ec38ac57318fa78c3ef11eee5d4acd0118460 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-0l501EMOTET_d2447e19Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.d2447e1937f779af8231c56a1184eaada0a71fb0be2ac89c0d41459f00af0984dafc2f5c d2447e1937f779af8231c56a1184eaad 33dc66ca6d18acaff3ee13baa7a2f925f5b0bd4dc8ea9436e4e5aecc57775fe0 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-37d01Samsam_d51e9eb2Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.d51e9eb26afb97ff2bb43cebe75210f614dbbec0f330df10baa423ad89e92c8345e9d70a d51e9eb26afb97ff2bb43cebe75210f6 516fb821ee6c19cf2873e637c21be7603e7a39720c7d6d71a8c19d8d717a2495 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-2zo01Win.Trojan.Agent_ddd2ba6aWindows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.ddd2ba6a93a4ac218dbb4b87722b23eba772a44697377acdf88428ed3ce010f7e91324bd ddd2ba6a93a4ac218dbb4b87722b23eb ea9eb1d7b61d711807c4609bf55f62af5bd6049585e086b75385963868ca31d6 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-88101Samsam_7a25b0d4Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.7a25b0d43047552cbdad17cfb488317d22b80abde3611407effec3140bb02bfb39b2c33d 7a25b0d43047552cbdad17cfb488317d 754fab056e0319408227ad07670b77dde2414597ff5e154856ecae5e14415e1a http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-sd201SocStealer_9cc53470Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.9cc5347041b8cce5ee9882dee849bf85a91d6ffb0779656b0fb2240f12bbae40649ff2bc 9cc5347041b8cce5ee9882dee849bf85 89e5effdd6426658db77526775b5ddb6f51487dbd80f7f55e79c2fce32a8abea http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-izq01EMOTET_07d29492Windows This strike sends a malware sample known as EMOTET. EMOTET is used as a banking Trojan that targeted users in Europe and the U.S.07d29492563d2d7a725d78ea3cb8a6efb5037de6a8d8801264ae639cfe1d3c6245282022 07d29492563d2d7a725d78ea3cb8a6ef 2299fb45a9a7f48d618c33d665bb0c88ea5545c86ba4ea05fbdb73dc38de96a5 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-66801NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.78e7250e7a7e9349078724e5c63dd4403e551f38235ce80ca61a4a9d33bf3f617278eb3d 78e7250e7a7e9349078724e5c63dd440 36fc2029280816810324e3be9cf3a4257f0dbb1a8b11eaffdbacdead863aaf44 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-yit01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.0dfae2f32c287221cf92f8f231d5ebb4423432c12fd2b98704a3e3d74cdc1347ee52f5d1 0dfae2f32c287221cf92f8f231d5ebb4 305790984d5ffa713794c1732eea4f83f18da6926e415a490b2fc090f2c4e8dc http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-dfq01PolyRansom_e50e3e60Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.e50e3e60799fbe5b2e746fe9026521d76a84e01bc2229c905a2014cb986d623487c80f3e e50e3e60799fbe5b2e746fe9026521d7 1dd699b7fdb082c35677938f6f064e02e226033f995189889799adac08811a18 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-fqt01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.d7e0d9160466185e7029380af86a4fd8d806ac357980fd4a14b852b5194e64a414e7ea50 d7e0d9160466185e7029380af86a4fd8 cab8fcbe8bce311464418e2fcd05e55353255c511e698726e009f075de82e2ea http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-jy201Win.Trojan.Agent_0a24f231Windows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.0a24f2316eba6e4096de9c5e2fa06723f18fc716ba2bb8a8fa79942ea896b6ae62bd6e22 0a24f2316eba6e4096de9c5e2fa06723 38318b262a6d85673fdf8fdcf4ddd5666f438f18dbeed8569a4d769f42ae05c2 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-jep01Win.Trojan.Agent_dc2bf617Windows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.dc2bf6177ba574f0052ab89997fde1981536bf20413e2938e231e77a4811024678119eee dc2bf6177ba574f0052ab89997fde198 59571268f235c8094036ab44f5f5c2be3819fd72888cbbfda2150e336549b2a8 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-2ld01Samsam_24217bb4Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.24217bb462138ff00a45e66a500f9280cca80f9c7be6231c28b31a244851b80a1481f476 24217bb462138ff00a45e66a500f9280 dabc0f171b55f4aff88f32871374bf09da83668e1db2d2c18b0cd58ed04f0707 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-dtv01PolyRansom_b81264c5Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.b81264c58a7ffec0a467a20b807e21161d1490bf602d71fdc16894f7b40a606e6a57680f b81264c58a7ffec0a467a20b807e2116 38c7c22fd8526dd108422befd6fd38212ef45fb30db3272d5016fa942cd2323d http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-94n01EMOTET_0dea9904Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.0dea99048b5edcb648995291f9dc65e4de613fbd349025c550a92a1d7bb3a33f8c136ae3 0dea99048b5edcb648995291f9dc65e4 24bd0b9517591458af75b8f1ad1b59e57fc6fe9eeaa41086d31c55a4c259e12d http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-osw01EMOTET_afaa0f42Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.afaa0f42eed10887d63c412803a5620836f21005ccc89cd9b43a2c40999eff7733806818 afaa0f42eed10887d63c412803a56208 831cc8a05f15820256cc41705cd3fe96f38bf3dbb61372b48d229b81922b15dd http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-6ld01PolyRansom_be54dd43Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.be54dd43298e6fa5bbd411370b5d814dab5d04d43786563a5b0447cb4b8857bb6aea6113 be54dd43298e6fa5bbd411370b5d814d 3ab0d96b041b994d6f32a4351120b822d39b681d2c5133f12bb507fe2fb66e19 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-vjw01RoughTed_295d4ce2Mixed This strike sends a malware sample known as RoughTed. This sample is part of the RoughTed malvertising campaign. It leverages the Amazon cloud infrastructure to distribute a variety of malicious attacks including scams, exploit kits, and ransomware to different platforms.295d4ce28f038086a73ddb7adffff530e6cf709bd1a6d63d96a426ec7529a762597e2099 295d4ce28f038086a73ddb7adffff530 9fc5fb99f72be24ec7d1e2004f1c1f2083885059e0e072314cb712934415bc24 https://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser/
M18-rd301Rincux_03481bf4Windows This strike sends a malware sample known as Rincux. Rincux is a trojan that acts as a downloader for DDoS attacks.03481bf4f554ac68641247eb7f2c097a21fbc83de38355090852a04c6486fee89b3b3141 03481bf4f554ac68641247eb7f2c097a c4d2b74d66362f926e99ab1a89f46e311d789e28eafabffb9668278422403c01 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-r2i01PhotoMiner_aba2d86eWindows This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.aba2d86ed17f587eb6d57e6c75f64f05aeccba64f4dd19033ac2226b4445faac05c88b76 aba2d86ed17f587eb6d57e6c75f64f05 807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-25k01Win.Trojan.Generic_7eded50aWindows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.7eded50a29a3620b74cb2437248f096f2d1ebdc1d8fc71c7f7fe792ad314c1d735f9f3d6 7eded50a29a3620b74cb2437248f096f 0d8031a8b9e1f5aa16fc7c82115565d1d468a8f4f3a828339eceb901f76b5577 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-tti01SocStealer_76c61f6fWindows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.76c61f6fdcfc313276c9b9443977d80d8ed4876f993bbc38940384b6c244f7988eb8c5ff 76c61f6fdcfc313276c9b9443977d80d aecf6184c2b620a198f0415a16d6ae824f09df25bbc310b24edfbf5ee0b7c3a5 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-7gb01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.f47b13a0b2717821c2ec2d60427dcde2e17c5265e37bf09435fdd641817008e76ff5c1e2 f47b13a0b2717821c2ec2d60427dcde2 4c04d8aeebdd0eb1747a9a66b10e4681328a03edcbcbd0e9921c4a74367bbd08 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-0sa01PhotoMiner_fbbcf1e9Windows This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.fbbcf1e9501234d6661a0c9ae6dc01c91ca9759a324159f331e79ea6871ad62040521b41 fbbcf1e9501234d6661a0c9ae6dc01c9 d9901b16a93aad709947524379d572a7a7bf8e2741e27a1112c95977d4a6ea8c https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-pqi01Win.Trojan.Generic_3a4e4bd3Windows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.3a4e4bd3ff3ca93d1c40c410aba51ef8251dd5c622ef5b1965058803228244a7c8b45e5b 3a4e4bd3ff3ca93d1c40c410aba51ef8 c247197bf71c4fadbc4e267888f6c416f4775c07a1fc8aa8d0d1144b5ba1db36 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-onb01Samsam_d8469e62Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.d8469e625ae90ab64d4aef0b63f421504a042e44f962ad03e62494e676e377710532b7e4 d8469e625ae90ab64d4aef0b63f42150 0785bb93fdb219ea8cb1673de1166bea839da8ba6d7312284d2a08bd41e38cb9 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-ce501NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.0785d2e1f4e116ed8783f16076c3f85d62664ccad158ceb554eda145431a303d61f300fe 0785d2e1f4e116ed8783f16076c3f85d 580b05987531aa4ef4bed150bd51fdbbcad5f95abb63e8439e3d4bb07eb68598 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-rh401Samsam_c3e8acc1Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.c3e8acc131a3484ffd06af189f90f92a7201b6f7dfea98172fd09d83359f262dbf2ed4bf c3e8acc131a3484ffd06af189f90f92a e7bebd1b1419f42293732c70095f35c8310fa3afee55f1df68d4fe6bbee5397e http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-se701Samsam_43049c58Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.43049c582db85b94feed9afa7419d78cab94ea814ca7cedc4e43d0ff3c646b762f527b13 43049c582db85b94feed9afa7419d78c 946dd4c4f3c78e7e4819a712c7fd6497722a3d616d33e3306a556a9dc99656f4 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-bft01SocStealer_4df50850Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.4df5085058290198bd6aecc4f49e60830bb35356318f65450e9284c469c29673fb891d62 4df5085058290198bd6aecc4f49e6083 73ed012536499f859ac55c2fb0017e65255f2462f13b663ed1d85e552c13740b http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-ncc01Samsam_58b39bb9Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.58b39bb94660958b6180588109c34f517d21c1fb16f819c7a15e7a3343efb65f7ad76d85 58b39bb94660958b6180588109c34f51 88e344977bf6451e15fe202d65471a5f75d22370050fe6ba4dfa2c2d0fae7828 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-uw401Samsam_a82db52bWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.a82db52bc6f1e5477eb1809cd5f2348903c21e5ad8f0f2685821f0f74799aa1cf104e443 a82db52bc6f1e5477eb1809cd5f23489 88d24b497cfeb47ec6719752f2af00c802c38e7d4b5d526311d552c6d5f4ad34 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-v6k01PolyRansom_add055d8Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.add055d84eeb4883c885c77499b8050627caa5faa8d603ec1009461237bd24723f82fada add055d84eeb4883c885c77499b80506 c4471377f58643e454ef33f21dc65f696567bf8700ae120caac5086f85bfeace http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-ldy01Win.Trojan.Generic_086381f3Windows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.086381f3890fc9c59e189c9ed785e57469f757494736cd983458bd41bdb94f3d07d1fc1d 086381f3890fc9c59e189c9ed785e574 7ca99c0c24283ff2b6f8e0f81ba7edcb17948e4fee7bc8c3cc22d5026c455f4a http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-e0901NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.685e23ad5cd66905debd403f4492c487062d4256fa5a3a48dd2993da3d54fb850e126e25 685e23ad5cd66905debd403f4492c487 ce5d33fb70fc7834d8faa7749d5cedbcb6b0958105ebe94633e2daba897612ef http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-iuj01PhotoMiner_e3b35ae8Windows This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.e3b35ae837911135c70acb0ece15bf849e05722d4e298243a69b175074831062a4903772 e3b35ae837911135c70acb0ece15bf84 5f522ebe3f4b2f1797249e431077725c45c76424dc21f7d16d5772ac35607f62 https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-elt01Win.Trojan.Generic_3ebb43cbWindows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.3ebb43cb2a4d28d7ecdd0ad38e76138f7360dd929936f6e4a30244395acad3449652f2a9 3ebb43cb2a4d28d7ecdd0ad38e76138f d8781d7dd2e9cc4b029a9147cf5691c8622b15b1bdbd438f8cd1443e9c268a31 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-0kr01Win.Trojan.Generic_009404d2Windows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.009404d2f52c91bc87b96138e7b6715a886f68486115357a0fbe7bbc6a000e74e1e50b1f 009404d2f52c91bc87b96138e7b6715a 05beeee9353e581e5e0fad00ef8b88f90f911a45411dd52b620fc2cc73ba1e85 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gfc01Zusy_004d2ec0Windows This strike sends a malware sample known as Zusy. Zusy utilizes a Man in the Middle attack to grab a targeted user's banking credentials. The trojan uses process injection to mask itself and when the victim visits a banking site they are tricked into interacting with a form and disclosing personal information.004d2ec0ee4bd949396fc5c79ad3b1db80f9b68793a929a54ecb275ff4dee039ccafcc27 004d2ec0ee4bd949396fc5c79ad3b1db 0546853f1fa7e7715f1f80e8d544f19055b9c118672d8fe07843b3bcc9b5a212 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-a5r01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.0deed644e27a8586d74bc8e311620f0421d23e09ec1c43788696a1c5216b63948ec52e94 0deed644e27a8586d74bc8e311620f04 32d85f3dded85d0375965a50991ddb7b608166f51a12b297ae981348119512da http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-cxq01EMOTET_6a9879ddWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.6a9879dd3765872f86cddbb130c63d693754f31e605c6f7103bed6148fce9b9ffced7b40 6a9879dd3765872f86cddbb130c63d69 3726d3185b6aa67c425b7e1866ac424284737df53df1c83e9a040428837c4a8c http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-o6s01Samsam_02dce579Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.02dce579d95a57f9e5ca0cde800dfb0f26d53045468df4f8238306f9e68e7a4283249e40 02dce579d95a57f9e5ca0cde800dfb0f e682ac6b874e0a6cfc5ff88798315b2cb822d165a7e6f72a5eb74e6da451e155 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-gcq01Rincux_0199d19bWindows This strike sends a malware sample known as Rincux. Rincux is a trojan that acts as a downloader for DDoS attacks.0199d19b13110f67878e9a265f57097d075847adcc4352ea988c70d8113ff03e8261510e 0199d19b13110f67878e9a265f57097d e1447fc8b4e8dbf342f8d89c291979bcf1102244f432e25c704d2d504458276a http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-ki101NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.71442de640504ed8e6c781a564740c548bb71c189d80be512132daa8e23ea7a55e16e2a2 71442de640504ed8e6c781a564740c54 3abdf9d8249e3cc7507529aec80d93551f1fcd714a61861a69c059662aa39e9f http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-q0q01SocStealer_4036f2d0Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.4036f2d0106257f9a9e3750da590ccf01b375f063a2d76ae6cd0cae0504e1a1dc14fc83f 4036f2d0106257f9a9e3750da590ccf0 ebba38b2a422277646ea55484f41cd919d0bd2d619e8d45bfd9585aac8986369 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-pum01SocStealer_53b68e65Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.53b68e6585f91387ebfdd351eb6ce49a5c08f133ae8e411d1a5b3feb76297561eaa96b7b 53b68e6585f91387ebfdd351eb6ce49a 04fafb357ccdd1f9aac6db2c62ae274f58f6fb5b569b10f15e3b3a94fc1ae899 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-69401PolyRansom_ade4facbWindows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.ade4facb5063e4c07a0caf3bfa732ed1e1a028a169c030a260904a5f8cb65a21a9c6b290 ade4facb5063e4c07a0caf3bfa732ed1 7e888fabc1451dce556864690cc55e70c8236db2a7b01b8726af0a5700ebafea http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-ltp01Samsam_868c351eWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.868c351e29be8c6c1edde315505d938b8fb40188f21eb689deffb36438fac45bfed5c2ca 868c351e29be8c6c1edde315505d938b 58ef87523184d5df3ed1568397cea65b3f44df06c73eadeb5d90faebe4390e3e http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-eoz01PolyRansom_a717e916Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.a717e91617aa6ae6d318106e38764a336a3ddf6ac6ae28a603b52b5400142eb6aaeb4395 a717e91617aa6ae6d318106e38764a33 6f15dc426b87da591d0a2d4965558a22857e2b1c8e1e6fdfe9c36c8a4b50a99c http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-ijy01EMOTET_4ee5de21Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.4ee5de21e0444356c775594ed3df26a7bce3cd5bcdf09db995c1ce21fd6f90f03cc6aff6 4ee5de21e0444356c775594ed3df26a7 