Windows
Analysis Report
Revised PI_2024.exe
Overview
General Information
Detection
GuLoader, Snake Keylogger
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Machine Learning detection for sample
Mass process execution to delay analysis
Obfuscated command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Classification
- System is w10x64native
Revised PI_2024.exe (PID: 5984 cmdline:
"C:\Users\ user\Deskt op\Revised PI_2024.e xe" MD5: 92A02307F4C44A671C89B1B3D217D019) cmd.exe (PID: 4252 cmdline:
cmd.exe /c set /a "2 50^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6332 cmdline:
cmd.exe /c set /a "2 44^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6776 cmdline:
cmd.exe /c set /a "2 27^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3276 cmdline:
cmd.exe /c set /a "2 55^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3084 cmdline:
cmd.exe /c set /a "2 44^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 2804 cmdline:
cmd.exe /c set /a "2 53^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 280 cmdline:
cmd.exe /c set /a "1 30^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 344 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3480 cmdline:
cmd.exe /c set /a "1 31^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 7796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3928 cmdline:
cmd.exe /c set /a "1 39^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 5052 cmdline:
cmd.exe /c set /a "1 39^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 7600 cmdline:
cmd.exe /c set /a "2 42^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 5240 cmdline:
cmd.exe /c set /a "1 95^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4560 cmdline:
cmd.exe /c set /a "2 12^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 840 cmdline:
cmd.exe /c set /a "2 08^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1600 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6332 cmdline:
cmd.exe /c set /a "1 97^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4528 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6776 cmdline:
cmd.exe /c set /a "2 12^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6248 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1268 cmdline:
cmd.exe /c set /a "2 47^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5452 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3084 cmdline:
cmd.exe /c set /a "2 16^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 600 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 2304 cmdline:
cmd.exe /c set /a "2 21^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 3484 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1396 cmdline:
cmd.exe /c set /a "2 12^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 7596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4980 cmdline:
cmd.exe /c set /a "2 40^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1568 cmdline:
cmd.exe /c set /a "1 53^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5752 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4668 cmdline:
cmd.exe /c set /a "2 20^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3400 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1940 cmdline:
cmd.exe /c set /a "1 95^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4932 cmdline:
cmd.exe /c set /a "1 33^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1600 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3920 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 2704 cmdline:
cmd.exe /c set /a "1 57^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6768 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 8080 cmdline:
cmd.exe /c set /a "2 16^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 3484 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4684 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 7596 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4528 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6104 cmdline:
cmd.exe /c set /a "2 01^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 600 cmdline:
cmd.exe /c set /a "1 37^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 8164 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 7796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4684 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4864 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1420 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1608 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3692 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 3440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 5052 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 624 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6812 cmdline:
cmd.exe /c set /a "1 57^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6424 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 7596 cmdline:
cmd.exe /c set /a "2 16^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4728 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 7624 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6412 cmdline:
cmd.exe /c set /a "1 57^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4720 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4344 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6248 cmdline:
cmd.exe /c set /a "1 93^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 2544 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 3440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6660 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 624 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6104 cmdline:
cmd.exe /c set /a "1 57^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 7796 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1404 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6000 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6876 cmdline:
cmd.exe /c set /a "2 16^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 1248 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6812 cmdline:
cmd.exe /c set /a "1 33^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4252 cmdline:
cmd.exe /c set /a "1 57^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 3276 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 4344 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 4180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 6248 cmdline:
cmd.exe /c set /a "2 16^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5052 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 2544 cmdline:
cmd.exe /c set /a "1 45^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 624 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 5820 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 3920 cmdline:
cmd.exe /c set /a "2 01^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 6976 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 280 cmdline:
cmd.exe /c set /a "1 37^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 1940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) cmd.exe (PID: 5424 cmdline:
cmd.exe /c set /a "1 29^177" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) Conhost.exe (PID: 2660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) Revised PI_2024.exe (PID: 2496 cmdline:
"C:\Users\ user\Deskt op\Revised PI_2024.e xe" MD5: 92A02307F4C44A671C89B1B3D217D019)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage?chat_id=6419839739"}
{"C2 url": "https://api.telegram.org/bot7403026399:AAFfphUcCNwXUYyJxcHC8R68pFj9jInz4Bk/sendMessage"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
Click to see the 7 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Timestamp: | 2024-07-23T12:54:26.900562+0200 |
SID: | 2853006 |
Source Port: | 49841 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Code function: | 131_2_33EFB768 | |
Source: | Code function: | 131_2_33EFBDF0 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00405464 | |
Source: | Code function: | 0_2_00405EA8 | |
Source: | Code function: | 0_2_00402645 | |
Source: | Code function: | 131_2_00402645 | |
Source: | Code function: | 131_2_00405464 | |
Source: | Code function: | 131_2_00405EA8 |
Source: | Code function: | 131_2_0015E438 | |
Source: | Code function: | 131_2_0015E438 | |
Source: | Code function: | 131_2_0015E00D | |
Source: | Code function: | 131_2_0015F780 | |
Source: | Code function: | 131_2_0015D7F8 | |
Source: | Code function: | 131_2_0015DE2B | |
Source: | Code function: | 131_2_33EFFB50 | |
Source: | Code function: | 131_2_33EF11C0 | |
Source: | Code function: | 131_2_33EF0D60 | |
Source: | Code function: | 131_2_33EFF6F8 | |
Source: | Code function: | 131_2_33EFF2A0 | |
Source: | Code function: | 131_2_33EFEE48 | |
Source: | Code function: | 131_2_33EFDA50 | |
Source: | Code function: | 131_2_33EFE9F0 | |
Source: | Code function: | 131_2_33EF11B7 | |
Source: | Code function: | 131_2_33EFE598 | |
Source: | Code function: | 131_2_33EFE140 | |
Source: | Code function: | 131_2_33EF1506 | |
Source: | Code function: | 131_2_33EF0900 | |
Source: | Code function: | 131_2_33EFDCE8 | |
Source: | Code function: | 131_2_33EF04A0 | |
Source: | Code function: | 131_2_33EF0040 | |
Source: | Code function: | 131_2_360BAD08 | |
Source: | Code function: | 131_2_360B9750 | |
Source: | Code function: | 131_2_360B3008 | |
Source: | Code function: | 131_2_360BA000 | |
Source: | Code function: | 131_2_360B8A20 | |
Source: | Code function: | 131_2_360B0040 | |
Source: | Code function: | 131_2_360BA458 | |
Source: | Code function: | 131_2_360B1A50 | |
Source: | Code function: | 131_2_360B3460 | |
Source: | Code function: | 131_2_360B8E78 | |
Source: | Code function: | 131_2_360B0498 | |
Source: | Code function: | 131_2_360B7898 | |
Source: | Code function: | 131_2_360B5AAB | |
Source: | Code function: | 131_2_360B1EA8 | |
Source: | Code function: | 131_2_360B5AB8 | |
Source: | Code function: | 131_2_360BA8B0 | |
Source: | Code function: | 131_2_360B92D0 | |
Source: | Code function: | 131_2_360B08F0 | |
Source: | Code function: | 131_2_360B2300 | |
Source: | Code function: | 131_2_360B7D18 | |
Source: | Code function: | 131_2_360B0D48 | |
Source: | Code function: | 131_2_360B2758 | |
Source: | Code function: | 131_2_360B8170 | |
Source: | Code function: | 131_2_360B9BA8 | |
Source: | Code function: | 131_2_360B11A0 | |
Source: | Code function: | 131_2_360B2BB0 | |
Source: | Code function: | 131_2_360B85C8 | |
Source: | Code function: | 131_2_360B5DCE | |
Source: | Code function: | 131_2_360B15F8 |
Networking |
---|
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |