
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan. 13 and Jan. 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, [Snort.org](), or [ClamAV.net]().
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found [here]() that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.
The most prevalent threats highlighted in this roundup are:
Threat Name| Type| Description
—|—|—
Win.Virus.Xpiro-9983832-1| Virus| Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Xls.Exploit.LokiBot-9983602-0| Exploit| Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
Win.Dropper.Fareit-9983571-1| Dropper| The Fareit trojan is primarily an information stealer with functionality to download and install other malware.
Win.Dropper.HawkEye-9983397-0| Dropper| HawkEye is an information stealing malware that specifically targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media.
Win.Dropper.Shiz-9983394-0| Dropper| Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.
Win.Dropper.DarkKomet-9984290-0| Dropper| DarkKomet is a freeware remote access trojan that was released by an independent software developer. It provides the same functionality you would expect from a remote access tool: keylogging, webcam access, microphone access, remote desktop, URL download, program execution, etc.
Win.Dropper.Nanocore-9984085-0| Dropper| Nanocore is a .NET remote access trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, downloading files and recording keystrokes.
Win.Dropper.QuasarRAT-9983512-0| Dropper| QuasarRAT is a .NET remote access trojan. It is an open source RAT providing threat actors a plethora of functionalities, including the standard features such as remote shell, file management, arbitrary command execution and credential stealing.
* * *
## Threat Breakdown
### Win.Virus.Xpiro-9983832-1
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 11 samples
Registry Keys| Occurrences
—|—
`SYSTEMCONTROLSET001SERVICESWSCSVC
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESWINDEFEND
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESCLR_OPTIMIZATION_V2.0.50727_32
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESCLR_OPTIMIZATION_V4.0.30319_32
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESCLR_OPTIMIZATION_V4.0.30319_32
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESCOMSYSAPP
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESCOMSYSAPP
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESMOZILLAMAINTENANCE
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESMOZILLAMAINTENANCE
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESMSISERVER
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESMSISERVER
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESOSE
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESOSE
Value Name: Start`| 11
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTERSVCS-1-5-21-2580483871-590521980-3826313501-500`| 11
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTERSVCS-1-5-21-2580483871-590521980-3826313501-500
Value Name: EnableNotifications`| 11
`SYSTEMCONTROLSET001SERVICESCLR_OPTIMIZATION_V2.0.50727_32
Value Name: Start`| 11
`SYSTEMCONTROLSET001SERVICESAELOOKUPSVC
Value Name: Type`| 11
`SYSTEMCONTROLSET001SERVICESAELOOKUPSVC
Value Name: Start`| 11
`SOFTWAREWOW6432NODEMICROSOFT.NETFRAMEWORKV2.0.50727NGENSERVICESTATE
Value Name: AccumulatedWaitIdleTime`| 11
`SOFTWAREWOW6432NODEMICROSOFT.NETFRAMEWORKV2.0.50727NGENSERVICELISTENEDSTATE
Value Name: RootstoreDirty`| 11
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONACTION CENTERCHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting`| 11
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONACTION CENTERCHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting`| 11
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONACTION CENTERCHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting`| 11
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONACTION CENTERCHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting`| 11
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONACTION CENTERCHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting`| 11
Mutexes| Occurrences
—|—
`kkq-vx_mtx67`| 11
`kkq-vx_mtx68`| 11
`kkq-vx_mtx69`| 11
`kkq-vx_mtx70`| 11
`kkq-vx_mtx71`| 11
`kkq-vx_mtx72`| 11
`kkq-vx_mtx73`| 11
`kkq-vx_mtx74`| 11
`kkq-vx_mtx75`| 11
`kkq-vx_mtx76`| 11
`kkq-vx_mtx77`| 11
`kkq-vx_mtx78`| 11
`kkq-vx_mtx79`| 11
`kkq-vx_mtx80`| 11
`kkq-vx_mtx81`| 11
`kkq-vx_mtx82`| 11
`kkq-vx_mtx83`| 11
`kkq-vx_mtx84`| 11
`kkq-vx_mtx85`| 11
`kkq-vx_mtx86`| 11
`kkq-vx_mtx87`| 11
`kkq-vx_mtx88`| 11
`kkq-vx_mtx89`| 11
`kkq-vx_mtx90`| 11
`kkq-vx_mtx91`| 11
*See JSON for more IOCs
Files and or directories created| Occurrences
—|—
`MSOCacheAll Users{90140000-0115-0409-0000-0000000FF1CE}-CDW20.EXE`| 11
`MSOCacheAll Users{90140000-0115-0409-0000-0000000FF1CE}-Cdwtrig20.exe`| 11
`MSOCacheAll Users{91140000-0011-0000-0000-0000000FF1CE}-Cose.exe`| 11
`MSOCacheAll Users{91140000-0011-0000-0000-0000000FF1CE}-Csetup.exe`| 11
`%CommonProgramFiles(x86)%microsoft sharedSource EngineOSE.EXE`| 11
`%ProgramFiles(x86)%Microsoft OfficeOffice14GROOVE.EXE`| 11
`%ProgramFiles(x86)%Mozilla Maintenance Servicemaintenanceservice.exe`| 11
`%SystemRoot%Microsoft.NETFrameworkv2.0.50727mscorsvw.exe`| 11
`%SystemRoot%Microsoft.NETFrameworkv4.0.30319mscorsvw.exe`| 11
`%SystemRoot%Microsoft.NETFrameworkv2.0.50727ngen_service.log`| 11
`%SystemRoot%Registration{02D4B3F1-FD88-11D1-960D-00805FC79235}.{33EC2C09-9668-4DE7-BCC0-EFC69D7355D7}.crmlog`| 11
`%SystemRoot%SysWOW64dllhost.exe`| 11
`%SystemRoot%SysWOW64msiexec.exe`| 11
`%SystemRoot%SysWOW64svchost.exe`| 11
`%SystemRoot%Microsoft.NETFrameworkv4.0.30319ngen_service.log`| 11
`%SystemRoot%SysWOW64dllhost.vir`| 11
`%SystemRoot%SysWOW64msiexec.vir`| 11
`%SystemRoot%SysWOW64svchost.vir`| 11
`%APPDATA%MozillaFirefoxProfiles.defaultextensions`| 11
`%SystemRoot%Microsoft.NETFrameworkv4.0.30319ngenservicelock.dat`| 11
`%SystemRoot%Microsoft.NETFrameworkv2.0.50727ngen_service.lock`| 11
`%SystemRoot%Microsoft.NETFrameworkv2.0.50727ngenservicelock.dat`| 11
`MSOCacheAll Users{90140000-0115-0409-0000-0000000FF1CE}-CDW20.vir`| 11
`MSOCacheAll Users{90140000-0115-0409-0000-0000000FF1CE}-Cdwtrig20.vir`| 11
`MSOCacheAll Users{91140000-0011-0000-0000-0000000FF1CE}-Cose.vir`| 11
*See JSON for more IOCs
#### File Hashes
`14a816eca397542177be1b013a8550463aaada0e544428d833d79d247b918a04`
`4d4b1301cdc29373b5fdaa0b961117b4ea230f3182ff1033a50b75cb33cb6737`
`58e289ed1bec0909bd490687c84bc81a754050028894cad20e045ea684106f87`
`63ef0e482f77540abbadc761522c8175d7e6f4b50a9932b0a98763f05916d913`
`6ac332b34addca8a68fc3808e412bd094202cdae8b1f7f381931541030d1aca0`
`9b8f4ffb5c45eab8a4b1d2ddf7dca2d0e3c3a11cb9ff989ad78b18891ba4267b`
`9e32c538f726a4dd30284cbe9427fbc3bd8daef548fddd35b9a0c1947028cba1`
`b15b22c579087019a0bca33bd562bda64716b53854d1068024ecc2fd7db6a215`
`b22d2e2f2850a578b83ab80b99f3c712395bd53b4d605f14396bbdb910089b3f`
`b752731598528ea613850e0ad96c81ae76c9be21e6ab5b44928ce384910d0579`
`c7fc0618631d7a46cd16ed17a0edf1ea25dd9d3766536ffb35aa74c0b2cae931`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| N/A
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Xls.Exploit.LokiBot-9983602-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 26 samples
Registry Keys| Occurrences
—|—
`LOCAL SETTINGSMUICACHE8252C64B7E
Value Name: LanguageList`| 26
`SOFTWAREMICROSOFTEQUATION EDITOR`| 25
`SOFTWAREMICROSOFTEQUATION EDITOR3.0`| 25
`SOFTWAREMICROSOFTEQUATION EDITOR3.0OPTIONS`| 25
`SOFTWAREMICROSOFTINTERNET EXPLORERINTELLIFORMSSTORAGE2`| 1
`SOFTWAREWOW6432NODEMOZILLAMOZILLA FIREFOX`| 1
`SOFTWAREWOW6432NODEMOZILLAMOZILLA FIREFOX20.0.1 (EN-US)MAIN`| 1
`SOFTWAREWOW6432NODEMOZILLAMOZILLA THUNDERBIRD`| 1
`SOFTWAREMICROSOFTCALC`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERDISCARDABLEPOSTSETUPCOMPONENT CATEGORIES{56FFCC30-D398-11D0-B2AE-00A0C908FA49}`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERDISCARDABLEPOSTSETUPCOMPONENT CATEGORIES{56FFCC30-D398-11D0-B2AE-00A0C908FA49}ENUM`| 1
`SOFTWAREMICROSOFTCALC
Value Name: Window_Placement`| 1
`SOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONUNINSTALLSADDELTAGENE`| 1
`SOFTWARESTANLEY`| 1
`SOFTWARESTANLEYMUSTELA`| 1
`SOFTWARESTANLEYMUSTELAMEMORANDIZE`| 1
`SOFTWAREKOMPOSTER`| 1
`SOFTWAREKOMPOSTERMYTHUS`| 1
`SOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONUNINSTALLSADDELTAGENE
Value Name: Anabata`| 1
`SOFTWARESTANLEYMUSTELAMEMORANDIZE
Value Name: Hannss`| 1
`SOFTWAREKOMPOSTERMYTHUS
Value Name: Udlbsdatos`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERDISCARDABLEPOSTSETUPCOMPONENT CATEGORIES{56FFCC30-D398-11D0-B2AE-00A0C908FA49}ENUM
Value Name: Implementing`| 1
Mutexes| Occurrences
—|—
`Local10MU_ACB10_S-1-5-5-0-67863`| 26
`Local10MU_ACBPIDS_S-1-5-5-0-67863`| 26
`3749282D282E1E80C56CAE5A`| 4
“| 1
`irLbieSUCc`| 1
`8M65-UPTBHT-1F5Z`| 1
`8L30N9RRD4TG20Lz`| 1
`gsVeqYyojcjHvs`| 1
`qtHAQcA`| 1
`tKywdBwKac`| 1
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`192[.]3[.]136[.]186`| 5
`3[.]232[.]242[.]170`| 3
`52[.]20[.]78[.]240`| 2
`3[.]220[.]57[.]224`| 2
`208[.]67[.]105[.]148`| 2
`103[.]232[.]54[.]143`| 2
`104[.]168[.]45[.]102`| 2
`185[.]216[.]71[.]172`| 2
`103[.]167[.]85[.]164`| 2
`91[.]195[.]240[.]94`| 1
`85[.]159[.]66[.]93`| 1
`216[.]18[.]208[.]202`| 1
`208[.]67[.]105[.]161`| 1
`45[.]33[.]6[.]223`| 1
`198[.]23[.]188[.]145`| 1
`198[.]46[.]178[.]174`| 1
`103[.]139[.]44[.]52`| 1
`193[.]222[.]62[.]4`| 1
`192[.]3[.]101[.]26`| 1
`103[.]171[.]0[.]73`| 1
`175[.]41[.]16[.]124`| 1
`154[.]204[.]248[.]137`| 1
`199[.]192[.]23[.]224`| 1
`164[.]155[.]185[.]152`| 1
`145[.]14[.]156[.]167`| 1
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`api[.]ipify[.]org`| 7
`sempersim[.]su`| 1
`www[.]sqlite[.]org`| 1
`www[.]asiadesign[.]xyz`| 1
`www[.]easy005[.]xyz`| 1
`www[.]terratechpower[.]com`| 1
`www[.]porpubby[.]info`| 1
`www[.]glaaforum[.]com`| 1
`www[.]barefootcalzado[.]com`| 1
`www[.]bullcute[.]com`| 1
`www[.]hameaudeguzon[.]com`| 1
`www[.]allosteriacarpi[.]com`| 1
`www[.]brasil24horas[.]online`| 1
`www[.]hf9blwwuwpx7j8k[.]live`| 1
Files and or directories created| Occurrences
—|—
`%PUBLIC%vbc.exe`| 15
`%TEMP%tmp.tmp`| 7
`%APPDATA%D282E1`| 4
`%APPDATA%D282E11E80C5.lck`| 4
`%APPDATA%MicrosoftCryptoRSAS-1-5-21-2580483871-590521980-3826313501-500a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5`| 4
`%TEMP%ns.tmp`| 3
`Users`| 1
`%TEMP%sqlite3.dll`| 1
`%TEMP%CVRDF9.tmp`| 1
`%SystemRoot%resources409`| 1
`%TEMP%sqlite3.def`| 1
`%TEMP%nsxF2D0.tmpSystem.dll`| 1
`%APPDATA%Spisebordets170`| 1
`%APPDATA%Spisebordets170Tiltvingende`| 1
`%APPDATA%Spisebordets170TiltvingendeArtDeco_brown_5.bmp`| 1
`%APPDATA%Spisebordets170TiltvingendeHemmeligheden.Aqu`| 1
`%APPDATA%Spisebordets170TiltvingendeUnsaluting.Str`| 1
`%TEMP%nstD558.tmpSystem.dll`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometry`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127Thermomultiplier`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127ThermomultiplierFejekoste`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127ThermomultiplierFejekosteAmidoacetic.Int`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127ThermomultiplierFejekosteSystem.Text.Encodings.Web.dll`| 1
`%APPDATA%MicrosoftWindowsStart MenuHematachometryOptimumets127ThermomultiplierFejekostemedia-playlist-repeat.png`| 1
*See JSON for more IOCs
#### File Hashes
`0096e380996a5c8896055aa0543c3f51bbebd5c1ea8178da1d67691a975cdbf7`
`067c2a2f4c8344f55cae9cc1c6ba03324a4cc99ae5facd672d100c71f64233e0`
