Threat Roundup for Dec. 7 to Dec. 14
Discription

[![](https://3.bp.blogspot.com/-mBbj7I9pcbc/XBKwLGh3XTI/AAAAAAAAABQ/MjxDRHMcG884MPWC8_VvkkBYeFaz38pogCLcBGAs/s1600/recurring%2Bblog%2Bimages_threat%2Broundup.jpg)]()

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Dec. 07 and Dec. 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

You can find an additional JSON file [here]() that includes the IOCs in this post, as well as all hashes associated with the cluster. That list is limited to 25 hashes in this blog post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

* **Doc.Malware.Dkvn-6781497-0**
Malware
This is a trojan that drops a malicious executable and executes PowerShell commands. It can be used as a downloader or a dropper for Emotet.

* **Txt.Malware.Nemucod-6780827-0**
Malware
Nemucod is a trojan that executes ransomware on a victim’s computer.

* **Win.Virus.Parite-6780568-0**
Virus
Parite is a polymorphic file infector. It infects executable files on the local machine and network drives.

* **Xls.Downloader.Jums-6779285-0**
Downloader
Jums is a trojan that spawns a PowerShell and creates and executes a malicious executable. It collects a large of amount of system information and reaches out to a remote server after installation.

* **Win.Virus.Sality-6780277-0**
Virus
Sality is a file infector that establishes a peer-to-peer botnet. Although it’s been prevalent for more than a decade, we continue to see new samples that require marginal attention in order to remain consistent with detection. Once a Sality client bypasses perimeter security, its goal is to execute a downloader component capable of executing additional malware.

* **Doc.Malware.Powload-6775735-0**
Malware
Powload is a malicious document that uses PowerShell to download malware. This campaign is currently distributing the Emotet malware.

* **PUA.Win.Trojan.Hupigon-6776762-0**
Trojan
Hupigon is a trojan that installs itself as a backdoor on a victim’s machine.

* * *

## Threats

### Doc.Malware.Dkvn-6781497-0

#### Indicators of Compromise

**Registry Keys**

* <HKLM>SOFTWAREMICROSOFTWINDOWS NTCURRENTVERSIONPRINTPRINTERSCanon PIXMA MG2520PrinterDriverData
**Mutexes**

* Local10MU_ACB10_S-1-5-5-0-57527
* Local10MU_ACBPIDS_S-1-5-5-0-57527
* LocalWinSpl64To32Mutex_e162_0_3000
**IP Addresses** contacted by malware. Does not indicate maliciousness

* 45[.]40[.]183[.]1
* 66[.]198[.]240[.]4
* 103[.]18[.]109[.]178
* 192[.]169[.]140[.]162
* 209[.]151[.]241[.]184
**Domain Names** contacted by malware. Does not indicate maliciousness

* enthos[.]net
* shofar[.]com
* shawktech[.]com
* thecreativeshop[.]com[.]au
* burlingtonadvertising[.]com
**Files and or directories created**

* %UserProfile%Documents20181212
* %LocalAppData%Temp109.exe
* %SystemDrive%~$6889120.doc
* %LocalAppData%Temp2vuqj0ws.zbs.ps1
* %LocalAppData%Temp4ezh4c4j.esn.psm1
* %LocalAppData%TempCVR95F8.tmp
* %LocalAppData%Temp~DF78CDE2D9B1588659.TMP
**File Hashes**

* 0421be0b17b64e14118e01ec412f1721bb9079630a004ff7e846f954c2355538
* 18bf25020d301b1b22e316d2a6909a40c8dcea59fb04057d58346bdb58a7503c
* 24ee6e8bd38b5bef0c3db97c8cfdf03a38e442b624a1f7f731fb6e7c2989d6ea
* 2d50cc5a4ac493e5578038e8f892f9df5e134114ed6e9840089d9f32b8f28440
* 2ed82969c7fb23e18f1f9b0ab519124438129dc7f2530ee24604397b9c1250de
* 3e662508b29b2ef40092655a69073c220770a8306c0b17773059e07fe1a712b3
* 5ed274afe729b6b92cbb4446fa3f4f6130c8e20b3a903b13d7691d2006d2e72d
* 6d34270f0aeb0fbdb270e47866413a299a1deb54e7c4dd6b785a0ca7f2e0c73a
* 727afa31d97e874e3d2a3c11870a5b1b65ecda8905e3c97cbddb31a9fbfaf543
* 74201328ff459bf6412c7dbbcc0866f06f7ccc2b2dc7a1c4bc429518a85fee89
* 827c0012de03d21f84442e7dd0ea1d0a25f40b0e2982fab1695f935aaf471bd0
* 91da45beb83ea575f50ff8d9d6dcad7d9efa437b7e337006b2cc8ed2f6d4faf2
* ac280877daecf65f6570233d76c249caa8eaa52cb5ba31fc3e1611d45c8d0454
* aeef6e04c09d5f051f94a5c6545cf4228670954274ab97f1c85e7c78f1e6f116
* af8a10416ae6e32a6250cf03d8c3ba37933903accf649e9feb4f636c17ae2b54
* c26e6b57799f13d5d8353834bd721b304a15a7bbbb238995dbf98c4a26b71be3
* d77fdb097fb549034a72f67236bf4c744012ff71e43f37cd89e373645fc26288
* da7ac63e1a221dba1fb4d1ee743537b985fde34ad9bbc372fcc07a184ce683a7
* db37c4693eebc0f518bbd7e5707ec3abd4c2633e86b2ca92b9e34b21864a310b
* dd57c3ea2596874a51b13fe84d3dc328365af06bd0f50eb328819bc970766fde
* de2c3b81106ab89e0dd2c7d654b0a161e2227bbaafcd1b1860c387c7b67be69d
* e2ae044f486dba0d5005295ffa9100411a6225fff6c061da69225b6c50834a69
* e4269fcfda0fe8ef8872dbf51aec6dc9cbb18ad4eae281700be24f563164026d
* e71d9efea3a62cc265938bac1c53aa96f8729609cabfc6df4c66d5c5e9c016fe
* eb2bb764fb66c7c5509c7ce50ee3e0c61a675867f85ecdae78ad547b0ac72760

