不正URLへのアクセス、不正メールの受信
-
メール受信した
弊社お客様0社 URLアクセスした
弊社お客様0社 -
2023/02/07
※2023/02/07 更新
マルウェア感染させると考えられるURLを検知(2023/02/07)
■IoC(※1)
Type: | IOC: | Signature: |
---|---|---|
URL | hxxp://192[.]210[.]160[.]106/151/vbc[.]exe hxxp://192[.]210[.]160[.]106/51[.]doc |
Agent Tesla |
URL | hxxp://167[.]235[.]69[.]31/nppshell[.]exe hxxp://62[.]204[.]41[.]248/ki/rocku[.]exe hxxp://62[.]204[.]41[.]248/lebro[.]exe hxxp://5[.]75[.]139[.]35/so57Nst/index[.]php |
Amadey |
URL | hxxp://62[.]204[.]41[.]88/lend/DLGEN~ONT+QC[.]exe hxxp://arthurcambell[.]ac[.]ug/pm[.]exe |
AsyncRAT |
URL | hxxp://arthurcambell[.]ac[.]ug/azne[.]exe | Azorult |
URL | hxxp://103[.]179[.]172[.]2/a-r[.]m-5[.]AXIS hxxp://103[.]179[.]172[.]2/m-6[.]8-k[.]AXIS hxxp://103[.]179[.]172[.]2/x-8[.]6-[.]AXIS |
Bashlite |
URL | hxxps://msvtcvw[.]us/readerdc64[.]msi | BATLOADER |
URL | hxxp://dracjohnsupport[.]com/park/jeff[.]php | Bitter RAT |
URL | hxxps://megookbpnq[.]cf/herpetici[.]afm hxxp://megookbpnq[.]cf/Stille[.]sea |
CloudEyE |
URL | hxxp://185[.]225[.]74[.]52:443/favicon[.]js hxxp://45[.]12[.]253[.]139:443/an[.]js hxxp://118[.]194[.]252[.]253:9000/visit[.]js hxxp://119[.]91[.]148[.]9/push hxxp://159[.]138[.]5[.]204:443/push hxxp://159[.]138[.]5[.]204:443/submit[.]php hxxp://198[.]211[.]9[.]165/load hxxp://208[.]67[.]105[.]87:12338/push hxxp://212[.]193[.]30[.]14:8080/jquery-3[.]3[.]1[.]min[.]js hxxp://221[.]14[.]145[.]37/cm hxxp://221[.]14[.]145[.]37/submit[.]php hxxp://43[.]139[.]78[.]242:8090/__utm[.]gif hxxp://45[.]56[.]100[.]192:9090/match hxxp://49[.]4[.]88[.]243:82/match hxxp://54[.]208[.]41[.]185/Config hxxp://54[.]208[.]41[.]185/login hxxp://88[.]214[.]27[.]53:50004/push hxxp://goodsport2023[.]win/cx hxxp://windowsupdate-cdn[.]click:8880/ga[.]js hxxp://www[.]microsofe[.]xyz:8080/cm hxxps://108[.]165[.]178[.]42/updates[.]rss hxxps://125[.]76[.]247[.]137/en-us/silentauth hxxps://138[.]124[.]180[.]171:8080/fwlink hxxps://156[.]232[.]11[.]5/pixel hxxps://195[.]189[.]99[.]65:999/__utm[.]gif hxxps://198[.]211[.]9[.]165/pixel[.]gif hxxps://208[.]67[.]105[.]87:13443/cx hxxps://213[.]252[.]245[.]68/en_US/all[.]js hxxps://42[.]81[.]85[.]224/en-us/silentauth hxxps://45[.]207[.]58[.]57:2080/load hxxps://45[.]32[.]121[.]12:8443/jquery-3[.]3[.]1[.]min[.]js hxxps://54[.]248[.]1[.]227:4433/updates[.]rss hxxps://prod[.]risio[.]co[.]in/messages/B1fOncrhSeI1hn7Cj6qJmsSz7SYcUuCea8 hxxps://uranustechsolution[.]com/an[.]js |
Cobalt Strike |
URL | hxxp://62[.]109[.]5[.]68/Servergamemobilegame/Mathlimitlocal/coreprogrammessageboot/logscreendemo/pluginPref/poolWarrule/WarPrefbootCam/searcher/logprogramdemo/mobile/externalasynctest[.]php | DCRat |
URL | hxxps://10a44[.]samples[.]muzikcitysound[.]com/subscribeEvent hxxps://85638[.]samples[.]muzikcitysound[.]com/subscribeEvent hxxps://c4f22[.]samples[.]muzikcitysound[.]com/subscribeEvent |
FAKEUPDATES |
URL | hxxp://farmriterural[.]com[.]au/shederct2[.]1[.]exe hxxp://hard-wall[.]ru/bba[.]exe |
Formbook |
URL | hxxp://167[.]235[.]69[.]31/avicapn32[.]exe | Laplas |
URL | hxxp://185[.]246[.]220[.]85/minister/five/fre[.]php hxxp://194[.]180[.]49[.]166/Desktop/[.]win32[.]exe hxxp://202[.]55[.]134[.]52/Desktop/smss[.]exe |
LokiBot |
URL | hxxp://182[.]114[.]32[.]13:40099/Mozi[.]m | Mozi |
URL | hxxp://farmriterural[.]com[.]au/javonet2[.]1[.]exe | Nanocore RAT |
URL | hxxps://naomorrasemaceitarjesus[.]org[.]mz/TZnI9epGBbNfGb3[.]exe | NetWire RC |
URL | hxxp://185[.]215[.]113[.]66/newtpp[.]exe | Phorpiex |
URL | hxxp://al-hadin[.]com/pony/gate[.]php | Pony |
URL | hxxp://modeloartesanatos[.]com[.]br/wp-admin/images/Zqchb[.]bmp | PureCrypter |
URL | hxxp://128[.]254[.]207[.]55/86607[.]dat | QakBot |
URL | hxxp://195[.]201[.]23[.]180/urapwd2x[.]dll | Raccoon |
URL | hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/freebl3[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/mozglue[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/msvcp140[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/softokn3[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/sqlite3[.]dll hxxp://146[.]70[.]161[.]70/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/vcruntime140[.]dll |
RecordBreaker |
URL | hxxp://62[.]204[.]41[.]248/buba/gona[.]exe hxxp://62[.]204[.]41[.]248/mohna/ringo[.]exe hxxp://62[.]204[.]41[.]248/mohna/ringo1[.]exe hxxp://62[.]204[.]41[.]248/prata/trebo[.]exe |
RedLine Stealer |
URL | hxxp://arthurcambell[.]ac[.]ug/rc[.]exe | Remcos |
URL | hxxp://62[.]204[.]41[.]248/prata/trebo1[.]exe | Rhadamanthys |
URL | hxxp://bihsy[.]com/test1/get[.]php | STOP |
URL | hxxps://cryptoidea[.]help/downloads/metamask[.]exe hxxps://cryptoidea[.]help/downloads/video[.]exe hxxp://135[.]181[.]41[.]147/839 hxxp://49[.]12[.]79[.]235/656 hxxp://65[.]109[.]7[.]48/439 hxxp://65[.]109[.]7[.]48/670 hxxp://65[.]109[.]7[.]48/713 hxxp://65[.]109[.]7[.]48/855 hxxp://95[.]217[.]240[.]133/439 hxxp://95[.]217[.]240[.]133/562 hxxp://95[.]217[.]240[.]133/670 hxxp://95[.]217[.]240[.]133/888 hxxp://95[.]217[.]240[.]133/889 |
Vidar |