`07417c9975e6ada913ab62a1338ea1df45800d5eca0c73de33d1f53a72973bc6`
`0fa75b407da549a4c7e144216a5970b1c3803c74e57ebf433257c0d4381f34db`
`10cd2aa23f0117fb286aba9f6a6ecbf7c467071881763d18c570574eed5b3dc8`
`2c585eb6a6b3d165c75312f0676e312fc0b1c9dbfd63ab4a060356669f605c90`
`3e8d8210b9d681c89f5df122c1598d4117b0c1843b706f7525039b5ba37f96af`
`400e675021818214d2779c38b2d77b457ef9956518cd812b53bc7f41ca228bca`
`57e5341a8009432af3aa5b4246eabb8774d292db8a245106fc045c4f36e5cddb`
`7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd`
`80bfd5671a9013cc4ba919582612f6d16076e0663990572188093e61ae40e2bd`
`8126aa90f564c1662d9b42b333a7b0fe7489770c8b5069997b8dc5577ded2bc0`
`86fdff90584064c135a98f05986da5a03bd67abe414f1d8f5fbdbf4249430019`
`93a71008a2294209a986d896b26e8bcff214afc6923323687c9281919c033a91`
`9d6fcf6155af47fbacddd1f7feb457dc919f1ee29f3d28cc30f3c9c437ee516a`
`a7225665972f421022ded04315aa75f15cda747e12dbd82130b1a8e87c9d062d`
`afa915e7174b5c3da177ea2bc6573248a00d173dfe8f2ff8e7667557a3bf699f`
`b66c265b35372a58775ab68db5392014be36b745f4647df6c3da1c0a7aab82fc`
`b7062983e7667a1b86c1bd1123bc3aac29b7a8200b079c9bc4b566dd1c7ee44d`
`c2745c75eefa6867cce4cc61d89d306810370e0958a550d039c5935e7012de71`
`c9ebabe61d9c25500298ac578ba280ebb1b78fd2da07f32a82c44f1c11c3453e`
`cc77dde534b4aa329ecf543351157ca8c9ee43730de6dbef2673d1f63f225f87`
`cd0a74e966577953be0ea3d89be7467057d1356f5a8fc0f95a472fe938ca7ff5`
`e7582ee773f6857a3f18e76453beefc46912089372f3b12bdd6e5735a3a3536d`
`e89082a08c246ba8e4bffb9ddb127a2ee24cef652e4b0a8772ad22d376a82eb7`
*See JSON for more IOCs
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.Fareit-9983571-1
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 25 samples
Registry Keys| Occurrences
—|—
`SOFTWAREWINRAR`| 23
`SOFTWAREWINRAR
Value Name: HWID`| 23
`SAMSAMDOMAINSACCOUNTUSERS00003E9
Value Name: F`| 23
`SAMSAMDOMAINSACCOUNTUSERS00001F5
Value Name: F`| 23
`SAMSAMDOMAINSACCOUNTUSERS00003EC
Value Name: F`| 23
Files and or directories created| Occurrences
—|—
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupfilename.vbe`| 23
`%APPDATA%subfolder`| 23
`%APPDATA%subfolderfilename.scr`| 23
#### File Hashes
`02c648162f41e0ec54b1787c99bb274b484adeeaecbc99554fcd4428a276406e`
`07ace7fc4681b7d16fd6a76364cbb679b4447128b77123424c788058659e07e2`
`0864a6c576429f1d5cb4a9529b016903bd8e368ae3c11527ef421e566b6b37ec`
`0aaad800dbe8242fdc236b0d12cc3f0fade9c7d9ac02d2fc872f60075ec4dfa0`
`143bee6fde9b3dee4f91e16e6925b6254848d9958f0c34ae1b8a5e7b444e8d63`
`14eea17e15d2dd0092935ec71c98269ff4fe492eb6534b3c6baca1f48ea7376d`
`15b459fd340458d8eaa5269296f9cfcccc3a3540942ef17f47637a73d59acc0a`
`17704079963b83eb8a4aa50af808aa3f2facc1eaba7708b6715504806db95a64`
`276fc674e4f232e25a17a67e53a98050265ec64a7698ad9bf56d3cc31ae0a732`
`2acfbc4bb180b60e8b257795e5b66e51e3ceae0550a2187703d15dd929471673`
`2c23d82a3f45947ef677c2a2a73d1900b27dc7a5b11c0e2464ad6270671c864c`
`32a1ae5db46aeae9898d6c83a752d028b08e59b86f17c19e0d12287a5d42c857`
`37a85828e7c787657ec66752d73db2ebcb85040b0fe9df689bb18067a304f954`
`44bda2acfe872846b11d129916e66a5c158308266bbb2c5b4b659ae040bc6726`
`46802ef2d4c318d394572f84218f8bf385edd63699c5fb762aef10fdac0a4878`
`4a1371381fe29c6bf17b802e1671c3081687156df7c819fbe7bbe547dc3309a7`
`4b837e51f59054694d52f242ebc18a12a4ecf5080a5d7858032f7f968377ccca`
`50b7ce25bf5591612540b416e12022f3284ea2de470eec1aa7759e9c0aa3469f`
`5dd087571c55d345f926cbaee71f752052881f44f99e7712e491fa2ad349933c`
`695aba9d911967937babbe5dbcf038ea43d67290959fbcc199cd1cac0f437ba0`
`698540018cbc00b2136dcb4951190309375b01498265db094549593e9f335aed`
`6e02c443b09119b78fce3ca1340f8bbf25380ba485f7fab41f3bd7d3bddc3fe6`
`70fb6ede7c66ae618cf6a2414d6e954926a9a83097607de52101f89e6606587e`
`721968ba560a6e1d4def705be4279c5520a90015de5a08c1022448255d3d398e`
`78f0cb383a71dd77a716fbe97052969ef11fc0fb4420dfad541d5e36a356f39f`