0a3c71a1b1e82e87de944e0c2672f97db0e78a076124b00692233414a8054cb8 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-97a01Satori_eeab715dLinux This strike sends a malware sample known as Satori. This sample belongs to the Mirai variant family known as Satori. It has been seen in the wild targeting a vulnerability in Huawei router model HG532. The vulnerability allows for the remote attacker to execute arbitrary commands on the device. This allows for the ability to download and execute malicious payloads as well as upload the Satori botnet. The bot floods targets with crafted UDP and TCP packets.eeab715dc67af05280c926dc4c4676f5fc6569b13e4f0fb9a541f0eb4b0b179d34aadb4c eeab715dc67af05280c926dc4c4676f5 dd6e5607f137b6536097670a1211b4e20821ca136e2db26529948ff0a48555ff https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/satori-mirai-variant-alert-threat-advisory.pdf https://blog.fortinet.com/2017/12/12/rise-of-one-more-mirai-worm-variant
M18-c5u01Samsam_e94f4ddcWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.e94f4ddc46ea280332b899cc747c78e1d5953a42622024ee05618da645d381973c3ed5a5 e94f4ddc46ea280332b899cc747c78e1 4856f898cd27fd2fed1ea33b4d463a6ae89a9ccee49b134ea8b5492cb447fb75 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-uw402Win.Trojan.Generic_136ced13Windows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.136ced13f97b6e5cb0981461c2555690e5467d7b693fe3e936b0caae85f3e680bce82990 136ced13f97b6e5cb0981461c2555690 3ab29f60bf807759931c817cb40a42140296364fa8a5e0b032e8a6851accce5c http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-qa501NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.c34583adff6bbb7b807536428d5d6638b5949e88526f3d74abc4238b68a21066fc8a4083 c34583adff6bbb7b807536428d5d6638 d18256e9f4062259e941028c531c5219b63446a35c524ef00554c69de2110e98 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-cx901EMOTET_b006196eWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.b006196e9216eae154888f31023d48eba7e54ee7245ff820fc716b3533cea9e17c68a29d b006196e9216eae154888f31023d48eb f13483a7ec5d329e5da2901fa9f3fcea6eff6e4cb1724200df114d214a8cd0bf http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-oef01SocStealer_05324d45Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.05324d45fb1ce6d362d9a3586add45bbfc8f0bfb773d0d581abfd41029068e3977dc457e 05324d45fb1ce6d362d9a3586add45bb b5d5a2cc7f8a796009674981f60c76fb99eb6cceb6a19f276e13c0ce9b22ef4c http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-tx101EMOTET_a8bbe0b0Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.a8bbe0b0db168642f577f27dd638e1f4cb5771dd1af2c510013f748126ac64f68a8a8b5b a8bbe0b0db168642f577f27dd638e1f4 72c6f63cd23d2de81ca96f7246efc9e11a1c8ae9e8f41755aea03ef067ae484b http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gog01Win.Trojan.Agent_5919519cWindows This strike sends a malware sample known as Win.Trojan.Agent. This credential harvesting trojan steals information from Microsoft Outlook and Mozilla Firefox. The MD5 hash of this Win.Trojan.5919519c95ae1da0a49d103140d56215b2e6f35a958566fe033d400b64dfbbb7b02b187b 5919519c95ae1da0a49d103140d56215 5b6e111a37e7c0fdaefd543ea45ff37f162bfeda2b58ce60783091ad6129f11a http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gwv01Samsam_0d2505ceWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.0d2505ce7838bb22fcd973bf3895fd2798e3df3ec24b88bbec95af7472085088230dd70e 0d2505ce7838bb22fcd973bf3895fd27 ffef0f1c2df157e9c2ee65a12d5b7b0f1301c4da22e7e7f3eac6b03c6487a626 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-y8601Win.Trojan.Generic_009824c2Windows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.009824c2b9d54ebf9b899c4bd8407ef0767f92b249864d745d656703add97c164cc447d2 009824c2b9d54ebf9b899c4bd8407ef0 4bbf688503c81af93e8c598242c0a087b57aaa4c95fedb3193e4a021e535fde0 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-frd01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.704cb2d5ecdbfdcbf794dddc188860239a5835095d97181c8aac104f5319e62a5223591f 704cb2d5ecdbfdcbf794dddc18886023 d4a8da30821df543407bcbbc25bf2a89db3d3f5c8d49fddeddaecd3b47c111ef http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-qay01EMOTET_a4e2e084Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.a4e2e08410a08bf5868732a7b4897afa070d46663a80c59ea5be94f7ecc4e5bdf731d3a5 a4e2e08410a08bf5868732a7b4897afa 563a41f03cd9f6e1917b486ec1de9ef941f7449f3bf2635f7fa6186455db01c5 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-b1d01SocStealer_296b3db5Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.296b3db54a57d5d92c45cb37051d9624d8fdee01166a4fee7a9ec9808cb2196571619c3e 296b3db54a57d5d92c45cb37051d9624 51243602a1bb3c7784373c17b430ff2491d1679ae6e169175c45907f0313b76b http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-o3301RoughTed_33208ee0Windows This strike sends a malware sample known as RoughTed. This sample is part of the RoughTed malvertising campaign. It leverages Amazon's cloud infrastructure to distribute a variety of malicious attacks including scams, exploit kits, and ransomware to different platforms.33208ee031ef6121244a4a99122303dcd7951beb7a22e80608013edc7a4d5f4ca602bee0 33208ee031ef6121244a4a99122303dc 4ac4e1ebb3b51406a10f3826e048e639b1b473d53e42877bc3fef4455cb99bdc https://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser/
