
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 2 and June 9. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, [Snort.org](), or [ClamAV.net]().
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found [here]() that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.
The most prevalent threats highlighted in this roundup are:
Threat Name| Type| Description
—|—|—
Win.Virus.Ramnit-10003937-0| Virus| Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It can steal browser cookies and attempts to hide from popular anti-virus software.
Win.Packed.Zusy-10003901-0| Packed| Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as “explorer.exe” and “winver.exe.” When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Malware.Zbot-10003849-0| Malware| Zbot, also known as Zeus, is a trojan that steals information such as banking credentials, using methods like key-logging and form-grabbing.
Win.Packed.Upatre-10003658-0| Packed| Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
Doc.Downloader.Valyria-10003621-0| Downloader| These variants of Valyria are malicious Microsoft Word documents that contain embedded VBA macros used to distribute other malware.
Win.Ransomware.Ryuk-10003991-0| Ransomware| Ryuk is ransomware known for targeting large organizations and asking for rather large ransom payments to recover the encrypted files. The infection has been associated with emails that contain malicious attachments that first deliver Emotet, which is used to deliver modular payloads such as Ryuk. Ryuk encrypts a user’s files using AES-256 + RSA2048 encryption algorithms.
Win.Packed.LokiBot-10003974-0| Packed| Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from several popular applications. It is commonly pushed via malicious documents attached to spam emails.
Win.Dropper.Nanocore-10003611-0| Dropper| Nanocore is a .NET remote access trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, downloading files and recording keystrokes.
Win.Dropper.Glupteba-10003588-0| Dropper| Glupteba is a multi-purpose trojan that is known to use the infected machine to mine cryptocurrency and steals sensitive information like usernames and passwords, spreads over the network using exploits like EternalBlue, and leverages a rootkit component to remain hidden. Glupteba has also been observed using the Bitcoin blockchain to store configuration information.
* * *
## Threat Breakdown
### Win.Virus.Ramnit-10003937-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 19 samples
Registry Keys| Occurrences
—|—
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: AntiVirusOverride`| 19
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: AntiVirusDisableNotify`| 19
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: FirewallDisableNotify`| 19
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: FirewallOverride`| 19
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: UpdatesDisableNotify`| 19
`SOFTWAREWOW6432NODEMICROSOFTSECURITY CENTER
Value Name: UacDisableNotify`| 19
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONPOLICIESSYSTEM
Value Name: EnableLUA`| 19
`SYSTEMCONTROLSET001SERVICESSHAREDACCESSPARAMETERSFIREWALLPOLICYSTANDARDPROFILE
Value Name: EnableFirewall`| 19
`SYSTEMCONTROLSET001SERVICESSHAREDACCESSPARAMETERSFIREWALLPOLICYSTANDARDPROFILE
Value Name: DoNotAllowExceptions`| 19
`SYSTEMCONTROLSET001SERVICESSHAREDACCESSPARAMETERSFIREWALLPOLICYSTANDARDPROFILE
Value Name: DisableNotifications`| 19
`SYSTEMCONTROLSET001SERVICESWSCSVC
Value Name: Start`| 19
`SYSTEMCONTROLSET001SERVICESWINDEFEND
Value Name: Start`| 19
`SYSTEMCONTROLSET001SERVICESEFS
Value Name: Start`| 19
`SYSTEMCONTROLSET001SERVICESMPSSVC
Value Name: Start`| 19
`SOFTWAREWOW6432NODEMICROSOFTWINDOWS NTCURRENTVERSION
Value Name: jfghdug_ooetvtgk`| 19
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: JudCsgdy`| 19
`SYSTEMCONTROLSET001SERVICESWUAUSERV
Value Name: Start`| 19
`SOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: Windows Defender`| 19
`SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: Userinit`| 19
`SOFTWAREWOW6432NODEMICROSOFTWINDOWS NTCURRENTVERSIONWINLOGON
Value Name: Userinit`| 19
Mutexes| Occurrences
—|—
`{7930D12C-1D38-EB63-89CF-4C8161B79ED4}`| 19
`{79345B6A-421F-2958-EA08-07396ADB9E27}`| 19
