不正URLへのアクセス、不正メールの受信
-
メール受信した
弊社お客様0社 URLアクセスした
弊社お客様2社 -
2025/01/23
※2025/01/23 更新
マルウェア感染させると考えられるURLを検知(2025/01/23)
■IoC(※1)
Type: | IOC: | Signature: |
---|---|---|
URL | hxxp://185[.]215[.]113[.]16/inc/whiteshadow123[.]exe | CryptBot |
URL | hxxps://milta[.]shop/next-page-proceeding-waitv1[.]html hxxps://babbebange[.]cyou/api hxxps://sensatiogener[.]sbs/api hxxps://reflectepatt[.]click/api hxxps://writeimgaiin[.]cyou/api hxxps://kitestarepatt[.]click/api hxxps://milta[.]shop/riiw1-2[.]mp4 hxxps://deepvibes[.]shop/S5[.]mp4 hxxp://185[.]215[.]113[.]39/files/7559999840/rJDqJIa[.]exe hxxps://toppyneedus[.]biz/api hxxps://earthfarile[.]cyou/api hxxps://affordtempyo[.]biz/api hxxps://pleasedcfrown[.]biz/api hxxps://mixedrecipew[.]biz/api hxxps://measlyrefusz[.]biz/api hxxps://hoursuhouy[.]biz/api hxxps://lightdeerysua[.]biz/api hxxps://impolitewearr[.]biz/api hxxps://disgusterproduc[.]shop/api hxxps://danceselfyprem[.]shop/api hxxps://quarrelepek[.]bond/api hxxps://granystearr[.]bond/api hxxps://tranuqlekper[.]bond/api hxxp://62[.]60[.]226[.]64/public_files/rggkaFp[.]txt hxxps://amazingmassivei[.]shop/api hxxps://jlolaw[.]com/up/ hxxps://versedkinfe[.]sbs/api hxxps://markedgroud[.]shop/api hxxps://reflecpolit[.]shop/api |
Lumma Stealer |
URL | hxxp://175[.]107[.]38[.]208:40212/Mozi[.]m | Mozi |
URL | hxxps://llewen[.]com/4f1qw[.]js hxxp://nlafhhiffkceadc[.]top/1[.]php hxxps://liveskortv[.]icu/work/original[.]js hxxps://liveskortv[.]icu/work/index[.]php hxxps://liveskortv[.]icu/work/files[.]php hxxps://vglweb[.]com/6r9i[.]js hxxps://vglweb[.]com/js[.]php |
FAKEUPDATES |
URL | hxxp://45[.]131[.]215[.]139/4c0eeee3a4b86b26[.]php hxxp://82[.]115[.]223[.]182/encrypthub/stealc/stealc[.]exe hxxp://77[.]91[.]102[.]115/an7jd0qo6kt5bk5bq4er8fe1xp7hl2vk/nss3[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/vcruntime140[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/sqlite3[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/nss3[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/freebl3[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/softokn3[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/msvcp140[.]dll hxxp://45[.]91[.]201[.]142/ef0d63d53ef3bb6c/mozglue[.]dll hxxps://185[.]237[.]165[.]47/9b5e67be63d48ab6/mozglue[.]dll hxxps://185[.]237[.]165[.]47/9b5e67be63d48ab6/vcruntime140[.]dll |
Stealc |