M18-t9j01Samsam_9585f0c7Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.9585f0c7dc287d07755e6818e1fa204c3a4f16238ec07b39873f3ca26a0d9e94fa8835fa 9585f0c7dc287d07755e6818e1fa204c 45e00fe90c8aa8578fce2b305840e368d62578c77e352974da6b8f8bc895d75b http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-z0y01RoughTed_3f5167b0Mixed This strike sends a malware sample known as RoughTed. This sample is part of the RoughTed malvertising campaign. It leverages the Amazon cloud infrastructure to distribute a variety of malicious attacks including scams, exploit kits, and ransomware to different platforms.3f5167b0793d2226affeb49d00063d8a3cf957ea2529b39566384bf612bd719c10e2fb31 3f5167b0793d2226affeb49d00063d8a 5170de1236854a73fa4c964044347142788a1d89adfa7f99704fc661620a9bd1 https://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser/
M18-pk501NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.b2886b71cc59b417f72966c233a004d46326e2e8d83ed3d6410f95d8e07879bcf92da381 b2886b71cc59b417f72966c233a004d4 495b93c1a9940e94c14063b1e52877864d54fb544a3a32e923b0530cb03c96cf http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-29q01EMOTET_a3fe0007Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.a3fe0007c5f41e24e7feafa66f664c2934139e8243b1f2273a8ace0d41ac9757c11b87ac a3fe0007c5f41e24e7feafa66f664c29 9ddb4d20633a371d2ab3858f4c74ce2c2d55804c40aedde9b46afcc98db8f709 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-lzt01Samsam_4851e633Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.4851e63304b03dc8e941840186c11679bedde43e8c9dc1efbd4171b071cc7697dd25ea7f 4851e63304b03dc8e941840186c11679 a763ed678a52f77a7b75d55010124a8fccf1628eb4f7a815c6d635034227177e http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-fin01Win.Trojan.Generic_100fcdfeWindows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.100fcdfed83028fb9dfe2e27f5efcb98dc169990e31ff9c3d8dbb151a9382da521cfa98d 100fcdfed83028fb9dfe2e27f5efcb98 7f7b2e315d47d3b8874517443888e229aa738f211e3ebcaa67d6859539e439bb http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-xi001SocStealer_2f389f65Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.2f389f65616f99f1a57e55fa721b8d79af62ba71d677727517f3a7db4595c3b2778c3a55 2f389f65616f99f1a57e55fa721b8d79 078baebe5ee2cadda00cd0142280a7bd1034494e79819f16d22a4fe961b3dc84 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-1bt01PhotoMiner_e9ffdb71Mixed This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.e9ffdb716af3d355b25096a8ed4de8ef66e2b15ba4dbfa127c3ec86abce666870a4a168a e9ffdb716af3d355b25096a8ed4de8ef 30daba44a4a25ff5750508613f897057a55337458f19b562e2ed1172c77e626b https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-flq01Win.Trojan.Generic_30f039faWindows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.30f039faa2be4fc36bcb32771ba869b73c43b36e19bdf10822951b9bff6184ccc408b7ce 30f039faa2be4fc36bcb32771ba869b7 744a6e99676a89e8cfd2b0ff2c540f2500f1afc5dc541e3611b0dc04973244ef http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-qrl01Samsam_4c8fb28aWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.4c8fb28a68168430fd447ba1b92f4f42dfa673bfbf644eaef6dc6c70ff8db4ceed2db8f1 4c8fb28a68168430fd447ba1b92f4f42 6bc2aa391b8ef260e79b99409e44011874630c2631e4487e82b76e5cb0a49307 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-x8z01Bancteian_02c824d5Windows This strike sends a malware sample known as Bancteian. The Bancteian malware family is a full featured trojan. It modifies system files, and has the ability to inject code as well as download and execute code from remote locations. It can uncover hidden files on a system as well as maintain persistence on the machine.02c824d59cc08a2915618722ada161b28ec77220117e34c158ebc4c905a86857df1065b5 02c824d59cc08a2915618722ada161b2 29c488b4cdbf1023b9aebe15c5e3b56280e3424ee02d9f38d82ac47221688853 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-qsj01Satori_59e3fa23Linux This strike sends a malware sample known as Satori. This sample belongs to the Mirai variant family known as Satori. It has been seen in the wild targeting a vulnerability in Huawei router model HG532. The vulnerability allows for the remote attacker to execute arbitrary commands on the device. This allows for the ability to download and execute malicious payloads as well as upload the Satori botnet. The bot floods targets with crafted UDP and TCP packets.59e3fa23e0282368628b2dfe1605ccf703ee6974ea4c7eace0846a08f799b4f0f7f44996 59e3fa23e0282368628b2dfe1605ccf7 f9a4c6857bb3a4feebb232c54e6ecffd3742ce598b48e975d675b38232b8e30e https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/satori-mirai-variant-alert-threat-advisory.pdf https://blog.fortinet.com/2017/12/12/rise-of-one-more-mirai-worm-variant