*See JSON for more IOCs
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| N/A
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.HawkEye-9983397-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 15 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERADVANCED
Value Name: Hidden`| 15
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`27[.]121[.]68[.]109`| 15
`104[.]16[.]154[.]36`| 11
`104[.]16[.]155[.]36`| 4
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`whatismyipaddress[.]com`| 15
`mail[.]yourstudyway[.]com`| 15
Files and or directories created| Occurrences
—|—
`%APPDATA%pid.txt`| 15
`%APPDATA%pidloc.txt`| 15
`%TEMP%holdermail.txt`| 15
`%TEMP%holderwb.txt`| 15
`%APPDATA%subfolder`| 15
`%APPDATA%subfolderfilename.exe`| 15
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupfilename.vbs`| 15
#### File Hashes
`00452dc6f78541178d6d024b47d0f4f928b17a9f14e770ebf0da15d87325737b`
`1b583b41491e0c21eec87a0c150c234b5567906a42bd1b61ab1adb39e5b99efa`
`1ea1014f69c680fcb2e23c10d56941508d7024bf04780b51e1f8d59bc45d2d87`
`202ce3acdc22c7ad0761a03cdf5e15d593a4b0f6490815cc20dfed407b667f86`
`22280734efa0e527d7517fec07479a955d5cc70128558ace13489311f3aae2fa`
`3c04cad716a78717ddb48470b954ab6bce9feecdb3adc7a74dee8ecb9b62b3a4`
`4aece62cf34ce60c1f16d75140f47bc21bfcaf48da5a6f9eca0e48a43ff5b6d4`
`64b20ed5668241744570462e85987d91671fee3e0a94ca1546b68dd59df95997`
`873645150140fc2f57e2e205d6b5e7d5b45fc35099d75eebe4b9a0989b98df0e`
`89afbd7a372ee58c23edc29814c6faceeba8f7a9d82c0632a054577a491e748a`
`8f10e57f73fc6f805908a3b36244ca92639500b5d08af601defd78498ec02b9c`
`aa264abc70a1d7eaf196bc83155a3764f5408b78e470f7bfa2fc3e81d60ee133`
`c9d2b04de15964130afc80e4a41c7f71da8425302f6aa7297c7b0fad2cf09205`
`f50240e0f888e5e17cabc3d088c04f2de75ef5b8acd20e3551fcc0dc26c3407f`
`fe619680c0acc53af4ea30910cdc3bead472206ebe3c5eb040e11d4cbea07b4e`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.Shiz-9983394-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 25 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFT
Value Name: 67497551a`| 25
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: 98b68e3c`| 25
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: userinit`| 25
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: System`| 25
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINDOWS
Value Name: load`| 25
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINDOWS
Value Name: run`| 25
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: userinit`| 25
Mutexes| Occurrences
—|—
`Global674972E3a`| 25
`GlobalMicrosoftSysenterGate7`| 25
`internal_wutex_0x000004b4`| 25
`internal_wutex_0x0000043c`| 25
`internal_wutex_0x000004dc`| 25
`internal_wutex_0x`| 25
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`85[.]94[.]194[.]169`| 25
`13[.]107[.]21[.]200`| 17
`45[.]56[.]79[.]23`| 7
`198[.]58[.]118[.]167`| 5
`45[.]33[.]2[.]79`| 5
`173[.]255[.]194[.]134`| 5
`45[.]79[.]19[.]196`| 4
`45[.]33[.]18[.]44`| 4
`45[.]33[.]20[.]235`| 4
`45[.]33[.]30[.]197`| 4
`72[.]14[.]178[.]174`| 4
`96[.]126[.]123[.]244`| 3
`72[.]14[.]185[.]43`| 3
`45[.]33[.]23[.]183`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`dikymezosaj[.]eu`| 25
`cileretirus[.]eu`| 25
`fogixezajaq[.]eu`| 25
`gadohyzyvah[.]eu`| 25
`nofoletezup[.]eu`| 25
`masafytunux[.]eu`| 25
`jepepyxiwam[.]eu`| 25
`qetyrypopup[.]eu`| 25
`lymoxuxelam[.]eu`| 25
`lysenenyxis[.]eu`| 25
`tupycegubej[.]eu`| 25
`xutulenuqix[.]eu`| 25
`purijygirem[.]eu`| 25
`dimasyhageh[.]eu`| 25
`ciqofymosip[.]eu`| 25
`vonerymekix[.]eu`| 25
`novubymyvip[.]eu`| 25
`fobyqyhezem[.]eu`| 25
`gacucuhumeg[.]eu`| 25
`maxilumiriz[.]eu`| 25
`jelojujopen[.]eu`| 25
`qekafuqafit[.]eu`| 25
`ryhyruqeliz[.]eu`| 25
`kejepujajeg[.]eu`| 25
`tufibiqunit[.]eu`| 25
*See JSON for more IOCs
Files and or directories created| Occurrences
—|—
`%TEMP%.tmp`| 25