URL | hxxps://140[.]238[.]122[.]17/payload[.]exe hxxp://154[.]201[.]66[.]166:801/02[.]08[.]2022[.]exe hxxp://124[.]221[.]100[.]215/02[.]08[.]2022[.]exe hxxp://156[.]238[.]249[.]185:8888/02[.]08[.]2022[.]exe hxxp://66[.]206[.]27[.]24/02[.]08[.]2022[.]exe hxxp://121[.]37[.]170[.]202:60020/02[.]08[.]2022[.]exe hxxp://120[.]26[.]164[.]174:8088/02[.]08[.]2022[.]exe hxxp://47[.]113[.]217[.]92:18888/02[.]08[.]2022[.]exe hxxp://43[.]143[.]235[.]189:42334/02[.]08[.]2022[.]exe hxxp://45[.]192[.]96[.]63:6001/02[.]08[.]2022[.]exe hxxp://83[.]229[.]122[.]83:801/02[.]08[.]2022[.]exe hxxp://82[.]156[.]0[.]140:9900/02[.]08[.]2022[.]exe hxxp://8[.]219[.]211[.]139/02[.]08[.]2022[.]exe hxxp://159[.]75[.]114[.]131:5465/02[.]08[.]2022[.]exe hxxp://120[.]26[.]164[.]174:8099/02[.]08[.]2022[.]exe hxxp://68[.]183[.]234[.]239:28080/02[.]08[.]2022[.]exe hxxp://124[.]71[.]164[.]7:5001/02[.]08[.]2022[.]exe hxxp://154[.]204[.]177[.]197/02[.]08[.]2022[.]exe hxxp://124[.]71[.]164[.]7:4433/02[.]08[.]2022[.]exe hxxp://202[.]162[.]99[.]38/02[.]08[.]2022[.]exe hxxp://94[.]156[.]167[.]138:8085/02[.]08[.]2022[.]exe hxxp://20[.]124[.]90[.]24/02[.]08[.]2022[.]exe hxxp://31[.]57[.]102[.]138/02[.]08[.]2022[.]exe |
Cobalt Strike |
URL | hxxps://tmpfiles[.]org/dl/19710343/build[.]exe | Vidar |
URL | hxxp://134[.]209[.]99[.]214/QuanTV%20Installer%20Graphics[.]exe | NjRAT |
URL | hxxp://85[.]235[.]74[.]64/Client[.]exe hxxp://198[.]12[.]81[.]151/xampp/kb/nicekickstartforgirlfriendjobwithgrreatthinkingbet[.]tIFF hxxp://87[.]120[.]116[.]179/files/Flaas[.]txt hxxp://upadaria[.]org/pr[.]txt hxxp://147[.]45[.]44[.]131/infopage/rtqagvxp[.]exe |
AsyncRAT |
URL | hxxp://http[.]vseuasthfxzzqxev[.]xyz/hidakibest[.]sh | Bashlite |
URL | hxxp://185[.]215[.]113[.]39/files/5589760584/fXWlfxf[.]exe hxxps://178[.]173[.]246[.]113/main[.]exe hxxps://admin[.]bookviewextranet[.]com/hotel/khYkKJlR?hoteladmin/ hxxps://polytechnix[.]com/npz5h |
XWorm |
URL | hxxp://172[.]245[.]119[.]74/xampp/mmn/nicethingforgreatthingsforgoodfor[.]hta hxxp://198[.]12[.]81[.]151/xampp/kb/kn/wemustlearnfromthegreatnewswithgoodcoveragegettingthings[.]hta hxxp://glennmedina[.]com/rem[.]txt hxxps://phimiclzwe[.]top/evbLkZMxVy8qo94[.]exe |
Remcos |
URL | hxxp://vikincdesigns[.]com/front[.]php | Satacom |
URL | hxxp://447320cm[.]nyashnyash[.]ru/Js_packetLinuxWordpressDatalife[.]php hxxp://525833cm[.]nyashnyash[.]ru/providerServerprotectTrafficDlePublic[.]php hxxp://31[.]58[.]58[.]231/_multiDump/updateJs/low/_7private/update/Private0Javascript/VideoWordpress/Datalifeexternal3/Generator/to/JsrequestTemp[.]php |
DCRat |
URL | hxxps://quickauto24[.]com/Trust[.]zip | NetSupportManager RAT |
URL | hxxps://185[.]184[.]26[.]10:4928/e4eb12414c95175ccfd/INSTALLS | Rhadamanthys |
URL | hxxp://www[.]emza[.]xyz/g10k/ hxxp://www[.]wiftly[.]company/g10k/ hxxp://www[.]mindap[.]xyz/g10k/ hxxp://www[.]ensentoto[.]cloud/g10k/ hxxp://www[.]idrift[.]net/g10k/ |
Formbook |
URL | hxxp://techstu[.]org:8080/eSign_Agreement-2025_46289[.]pdf[.]lnk hxxp://31[.]192[.]232[.]50:8080/eSign_Agreement-2025_46289[.]pdf[.]lnk |
MetaStealer |