malware-ioc/exchange_exploitation at master · eset/malware-ioc · GitHub
Skip to content

Latest commit

 

History

History

exchange_exploitation

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Microsoft Exchange Exploitation Indicators of Compromise

Table of Contents

Samples

SHA-1

ESET Detection name

Details

30dd3076ec9abb13c15053234c436406b88fb2b9

Win32/Korplug.RT

Calypso loader

eb8d39ce08b32a07b7d847f6c29f4471cd8264f2

Win32/Korplug.RU

Calypso loader

4f0ea31a363cfe0d2bbb4a0b4c5d558a87d8683e

Win32/Agent.ACUS

Calypso loader

2075d8e39b7d389f92fd97d97c41939f64822361

Win64/HackTool.Mimikat.A

Mimikat_ssp used by Calypso

02886f9daa13f7d9855855048c54f1d6b1231b0a

Win32/Agent.ACUQ

Opera Cobalt Strike loader

123cf9013fa73c4e1f8f68905630c8b5b481fce7

Win64/Mikroceen.AN

Mikroceen RAT

b873c80562a0d4c3d0f8507b7b8ec82c4df9fb07

Win64/HackTool.Mimikat.A

Mimikat_ssp used by Mikroceen

59c507bcbefca2e894471efbcd40b5aad5bc4ac8

Win32/HackTool.Proxy.A

Proxy used by Mikroceen

3d5d32a62f770608b6567ec5d18424c24c3f5798

Win64/Kryptik.CHN

ShadowPad backdoor used by Tonto Team

af421b1f5a08499e130d24f448f6d79f7c76af2b

Win64/Riskware.LsassDumper.J

LSASS dumper used by Tonto Team

1de8cbbf399cbc668b6dd6927cfee06a7281cda4

Win32/Agent.ACGZ

PlugX injector used by the Winnti Group

b8d7b850dc185160a24a3ee43606a9ef41d60e80

Win64/Winnti.DA

Winnti loader

33c7c049967f21da0f1431a2d134f4f1de9ec27e

Win64/HackTool.Mimikat.A

Mimikatz used by the Winnti Group

a0b86104e2d00b3e52bda5808cceed9842ce2cea

Win64/HackTool.Mimikat.A

Mimikatz used by the Winnti Group

281fa52b967b08dbc1b51bafbfbf7a258ff12e54

Win32/PSWTool.QuarksPwDump.E

Pasword dumper used by the Winnti Group

46f44b1760ff1dbab6aad44deb1d68bee0e714ea

Win64/Shadowpad.E

Unclassified ShadowPad

195fc90aee3917c94730888986e34a195c12ea78

Win64/Shadowpad.E

Unclassified ShadowPad

29d8dedcf19a8691b4a3839b805730dda9d0b87c

PowerShell/TrojanDownloader.Agent.CEK

DLTMiner

20546c5a38191d1080b4ee8adf1e54876bedfb9e

PowerShell/TrojanDownloader.Agent.CEK

DLTMiner

84f4aeab426ce01334fd2da3a11d981f6d9dcabb

Win64/Agent.AKS

Websiic

9afa2afb838caf2748d09d013d8004809d48d3e4

Win64/Agent.AKS

Websiic

3ed18fbe06d6ef2c8332db70a3221a00f7251d55

Win64/Agent.AKT

Websiic

aa9ba493cb9e9fa6f9599c513edbcbee84ececd6

Win64/Agent.IG

IIS Backoor

Network

Ip address / domain

Details

34.90.207[.]23

LuckyMouse SysUpdate C&C server

yolkish[.]com

Calypso C&C server

rawfuns[.]com

Calypso C&C server

86.105.18[.]116

“Opera Cobalt Strike” C&C & distribution server

89.34.111[.]11

“Opera Cobalt Strike” distribution server

172.105.18[.]72

Mikroceen RAT C&C server

194.68.44[.]19

Mikroceen proxy C&C server

www.averyspace[.]net

Tick Delphi backdoor C&C server

www.komdsecko[.]net

Tick Delphi backdoor C&C server

77.83.159[.]15

Tonto Team distribution server

lab.symantecsafe[.]org

Tonto Team ShadowPad C&C server

mm.portomnail[.]com

Winnti Group PlugX C&C server

back.rooter[.]tk

Winnti Group PlugX C&C server

161.129.64[.]124

Winnti malware C&C server

ns.rtechs[.]org

Unclassified ShadowPad C&C server

soft.mssysinfo[.]xyz

Unclassified ShadowPad C&C server

p.estonine[.]com

DLTMiner C&C server