#### Coverage

[![](https://1.bp.blogspot.com/-9t2Of3KWq7I/Wz-6a6Dy3kI/AAAAAAAAAbk/5J2B6tJuFS44Fz9CyF7x9wPcTvmCLrV1gCLcBGAs/s320/all-selected-except-cloudlock.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://1.bp.blogspot.com/-lkxWRVKTgfE/XBP7sAijTCI/AAAAAAAABRE/AP8XeGmALD4iYY4ei05JIsbQtu4bW5WBwCLcBGAs/s400/db37c4693eebc0f518bbd7e5707ec3abd4c2633e86b2ca92b9e34b21864a310b_amp.png)]()

**
**
**ThreatGrid**

[![](https://2.bp.blogspot.com/-VQ5ebfZlbo0/XBP7xWeQSFI/AAAAAAAABRI/nTCiDh5R9vw-FDOPhumnhKDCeQfotVMRgCLcBGAs/s640/db37c4693eebc0f518bbd7e5707ec3abd4c2633e86b2ca92b9e34b21864a310b_tg.png)]()

**Umbrella**

[![](https://2.bp.blogspot.com/-Pk4LV1jSUsQ/XBP74XYQfDI/AAAAAAAABRM/ti-tdfrWumwr5DoZCCbhqHU5zsl3mzgRwCLcBGAs/s640/74201328ff459bf6412c7dbbcc0866f06f7ccc2b2dc7a1c4bc429518a85fee89_umbrella.png)]()

**Malware**
**
**

[![](https://1.bp.blogspot.com/-8V0asabKXUk/XBP8BUKblgI/AAAAAAAABRU/thWi0FMOUvo8EwxKQ_-SyYNTolXyGhC2ACLcBGAs/s640/74201328ff459bf6412c7dbbcc0866f06f7ccc2b2dc7a1c4bc429518a85fee89_malware.png)]()

**
**

### Txt.Malware.Nemucod-6780827-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* N/A
**IP Addresses** contacted by malware. Does not indicate maliciousness

* 144[.]217[.]147[.]190
* 201[.]187[.]101[.]156
* 185[.]104[.]28[.]132
**Domain Names** contacted by malware. Does not indicate maliciousness

* www[.]w3[.]org
* api[.]w[.]org
* gmpg[.]org
* ikincielesyaevi[.]com
* www[.]ikincielesyaevi[.]com
* www[.]gulfshorecooling[.]com
* elemaroregon[.]com
* gpconstructie[.]be
* cvcpdx[.]com
* www[.]chaffinww[.]com
* workwithcore[.]com
* phoenixconstruction[.]com
* www[.]laneexteriorsllc[.]com
* autosorno[.]cl
* cleanairtx[.]com
* www[.]ohiostatestucco[.]com
* www[.]teknikinc[.]com
* GOESTOM[.]COM
* CLARAMUSICA[.]COM
* claramusica[.]com
* goestom[.]com
**Files and or directories created**

* ROUTER
* DAV RPC SERVICE
* DeviceNull
* Win32Pipes.00000370.00000001
* Win32Pipes.00000370.00000002
**File Hashes**

* 029cfbcb0e44965e253979458652858b3eabfff38be5e7648c8b82f475233345
* 0cb706b11174c5a7fd08e70308d1ff84447d6e65a487b146846d5150931a8970
* 17304c0d1c57c83a58b5b1df2e6fe5b0b2a58634d1cebbd83ce8bd5533fea584
* 215953913e52f0e071dd8244d598a7c34367d03558599f7b9c824d916f60186a
* 2c93a65ec63e429b8e8a971dbaea069829763235daeb26a5f24adc69debbff71
* 38848aedc1194c09d6eeb88ef04ba56aee22e0f579284a63b12d896fdb0d4831
* 3bf5629a35700582d0abbdf8aa1c97c34c4f2fd933de6f70569d2b3103f6379e
* 4d85b12eddc09b1cfdfd8d580ecca6d724dd66b91d8866f707aa91cb50c7fbd7
* 5247f2722b8623e95f8d10cd79d0fbe3e96fe8f0527d3b9be480d2640f02b160
* 52cecc5d101a881b137c07143268217dacf145dab73d50e0e8da318000f5b5e0
* 59109d8c01b76ebe171dc28cbe37ceb393846d0ed240f54a14eb9014588c748d
* 5c2d33368a931651ea426f3ed037185d99c7c3bb28d5430413a2c93b4f525428
* 66b09b100ecc40609965a74c90e9553457d730bc8b4c5ee95b2f2089dd0aba3b
* 7d9fcffa70fec088cda7c4095740599a45a710ce38a66fa9e13f0dfb7bc43b3b
* 8afdadaa66d58e386411755871ff91858bb99016e22e67de3ce3cc63ea35c4a8
* 918312a6b9b634f27089520d15dc15966a25bd719627962d756f370949adb152
* af0ab34d44410fab4cfb8c24dfc0240e508de5e31a0eb567c0533344eb9c92fe
* de5e00e84554eb352985d85146eb696be474c1f5b97a764052fc0575fec8ad13
* e29d601569f5197e631275c5391a273058ab2aca0473dedf148177516de1e7c5
* f40f059bad77bf7297b3783af078e8febf11650709294e69a9c198c711a87386

#### Coverage

[![](https://1.bp.blogspot.com/-9t2Of3KWq7I/Wz-6a6Dy3kI/AAAAAAAAAbk/5J2B6tJuFS44Fz9CyF7x9wPcTvmCLrV1gCLcBGAs/s320/all-selected-except-cloudlock.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://1.bp.blogspot.com/-WDEvF5Vv_GI/XBP8PdugCGI/AAAAAAAABRc/emwyH-UWnV4HV_GIyPU_VICPxri49SniQCLcBGAs/s400/2c93a65ec63e429b8e8a971dbaea069829763235daeb26a5f24adc69debbff71_amp.png)]()

**
**
**ThreatGrid**

[![](https://1.bp.blogspot.com/-DPX35Zm-zSs/XBP8UG_PUQI/AAAAAAAABRk/G2ZzeQwyxi4Iq9KmCWh9TlRtCVESvV4ngCLcBGAs/s640/66b09b100ecc40609965a74c90e9553457d730bc8b4c5ee95b2f2089dd0aba3b_tg.png)]()

**Umbrella**

[![](https://4.bp.blogspot.com/-DE9X1L8khxE/XBP8Yg-KjBI/AAAAAAAABRo/UsDZT2zbBkQNxqdNnqm10HYS5Cno31clACLcBGAs/s640/17304c0d1c57c83a58b5b1df2e6fe5b0b2a58634d1cebbd83ce8bd5533fea584_umbrella.png)]()

**Malware**

[![](https://2.bp.blogspot.com/-Mc0uZVwdSOo/XBP8eFLIMnI/AAAAAAAABRs/0rxBcsxDJ4s7eA6o-eJCjLMeK7hNA-hKQCLcBGAs/s640/66b09b100ecc40609965a74c90e9553457d730bc8b4c5ee95b2f2089dd0aba3b_malware.png)]()

### Win.Virus.Parite-6780568-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* InstallLauncher_4541454E-9FFA-4246-835D-3F49EFA91F6C
* BaseNamedObjectsInstallLauncher_4541454E-9FFA-4246-835D-3F49EFA91F6C
**IP Addresses** contacted by malware. Does not indicate maliciousness

* N/A
**Domain Names** contacted by malware. Does not indicate maliciousness

* N/A
**Files and or directories created**

* %LocalAppData%Tempejp5C31.tmp
**File Hashes**

* 03b06a1f568e2985a763c155c14c2a9c4b7b18471d91bf2164ad44350d4353d6
* 0478b98235d5c49bc7facddce8f912a4ec2b58c33b4947922927e139b9efba1f
* 11ec64be12c389f32640d9803deffa8f93b9457572c71f36df3fe0df4e1f6a8b
* 17527e946bbac0ed6c69fe1b97d4d16a8d2ea20811898ee471bf0f9e4377d3e7
* 250e929dc833074872defd3ca65b2ccf6cf9b32ed6f6cfca07a66767e48db6d4
* 2a4b55983c456e9ea14115378397e67df37d89a28818cb3f557b8afbb3e086e3
* 2f6a2d0728cad1403d52a3dfc6db10011fa215f6f5b8272e5c4699e1a68afaf2
* 318722e8243edf25c73800569cc1d78c8a6f62aa382f484116c0197d3cfc6578
* 3858721e1297e627247f17ebf44ff0502981481af3c04ebb6c76bafda0db2c6d
* 3aea0bd31f0d86f9c5a5035828dea6e42cb0646c204bb866c71528bd1f714e7f
* 55e263c3206ceed9776d0d0b6015cc5e7c444bed6c68a66766d34998fb744ff1
* 5b6e1419168ecd9ead5800273b1c63fa6420455b1ac2c85be430d5e976f4a104
* 69528927f100ff5c7b92e6898f33e94768953fceed5ffb71fce02dc6acb9ca56
* 6efd875b023b1289020e7d2acd02526d61592f4dd5e1b35e2ca04eeae162507b
* 78af109d92ce244c02b1530f7ae65f2c9958e34e239788caf3ee94115ad36d47
* 8240517c639812a704d439035b22fe685b3b905bb376776c4adcc264862675e7
* 8e170f44cd0e49ad850ffbd244ad755d1b0b7b91051308ed18c049a5e6068acc
* 8f6c73d10c4c5f1ee2758f80bbee0e2700978b34ec74b83296ec9e3a403e81db
* 94aad46d563c9f5a46bc1e1316d638f7e96ab4ac07b7925510644768504c9d1d
* 9d818507ca3222b5f1f471ae1c4338de9227e95b12ac838eed1d68550019aa22
* c1b87392cafff0a07c0dedfa59da2936a371bf2e40855c9b1a1d6bf66903ef12
* c56b47185d4176e620a12ba8f752a67d4e264919127970f0f8bb567f5f778511
* d9cc0b9443f5ec4f84070165ddd08d3def72662df47b52795b793725547816b3
* dafa195b9f7cf1b3d249ccc6e40bbc181aa54878faf3411b78ccea85e4e4f255
* e77216030291a46d69d4bdf5725dc052d16e6ed7d6485b85cfcc8c4b88bc4313

