钓鱼木马文件样本

钓鱼木马文件样本

发现日期 样本名称 样本链接/特征
20240722 徐加李简历.docx .exe https://s.threatbook.com/report/file/d86db50d6990d345a1280991b757c770b661d94592a68a95c48b189b7ac4bf50
20240722 关于 2024 攻防演练员工守则通知.exe SHA256:
bccd982dab220d22689cf81277789ef64b32f575a08f604e1a75da1d5d6aee10
MD5: 1c26667276b0f3f69ab55bf8b34fdd22
20240723 公布名录.exe https://s.threatbook.com/report/file/cdb20591b75cb330a887a96ed631e06511aa7a10e5e45574cdfccd6f4f7d6854
20240723 2024重点保障安全意识培训参会人员名单.zip https://s.threatbook.com/report/file/c9d2dca72286c01e068b1995e3aa7772ff9686a492b89e8b8c7b0ecaf715cf40
20240723 关于2024年公司财务调整的通知.exe https://s.threatbook.com/report/file/d44f628b8e447249ef9ce8871350c52693c1f31cb126307be9f1b2c535053a4a
20240723 关于2024攻防演练员工守则通知.exe https://s.threatbook.com/report/file/bccd982dab220d22689cf81277789ef64b32f575a08f604e1a75da1d5d6aee10
20240723 《关于集团网络资产评估管理有关事项的通知》.exe SHA256:
f1d4316a2c7bccf197ee6209389fe1ad7aef8a3b94aebae5548c8d1a05f036cd
MD5: 1b50d0cc313552072462327588f93a49
C2:117.50.187.104:443
20240723 测试tdp (2).zip SHA256:
13d7483a1f1a0b72aaa09ec985797556eeb402c893013a5bc08b706300c5bb3d
MD5: e2eba605cf1b6822e1bd9cb06bd334db
C2:101.200.150.8:8089
20240724 集团“星火计划”推荐学员参加选拔考试通知_docx.exe SHA256:54a28a2bc66c4529aaf2c7b92d724f2a2943dcd12bb960f43e6d34cf90ace700

MD5:7c29a8b9e872af42b5d92dc98f87a917

C2:59.42.126.162:80

来源:CobaltStrike 木马

20240724 徐加李简历.docx.exe SHA256:d86db50d6990d345a1280991b757c770b661d94592a68a95c48b189b7ac4bf50

MD5:b97e176e0ee5987ddfe98e056df343e9

SHA1:3bdde433ae2579d8270110fa6281e2feca7d6225

20240724 **金融(渠道经理).zip SHA256:431d010c90b451c107d4160bb134ff072cf8c7076f16ab516faa2d31ef3c4759

MD5:6330fab9ce531ce8943132272a3cb2a7

相关IP域名/C2:mobile.static.apiproxy.cloud.360.net/mobile.static.apiproxy.cloud.360.net.cdn.dnsv1.com:443

攻击手法:域前置 CobaltStrike 木马

20240724 **会议(去除 30 分钟限制).exe SHA256:ac962605550d120d4d38ba87a10c87027c7ccb3f430475c0104646183bc6f825

MD5:2a04ff4412e48aabdc6fc073ae734cd2

C2:154.12.83.210:54123

攻击手法:资源段解密执行 CobaltStrike 木马

20240724 **有限公司社会招聘报名登记表.exe SHA256:02bbeb4d9d6f13fe1db44a0a2da572b1596d9ff59b79376e8afaeab0ba76a1d6

MD5:09c7199b2bcd0d908a2b8d6867a1b240

C2:2gwxrah28rj0z.cfc-execute.bj.baidubce.com

攻击手法:垃圾代码耗时、Rust CobaltStrike 木马

20240724 第三周周报.exe SHA256:090a42171e42477dbcf0d02a4e901e8eb20cfde8c1765c9a67a84bafd256b2a4

MD5:5cd7b3e9950c5169a5278bdee38438ef

C2:2gwxrah28rj0z.cfc-execute.bj.baidubce.com,downloadlog.oss-cn-chengdu.aliyuncs.com

攻击手法:go 编译,从对象存储中获取到加密载荷 CobaltStrike 木马

20240724 artifact.exe SHA256:c716ebfc4ae128c5d3b5a882683d7ca833bc4f339909cba4153425d4df765954

MD5:9974ad03575c5a8bfae6f2bb787321ea

C2:39.101.122.168:89

来源:CobaltStrike 木马

20240724 ***服务平台-存在弱口令漏洞.exe SHA256:2358438e0c5931b12b2233d449354d3db21e17c350fdf171298c6665514bc655

MD5:aef9c59cb030b7e4038ca9850c95f8a2

C2:www.tencentcloud.site

攻击手法:白加黑 CobaltStrike 木马

20240724 杨*.rar SHA256:7a5fdc1afaadd9d3673b922c45d65061b0ac01f9ffce6b0aec1126d843561f72

MD5:6a0427a10e8e51b1db6c5670fe071f82

相关IP域名:36.249.64.101:443(CDN),www.jinsixian.cn(Host)

攻击手法:域前置 CobaltStrike 木马

20240724 ***服务平台-存在弱口令漏洞.exe SHA256:2358438e0c5931b12b2233d449354d3db21e17c350fdf171298c6665514bc655

MD5:aef9c59cb030b7e4038ca9850c95f8a2

C2:www.tencentcloud.site

攻击手法:白加黑 CobaltStrike 木马

20240724 Desktop.exe SHA256:ce19a3062a20d0f2b0bc2a774c11912214aba6e27a191ae31bb96bf6610ca765

MD5:65c7f30fde67152da3176a8b55577acc

C2:101.132.194.179:8081

来源:CobaltStrike 木马

20240724 edragent SHA256:e3ef6b7090bba1ca1590f09538f2261d78dbfbea1435dd99b1e8e12e1636bbe5

MD5:a7a2d23e0b1941876d043f0af6e71110

C2:139.196.210.163:50010

来源:CobaltStrike 木马

© 版权声明
THE END
喜欢就支持一下吧
点赞10 分享
评论 抢沙发
头像
欢迎您留下宝贵的见解!
提交
头像

昵称

取消
昵称表情代码图片快捷回复

    暂无评论内容