M18-43401Samsam_f161be29Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.f161be29868df913405338499a6ee6757b7318b1c25477ea5d63dc8c563cd36fdbca8055 f161be29868df913405338499a6ee675 3531bb1077c64840b9c95c45d382448abffa4f386ad88e125c96a38166832252 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-vb601NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.c99d3ef134efefa3434724cc0110d5f01c666276d00790975b9ace488f1aa53d1101dd35 c99d3ef134efefa3434724cc0110d5f0 f07f747978b7d8bed904ccadbcc49f184bc16e872f22d7b53b1030bc22ebd794 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-54o01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.197edd484ec775546925a45c41121dccf136e01ad9607978474aee6666fb7143cb3e0f6f 197edd484ec775546925a45c41121dcc 0cfdad54484cf1d4ff9be267469edefdb98e963ffabd6beeb081a208e3fca9ac http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-o2y01Samsam_1e22c58aWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.1e22c58a8b677fac51cf6c1d2cd1a0e232a2d1a9d91ce7d9c130a9b0616c40ac4003355d 1e22c58a8b677fac51cf6c1d2cd1a0e2 939efdc272e8636fd63c1b58c2eec94cf10299cd2de30c329bd5378b6bbbd1c8 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-ib101RoughTed_f368f809Windows This strike sends a malware sample known as RoughTed. This sample is part of the RoughTed malvertising campaign. It leverages Amazon's cloud infrastructure to distribute a variety of malicious attacks including scams, exploit kits, and ransomware to different platforms.f368f80932b646ca73445d81205d16bbe4533419cfcb60e02b5ed4e18b84bf3857a6f095 f368f80932b646ca73445d81205d16bb 0434a5b69bea3a10443c0740bca4f36772cf67130c6b7da5b1b16494b3e12377 https://blog.malwarebytes.com/cybercrime/2017/05/roughted-the-anti-ad-blocker-malvertiser/
M18-l7m01SocStealer_391bd2f9Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.391bd2f99066aa026992452af8fe0ca62cd90aca67a242977f226228662c606e23c1e136 391bd2f99066aa026992452af8fe0ca6 b6b43b0e6488b384a3ad695ceb1d6b576910ce721079346cfd1d12dd9eea5108 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-mtc01EMOTET_066dc02dWindows This strike sends a malware sample known as EMOTET. EMOTET is used as a banking Trojan that targeted users in Europe and the U.S.066dc02d40b3eaeb6d705d97721c6cda4c0430e3e99902713d6e2c230b26fed45a898389 066dc02d40b3eaeb6d705d97721c6cda 293580f6560d8d9b4d3a413dedd347f2cad79bf7e9f22519d9b60cfdb0f52fc6 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-iy601NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.628800122ca92f1e89806fc2cfad355cb417fdf62f4aeb94473171279b89cbb70ea91f09 628800122ca92f1e89806fc2cfad355c 962beb562acef288c5ef09f14e366d7ff3f51a00dd28b3dc5c0e388c92d3c0a2 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-kk301SocStealer_83d55872Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.83d5587245ddcba79bde4c886da1e40bc290e472a23667fb2f64e4c19a89a0bced7bd125 83d5587245ddcba79bde4c886da1e40b b5da35a9a483d86c19d4d450006698d2bd6c41b9eaa9783d563e1522c6ef11a4 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-ft901EMOTET_20082b7dWindows This strike sends a malware sample known as EMOTET. EMOTET is used as a banking Trojan that targeted users in Europe and the U.S.20082b7d97cf50ed560faca05e8cd83f500732f1419749fa6c74053be17abd64dfce1273 20082b7d97cf50ed560faca05e8cd83f 27ef5e8a51c44b6351ea13af6454ce7c34d506c604d9eb6366c7b98ce70a37b4 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-kxe01Win.Trojan.Generic_d7ab4eabWindows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.d7ab4eabb875fab440b0626c6d5c4d784934f79ba04e330bec40be6801e2259d28d0a064 d7ab4eabb875fab440b0626c6d5c4d78 018fad91a80cd1ff5328bf6ee3fe613b563eea547d23d22cd708d76cedbc578b http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-4p301NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.56649a8141c72d442ef3070dbf743563d81aa128199f0b46f939f214202eba93fc236e51 56649a8141c72d442ef3070dbf743563 a3f68a31db23b9c7312219990bfe27bf9bb7c158fde4200c0af7a985bd7ac97d http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-mju01SocStealer_e437c73aWindows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.e437c73a3775a56f5fe2c715da2c8dd6d5b6524c5311a781a9281f155a3c0d542ace2880 e437c73a3775a56f5fe2c715da2c8dd6 026764bc699841080691463758db461d64138343a310b918bac027cf67ffaf34 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-2ko01PolyRansom_b0540808Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.b0540808001a3d199e094ea2477a71170b7df0617f15bf69a57c297d74080386c69d0ab7 b0540808001a3d199e094ea2477a7117 aff6517827847137411d37bafc0aee2915e87b9d2494493c1723634ba1014792 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-5np01SocStealer_73bbad0cWindows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.73bbad0c46e317d5c741fb791ee72f82a700c34292d4532419713ad1f927a981ae9b48f8 73bbad0c46e317d5c741fb791ee72f82 45b6a109d001e4dc2e66d4570c19384d7aa44332e906feef739649b9ebc77bb0 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-cst01Win.Trojan.Generic_cd0483eaWindows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.cd0483ea0584fe982a57b850327319a36c14065808d6f30a0ae9e21cd1d529f09fe5a86c cd0483ea0584fe982a57b850327319a3 a555f788fabda605dd622c7a3320ae31840fb302b82a7d05a981e37cee0d11b2 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-8no01Samsam_14721036Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.14721036e16587594ad950d4f2db5f27ed1797c282f0817d2ad8f878f8dd50ab062501ac 14721036e16587594ad950d4f2db5f27 7aa585e6fd0a895c295c4bea2ddb071eed1e5775f437602b577a54eef7f61044 http://blog.talosintelligence.com/2016/03/samsam-ransomware.html https://twitter.com/VessOnSecurity/status/955119698122821632