#### File Hashes
`08a7b276706517d28c3885c812f89b57549af4be14fe07059fc6f4651625f091`
`091f71db383670a6815d3f57e5075000fc6fd016bc4823be5e7ae16bb53267a9`
`0d7c8955acc824a085be5d45102c510212ca6c5f4df5fad897ee2d5923d34a1f`
`14b6836f41d60a28868dc0fcd758b7a23b86a9d7b5f08fc463de6ed950a737d1`
`1cc720425d2994b10536284c18e4a9e255ee5ea7ba21e6e6cafaf00310207a80`
`342e45c1360a96d5b87847db6b3c85ef79bfda78c9f53a67a15424df91d78554`
`4056a5fa6b1b28126a3ffbeb4d8a2a046ed8017e49ab1941c64bb913dc9a6ace`
`446ea4991b5630082258be07dc8fc7ac4297f89a4de7b63fcf2e09937f0ed298`
`4d923330bfbba1410ba2e553ac6da20068c2714fc9405a76b64a35e5a5f3db14`
`54f5f3b8f9310dfee013917c10d88dff4c524aa406e758c067e6ded17840834f`
`55704fcf179904208e18ae3000599ae04869d57530fbb388f8e6aa37353e344c`
`593d96413956b2ac7f3ac3cc7b9d5b106c480f8aa587789c48c77f43e15dccb3`
`6da3c0667c67bb53ada30dfc2fa6dac45ee5b56197515d0c083ea155a893730f`
`7781a10e637ee035b26e363c178fbcf9e07d30a32444b50b00c715376388f6e2`
`856b831b3f7ada0bb31ade63f755c35f7f4f381a956956052fff69e8119815ee`
`8b9781057d5595fee84b6c45830ecb83fc0f261d6d9ba73b066f3c4b9c7f2c88`
`bcb55a2df28a554fa12c514979c2080cb4244ee171686b8f910ce70a7f1f513e`
`be38aa13642e482adcf749e2cea5507e7942255e1b31c7c455c356dea793189f`
`c74083c017fd115c3319f21234010c73650be020a95818b18aaca1b5902d73d8`
`cadc40ac3e45eafe1977416e6bc4dd159ba74dd4becf5e177cdc6be9906c388e`
`e4be229930351810431bc7c946fe36242e6e9f4c753578585c64fa1aebc09179`
`eb95741a6ee9008efada291453ae1343a66d0eaa868b5554b6741d3d2a0dbd1a`
`ebfe801ee7ba2cfaa5b89359dff445569ec7883064d1bfa9f2a6cfb5394fe841`
`eda4243c382593841fa5ee68b3ecf0c4d307a1b1cd01f6081bdf93373383a19b`
`f0165180238c73a0fcdb1f9ec4142a3d98054a613373d1e67ce22dcbe53c7b08`
*See JSON for more IOCs
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.DarkKomet-9984290-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 18 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN`| 16
`SOFTWAREWINRAR`| 7
`SAMSAMDOMAINSACCOUNTUSERS00003E9
Value Name: F`| 7
`SAMSAMDOMAINSACCOUNTUSERS00001F5
Value Name: F`| 7
`SOFTWAREWINRAR
Value Name: HWID`| 7
`SAMSAMDOMAINSACCOUNTUSERS00003EC
Value Name: F`| 7
`SOFTWAREDC3_FEXEC`| 6
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: MicroUpdate`| 6
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: UserInit`| 6
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUNONCE
Value Name: LiveSafe`| 3
Mutexes| Occurrences
—|—
`DC_MUTEX-U4R2ZE3`| 6
`1daec281-87cf-4d12-bf14-b425e26bf9ca`| 3
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`192[.]169[.]69[.]25`| 6
`5[.]189[.]137[.]8`| 3
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`1ntershipping[.]co`| 7
`randomlovezs[.]duckdns[.]org`| 6
Files and or directories created| Occurrences
—|—
`%APPDATA%dclogs`| 6
`%HOMEPATH%DocumentsMSDCSC`| 6
`%HOMEPATH%DocumentsMSDCSCmsdcsc.exe`| 6
`%APPDATA%ConfigsEx`| 3
`%ProgramData%LiveSafe`| 3
`%ProgramData%LiveSafelivesafe.exe`| 3
#### File Hashes
`06589ce72d7765cf161dd7efee2daecfe8a85899489a46d207c936af5a025528`
`140e5bec9612622eb47912cf88cc82fc74e3ef2f0433dbc8a597cc2970b2cc02`
`14de0def7ff5d9c43ecbcb207ab56a858fdc083229b30ef816e62e19dbf6b2d0`
`21df035a886ce850512c47bfe7eb83cf1c1ab521187894483e9220e06c2fd773`
`30daa7fe12aa0818aa8739ef8dac3cea625a175a27cba68998545ce25fc17c29`
`40511c3a0402ec8b6d90b294ea13f5d83b5f77a2a47c333c01dd231b3588da76`
`4d09f136f145dbd40513abfda1bc92e7588143ee318a11c5e498995847fb6c12`
`7bfb7f8f369004364519394d630587619447f397b1ce95f28984db7aede13982`
`7d1b8b1631a84926b840cd5b857c8fb4c21af7ed394ac85c4146d464eb413f5d`
`97440f7334388258e72995338186e89a40aff17ba1f6fffffdb088d04141f0be`
`a1296eade8e9e99c60155900604c318e6a5dd270495d9fd42ef5144f388ff033`
`bfe82fd70f36efa6164bbd42d196381584d661d12c5de6312806100c37042558`
`d1b45a3651bfa2af1186894fc579784a5b92997d8124a1bbde8725fe259f19bf`
`de2673264d41fe0ef2391733223e9b092483f95a34fc0a5fa1acb69a9d29f920`
`e4a1a2cb2e4d98adeb6eb38678de696425c437a42da49d0586028a32e7076bc8`
`ea04019c2556bd95a4d5de9f1688a39af9a09bc83353026223e0d29a2cec81b0`
`ecbd53c73ab4c3b0efe1f2e6aaceae13e19006584f615ead12d134d2fe52f282`
`f211174d53657e1edf965e99c5fdee9f15f91bff3c41c4ceca1bd9b0abc38f82`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.Nanocore-9984085-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 19 samples
Registry Keys| Occurrences
—|—
`SOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: AGP Manager`| 8
`LOCAL SETTINGSMUICACHE8252C64B7E
Value Name: LanguageList`| 3
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: MyApp`| 2
`SYSTEMCONTROLSET001SERVICES.NET CLR DATALINKAGE
Value Name: Export`| 1
`SYSTEMCONTROLSET001SERVICES.NET CLR NETWORKINGLINKAGE
Value Name: Export`| 1
`SYSTEMCONTROLSET001SERVICES.NET DATA PROVIDER FOR ORACLELINKAGE
Value Name: Export`| 1
`SYSTEMCONTROLSET001SERVICES.NET DATA PROVIDER FOR SQLSERVERLINKAGE
Value Name: Export`| 1
`SOFTWAREWOW6432NODEMICROSOFTCRYPTOGRAPHYAUTOENROLLMENT`| 1
`LOCAL SETTINGSMUICACHE8252C64B7E
Value Name: @C:Windowssystem32DeviceCenter.dll,-2000`| 1
`LOCAL SETTINGSMUICACHE8252C64B7E
Value Name: @explorer.exe,-7001`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: b729dc2de3a09245553725e76a1d5da45456d6be6edf6a6c6b4ce0e922895d88`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: b729dc2de3a09245553725e76a1d5da45456d6be6edf6a6c6b4ce0e922895d88`| 1
Mutexes| Occurrences
—|—
`Global{6eacccb2-da40-404e-ba3f-9cf2cb842104}`| 6
`-`| 3
`3749282D282E1E80C56CAE5A`| 1
`Global>98B68E3C00000000`| 1
`Global>98B68E3C00000001`| 1
`Global{2de2dd5e-5799-4adf-b77b-aaae77ba7236}`| 1
`Global{217c10cb-4875-422a-a6ac-cae34e8afb0c}`| 1
`f8a1hk9am3adue2674aue`| 1
`Global{d26f97e8-1d06-44a6-abc2-219db996fe51}`| 1
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`173[.]254[.]223[.]94`| 6
`64[.]32[.]8[.]67`| 3
`35[.]205[.]61[.]67`| 3
`77[.]88[.]21[.]158`| 2
`185[.]107[.]56[.]58`| 2
`37[.]235[.]1[.]177`| 1
`37[.]235[.]1[.]174`| 1
`185[.]19[.]85[.]183`| 1
`64[.]32[.]8[.]68`| 1
`185[.]107[.]56[.]60`| 1
`52[.]23[.]46[.]39`| 1
`185[.]157[.]161[.]147`| 1
`185[.]107[.]56[.]57`| 1
`35[.]169[.]217[.]142`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`bright1[.]awsmppl[.]com`| 4
`brightgee[.]phatbois[.]biz`| 3
`checkip[.]amazonaws[.]com`| 2
`smtp[.]yandex[.]com`| 2
`ml[.]warzonedns[.]com`| 1
`epiccard[.]tech`| 1
`sarlelhassan[.]ddns[.]net`| 1
`stevesteves001[.]warzonedns[.]com`| 1
Files and or directories created| Occurrences
—|—
`%APPDATA%D19AB989-A35F-4710-83DF-7B2DB7EFE7C5`| 9
`%APPDATA%D19AB989-A35F-4710-83DF-7B2DB7EFE7C5Logs`| 9
`%APPDATA%D19AB989-A35F-4710-83DF-7B2DB7EFE7C5LogsAdministrator`| 9
`%APPDATA%D19AB989-A35F-4710-83DF-7B2DB7EFE7C5run.dat`| 9
`%ProgramFiles(x86)%AGP Manager`| 8
`%ProgramFiles(x86)%AGP Manageragpmgr.exe`| 8
`%APPDATA%D19AB989-A35F-4710-83DF-7B2DB7EFE7C5task.dat`| 6
`%System32%TasksAGP Manager`| 6
`%System32%TasksAGP Manager Task`| 6
`%TEMP%tmp.tmp`| 6
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupensptrbyxaelazb.vbs`| 4
`%APPDATA%hbmwcjzrpp`| 4
`%APPDATA%hbmwcjzrppensptrbyxaelazb.exe`| 4
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupzmpesqpigdgyqtc.vbs`| 3
`%APPDATA%hqwhhfunce`| 3
`%APPDATA%hqwhhfuncezmpesqpigdgyqtc.exe`| 3
`%APPDATA%MyAppMyApp.exe`| 2
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupncynfkdiseoqyjq.vbs`| 2
`%APPDATA%gjqcrsyeizncynfkdiseoqyjq.exe`| 2
`$Recycle.BinS-1-5-21-2580483871-590521980-3826313501-500desktop.ini.id[98B68E3C-2275].[recovermyfiles2019@thesecure.biz].Adame`| 1
`%TEMP%638094733462004000_0e17d79b-46a9-4d98-a066-dda3308efeb0.db`| 1
`%APPDATA%lpupw5gp.0lp.zip`| 1
`%APPDATA%lpupw5gp.0lpFirefoxProfiles1lcuq8ab.defaultcookies.sqlite`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupsosikeuywehiylb.vbs`| 1
`%APPDATA%ubrwzdoibysosikeuywehiylb.exe`| 1
*See JSON for more IOCs
#### File Hashes
`0aa0cbcf28aba3c9ea66255d21568dc834aee97f68d1071e7cc49c167e5f4430`
`1f73eb2dc88a5a499b95c95463428181c82612361c38490b9a749d5e6dd410a1`
`23064f9a8ba30be479e5890ec13b654d539098844e9c4a16409dbd4a015513c5`
`2348735813c9d79c4723a890b64468f68b448594574b9a70db7a6b9afe1bbb10`
`6a0dc109135a2a858cddc2b65387d3ad8d67ffc9325440c70eb1bc83f3ba9ef9`
`769a82395d916954845a5dbcce1783e30b50a35e9249081494dfdd8acb05f67c`
`843d2082b0ecfbfc99780647e82e5575e0371a2bef4ae06ca45e1afa559acc1a`
`88fc092603ca33d605af12e8c9722ae65801377dc5703a1fd9041c046c0ef5db`
`9ca16e853d60c67a4d6c379ce90d1a0492b28efc15ce89867a696937ddedd125`
`a28e0e11818bc375921d1d2a07a3128b4db509eb5a1340ebb6d8eeaf7c875707`
`b729dc2de3a09245553725e76a1d5da45456d6be6edf6a6c6b4ce0e922895d88`
`c277448c9e5e8699e9d25258fe07632cc150515afc96a4ac160781552b52460b`
`c873f96e97877322dab3712e7e32e652a5e7901c1fe41fa65cff80380bd39b52`
`c8dae9c8a95d171ce5520f7d1d8fc089cb06cb6cc238e63dc7b2ed0214855cd6`
`cd7ba4950c05210f3ce55da9466bd531319998be31ecbdab01df806d254ca64f`
`ebf129df20c2e7fc5eeb1c67a0d3184e5f0c022a52368be4a9ea06fe3341c57e`
`ecb34493e0db3c2cbf6602e183732f43cc1af8b6572244ed8aa2eb18f1de8bf3`
`f7a704fbd592324b3a2ea2d316db30463c47fe1c0c2039dbc13901a2ab9519ce`
`ff9a714c790ccd7c31eb5abb568dc79c9553ff3d99ac84050a62b0feebb6cb11`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.QuasarRAT-9983512-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 10 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTINTERNET EXPLORERSEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: FaviconPath`| 10
`SOFTWAREMICROSOFTINTERNET EXPLORERSEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: Deleted`| 10
`SOFTWAREMICROSOFTINTERNET EXPLORERSEARCHSCOPES
Value Name: DefaultScope`| 10
`LOCAL SETTINGSMUICACHE8252C64B7E
Value Name: LanguageList`| 10
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXTSTATS{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}`| 10
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`31[.]13[.]65[.]36`| 10
`31[.]13[.]65[.]174`| 10
`13[.]107[.]21[.]200`| 8
`157[.]240[.]241[.]63`| 7
`142[.]250[.]65[.]202`| 6
`142[.]250[.]80[.]99`| 5
`142[.]251[.]40[.]205`| 5
`142[.]250[.]176[.]206`| 2
`172[.]217[.]165[.]150`| 2
`142[.]250[.]64[.]78`| 1
`142[.]250[.]80[.]14`| 1
`142[.]250[.]81[.]238`| 1
`142[.]251[.]32[.]110`| 1
`142[.]250[.]65[.]238`| 1
`142[.]250[.]65[.]234`| 1
`142[.]251[.]35[.]174`| 1
`142[.]251[.]40[.]142`| 1
`142[.]251[.]40[.]110`| 1
`142[.]251[.]40[.]214`| 1
`142[.]250[.]65[.]246`| 1
`142[.]250[.]65[.]182`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`www[.]bing[.]com`| 10
`www[.]instagram[.]com`| 10
`www[.]youtube[.]com`| 10
`www[.]facebook[.]com`| 10
`m[.]facebook[.]com`| 10
`r20swj13mr[.]microsoft[.]com`| 10
`www[.]eklinkk[.]net`| 10
`www[.]eneskeles[.]net`| 10
`fonts[.]googleapis[.]com`| 7
`static[.]cdninstagram[.]com`| 7
`i[.]ytimg[.]com`| 6
`accounts[.]google[.]com`| 5
`fonts[.]gstatic[.]com`| 5
Files and or directories created| Occurrences
—|—
`%System32%driversetchosts`| 10
#### File Hashes
`19efdda9ec1232653d64ad9f6d3d8813904ddd9995df3e697e49ae4f267622b0`
`53b741a52f88d7e0f01dd4f5bcffac6882668922a45ecb1bc2e7275778afd599`
`6a625df2a22684ec5c95df37818afc44ca1d7aca39e8011b7c0287c369588728`
`99f9e4ecd9882db1a05327c07481941e8a4ce22dfdef90c15e9d200d9c79cbdd`
`ae8220d48eb72043bdfc4fd965fce63a668cdd281553c6a93aaf574af554881a`
`c37ff695876f126cc4f6b627a54f2a0bfd68983243b87d8e078143609c26f6a1`
`ceecc1833d5bd98f7377e20514c3574e5e7baa11462fb952be29b2d7d2be10af`
`ceeddc45a3e52e50445abfd568287edf87649fa4e94d75d3a4533a7396ae1604`
`e237afed733f19fb87d226904faa1f6b13a9279db2970aa9821bd7ba03a61487`
`f707db5c91e9f1e70effecb99ae6d8101cb2343779df3b06eba56311bde64a41`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *Read More