#### Coverage

[![](https://2.bp.blogspot.com/-jTB0CZDwsFQ/Wz-6aknWuhI/AAAAAAAAAbc/XPOsdG7hpfQpz9NPUVylIgNETUHICQ5OwCLcBGAs/s320/amp-email-threatgrid-cws-only.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://1.bp.blogspot.com/-nTc_4Hbk2eo/XBP8tHlt_CI/AAAAAAAABR8/7sBRvm0QWyMVcwpMQe0jYeTUu-b8p2opwCLcBGAs/s400/2a4b55983c456e9ea14115378397e67df37d89a28818cb3f557b8afbb3e086e3_amp.png)]()

**
**
**ThreatGrid**

[![](https://3.bp.blogspot.com/-UJXXPG_cSpA/XBP8y3SZcDI/AAAAAAAABSE/2W23JSt1MGcp69m0S5W2pQQaQYpOihSbwCLcBGAs/s640/3aea0bd31f0d86f9c5a5035828dea6e42cb0646c204bb866c71528bd1f714e7f_tg.png)]()

**Malware**

[![](https://2.bp.blogspot.com/-aIJko68jxKU/XBP83whBFNI/AAAAAAAABSI/q_mA6vl1S2wTW4zUKsNRBTd3FQ5RVHmnwCLcBGAs/s640/c1b87392cafff0a07c0dedfa59da2936a371bf2e40855c9b1a1d6bf66903ef12_malware.png)]()

### Xls.Downloader.Jums-6779285-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* Global552FFA80-3393-423d-8671-7BA046BB5906
* LocalZonesCacheCounterMutex
* KYIMEShareCachedData.MutexObject.Administrator
* KYTransactionServer.MutexObject.Administrator
**IP Addresses** contacted by malware. Does not indicate maliciousness

* 192[.]185[.]16[.]22
* 192[.]254[.]237[.]11
**Domain Names** contacted by malware. Does not indicate maliciousness

* www[.]aaaplating[.]com
* weighcase[.]co[.]uk
**Files and or directories created**

* %LocalAppData%TempVBEMSForms.exd
* %AppData%MicrosoftExcelXLSTART
* %UserProfile%Documents20181119
* %TEMP%tmp907.bat
* %LocalAppData%Temptmp016.exe
* %LocalAppData%TempCVR4F0E.tmp
* %LocalAppData%Temptwaibr0n.00s.ps1
**File Hashes**

* 199f1eec8413168be6418ace60cfe760d858350ebef3605aa91d47338b881e0c
* 1f444338e19212dfe5f597ceb3b55f06a8b927a342ce50d0c5ae4452d4999e80
* 49fbb593eb1418ecbbefd3ac0529ccf1ed2ef64e20927a5e0379f99ec9fd0c9b
* 5ac6fb69b5c55ec6419b89e22ce7fd873d11d263ae2eda9ff85e8eda10b20444
* 644f8f3822eb0c5435ffbec711a0b2821e1fa050ca10c837a62c02a9df814d9d
* 77f27841d4263d1ed6ba59267d78a454c9a2a3383ee3f1a2a5ddbed4e835dd06
* 83cf5c7623bc92966e02b594bb41ab3896b1ffaae748d7cc9b4331f3f435f171
* 9a422430a9443b77b5959847657ec411736e180b30563b5066d1ea0c7b22633e
* 9bfd539bb55f7a7a5a8df5a0e3ecd87157ecd87675915ac01ca6ce62a3402872
* 9dbd2fc30b9c22fb03df72eb46ea83af41449bb6054cdf8cd83e5520de633641
* a46e400bbf7b921a5b2e131ac3c8bf10506569466ad3fff99381c411e585192d
* a6043595251b41b336ca8bc2ccc05bc2bf2781274c1893d6943141a4bd3cf637
* a6d95c0eac0c0b584faa37c1e21ee5baad74e227685275899a9d8c5ac2806b9d
* be6ac030af25e2044cf8889d747fa170bcbb10a325a3f05f67194379f86375ca
* c7c3ded9554e8ca38031ab080c1ed9d775a20ac928eaded8d24fb325d7c6be1f
* cba2b5d0949ff517c40f74cf166b7c363dbf54bda30d4e8432f31da674a78b9c
* e4fcc415e1f7cec20991a6e5612c7706c1187e23ecea5115fbeea824c9b06c14
* efd04977ffd67e71dc9730268a7cee0b85ca128c0e0e3962b073494e5e9f2081
* f495fc57c7bd8311cee17ea6dc15c953d21c5fd97147e632a509b07217855501

#### Coverage

[![](https://1.bp.blogspot.com/-9t2Of3KWq7I/Wz-6a6Dy3kI/AAAAAAAAAbk/5J2B6tJuFS44Fz9CyF7x9wPcTvmCLrV1gCLcBGAs/s320/all-selected-except-cloudlock.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://1.bp.blogspot.com/-O5JdcyLFXlw/XBP9G9KIhyI/AAAAAAAABSU/Fb8-1HfmyYc46Uk0ms3c3jNo9oDjwfHZwCLcBGAs/s400/efd04977ffd67e71dc9730268a7cee0b85ca128c0e0e3962b073494e5e9f2081_amp.png)]()

**
**
**ThreatGrid**
**
**

[![](https://3.bp.blogspot.com/-7wUWniPcHQs/XBP9Lcai8OI/AAAAAAAABSc/__MyYjcDftcS9oUxDgtP-P_65Ozx-w06ACLcBGAs/s640/efd04977ffd67e71dc9730268a7cee0b85ca128c0e0e3962b073494e5e9f2081_tg.png)]()

**
**
**Umbrella**
**
**

[![](https://3.bp.blogspot.com/-yredc2BiSPk/XBP9QAeSJiI/AAAAAAAABSg/14wk9FmahHEtqNmAs3wj09j8eoshZ3tdwCLcBGAs/s640/efd04977ffd67e71dc9730268a7cee0b85ca128c0e0e3962b073494e5e9f2081_umbrella.png)]()

**
**
**Malware**

[![](https://2.bp.blogspot.com/-a-Jhj8mpZhI/XBP9VfQ6UtI/AAAAAAAABSk/Dg-YJgmbjmwLGhrUBhf5QwnvzU7zg_xkQCLcBGAs/s640/efd04977ffd67e71dc9730268a7cee0b85ca128c0e0e3962b073494e5e9f2081_malware.png)]()

### Win.Virus.Sality-6780277-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* uxJLpe1m
* wininit.exeM_320_
* winlogon.exeM_356_
* wudfhost.exeM_1644_
* BaseNamedObjectsuxJLpe1m
* BaseNamedObjectscsrss.exeM_528_
* BaseNamedObjectsservices.exeM_664_
* BaseNamedObjectslsass.exeM_676_
* BaseNamedObjectssvchost.exeM_1008_
* BaseNamedObjectssmss.exeM_364_
* BaseNamedObjectsspoolsv.exeM_1560_
* BaseNamedObjectswinlogon.exeM_552_
* BaseNamedObjectsctfmon.exeM_204_
* BaseNamedObjectssvchost.exeM_912_
* BaseNamedObjectsuserinit.exeM_1372_
* BaseNamedObjectssvchost.exeM_832_
* BaseNamedObjectsjqs.exeM_1736_
* BaseNamedObjectsrundll32.exeM_948_
* BaseNamedObjectsexplorer.exeM_1456_
* BaseNamedObjectssvchost.exeM_1116_
* BaseNamedObjectswmiprvse.exeM_440_
* wmiprvse.exeM_776_
* BaseNamedObjectswmiadap.exeM_3280_
* BaseNamedObjects356677150.exeM_1408_
* BaseNamedObjectswmiprvse.exeM_1688_
**IP Addresses** contacted by malware. Does not indicate maliciousness

* N/A
**Domain Names** contacted by malware. Does not indicate maliciousness

* N/A
**Files and or directories created**

* ??E:autorun.inf
* %System32%driverslhlnn.sys
* %SystemDrive%Documents and SettingsAdministratorCookiesadministrator@cargocrystal[1].txt
* %SystemDrive%Documents and SettingsAdministratorCookiesadministrator@cargocrystal[2].txt
* %SystemDrive%Documents and SettingsAdministratorCookiesadministrator@samayer[1].txt
* %LocalAppData%Tempwingqijig.exe
* %SystemDrive%okieu.exe
* ??E:mshy.pif
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempaugx.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempbvwf.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempceohbt.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempcevjx.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempdkgn.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempeasrrv.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempgekhk.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempglya.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temphpqd.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempixway.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempjbccl.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempjhrim.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempjvuj.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempkdpw.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempkwih.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Templmbonl.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Templpig.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Templtyyd.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempmqsr.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempmskjgp.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempmslmw.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempndcdl.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempniut.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempnixbf.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempnygs.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempolsit.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempospd.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temppffcy.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temprfioy.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temprxoqk.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temptguha.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temptvuin.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempuspe.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempvkecy.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempvtba.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempvxqq.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempvylwe.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwhtfo.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinadpngm.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinasew.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinauunwn.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinbkjyy.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinbpcf.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinbusg.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwindlwd.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwindpbi.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwineeyux.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinesrg.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinfjvcgs.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinfpmye.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwiniuak.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinjenpka.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinjkyn.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinkqxb.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinkrepqp.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinktee.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinlbehwb.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinlihxj.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinlsbpg.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinlxanm.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinlywa.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinmtfju.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinneng.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinnjxa.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinnurxrn.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinodpm.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinohuuif.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinolmyt.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinonwqwp.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpcpvjx.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpdae.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpdgmo.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpgqpu.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpmlm.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpnsv.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinpuybd.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwintqckmy.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinudusnh.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinuixn.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinvcwb.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinvxxb.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinwbnx.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinwbppmo.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinydntxg.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinyksvqi.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempwinyqksg.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempxfkklk.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempxgvmsf.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempxmjmf.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempxwota.exe
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Tempyxjkrt.exe
* %SystemDrive%eetdut.exe
**File Hashes**