M18-3zw01EMOTET_00ea8f10Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.00ea8f10009bba2563f1693a15f6e1af354e0e8d19b2ab423518214bce86f348c9f8203f 00ea8f10009bba2563f1693a15f6e1af b9121f992ba17130ce6429aba0c47138b059b0c8aec2cb36ab446361c95eb238 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-37701Zusy_07e5340aWindows This strike sends a malware sample known as Zusy. Zusy utilizes a Man in the Middle attack to grab a targeted user's banking credentials. The trojan uses process injection to mask itself and when the victim visits a banking site they are tricked into interacting with a form and disclosing personal information.07e5340aa0f33b6f15870722588da3392342d36d503c302028309bdf97ab28341d1d3d4e 07e5340aa0f33b6f15870722588da339 2391a31b7dc07f209a6039044a1d0f11bfcb3b628716b6f842e959f7e90042e8 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-7mu01EMOTET_88969eceWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.88969ece6dcbb19161d5447df8bb67f5557895a946d2099d6695fad14086c870d9442681 88969ece6dcbb19161d5447df8bb67f5 0533852f18624569fbef4cf6677063a92fbd695b3ea36e003da95999d6c8d9cb http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-ss701Win.Trojan.Generic_8e702ec0Windows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.8e702ec05a231967db304dabac12a3678b04ad3404caf6b3cd127b796103034da8fc45b8 8e702ec05a231967db304dabac12a367 a86662848047586347e4fe38341e67c43eef8c83738e22376a7bd992d11f26b6 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-wae01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.c2d70aaafbc104f7b56b0d98b5cf7150bcc042661d67311102f2e59c39793a4c2a9ab1a6 c2d70aaafbc104f7b56b0d98b5cf7150 5c4d5f6d7d0a8d4e805c1341cadf76a924aa2fe6437d432d96f103c4319e84c2 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-nlo01PhotoMiner_fe9787b3Windows This strike sends a malware sample known as PhotoMiner. This sample is part of the family of malware known as PhotoMiner. It is a worm attacks victims by infecting websites hosted on FTP servers.fe9787b3d1c40d4cec154511f7725da6184f5bac495445c19ca9788b56271b024b7b609a fe9787b3d1c40d4cec154511f7725da6 cdf743f542226971129e8c037fa2ea29ee488566848887ff8de3dd166b0636b8 https://www.guardicore.com/2016/06/the-photominer-campaign/ https://www.tripwire.com/state-of-security/security-data-protection/3-malware-trends-watch-2018/
M18-znk01EMOTET_0bdf936cWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.0bdf936cc458fe330531a1510cdaf051b8e4550850b8a6285ec31d2a894025c92c8361de 0bdf936cc458fe330531a1510cdaf051 69137a62cfc2e60c5d2915d919fe987fa94c1510bdd180bc3079330f1897bb64 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-5wd01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.9b3c30efb9cbfba9f5db2f13b410e5aa4e19b317da98c77685756e3237f5b4129109f0f8 9b3c30efb9cbfba9f5db2f13b410e5aa 0c51e3df0b09f14e04b268102afc9342c35fcc2460c645f9c8d21b2413910d32 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-1k101NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.ded3fe1ca4c96461a7cf9a3c54ca9b7d5603d8a9b8fa73c246b90e4ad37fe9d8f95819e7 ded3fe1ca4c96461a7cf9a3c54ca9b7d 305f855ff8d47be5cc2d57e137a436bb2e17b1783f6cc5b8302c2df56b75afd7 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-csm01PolyRansom_9261dbbdWindows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.9261dbbd8cce136f09f706b4887fc5d7a03eb95979281aef6ced2d367d9ae5abf5843c4e 9261dbbd8cce136f09f706b4887fc5d7 ca8eb5e89426e3c6771a72cffac6998abce9ca2a6011207691e47df1738cdeb6 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-yhf01PolyRansom_e621671dWindows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.e621671d3da7dd6de42c101404b6b907eb05262a5a8abc0c4dbd4b16b9e4a38ee6653994 e621671d3da7dd6de42c101404b6b907 9ca5fd8ee403b418f92118836171b72a334caeb94fae9b5b46d6246742bf1345 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-zzy01EMOTET_903247e9Windows This strike sends a malware sample known as EMOTET. EMOTET is used as a banking Trojan that targeted users in Europe and the U.S.903247e98e876bca34b25d3171bd44d2717c86690e1d9e5d6800965456c122ac5bf574a7 903247e98e876bca34b25d3171bd44d2 90d6515b29f9f59d551f8f170b731f9831ab63a2a8f6d70358cee6d5df519efa http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-gd601Win.Trojan.Generic_083185efWindows This strike sends a malware sample known as Win.Trojan.Generic. These .NET trojans utilize process injection techniques to disguise malicious activity. The MD5 hash of this Win.Trojan.083185ef1bc2705bc9e8b51d2856651f08546d0ebbb9118e284e1ec087b6615947ed68b7 083185ef1bc2705bc9e8b51d2856651f fb39b3f2ade2fa2754493d3d1208facf01c2ece961aa7c6e1e1f10607c9d4962 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-whw01Samsam_f297544aWindows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.f297544a20bda66ee6f98e3dc91060c63e140a5df3161ff5d3935b1139275e07903cfff5 f297544a20bda66ee6f98e3dc91060c6 338fdf3626aa4a48a5972f291aacf3d6172dd920fe16ac4da4dd6c5b999d2f13 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-6r701SocStealer_e86b4cf0Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.e86b4cf0ea731cfcb17c5aea5b451dc994d9f9a9b43752771734c67fbab86e78161b721b e86b4cf0ea731cfcb17c5aea5b451dc9 4d094bb5a93660f8e897ce8f191089cd9f76af8b6dd806fc2681acf2a3d70f38 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-6fr01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.efd634c9f4bf62f76d441d2460d16b42e03ff3a214f1e4fe828e3254fe5d1fe6a18f78dc efd634c9f4bf62f76d441d2460d16b42 9b48b6bc6ee491a2b180d6b353ae8f8da230f27a0cdfc1757c58a4819664b790 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-lf301SocStealer_12bcd774Windows This strike sends a malware sample known as SocStealer. This trojan extracts private information from the victim machine and sends it to the remote attacker.12bcd77433ed49bba023543503870da572844a6de18d3c4d969531ed0115d849f5a99a35 12bcd77433ed49bba023543503870da5 d083fbd8b7f1ad561aaaceabfcc601616ed3fdbf076ff845bef53fd178ca6a34 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-u6s01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.6d3ad65961191b5e4a5f0c415dcfae7d03ba7f5c72e6a405f7344f560f44e57095b268d5 6d3ad65961191b5e4a5f0c415dcfae7d a9db16baffc0b92aacae6647952fc2d32673998fc035493d50d32bad5bceb516 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-4ah01EMOTET_1518396eWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.1518396e92bdb87aa777d06d1065de13a01ea5e561c6c0c6d3841ee6852dd224c80fb86f 1518396e92bdb87aa777d06d1065de13 0b49337bc87bdcef167fa6b7313c23a836e9a5a45f827ba0eca7262901b9770c http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-peo01Bancteian_1f7a7d99Windows This strike sends a malware sample known as Bancteian. The Bancteian malware family is a full featured trojan. It modifies system files, and has the ability to inject code as well as download and execute code from remote locations. It can uncover hidden files on a system as well as maintain persistence on the machine.1f7a7d99a9ee33199eb135c5974bd1c262ad25fbfb18ee9dc119d3a04bbdcb1b8339c5e4 1f7a7d99a9ee33199eb135c5974bd1c2 086928aa133cd03aa950e0172ea060f51794f74dceb0974fe335d68d8762cc31 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-1i101Win.Trojan.Generic_00a5508cWindows This strike sends a malware sample known as Win.Trojan.Generic. This trojan will make contact with a CnC server and exfiltrate information from the infected machine. The MD5 hash of this Win.Trojan.00a5508c291098eefcc69368dccf2bcd4643a4208412aca718fa5d18ca5d4aa1768c2507 00a5508c291098eefcc69368dccf2bcd 2e965a7d0769b37a6e4af06db67592b3b0778b6929936bf8b4af8ef370af7eca http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-yjk01Samsam_92e897f4Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.92e897f476cc29a6422e64f961d786339800593add6c6d71e23aeaeee30d58fc2debaf68 92e897f476cc29a6422e64f961d78633 72832db9b951663b8f322778440b8720ea95cde0349a1d26477edd95b3915479 http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-diu01Samsam_739bda42Windows This strike sends a malware sample known as Samsam. Samsam is a ransomware that pivots through the network once machines have been infected, encrypting files and holding machines for ransom along the way. The healthcare industry has been the primary target of this ransomware.739bda4212ff42999d1401624eebcce04485004f78a68d8fccd4fc549a40dd8c76cfca14 739bda4212ff42999d1401624eebcce0 8eabfa74d88e439cfca9ccabd0ee34422892d8e58331a63bea94a7c4140cf7ab http://blog.talosintelligence.com/2018/01/samsam-evolution-continues-netting-over.html
M18-j6x01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.311260e0686c3b59722b819a7852fe657ad2abaeac98bc2c028fad0854fa976d4aa39145 311260e0686c3b59722b819a7852fe65 6e35534f8b79187dbe2fbdd1b0a21b03752a89df5981cb6fb89154eb7b34a087 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-mtb01EMOTET_721470d9Windows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.721470d93cc16d2ac945d9ec7b705beee9b71b394a02a04223bf7d7d0ee77dd8034b7e3f 721470d93cc16d2ac945d9ec7b705bee a5716b4266066ed231e6c207cf2850627c3c8fa84d2e96e8ebf65f8f918538d6 http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-76h01PolyRansom_c340f0faWindows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.c340f0fa4b87a21ae6a347d62ea7b2919bcb94b86cf49cb40124fa92dc6c82920c73f11c c340f0fa4b87a21ae6a347d62ea7b291 377a4c54239536019cef4c3fb2ed835a0142f58d64bc0bf49063440b7700a0b7 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-bc901PolyRansom_a90d5a90Windows This strike sends a malware sample known as PolyRansom. PolyRansom is polymorphic ransomware that infects other services and spreads by means of all media that it can gain access to.a90d5a9032c07f068a5a17bac6cfc04b81e453ca9068990c69dfa1417db0588672ae7154 a90d5a9032c07f068a5a17bac6cfc04b 64fac9307649854e520f733df3df40ed960650103a78b8460488319156e059cf http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html
M18-fbb01EMOTET_67a1366cWindows This strike sends a malware sample known as EMOTET. Emotet is used as a banking Trojan that targeted users in Europe and the U.S.67a1366c74e0e7363d8afa58ae15d1a8a29fce31d99846267a028ee40b72bc64f87e7011 67a1366c74e0e7363d8afa58ae15d1a8 30f73c131ca8864f57d5c3501ad7e75be30eb8bafb79f9ce0c9becca4813c7fc http://blog.talosintelligence.com/2018/01/threat-round-up-0105-0512.html
M18-bng01NecursMixed This strike sends a malware sample known as Necurs OLE Downloader. These samples are OLE based downloaders that use obfuscated VBA macros to download malware families that are being distributed with the Necurs botnet.da947b92c8922111cafc0a5c99e814acb694ef1dbc707f90b013bd5570572e996ab1d441 da947b92c8922111cafc0a5c99e814ac 1c2f0a28b5c13eb2967078d947924c9a4a5f8f845d3899986df19e8a166d3ec0 http://blog.talosintelligence.com/2018/01/threat-round-up-1229-0105.html