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`46[.]165[.]254[.]201`| 18
`72[.]26[.]218[.]70`| 18
`195[.]201[.]179[.]207`| 18
`208[.]100[.]26[.]245`| 18
`35[.]205[.]61[.]67`| 18
`206[.]191[.]152[.]58`| 18
`72[.]251[.]233[.]245`| 18
`142[.]250[.]80[.]46`| 18
`162[.]249[.]66[.]21`| 18
`45[.]79[.]19[.]196`| 4
`198[.]58[.]118[.]167`| 4
`96[.]126[.]123[.]244`| 3
`45[.]33[.]23[.]183`| 3
`45[.]33[.]2[.]79`| 3
`173[.]255[.]194[.]134`| 3
`45[.]33[.]20[.]235`| 3
`72[.]14[.]185[.]43`| 3
`45[.]33[.]30[.]197`| 2
`72[.]14[.]178[.]174`| 2
`45[.]56[.]79[.]23`| 1
`45[.]33[.]18[.]44`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`google[.]com`| 18
`testetst[.]ru`| 18
`mtsoexdphaqliva[.]com`| 18
`uulwwmawqjujuuprpp[.]com`| 18
`twuybywnrlqcf[.]com`| 18
`wcqqjiixqutt[.]com`| 18
`ubgjsqkad[.]com`| 18
`iihsmkek[.]com`| 18
`tlmmcvqvearpxq[.]com`| 18
`flkheyxtcedehipox[.]com`| 18
`edirhtuawurxlobk[.]com`| 18
`tfjcwlxcjoviuvtr[.]com`| 18
Files and or directories created| Occurrences
—|—
`%LOCALAPPDATA%bolpidti`| 19
`%LOCALAPPDATA%bolpidtijudcsgdy.exe`| 19
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupjudcsgdy.exe`| 19
`TEMPqMFJQ3E`| 19
#### File Hashes
`06148818f98f51bcd14a7b92ae2ed10d0bec53e3e3c3f61cd237e481f82c0d32`
`0d0a7f29e2670fbe81142948619e4eeafbd7665640f72b7c7c65c7351d4f4018`
`0db3b8a863fecf11852063a528c06760a6036bf0b59c3e7098e4d9663f6be9b7`
`12010b190837f9a739023874b3050d5302256478b4a2b118ebe6b985a63a3d88`
`3868284340c86e65f2123d8c28b12b8cc6bcf3d4ce78a7fe172066dd1aa54a86`
`3a3af352a97262fbf28da273ab68b7ce8b20c6684c9af3366629d08306d89c33`
`3aa9915ca67ab0a4e2f39abeea140aa6b572a56101401f77c2e71a176e8a343b`
`5a3a5256f59dc95a179b57b2153814492fdfc3236ebe059497785d7d1bc7d5ef`
`5d8da870059a98227317238c0d55fd72e56991df2e7d5000e4d1e8b928ac3d58`
`62b22a8010083fb6892e76e975f65ee3dd19b814fe26388e11d3ae7d9464b6f4`
`735e73cf6f2feb06e0ea685e3470cab216e5e716e055b06e1def285e6d6013c2`
`802ac9bbe5a0aa104f81b94789bf45d1901ac9e9508239fb2497ba118553b9a7`
`818d517ec1eaf19125c90a296cf03b5f24d7a4a0c09ac602f2057d02653b54d0`
`866f4dc906a46ef7c7d66ba04f789ab73addd75f796acb2053ab26ad6808ca87`
`a0e670deda039e728698d0bd77d675bb43b2ba59ad7072df420679702aad5b6f`
`aabda214459610e3f99d7010fa6e1aa3c14b516d5931a247497e164061d4ea78`
`ad141e9754ffc131fc78c926b5b939cb0c1da8a2fa7b5c186e3e7b948dfbad59`
`d855760b6d0d9960c9926d4cc54b2db0812262041fc8c63bb164d75a99323fd0`
`f67ea22f1630d61e9f77d154fbe98d67978d36b6e08ac8f898996bfc88334ee5`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Packed.Zusy-10003901-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 26 samples
Mutexes| Occurrences
—|—
`Global`| 26
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`45[.]15[.]157[.]147`| 9
`45[.]15[.]157[.]131`| 7
`45[.]15[.]156[.]170`| 5
`172[.]67[.]75[.]172`| 2
`176[.]123[.]9[.]142`| 2
`104[.]26[.]13[.]31`| 1
`94[.]142[.]138[.]4`| 1
`5[.]154[.]181[.]54`| 1
`5[.]154[.]181[.]39`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`api[.]ip[.]sb`| 3
`guongelasenne[.]shop`| 2
Files and or directories created| Occurrences
—|—
`%LOCALAPPDATA%Yandex`| 13
`%LOCALAPPDATA%YandexYaAddon`| 13
#### File Hashes
`1c71e9931848f48aad664d040cfc4aad4ba16bb51e025260402bfb7c48da384f`
`29a5153d6f84d6f5c377b2c63e8e36f4df259de9f9ecbc4742e0b91f69927472`
`2a988d986f530d6005bd904674c86f56ad319073f912c73c8a85eac9e6b83bd8`
`4894acaf378a905a66f58363b62f6c15114105ad32eff416ca882eebbf5c4a6f`
`4c8b74d8bda98ef787f8b00a4378fb7eda2562d3effce4dc49b68fc20d5cb9dc`
`5291640da9164fa51f930cce3108dc619f0fba6bf362f4b2e4af4a05798f4136`
`6b5f8229b2347cb6a106ad4a531400541265f1081eb9d3e396565f3712b95f41`
`6d4819c3cd10adaced6a56b61be1798502f956fb72f6a12dfa3977caacc58c3c`
`74d44b2efd64c3fe0d3efad1c6dcb1e4a6f33cc8ca9aab2c4d6e6a71f8530348`
`74ed62fbb15df9fe0add0406f468763fa5eac405442a13e5760b08f4ffc27923`
`7665128519d49eb1f5163d25cc4d7e714acc7e54fb9981a34bd072b326373d30`
`76955cf8d50051264cf788f0ac30759a7b649f94cde8026bd0db04bc2cfdb1ba`
`786b41d5cf21945a248441d5399e8f73e4942340ac830f689131a22e99f3830f`
`8c585bd8737ad360171f432d99d9956a81359f19805c036f235114fddc9fe100`
`910022461f1df0c7b35f8989466e56ee45a00619970e8a1283ff8cc2f20d28e6`
`936a8a99ea8442e2c99f59472b079b8d421400a847da07c9c862912a5462588d`
`9dde8babb0deaefcbdb486b211cec17481c0c83b87d2fa525f97faa8be2c2b8b`
`9f07595bd50329ee24499caaac018cd47de494dff4fb70db28eb3791fe027456`
`b1780701caae81b5c1273e811a325fb0be44e8106eb4687d47d3e1bfe151ed2a`
`be53c224313077b536f444663754ff2fa8e13e3ac34ec544cf63d627e8eee8ce`
`ca2b4c008f9a7378c5f5cbb18034569e0c092f2aa267f3dc49e442637edca4f2`
`dc7859f512d405c6e2fcdd13a876c5e7177fe8d63f9367ebf6c3bc7b920e2d11`
`dcef4ecf58ba5e9383ed5466f2583b457de189b91302d7e36c3eb114052e678d`
`e033d499892e6303ceeeefb7d54e35f263838e68dd75fd5d4f01a4c0b6fe7a84`
`ed96b5ea4373e5b3569ebb2758bf02c2ec6507198ed650435af90199af25c4d8`
*See JSON for more IOCs
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Malware.Zbot-10003849-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 19 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: {2EC645E8-BA31-AD44-55BA-04D54CAC27C8}`| 5
`SoftwareMicrosoft`| 5
`SOFTWAREMICROSOFTHASELA
Value Name: 15g98acf`| 1
`SOFTWAREMICROSOFTHASELA
Value Name: 2b9j8h79`| 1
`SOFTWAREMICROSOFTMYEV
Value Name: 3681g598`| 1
`SOFTWAREMICROSOFTMYEV
Value Name: 14086jd2`| 1
`SOFTWAREMICROSOFTHASELA
Value Name: 1986jd4h`| 1
`SOFTWAREMICROSOFTMYEV
Value Name: 32hej976`| 1
`SOFTWAREMICROSOFTEWJI
Value Name: 22fgba7e`| 1
`SOFTWAREMICROSOFTEWJI
Value Name: 1a87b40`| 1
`SOFTWAREMICROSOFTEWJI
Value Name: 26afjc78`| 1
`SOFTWAREMICROSOFTOWQE
Value Name: 1h6222j8`| 1
`SOFTWAREMICROSOFTOWQE
Value Name: adcbh3i`| 1
`SOFTWAREMICROSOFTOWQE
Value Name: 2130e0ga`| 1
`SOFTWAREMICROSOFTYCRO
Value Name: 3617de7j`| 1
`SOFTWAREMICROSOFTYCRO
Value Name: 13gj76b9`| 1
`SOFTWAREMICROSOFTYCRO
Value Name: 32bdb4gh`| 1
Mutexes| Occurrences
—|—
`Global{C30C6CF2-932B-408E-55BA-04D54CAC27C8}`| 5
`Global{73DE6ED9-9100-F05C-55BA-04D54CAC27C8}`| 5
`Global{A9348FD8-7001-2AB6-55BA-04D54CAC27C8}`| 5
`Global{A9348FDF-7006-2AB6-55BA-04D54CAC27C8}`| 5
`Local{C8D239CA-C613-4B50-55BA-04D54CAC27C8}`| 5
`Local{C8D239CB-C612-4B50-55BA-04D54CAC27C8}`| 5
`GLOBAL{}`| 5
`Local{}`| 5
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`194[.]94[.]127[.]98`| 5
`99[.]103[.]42[.]49`| 5
`108[.]83[.]233[.]190`| 5
`81[.]136[.]230[.]235`| 5
`1[.]186[.]47[.]244`| 5
`80[.]252[.]59[.]142`| 5
`69[.]36[.]201[.]244`| 5
`76[.]106[.]141[.]113`| 5
`69[.]132[.]202[.]147`| 5
`64[.]219[.]114[.]114`| 5
`87[.]5[.]135[.]46`| 5
`65[.]34[.]235[.]106`| 5
`180[.]247[.]151[.]5`| 5
`190[.]38[.]87[.]207`| 5
`142[.]250[.]176[.]196`| 4
`190[.]33[.]36[.]175`| 3
`161[.]184[.]174[.]65`| 3
`89[.]228[.]231[.]108`| 3
`186[.]47[.]175[.]67`| 3
`13[.]107[.]21[.]200`| 2
`71[.]42[.]56[.]253`| 2
`202[.]80[.]43[.]247`| 2
`50[.]147[.]96[.]104`| 2
`173[.]212[.]188[.]17`| 2
`142[.]250[.]64[.]68`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`www[.]google[.]com`| 5
`www[.]bing[.]com`| 4
`fuvkkvvsbiozqkkbymrxgpkzvstgt[.]info`| 1
`wsojvgontopjhzhwoxxojblpj[.]biz`| 1
`rwnfpdydqkvxfahfybislz[.]org`| 1
`rskbqhhmgejbtkcelndededuqcyluc[.]org`| 1
`vgxtcqlwtnzqcdfefelrjv[.]net`| 1
`ukdprmromnucbwxghidulh[.]info`| 1
`tejbeagmhtvspfgiqobecekzmfh[.]biz`| 1
`wojnylnvgpvhqprjvdatlbropto[.]com`| 1
`hqkdkznsctlblbbqxphizxcux[.]ru`| 1
`ljmbhvslffmpzzhpnnfaugqxzdtcy[.]ru`| 1
`jbeaewovgwolreanrtpnhcufuyl[.]com`| 1
`havwofgivkuktomvztibykzvh[.]biz`| 1
`aqppxopjwkhqgahekvswlrojem[.]net`| 1
`orsgljbmtoabaonyjfgqdafaqk[.]info`| 1
`fuxwamlnfoffmxgdvvshmuoucmn[.]org`| 1
`xauwfyplbprdmrdswpnxtemde[.]org`| 1
`rvbuvwjrjznvnbqsjbxozsw[.]biz`| 1
`wojibbavgtkhyhaisgpfsai[.]net`| 1
`nzxjxolruskfsgguwkppbptz[.]com`| 1
`hqqdxifwoytzdnribypnxkqc[.]com`| 1
`xkshwsonwzphufsydaulj[.]ru`| 1
`tctxnvnfypqoguqwlwswspbmpdu[.]ru`| 1
`fmrggmtctchyllkzhqtiifhqvkib[.]com`| 1
*See JSON for more IOCs
Files and or directories created| Occurrences
—|—
`%TEMP%tmp.bat`| 5
`%APPDATA%`| 5
`%HOMEPATH%AppDataLocalLow`| 5
`%APPDATA%.exe`| 5
#### File Hashes
`0638ccf6ab30044979265a6c249045a807f797f795cd35c6662f1368351704a7`
`08de3e8b52a1ae5a70c36e9e0c119d54f1e412667aee3d75384bf23625ee4368`
`179c6808ca96450adc50593587f3657158b95e0b7b18d57a17ca1ecd6467ab42`
`1d9b7783b5aa2fc027982ef8147b80ae3fbae04b8beef0e6f10d29884f47dd42`
`1fcb36bbf70e6b2048157b80f87b670a7ec3f12a1f05ec09e1a9a3560e6013cd`
`2e6982f483a07e50820ff992014d66785db20a07b720d69d858286aa66570344`
`3c3e1b42700ae8b0f8c8fd67296449f5bade0ff6696bad03061a87aa0449e7d9`
`78e2e9fea0dce051e9c54712869a7c219f9587040f92d60b9394e3c01b6f4d7e`
`83b94be137857db80c5c5c56bde288660eb57ae78db520af32101b12949f43b3`
`a8f8541231e010480d10deeca483f669b3705eb9f9155a285fc885cfb3c5f065`
`b1df831bcdfebfa7ca46092e3de13d4916bee6ad5880c5fefcf4d22a0f02ad54`
`b6419fc237fab15ffd1f5387040a7d7d2987280f28cea1fdfd5615240a3cf3c4`
`ba141c89b3ce1b23b425999d8362d368765fdb8c827d5b75e47cdd95a41e45cc`
`ce4a87af49e6ea05fce91ad4a43c2d9fa68cca54c2560e9c3cd1864c83064cae`
`ce5a9cf18cb500ad6f6411d5f3d37d1f6a4f73f19132aaa36d26db01fd9d47ec`
`da34f5a540b1a271dde98a8e7ae9a64025ba7e2154b071de38361049346200f1`
`e5f55ad1027078b8492c0d09e98816ee64aecea385d1c9053bdc7bc9a4fc416f`
`eab7b0d16f2933cdee9a4ee95b264b31526e0a5e131b7e49060df93b790980a3`
`f6b7f84a31b530e08a419afe6d4b228f4a2271e6e9075f5af20a3985467b6537`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Packed.Upatre-10003658-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 105 samples
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`93[.]185[.]4[.]90`| 104
`193[.]122[.]130[.]0`| 29
`193[.]122[.]6[.]168`| 21
`132[.]226[.]247[.]73`| 21
`158[.]101[.]44[.]242`| 21
`132[.]226[.]8[.]169`| 17
`176[.]36[.]251[.]208`| 14
`24[.]220[.]92[.]193`| 12
`67[.]222[.]197[.]54`| 11
`69[.]163[.]81[.]211`| 11
`67[.]221[.]195[.]6`| 11
`76[.]84[.]81[.]120`| 10
`67[.]206[.]96[.]68`| 9
`216[.]254[.]231[.]11`| 9
`72[.]171[.]9[.]146`| 9
`67[.]207[.]229[.]215`| 8
`85[.]135[.]104[.]170`| 8
`104[.]174[.]123[.]66`| 8
`24[.]33[.]131[.]116`| 8
`84[.]246[.]161[.]47`| 8
`67[.]222[.]201[.]222`| 8
`162[.]153[.]189[.]143`| 8
`69[.]8[.]50[.]85`| 8
`72[.]230[.]82[.]80`| 7
`64[.]111[.]42[.]64`| 7
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`checkip[.]dyndns[.]org`| 105
Files and or directories created| Occurrences
—|—
`%TEMP%guzakbet.exe`| 105
#### File Hashes
`0000184c2bf83493ce58794679be94ee431ab23d45685b7dcfa64c35e2a1fcab`
`014ab5c4620483729398a175ae10660faeb5bf7efd68e882859e81a585870d02`
`01f780ea7234c9196814cb5a7f0f58282966f913ef23121a785169992bb6437c`
`023d61e66aed8846590d7fd1e185d72864fccfcfc2540b259ad023c199b67173`
`0242d3e659006128358a7531dc5fdcb71561b2a82512ed21c6283731fc5a7716`
`03f1bd10d5036123120fe3fcc0c84ef26d4f6b9e9506b33b0851c78d2deb0f0d`
`06075bf7b39f70f68a36f5ae808c4b70824559e60bd63b241bf7f838ebe67602`
`06df2ad130f7d346c1ad75b341dccf51640acd5aca5126f6476ffad517fbe3aa`
`0858a55586120cb9e7827c540e07078af4ac697f70ab53546a15187126afe5bd`
`09736ce208d4bcbe7f4a18c21749aa4ed23d2724b164aaa289bea73af5d127fa`
`0a8609cb85233a683e73a94544c2152e0f0f83c847e61a77fa787fa7cc7bf678`
`0c6f859f4bd0351d596342a635d6e28ca457da90aac6248b4a55770715adab54`
`0cba2641937df34648711938c327a7565095891322b877ee46e94eb8f0207597`
`0cdf031f6415c1ab3e3c804a4af403b9b196906c77e1915b4cc82b3ed1638861`
`11e1fa7640fb1705c67740344fe19de354efcb0c8e12ffae9dc76b77ff4bdcb0`
`12679751aa2c8fbcbe32d17e9e3d61b8274514dc0866645096ab6c9b47975057`
`12ce1cb11a4ae1201fe972607698b42418ebae504b24654e95f65680072bf1dd`
`12ee667b11450888a07f348eb46fa075c0bef95c57654769301e9287a4aa20fa`
`13f610014a486c7e6585ffa2cda3d455bf59d36ed6eb144cbd0c9e7933acb927`
`16d0e440f0d0145804f56fe9651b9ee71252ee53d615030c93f36d959e923f0c`
`17fbf17ee60022aacc492fdc406dd28bff8ac8a89614159bbca0c89acbbd9cd0`
`1b5e0b2583fac04db8c84ad0970066cf42233437ce05b11a3752ffbfee2d76b6`
`1c48286e5605c2f5f300f6267bd4abb8db72bd1963b0100930d6802b4c8f0363`
`1c6af8fab4c4ed60ddbe41d90a6dad4cf442d38bb59bb17884445a8479f7f7fc`
`1d2b14e902557a04a501ccee11c9327d27c1e3247c275406e7c12e5b13e5f08c`
*See JSON for more IOCs
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Doc.Downloader.Valyria-10003621-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 16 samples
Registry Keys| Occurrences
—|—
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTRECOVER
Value Name: Name`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTRECOVER
Value Name: Path`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTRECOVER
Value Name: Extensions`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWRDPRFCTDOS
Value Name: Name`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWRDPRFCTDOS
Value Name: Path`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWRDPRFCTDOS
Value Name: Extensions`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWORDPERFECT6X
Value Name: Name`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWORDPERFECT6X
Value Name: Path`| 16
`SOFTWAREWOW6432NODEMICROSOFTOFFICE14.0WORDTEXT CONVERTERSIMPORTWORDPERFECT6X
Value Name: Extensions`| 16
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERSTARTPAGE
Value Name: StartMenu_Balloon_Time`| 1
`SOFTWAREMICROSOFTOFFICE14.0WORDRESILIENCYDOCUMENTRECOVERY8BC0208`| 1
`SOFTWAREMICROSOFTOFFICE14.0WORDRESILIENCYDOCUMENTRECOVERY8BC0208
Value Name: 8BC0208`| 1
Mutexes| Occurrences
—|—
`Local10MU_ACB10_S-1-5-5-0-67863`| 16
`Local10MU_ACBPIDS_S-1-5-5-0-67863`| 16
`LocalWinSpl64To32Mutex_10960_0_3000`| 16
Files and or directories created| Occurrences
—|—
`%LOCALAPPDATA%MicrosoftWindowsTemporary Internet FilesContent.Word~WRD0000.doc`| 16
`%TEMP%.tmp`| 16
#### File Hashes
`07a207d41d5669719706ae493e174c74252cb42b8139c97726edb721942901d7`
`098833c966a76c0b54818a472507c96d274f4ac6c93a428aaa65fb9dfb5984a1`
`20657c7da5149507db1c410432cacb916fb109616f74ade4d95caeb2d9dc5dc1`
`23b5d97be4f74c16ac98a931c3997d0c6fa3aa5e703db2d2dac224a2e310a84c`
`25c57508a437ecb742ea8f1772466127aba604cf6b02d73937181c35cd5508c6`
`34bd0b0976be0df40c197b1933c3080245208df18a9fe66e74fe46631159aa0d`
`3b3a789fe9d6d3bb526243af373bc36ef169e01068f2df9153669cf3bcebbab0`
`46a139afae1f3f5a9a8c82311a5453aead22f3d8209c01d5c5c69626c4a56fb5`
`5711ce07377f183293ef7e3598f9b7f06d562e4dddb301fbb75718d0fba0930a`
`6b1b0d48bc95a2068a506218a7eba91670b4d462e8e149cf7c9d1b0bdfb7d00c`
`726fb562b5bc3a73709947bd5422d188d2ec5adc0425cfdf189200fae56b8591`
`7637d57389c1436e16c045d30151dca6027975112e0c0132ea5ccff2071d81d1`
`938390d91eea8cb1b605b1040aa44bc62368b3dad6b59e495e8bfd462cf74d05`
`b2f975840dc1e961a6f9e63f32bc02ccc88af0bf33b8bffcbda147c96e6651fa`
`bdc72b3bc3f55b0166abe6a449727351bed7327624efedc4e76acaeb5f1b7b86`
`cb7aefb789788152ad2a80efdbc50a2527a1cb57cdd37203029b2482d040eeb2`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| N/A
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Ransomware.Ryuk-10003991-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 15 samples
Mutexes| Occurrences
—|—
`rykmutex`| 14
Files and or directories created| Occurrences
—|—
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupryuk.exe`| 14
`%ProgramData%MicrosoftWindowsStart MenuProgramsStartupryuk.exe`| 14
`%ProgramData%ryuk.exe`| 14
`%System32%TasksRYUK`| 14
`%System32%Tasksryk`| 14
#### File Hashes
`0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09`
`557013f396529759dfe68b14246f96d448623fbadc75052a7892a34c60a2758a`
`5a0c6b1b2235159f7b144ad1aee1c084c7914b1e1f294c4cbad7a163df3081cf`
`5b12f08466104a9318ceed9a4ff13f1c1fdbcf734e3b5533dd1e86dad213da1f`
`5fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae`
`750bbdf6d68ab7df6e55ea92090328af5d02d4a2c1158cee5ee7190f5c785c1e`
`775745a0c067961761fa0fba5a2bef456413cd9096906d8772d4b9da6bf5e8b6`
`8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe`
`be1b021843326399a29f22897b25162986389905d25102c47a7d7a5853cc315a`
`c293249b528d552bbad69228ffb8b823163f35db8eb79498ab9307f490ea8cf6`
`d1600035b5cead621bc33e7024a4bb9ecf6a9583f23aaabb98e393ccfbac9601`
`da6b32948b1c01dbf1b5322199a935b8bbd8d6514ffc43ff5355f22eeed1f171`
`ee864a8610aea416b02ae7959606775444af70f3e424315edf3463c87e66f4c3`
`f534d1038be3bf9e0909d28ed1acb77825d1424b691a9259f4b7f605e105aaea`
`fe4547b20cf40de0e33ed545949f3e0dfef815b5add252d233177386910643a6`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| N/A
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Packed.LokiBot-10003974-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 16 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: efbng`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: aCcAwFD`| 1
Mutexes| Occurrences
—|—
`3749282D282E1E80C56CAE5A`| 3
`jDpDPnOkffrC`| 1
`XUFjBW`| 1
`fqBVRTwaHZHtrCfkQpOiNQIvCL`| 1
`xIumJSsKuOAlYSHwskpJ`| 1
`SKfeirAyTRLShRHdbvBVtbvsraX`| 1
`aIkjkqIVKPdZEKabRIYzdZ`| 1
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`213[.]165[.]67[.]102`| 2
`64[.]185[.]227[.]155`| 2
`185[.]246[.]220[.]85`| 2
`193[.]9[.]21[.]124`| 1
`193[.]122[.]130[.]0`| 1
`132[.]226[.]247[.]73`| 1
`104[.]237[.]62[.]211`| 1
`185[.]246[.]220[.]60`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`api[.]ipify[.]org`| 3
`checkip[.]dyndns[.]org`| 2
`smtp[.]ionos[.]es`| 2
`mail[.]fiziopet[.]si`| 1
Files and or directories created| Occurrences
—|—
`%System32%TasksUpdates`| 4
`%TEMP%tmp.tmp`| 4
`%APPDATA%D282E1`| 3
`%APPDATA%D282E11E80C5.lck`| 3
`%APPDATA%MicrosoftCryptoRSAS-1-5-21-2580483871-590521980-3826313501-500a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5`| 3
`%APPDATA%zqxqdlu2.oka`| 1
`%APPDATA%zqxqdlu2.okaFirefox`| 1
`%APPDATA%zqxqdlu2.okaFirefoxProfiles`| 1
`%APPDATA%zqxqdlu2.okaFirefoxProfiles1lcuq8ab.default`| 1
`%APPDATA%zqxqdlu2.okaFirefoxProfiles1lcuq8ab.defaultcookies.sqlite`| 1
`%APPDATA%sbxsrkxv.nfz`| 1
`%APPDATA%sbxsrkxv.nfzFirefox`| 1
`%APPDATA%sbxsrkxv.nfzFirefoxProfiles`| 1
`%APPDATA%sbxsrkxv.nfzFirefoxProfiles1lcuq8ab.default`| 1
`%APPDATA%sbxsrkxv.nfzFirefoxProfiles1lcuq8ab.defaultcookies.sqlite`| 1
`%APPDATA%efbng`| 1
`%APPDATA%efbngefbng.exe`| 1
`%APPDATA%XwGFCFzeTqkeUe.exe`| 1
`%APPDATA%vhnjipHhvAgPbD.exe`| 1
`%System32%TasksUpdatesXwGFCFzeTqkeUe`| 1
`%System32%TasksUpdatesvhnjipHhvAgPbD`| 1
`%APPDATA%wvd2jiis.qhp`| 1
`%APPDATA%wvd2jiis.qhpFirefox`| 1
`%APPDATA%wvd2jiis.qhpFirefoxProfiles`| 1
`%APPDATA%wvd2jiis.qhpFirefoxProfiles1lcuq8ab.default`| 1
*See JSON for more IOCs
#### File Hashes
`2bed887fca5ae34bb249eb750e20b7542c9209a169745ad2bd9176618042f8ee`
`34efc543781328d0d7161f144577197ea501c83974cc4edc0df012273d758d9a`
`3a826443754835af98b522ef9648a2602e6ef02a6da8138c71ec6780a09fd499`
`46481912ad5fa03359e9e75c73502e78a8c50fb3e809ddb53c10807c4226855f`
`4be6b367cd8fbbd9b5b047a1581775dc0157188fbea49760ce60abff3c4bd79b`
`62ed901f438fc72b696fd6fafaa0d7fa8b1d5a6b96a281844effc456de3ada1f`
`8f4c439db759beb01af1ec4d073406792073028abf8fbca33867396a499ca70a`
`9039395504a883d92a51c3abcc21e65191a1237d58d5cc36aa205a2696a7fd6a`
`961d2c3c698385223f128f5caa0e9a8260cefb0b8a29664f219d64fdcba7941e`
`ad641230d3be8895193642d333ed88e1d6e94c209dfcb6c1932cd6a7f324a82f`
`ad84a593f03c9a1ee16ea026718cbc46d921acdb940e49c7a78b26abf4dfd3b5`
`b0f38fbfb54d1735e9cb425df68fe633ed49c562176317d36bcfaea1095ef6ea`
`c4ef2ace35064a224b5ecaf23baef88a1095190ae3d9639a388e9b21196c8b9c`
`d0a263bd80d2a49060b909ea51211f258668930fcd799b28f8490d784db7c31d`
`e8b8b962c35b011fdd5a2154a43d468a8c00efe547f89c79b0d1f4b62677eb49`
`ee63ce54918a139d72523b3c11a62e00a1cc1573c01f4ac7bc4decaca7eed021`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| N/A
WSA| N/A
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.Nanocore-10003611-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 20 samples
Registry Keys| Occurrences
—|—
`SOFTWAREWOW6432NODEMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: AGP Manager`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERTASKBAND
Value Name: FavoritesVersion`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: newapp`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERTASKBAND
Value Name: FavoritesChanges`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: YLcqPJe`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: MmRKwR`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERTASKBAND
Value Name: FavoritesResolve`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONEXPLORERTASKBAND
Value Name: Favorites`| 1
`SOFTWAREMICROSOFTWINDOWSCURRENTVERSIONRUN
Value Name: sOFvE`| 1
Mutexes| Occurrences
—|—
`Global{0d867adb-3500-4c95-b576-70e197aae229}`| 1
`SBmdTDfceAO`| 1
`dguPijsTgw`| 1
`O64O3T231GHA5GE5`| 1
`urTYJlYpYYNDkAVkNuNKf`| 1
`kHCbAyHopHm`| 1
`fsmTWPRqOirFDgctmfcTeCy`| 1
`AeqWcHrmYllWoFRInLc`| 1
`zfBIOx`| 1
`tIJFKdFWJdJzxCITKNerlYSxEC`| 1
`hmRipQYdtfQNsUPHFxksrc`| 1
`gtRQfGqEtQfZ`| 1
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`64[.]185[.]227[.]155`| 3
`23[.]193[.]194[.]148`| 1
`173[.]231[.]16[.]76`| 1
`104[.]237[.]62[.]211`| 1
`162[.]241[.]60[.]79`| 1
`46[.]105[.]157[.]241`| 1
`45[.]12[.]253[.]242`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`api[.]ipify[.]org`| 5
`apps[.]identrust[.]com`| 1
`mail[.]nereus[.]cl`| 1
`ucnano180523[.]ddns[.]net`| 1
`mail[.]sgsbauto[.]com`| 1
Files and or directories created| Occurrences
—|—
`%TEMP%tmp.tmp`| 8
`%System32%TasksUpdates`| 7
`%APPDATA%MicrosoftWindowsIECompatCacheread_it.txt`| 1
`%APPDATA%MicrosoftWindowsIECompatUACacheread_it.txt`| 1
`%APPDATA%MicrosoftWindowsIEDownloadHistoryread_it.txt`| 1
`%APPDATA%MicrosoftWindowsIETldCacheread_it.txt`| 1
`%APPDATA%MicrosoftWindowsLibrariesread_it.txt`| 1
`%APPDATA%MicrosoftWindowsPrivacIEread_it.txt`| 1
`%APPDATA%MicrosoftWindowsRecentread_it.txt`| 1
`%APPDATA%MicrosoftWindowsSendToread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsAccessoriesAccessibilityread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsAccessoriesSystem Toolsread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsAccessoriesread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsAdministrative Toolsread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsMaintenanceread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsStartupread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart MenuProgramsread_it.txt`| 1
`%APPDATA%MicrosoftWindowsStart Menuread_it.txt`| 1
`%APPDATA%MicrosoftWindowsThemesread_it.txt`| 1
`%APPDATA%MozillaFirefoxProfiles.defaultbookmarkbackupsread_it.txt`| 1
`%APPDATA%MozillaFirefoxProfiles.defaultread_it.txt`| 1
`%APPDATA%MozillaFirefoxProfiles.defaultwebappsread_it.txt`| 1
`%APPDATA%MozillaFirefoxread_it.txt`| 1
`%PUBLIC%Documentsread_it.txt`| 1
`%PUBLIC%MusicSample Musicread_it.txt`| 1
*See JSON for more IOCs
#### File Hashes
`10090f0b186fb4818b017583c10e21e56ac1a9365020211c619bfc652fab01fb`
`1d1639113b0f01d2044ab2b41b3198a73497245faba4364ae7ea10a0ef39b267`
`1f96eaeda59db9e5803a11f4d045b309aed1e4d63e9952af0491b69edbf43507`
`2548dd5666787e050a7d3b96f5afadfd255858fae037a49b7ee7a91ecfbe9167`
`27618a1f5fcade2d1b13452dc9e463b295273d115483928e3a671cb8e7a80093`
`34d66474f8157ba70f6de429b8e624cd05a5512c46daf4f9ccd8c6adad5baece`
`3541875e5b62e84130450e229c73132431f93277343cf5214b65846d6000a7b9`
`3625699aceef8218cece58914659f6ba003e6f26ad033645ed738b4972050aa5`
`3b308d520b3707fed24d11275ec37f85bb4543d0098ef6c7ec965837a5a55dca`
`7e407cf9ad8a6c49b22e15151b5fd82bf6f0f6361c5e3f3abe9b76af8bf68f7e`
`8c9b30a3a8e903fdaa354943efe56e15a10ccc7515c5d7bee8b7ee624f5b2211`
`9748fc497d427eb41191ea495d907cd5d2dd9455ed20bf08df947bdb15d84baf`
`9cd47c4593254f37eb5bef6b0d887f7132ce6d9678af33799da736d6073382fa`
`ae6389876208f0c72afd8dfb44720bb2b94e31f9f8cf446c49c55748c912b44d`
`b13a9b8c3312ce8b485d1ddbc9a4c840a08e94793b109f2e7aef32b46fb999e3`
`b7839de29a4736fb565b36d5c4aeea0eea28c8384ae8249a1bce267ec75f4196`
`c4c96c2c76d0f6caa554e1bda74e44ba7fab6a678200cfc40189a7f489af5d23`
`e0b1008f8c4231c9e35552a08a4a708e8bd978f72f7b8b9991f6e7926d6fbaa7`
`e5950c07075986a0e853f4e919e1c39f0e64a878ff97143a1d49ea5a4eb186df`
`efca8f75ee68a472ea90763b970f83c9285c1178064f8174be4916e7da9ca740`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *
### Win.Dropper.Glupteba-10003588-0
#### Indicators of Compromise
* IOCs collected from dynamic analysis of 10 samples
Registry Keys| Occurrences
—|—
`SOFTWAREMICROSOFTA1890984
Value Name: PatchTime`| 10
`SOFTWAREMICROSOFTA1890984
Value Name: PGDSE`| 10
`SYSTEMCONTROLSET001SERVICESVBOXWDDM
Value Name: ErrorControl`| 10
`SYSTEMCONTROLSET001SERVICESVBOXWDDM
Value Name: ImagePath`| 10
`SYSTEMCONTROLSET001SERVICESVBOXWDDM
Value Name: DisplayName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXWDDM
Value Name: WOW64`| 10
`SYSTEMCONTROLSET001SERVICESVBOXWDDM
Value Name: ObjectName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: Type`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: Start`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: ErrorControl`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: ImagePath`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: DisplayName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: WOW64`| 10
`SYSTEMCONTROLSET001SERVICESVBOXSF
Value Name: ObjectName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: Type`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: Start`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: ErrorControl`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: ImagePath`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: DisplayName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: WOW64`| 10
`SYSTEMCONTROLSET001SERVICESVBOXMOUSE
Value Name: ObjectName`| 10
`SYSTEMCONTROLSET001SERVICESVBOXGUEST
Value Name: Type`| 10
`SYSTEMCONTROLSET001SERVICESVBOXGUEST
Value Name: Start`| 10
`SYSTEMCONTROLSET001SERVICESVBOXGUEST
Value Name: ErrorControl`| 10
`SYSTEMCONTROLSET001SERVICESVBOXGUEST
Value Name: ImagePath`| 10
Mutexes| Occurrences
—|—
`GlobalSetupLog`| 10
`GlobalWdsSetupLogInit`| 10
`Globalh48yorbq6rm87zot`| 10
`GlobalxmrigMUTEX31337`| 10
`WininetConnectionMutex`| 10
`Globalqtxp9g8w`| 10
`Globalkn29r6c6`| 1
`Global473ggh6j`| 1
`Globalwpewcqppg8z44x89`| 1
`GlobalIV71LG3P`| 1
`Global986spw6e`| 1
`Globalag7xpe52`| 1
`GlobalwpsSerMutex5`| 1
IP Addresses contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`204[.]79[.]197[.]219`| 10
`20[.]209[.]34[.]36`| 10
`162[.]159[.]133[.]233`| 6
`20[.]150[.]70[.]36`| 6
`142[.]250[.]15[.]127`| 5
`172[.]67[.]186[.]113`| 5
`185[.]82[.]216[.]48`| 4
`162[.]159[.]134[.]233`| 3
`81[.]3[.]27[.]44`| 3
`74[.]125[.]128[.]127`| 3
`185[.]82[.]216[.]50`| 3
`20[.]150[.]79[.]68`| 3
`104[.]21[.]1[.]4`| 3
`162[.]159[.]130[.]233`| 1
`162[.]159[.]135[.]233`| 1
`108[.]177[.]102[.]127`| 1
`142[.]250[.]112[.]127`| 1
`172[.]253[.]120[.]127`| 1
`185[.]82[.]216[.]64`| 1
`20[.]150[.]38[.]228`| 1
Domain Names contacted by malware. Does not indicate maliciousness| Occurrences
—|—
`msdl[.]microsoft[.]com`| 10
`vsblobprodscussu5shard35[.]blob[.]core[.]windows[.]net`| 10
`vsblobprodscussu5shard60[.]blob[.]core[.]windows[.]net`| 10
`cdn[.]discordapp[.]com`| 10
`fastprivate[.]me`| 8
`stun1[.]l[.]google[.]com`| 5
`stun[.]ipfire[.]org`| 3
`stun4[.]l[.]google[.]com`| 3
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]mastiakele[.]ae[.]org`| 3
`stun[.]l[.]google[.]com`| 1
`stun[.]stunprotocol[.]org`| 1
`stun2[.]l[.]google[.]com`| 1
`stun3[.]l[.]google[.]com`| 1
`server3[.]mastiakele[.]icu`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]mastiakele[.]icu`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]xd0xbexd0xbaxd1x80xd1x84[.]xd1x80xd1x84`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]zaoshanghaoz[.]net`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]mastiakele[.]cyou`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]cdneurop[.]cloud`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]zaoshanghao[.]su`| 1
`e93c35a1-5b7c-447e-bcec-65b84e83dd99[.]uuid[.]zaoshang[.]ru`| 1
`server4[.]zaoshanghaoz[.]net`| 1
`server6[.]zaoshang[.]ru`| 1
`server14[.]mastiakele[.]cyou`| 1
`server1[.]xn--j1ahhq[.]xn--p1ai`| 1
*See JSON for more IOCs
Files and or directories created| Occurrences
—|—
`%SystemRoot%LogsCBSCBS.log`| 10
`%SystemRoot%rss`| 10
`%SystemRoot%rsscsrss.exe`| 10
`%TEMP%csrss`| 10
`%TEMP%csrssdsefix.exe`| 10
`%TEMP%csrsspatch.exe`| 10
`%System32%driversWinmon.sys`| 10
`%System32%driversWinmonFS.sys`| 10
`%System32%driversWinmonProcessMonitor.sys`| 10
`%TEMP%Symbols`| 10
`%TEMP%Symbolsntkrnlmp.pdb`| 10
`%TEMP%Symbolsntkrnlmp.pdb9E22A5947A15489895CE716436B45BE02`| 10
`%TEMP%Symbolsntkrnlmp.pdb9E22A5947A15489895CE716436B45BE02download.error`| 10
`%TEMP%Symbolspingme.txt`| 10
`%TEMP%Symbolswinload_prod.pdb`| 10
`%TEMP%Symbolswinload_prod.pdbB7B16B17E078406E806A050C8BEE2E361`| 10
`%TEMP%Symbolswinload_prod.pdbB7B16B17E078406E806A050C8BEE2E361download.error`| 10
`%TEMP%dbghelp.dll`| 10
`%TEMP%ntkrnlmp.exe`| 10
`%TEMP%osloader.exe`| 10
`%TEMP%symsrv.dll`| 10
`%TEMP%csrssDBG0.tmp`| 10
`%System32%Taskscsrss`| 10
`%TEMP%csrssinjector`| 10
`%TEMP%csrssinjectorNtQuerySystemInformationHook.dll`| 10
*See JSON for more IOCs
#### File Hashes
`22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b`
`57feb1fe02b13382d369b5626e872a6159ff6dea32bad5a6d7ce6b6f6a93016d`
`9c005e337df63510b6a2a4758df8d4840b6b1ad35ee9eba3bfcdde9cd1fab858`
`c79398d04526ad67bb70628850a35678abcdb7772c11d7539354750dd9d7d36e`
`cbb12735307be5876ab96badb940f8e5870542005c6f5220e968d41e7d84d835`
`cdc9e61ff13c55f8a332ccfe2a1e6d2b2cf356a6954f6d555e4edf91f5a56db9`
`d349d2bfed8f0eaa962d8adcc5e47c9ec234a8acc9ffbfcbfdbe547711fa43ed`
`daf42e9987a8e7d8c7223a38a8083d8588278673653fbbbc3612ef675c269292`
`f7ae491824c410240f87ba1cffa233cfb761bc2c856e97785685dae707110c68`
`fcf0cd38f5e888254400b44cfe246b76588c2fcdd89c4e4d38b33d7c099ff83c`
#### Coverage
Product| Protection
—|—
Secure Endpoint| 
Cloudlock| N/A
CWS| 
Email Security| 
Network Security| 
Stealthwatch| N/A
Stealthwatch Cloud| N/A
Secure Malware Analytics| 
Umbrella| 
WSA| 
#### Screenshots of Detection
#### Secure Endpoint

#### Secure Malware Analytics

#### MITRE ATT&CK

* * *Read More
References
Back to Main