* 02e3ca0b78494efa9c54f41856fbf50478673329ea238c7786bdeb30542e5ed5
* 034336a710468f49c1eed9d375a85d4d7f48ecc271dde830f60b428d52a94c2b
* 0a9a606be52079bc06d34ee969313e58809c8bf4978e31101ce329b7651f564e
* 2055ba5f6fa09c201359729adc6c0e20ad97346d698b5801b601d29a85e78c52
* 34b3a1c08a185f7755b8fe3f741e13a6452b46766b2b564cd329c45bd45e1c76
* 38764b867874a08bd44e8a4b78b670e7445f93af546fba0443c99f56d469a951
* 3bd14203a0587eea25421d679fc5d7c598464e5fde6f39cf7e6a506fa86aaf5c
* 40d8f51d911e4f4d3fa29fcd39adc9e826557727dc1ec411404d6bd09c7f8c35
* 518b8b1dea7caf5f1c2d9b6f6ef32ba70effc2f74ebd7a902434fc66e179700e
* 609dcb6f088836745f24a24d71b49e092196b08a9924f42e8b63b92f4c0ebe24
* 6f8fec09c16a0f5bb60e3ec4cd1a41cb34a2eaa59d0351f5f875a83dd7ec8411
* 76cb38ecf5c3b925e946b6da3cc78e25e0df6db48c66073a6dc33bb8bc03cb5c
* 78784ee614b06d505879ec8454a80843416aa89869ecfb7eb059aadb14027178
* 7d5787833d365d5a2d84c0e6135106bd6d5a49de4da86857995cf0222491c028
* 8089f6db67efb482755dfc06ee4efe7271e685136e46a231b06bff87aca4393b
* 9af10868ac775ec789e3b9e7475015c3ba66f9ed35aabcfe8ea323b9b1a8d7a5
* 9fadad87f4763f5a062c0c12677b3b549f9df261484ad89cf58bb60809751e9c
* a543f5d10445af1ce7710cc596b2b6ab0532cef51e9041b8f8c58bd36b218dd9
* ac9ee5d47307f578e1a19a96dfb509a5063045a339ffcf1dc79f6a559f6385c3
* c3a88516553f23807115597f99f0b8f9e8a62c68bf7ee321bf1ff6c599c3c8f1
* c96d2cd51eff903958ccc279fa48e392e858403aead3add4b00e6e9b031d5754
* d2da9a2988364a576679489265765e8bd5419ea66e8aea48e666a5300f2c5e6f
* e080790b62f025fedc93b161dc061421ae47cf4785ecb1744d6da1be44f8667a
* e1a951d34a0c35cc5a011242189ed82707d3fc40289b37470169703f269d88f4
* e1d9701b9af405e448e57714ee762722c3ddc6306d271038c350b0cfc138cebc

#### Coverage

[![](https://1.bp.blogspot.com/-9t2Of3KWq7I/Wz-6a6Dy3kI/AAAAAAAAAbk/5J2B6tJuFS44Fz9CyF7x9wPcTvmCLrV1gCLcBGAs/s320/all-selected-except-cloudlock.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://2.bp.blogspot.com/-UpMlXO6trVE/XBP9m0y7GJI/AAAAAAAABS0/zQOXL2fjIqYiMy-TbTr48GkmFyfqxu5GQCLcBGAs/s400/3bd14203a0587eea25421d679fc5d7c598464e5fde6f39cf7e6a506fa86aaf5c_amp.png)]()

**
**
**ThreatGrid**

[![](https://3.bp.blogspot.com/-3GDbZ6rULQs/XBP9riksPKI/AAAAAAAABS4/F1GUgLWhotI2V53CndYABOwu1skebOEeACLcBGAs/s640/3bd14203a0587eea25421d679fc5d7c598464e5fde6f39cf7e6a506fa86aaf5c_tg.png)]()

**Umbrella**

[![](https://4.bp.blogspot.com/-pqpP8WO98LY/XBP90TehqqI/AAAAAAAABS8/pv8PQek8YY49_q121AtlzlCwkJ5m9Ss6wCLcBGAs/s640/3bd14203a0587eea25421d679fc5d7c598464e5fde6f39cf7e6a506fa86aaf5c_umbrella.png)]()

**Malware**

[![](https://4.bp.blogspot.com/-grY0ueX0ORc/XBP956868WI/AAAAAAAABTA/7RxVXMA_IcEljKxWRlhgLsEus1YnTsbVACLcBGAs/s640/78784ee614b06d505879ec8454a80843416aa89869ecfb7eb059aadb14027178_malware.png)]()

### Doc.Malware.Powload-6775735-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* Global552FFA80-3393-423d-8671-7BA046BB5906
* LocalZonesCacheCounterMutex
* LocalZonesLockedCacheCounterMutex
* RasPbFile
* GlobalPowerShell_CommandAnalysis_Lock_S-1-5-21-2580483871-590521980-3826313501-500
* GlobalMTX_MSO_AdHoc1_S-1-5-21-2580483871-590521980-3826313501-500
* GlobalMTX_MSO_Formal1_S-1-5-21-2580483871-590521980-3826313501-500
* Local10MU_ACB10_S-1-5-5-0-57527
* Local10MU_ACBPIDS_S-1-5-5-0-57527
* LocalWinSpl64To32Mutex_e162_0_3000
* BaseNamedObjectsGlobal\.net clr networking
**IP Addresses** contacted by malware. Does not indicate maliciousness

* 199[.]188[.]200[.]110
* 185[.]72[.]59[.]32
* 185[.]87[.]51[.]118
* 185[.]2[.]4[.]116
* 177[.]185[.]194[.]161
**Domain Names** contacted by malware. Does not indicate maliciousness

* www[.]w3[.]org
* tecleweb[.]com[.]br
* chiporestaurante[.]com
* www[.]onecubeideas[.]com
* onecubeideas[.]com
* dc[.]amegt[.]com
* fortools[.]ru
**Files and or directories created**

* %WinDir%ServiceProfilesLocalServiceAppDataLocallastalive0.dat
* %WinDir%ServiceProfilesLocalServiceAppDataLocallastalive1.dat
* %LocalAppData%MicrosoftWindowsTemporary Internet FilesContent.Word~WRS{257D7FC1-A1F1-4741-80E5-4CCDA3324B78}.tmp
* %AppData%MicrosoftTemplates~$Normal.dotm
* %AppData%MicrosoftWordSTARTUP
* %AppData%MicrosoftOfficeRecentindex.dat
* EVENTLOG
* ROUTER
* %UserProfile%Documents20181207
* %LocalAppData%Temp705.exe
* %LocalAppData%TempCVR8C5B.tmp
* %AppData%MicrosoftOfficeRecent355848530.doc.LNK
* %SystemDrive%~$5848530.doc
* %LocalAppData%Tempfjzx2n2i.cc2.ps1
* %LocalAppData%Tempqfrje44a.wpp.psm1
* %LocalAppData%Temp~DF25D3033E1B874DBC.TMP
* %AppData%MicrosoftOfficeRecent37c08bc14f578f0b19f992648c113e46dc49e0ad1ddc9cd2e63dfb9242fe151c.LNK
**File Hashes**

* 02c58585c45ba7f87a94eb10fda2ad3d1216dae821536c77bd1f53b5b48730cf
* 0aac7ab733c51437873bf791b28557b12e027bf9bf1b3eafcde05388010af655
* 0cc53d287e5df9017989526addc988b49fcd76894032458720acad7c265df9de
* 14ab7c3501e5ea1482687558d1544698b85cd9b24b3580245a85ce0b781c03e7
* 1af67c800700954695d42c3e124753750016b7c598c6fa2f9bcd9f85723dd1c6
* 1bfc31debc05dc83864b01ddf300552ec6496cc0d1c25b5846fcd2a4c5da93df
* 1e0c90f629beae558c6af53c3def9cda4bc77d06cd42131b8f969ff0da9afe25
* 1ff1729697c956aa4270731f63686d2f6aa1e86a47d219f32058fa67be31817f
* 21982965fc5661c509d1833f8fe9caf02d7649619b7b542d7a735abd7936a9cd
* 21e781747a69ebeda636616b47fdd4ff871b9c672aad10f3cf95cbd55eb8b169
* 239fea895e2a4a3bd3c3339ce48b2f330bd611d8120e0937aca1c8581e977849
* 2759147c5b948b705943cc4dfe7932aaeb14bda833ed00a850d1ee5543bac6c3
* 2b3064f31f52b8d33a9a7f73c1624252f4a2b615df0c99b4c70b4c617eed87fa
* 2c97f2997575df803d28dd38636856fd0efb9fa7efaea22c526b8dc71daa9aee
* 370c83daaa8ad3c9e1f684ac93a5c7436e86bab917f8511544792f083fd8d127
* 37c08bc14f578f0b19f992648c113e46dc49e0ad1ddc9cd2e63dfb9242fe151c
* 3ac2d948a193f03d6d6bbd288ab9ae2b58588567e459aecae80a66e00a291847
* 3b958df2dedb42704c2baf7b9dff89112db8e8297a594ebe98303f9913004e9b
* 54bf05efacb556c7ed106a9b802619b2f038d1e6b8adbcf4c8d632f8531e68be
* 56de2fad613807e46613e7159681a962cc8c54fc6ed20c7c3e90e104cdbfeaff
* 590cb8e2648bc9566d2709a22d33369309e32ddfcf6cf725dfce6b0efb2b51b3
* 5a2763ea3481568a73456a2e784b6b31b32845ec08df99b3394533ecdb0f973a
* 5f47e689fb44578d43e4c7590ce10c275f7f533c894387086bf5e0bb3a68e46d
* 626ead7063f00752432c54dcb61975b060e306f2712fa2fb1e6f3aa4cc406e1a
* 6714f37afcbe1d0685770f9558c40d0856e7c337f8d4c4beb7e312672adda950

#### Coverage

[![](https://1.bp.blogspot.com/-9t2Of3KWq7I/Wz-6a6Dy3kI/AAAAAAAAAbk/5J2B6tJuFS44Fz9CyF7x9wPcTvmCLrV1gCLcBGAs/s320/all-selected-except-cloudlock.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://2.bp.blogspot.com/-hirdB2Bsdns/XBP-K0vfhaI/AAAAAAAABTQ/y0eonBwQeK8TKlcR2sZEt4BVHPJC_r_FgCLcBGAs/s400/2759147c5b948b705943cc4dfe7932aaeb14bda833ed00a850d1ee5543bac6c3_amp.png)]()

**
**
**ThreatGrid**

[![](https://3.bp.blogspot.com/-cPATesOIsYk/XBP-SikEZDI/AAAAAAAABTU/QcbicV-UjjE-r-PptFZyhD76h6yyOJUxACLcBGAs/s640/54bf05efacb556c7ed106a9b802619b2f038d1e6b8adbcf4c8d632f8531e68be_tg.png)]()

**Umbrella**
**
**

[![](https://2.bp.blogspot.com/-1bXxXprfNac/XBP-Y8BR-_I/AAAAAAAABTY/UKcFBwgIWzYeQHdpuwyB75X790oBwP9-QCLcBGAs/s640/2759147c5b948b705943cc4dfe7932aaeb14bda833ed00a850d1ee5543bac6c3_umbrella.png)]()

**
**
**Malware**

[![](https://1.bp.blogspot.com/-td94ffkczL4/XBP-emybT1I/AAAAAAAABTg/eXhrp1PoqD4kWJ_odv11zU1jjA8EIMsHwCLcBGAs/s640/02c58585c45ba7f87a94eb10fda2ad3d1216dae821536c77bd1f53b5b48730cf_malware.png)]()

### PUA.Win.Trojan.Hupigon-6776762-0

#### Indicators of Compromise

**Registry Keys**

* N/A
**Mutexes**

* LocalMSCTF.Asm.MutexDefault1
* BaseNamedObjectsISPWizard Mutex
* ISPWizard Mutex
**IP Addresses** contacted by malware. Does not indicate maliciousness

* N/A
**Domain Names** contacted by malware. Does not indicate maliciousness

* N/A
**Files and or directories created**

* %WinDir%ServiceProfilesLocalServiceAppDataLocallastalive0.dat
* %WinDir%ServiceProfilesLocalServiceAppDataLocallastalive1.dat
* %SystemDrive%DOCUME~1ADMINI~1LOCALS~1Temptmpsetup.exe
* %System32%rnaph.dll
* %LocalAppData%Temptmpsetup.exe
**File Hashes**

* 0d72d9ee3de3e8ac191444390ba097b471e72fe6ff951b8d77f2107486f1310d
* 174751136660fe996a57657e8ec2205ad9a5e9efe8eaa5078b714f5fb51cf9a2
* 1edcf0b7e78dd603aaf2900a06bb8f52c38e5648df696caf14f6c39d2d23c4e9
* 4d2719868251d27b80b746161fcb2eb78e5ce1927b10c4da5f782ccc51b619e5
* 835a2e9ef6349c641ac1e786aae48338c88e76315a2ce4fd4c43903304984093
* a1a60ca213175febdcc3ff1bc578053c563a6d33c40312f46f3118464e2c9b34
* c6f5fcd39af9fe1a342d5b55b09c74c5cc29c666becdc583098e0a09883491c5
* d84e292c72cd96b1d4755881bb7c05bc7f013910f5671c606fe66a1c56a85411
* e1d008fcb364fa01413eb0710ec049f74e791b17ae25d8f27fe857a7ff9aa8f9
* f094e7eea20b73e4513ed141d82eeb96c8f4ba44373483154719ef9bdef07de4

#### Coverage

[![](https://2.bp.blogspot.com/-jTB0CZDwsFQ/Wz-6aknWuhI/AAAAAAAAAbc/XPOsdG7hpfQpz9NPUVylIgNETUHICQ5OwCLcBGAs/s320/amp-email-threatgrid-cws-only.png)]()

#### Screenshots of Detection

**AMP**
**
**

[![](https://1.bp.blogspot.com/-gzQeTrzD7Bw/XBP-rPrj9dI/AAAAAAAABTs/wAf2mnwS0RkTrJeDSImsy5K4iURQbcCXQCLcBGAs/s400/d84e292c72cd96b1d4755881bb7c05bc7f013910f5671c606fe66a1c56a85411_amp.png)]()

**
**
**ThreatGrid**

[![](https://3.bp.blogspot.com/-B_A0XkY2nB4/XBP-xv42quI/AAAAAAAABT0/LO2M1gH-HGUpqbLzsfP6X1ggMR2VmvT8QCLcBGAs/s640/f094e7eea20b73e4513ed141d82eeb96c8f4ba44373483154719ef9bdef07de4_tg.png)]()

**Malware**

[![](https://3.bp.blogspot.com/-ouF1EGIPQbE/XBP-5lUZfOI/AAAAAAAABT4/mzTF036ndUs49brrpzu6ycUU-MGzVjBMgCLcBGAs/s640/1edcf0b7e78dd603aaf2900a06bb8f52c38e5648df696caf14f6c39d2d23c4e9_malware.png)]()

![](https://feeds.feedburner.com/~r/feedburner/Talos/~4/A4O1YSiP_AY)Read More

Back to Main

Subscribe for the latest news: