Windows
Analysis Report
stage-0.bin.exe
Overview
General Information
Detection
GCleaner
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GCleaner
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
stage-0.bin.exe (PID: 1484 cmdline:
"C:\Users\ user\Deskt op\stage-0 .bin.exe" MD5: 8B7D2590F1FB0DFD81B796F4B4723542)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
GCleaner | No Attribution |
{"C2 addresses": ["185.172.128.90", "5.42.65.115"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
JoeSecurity_GCleaner | Yara detected GCleaner | Joe Security | ||
Click to see the 1 entries |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-07T17:35:27.732600+0100 | 2022930 | 1 | A Network Trojan was detected | 4.175.87.197 | 443 | 192.168.2.6 | 49758 | TCP |
2024-11-07T17:35:55.246016+0100 | 2022930 | 1 | A Network Trojan was detected | 4.175.87.197 | 443 | 192.168.2.6 | 53298 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-07T17:35:05.807851+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53308 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:19.807581+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 49709 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:33.312240+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 49752 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:46.820698+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 49813 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:00.443027+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 49828 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:13.937631+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53300 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:27.445639+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53301 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:40.958410+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53304 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:54.449681+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53305 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:37:07.954255+0100 | 2856233 | 1 | A Network Trojan was detected | 192.168.2.6 | 53307 | 185.172.128.90 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | Binary string: |
Source: | Code function: | 0_2_00415802 | |
Source: | Code function: | 0_2_00725A69 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IPs: | ||
Source: | IPs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00404610 | |
Source: | Code function: | 0_2_00409810 | |
Source: | Code function: | 0_2_00418101 | |
Source: | Code function: | 0_2_00413C09 | |
Source: | Code function: | 0_2_00413414 | |
Source: | Code function: | 0_2_00421DEE | |
Source: | Code function: | 0_2_00714877 | |
Source: | Code function: | 0_2_00719A77 | |
Source: | Code function: | 0_2_00728368 | |
Source: | Code function: | 0_2_0072367B |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_007BD3C6 |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00404610 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 | |
Source: | Command line argument: | 0_2_00714877 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Unpacked PE file: |
Source: | Code function: | 0_2_00408541 | |
Source: | Code function: | 0_2_007241D7 | |
Source: | Code function: | 0_2_0072C678 | |
Source: | Code function: | 0_2_0072C6C9 | |
Source: | Code function: | 0_2_007247CE | |
Source: | Code function: | 0_2_007187A8 | |
Source: | Code function: | 0_2_007C21A8 | |
Source: | Code function: | 0_2_007BE165 | |
Source: | Code function: | 0_2_007C21A8 | |
Source: | Code function: | 0_2_007C21A8 | |
Source: | Code function: | 0_2_007BFABE | |
Source: | Code function: | 0_2_007C03E7 | |
Source: | Code function: | 0_2_007C0442 | |
Source: | Code function: | 0_2_007BF5E3 | |
Source: | Code function: | 0_2_007BF5A9 |
Source: | Static PE information: |
Malware Analysis System Evasion |
---|
Source: | Stalling execution: | graph_0-25746 |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Code function: | 0_2_00415802 | |
Source: | Code function: | 0_2_00725A69 |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0040C12B |
Source: | Code function: | 0_2_00411142 | |
Source: | Code function: | 0_2_0040C631 | |
Source: | Code function: | 0_2_0071C898 | |
Source: | Code function: | 0_2_0071092B | |
Source: | Code function: | 0_2_007213A9 | |
Source: | Code function: | 0_2_00710D90 | |
Source: | Code function: | 0_2_007BCCA3 |
Source: | Code function: | 0_2_00416A3F |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_0040C12B | |
Source: | Code function: | 0_2_00407C46 | |
Source: | Code function: | 0_2_00408625 | |
Source: | Code function: | 0_2_004087B9 | |
Source: | Code function: | 0_2_0071888C | |
Source: | Code function: | 0_2_00718A20 | |
Source: | Code function: | 0_2_0071C392 | |
Source: | Code function: | 0_2_00717EAD |
Source: | Code function: | 0_2_00408823 |
Source: | Code function: | 0_2_004188F2 | |
Source: | Code function: | 0_2_0041893D | |
Source: | Code function: | 0_2_004189D8 | |
Source: | Code function: | 0_2_00411252 | |
Source: | Code function: | 0_2_00418A63 | |
Source: | Code function: | 0_2_00418CB6 | |
Source: | Code function: | 0_2_00418DDC | |
Source: | Code function: | 0_2_00418650 | |
Source: | Code function: | 0_2_00418EE2 | |
Source: | Code function: | 0_2_00411774 | |
Source: | Code function: | 0_2_00418FB1 | |
Source: | Code function: | 0_2_00729043 | |
Source: | Code function: | 0_2_007288B7 | |
Source: | Code function: | 0_2_00729149 | |
Source: | Code function: | 0_2_007219DB | |
Source: | Code function: | 0_2_00729218 | |
Source: | Code function: | 0_2_00728B59 | |
Source: | Code function: | 0_2_00728BA4 | |
Source: | Code function: | 0_2_00728C3F | |
Source: | Code function: | 0_2_00728CCA | |
Source: | Code function: | 0_2_007214B9 | |
Source: | Code function: | 0_2_00728F1D |
Source: | Code function: | 0_2_0040C9D1 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 21 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 3 Obfuscated Files or Information | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 22 Software Packing | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | ReversingLabs | Win32.Trojan.SmokeLoader | ||
100% | Avira | HEUR/AGEN.1312686 | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
⊘No contacted domains info
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.172.128.90 | unknown | Russian Federation | 50916 | NADYMSS-ASRU | true | |
5.42.65.115 | unknown | Russian Federation | 39493 | RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1551387 |
Start date and time: | 2024-11-07 17:34:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | stage-0.bin.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@0/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- VT rate limit hit for: stage-0.bin.exe
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.172.128.90 | Get hash | malicious | GCleaner, Nymaim | Browse |
| |
Get hash | malicious | Mars Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Bdaejec, GCleaner | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
5.42.65.115 | Get hash | malicious | GCleaner | Browse |
| |
Get hash | malicious | GCleaner, RedLine | Browse |
| ||
Get hash | malicious | LummaC, GCleaner, LummaC Stealer | Browse |
| ||
Get hash | malicious | GCleaner, RedLine | Browse |
|
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
NADYMSS-ASRU | Get hash | malicious | Atlantida Stealer | Browse |
| |
Get hash | malicious | Atlantida Stealer | Browse |
| ||
Get hash | malicious | GCleaner, Nymaim | Browse |
| ||
Get hash | malicious | Nymaim | Browse |
| ||
Get hash | malicious | Nymaim | Browse |
| ||
Get hash | malicious | Atlantida Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mars Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Bdaejec, GCleaner | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.570413348027663 |
TrID: |
|
File name: | stage-0.bin.exe |
File size: | 343'552 bytes |
MD5: | 8b7d2590f1fb0dfd81b796f4b4723542 |
SHA1: | b492d614f7749220b934127cdfc737426797890c |
SHA256: | b0968bdb6a175a38ec05efcf605ed61411d16e63e692bc0d7b8f1f747ce3b2e5 |
SHA512: | 5381413edddf5b7ed746fccf00560e0e326cf499b2149c2fe7fadca6511a6008d9ab6521c1bad1ab74c53765c27eed9c27a80879395597d22e2071b98dfd8f38 |
SSDEEP: | 3072:M4WBLuupGWmJT8kk4nhCvjzgQdeTDKnBmnMPbdyqJD2/OX3kaVw5OvRQ46+a:F4LgWC9k8Cvjz8TDKnBPb0wKWfvRQ4V |
TLSH: | EA745C03B2E1BD51E9278B729E2FC6F8366EF5608E59776E2218EE1F14B01B1C163711 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................PE..L...y..b................... |
Icon Hash: | 7141410943415053 |
Entrypoint: | 0x4025af |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x62F8C979 [Sun Aug 14 10:07:53 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | b585adb193cc73047fae4142a994b352 |
Instruction |
---|
call 00007F94EC52739Dh |
jmp 00007F94EC522F2Eh |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov edx, dword ptr [esp+0Ch] |
mov ecx, dword ptr [esp+04h] |
test edx, edx |
je 00007F94EC52311Bh |
xor eax, eax |
mov al, byte ptr [esp+08h] |
test al, al |
jne 00007F94EC5230C8h |
cmp edx, 00000100h |
jc 00007F94EC5230C0h |
cmp dword ptr [00447548h], 00000000h |
je 00007F94EC5230B7h |
jmp 00007F94EC527452h |
push edi |
mov edi, ecx |
cmp edx, 04h |
jc 00007F94EC5230E3h |
neg ecx |
and ecx, 03h |
je 00007F94EC5230BEh |
sub edx, ecx |
mov byte ptr [edi], al |
add edi, 01h |
sub ecx, 01h |
jne 00007F94EC5230A8h |
mov ecx, eax |
shl eax, 08h |
add eax, ecx |
mov ecx, eax |
shl eax, 10h |
add eax, ecx |
mov ecx, edx |
and edx, 03h |
shr ecx, 02h |
je 00007F94EC5230B8h |
rep stosd |
test edx, edx |
je 00007F94EC5230BCh |
mov byte ptr [edi], al |
add edi, 01h |
sub edx, 01h |
jne 00007F94EC5230A8h |
mov eax, dword ptr [esp+08h] |
pop edi |
ret |
mov eax, dword ptr [esp+04h] |
ret |
mov edi, edi |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
mov dword ptr [0043A200h], eax |
mov dword ptr [0043A204h], eax |
mov dword ptr [0043A208h], eax |
mov dword ptr [0043A20Ch], eax |
pop ebp |
ret |
mov edi, edi |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
mov ecx, dword ptr [004354ACh] |
push esi |
cmp dword ptr [eax+04h], edx |
je 00007F94EC5230C1h |
mov esi, ecx |
imul esi, esi, 0Ch |
add esi, dword ptr [ebp+08h] |
add eax, 0Ch |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3437c | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x48000 | 0x1a8c0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2f1e0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x33c70 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x33c28 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2f000 | 0x194 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2de76 | 0x2e000 | f6f6f9f0fa8f0eae5d4b4cfded21a7a5 | False | 0.7982814622961957 | data | 7.538305971867237 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2f000 | 0x5cba | 0x5e00 | 48759bc42397773d366f3362ad6507bc | False | 0.4256150265957447 | data | 5.810835322343505 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x35000 | 0x12564 | 0x5200 | 7096d9c211f4e1382ddd6c61e3f5e85b | False | 0.10642149390243902 | data | 1.2364473648857537 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x48000 | 0x1a8c0 | 0x1aa00 | 3b00dce7157587a18db38007d1d3df12 | False | 0.39469630281690143 | data | 4.658179050690975 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
AFX_DIALOG_LAYOUT | 0x5d078 | 0xe | data | 1.5714285714285714 | ||
LAW | 0x5b1f8 | 0x1e31 | ASCII text, with very long lines (7729), with no line terminators | Romanian | Romania | 0.5890800879803338 |
RT_CURSOR | 0x5d088 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | 0.2953091684434968 | ||
RT_CURSOR | 0x5df30 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | 0.46705776173285196 | ||
RT_CURSOR | 0x5e7d8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | 0.5361271676300579 | ||
RT_CURSOR | 0x5ed70 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | 0.26439232409381663 | ||
RT_CURSOR | 0x5fc18 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | 0.3686823104693141 | ||
RT_CURSOR | 0x604c0 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | 0.49060693641618497 | ||
RT_CURSOR | 0x60a58 | 0x130 | Device independent bitmap graphic, 32 x 64 x 1, image size 0 | 0.4375 | ||
RT_CURSOR | 0x60b88 | 0xb0 | Device independent bitmap graphic, 16 x 32 x 1, image size 0 | 0.44886363636363635 | ||
RT_ICON | 0x489c0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Romanian | Romania | 0.43390191897654584 |
RT_ICON | 0x49868 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Romanian | Romania | 0.5505415162454874 |
RT_ICON | 0x4a110 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | Romanian | Romania | 0.5852534562211982 |
RT_ICON | 0x4a7d8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Romanian | Romania | 0.611271676300578 |
RT_ICON | 0x4ad40 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.4446058091286307 |
RT_ICON | 0x4d2e8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Romanian | Romania | 0.4950750469043152 |
RT_ICON | 0x4e390 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.524822695035461 |
RT_ICON | 0x4e860 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors | Romanian | Romania | 0.5170575692963753 |
RT_ICON | 0x4f708 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors | Romanian | Romania | 0.5103790613718412 |
RT_ICON | 0x4ffb0 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors | Romanian | Romania | 0.45794930875576034 |
RT_ICON | 0x50678 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors | Romanian | Romania | 0.47398843930635837 |
RT_ICON | 0x50be0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | Romanian | Romania | 0.2816390041493776 |
RT_ICON | 0x53188 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | Romanian | Romania | 0.3074577861163227 |
RT_ICON | 0x54230 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304 | Romanian | Romania | 0.33647540983606555 |
RT_ICON | 0x54bb8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024 | Romanian | Romania | 0.37322695035460995 |
RT_ICON | 0x55098 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | Romanian | Romania | 0.494136460554371 |
RT_ICON | 0x55f40 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | Romanian | Romania | 0.4693140794223827 |
RT_ICON | 0x567e8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | Romanian | Romania | 0.43352601156069365 |
RT_ICON | 0x56d50 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | Romanian | Romania | 0.27634854771784234 |
RT_ICON | 0x592f8 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | Romanian | Romania | 0.2861163227016886 |
RT_ICON | 0x5a3a0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | Romanian | Romania | 0.30204918032786887 |
RT_ICON | 0x5ad28 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | Romanian | Romania | 0.33599290780141844 |
RT_STRING | 0x60e50 | 0x456 | data | Romanian | Romania | 0.4594594594594595 |
RT_STRING | 0x612a8 | 0x512 | data | Romanian | Romania | 0.4406779661016949 |
RT_STRING | 0x617c0 | 0x414 | data | Romanian | Romania | 0.45977011494252873 |
RT_STRING | 0x61bd8 | 0x598 | data | Romanian | Romania | 0.44273743016759776 |
RT_STRING | 0x62170 | 0x4aa | data | Romanian | Romania | 0.457286432160804 |
RT_STRING | 0x62620 | 0x29c | data | Romanian | Romania | 0.4865269461077844 |
RT_ACCELERATOR | 0x5d030 | 0x48 | data | Romanian | Romania | 0.8472222222222222 |
RT_GROUP_CURSOR | 0x5ed40 | 0x30 | data | 0.9375 | ||
RT_GROUP_CURSOR | 0x60a28 | 0x30 | data | 0.9375 | ||
RT_GROUP_CURSOR | 0x60c38 | 0x22 | data | 1.0588235294117647 | ||
RT_GROUP_ICON | 0x4e7f8 | 0x68 | data | Romanian | Romania | 0.6826923076923077 |
RT_GROUP_ICON | 0x55020 | 0x76 | data | Romanian | Romania | 0.6779661016949152 |
RT_GROUP_ICON | 0x5b190 | 0x68 | data | Romanian | Romania | 0.7115384615384616 |
RT_VERSION | 0x60c60 | 0x1f0 | MS Windows COFF PowerPC object file | 0.5362903225806451 |
DLL | Import |
---|---|
KERNEL32.dll | InterlockedIncrement, GetLogicalDriveStringsW, AddConsoleAliasW, GetModuleHandleW, GetTickCount, FindNextVolumeMountPointA, TlsSetValue, LoadLibraryW, SetCommConfig, AssignProcessToJobObject, WriteConsoleW, GetModuleFileNameW, CreateJobObjectA, InterlockedExchange, GetLastError, GetProcAddress, VirtualAlloc, SetVolumeLabelW, SetComputerNameExA, OpenMutexA, OpenWaitableTimerW, LocalAlloc, MoveFileA, GetNumberFormatW, RemoveDirectoryW, GlobalFindAtomW, EnumResourceTypesW, GetConsoleTitleW, VirtualProtect, GetFileAttributesExW, GetCurrentProcessId, UnregisterWaitEx, DeleteFileA, GetVolumeInformationW, LoadLibraryA, GetSystemDefaultLangID, FlushFileBuffers, UnhandledExceptionFilter, SetUnhandledExceptionFilter, Sleep, ExitProcess, GetStartupInfoW, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, HeapFree, TlsGetValue, TlsAlloc, TlsFree, SetLastError, GetCurrentThreadId, InterlockedDecrement, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, HeapCreate, VirtualFree, QueryPerformanceCounter, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, RaiseException, HeapAlloc, HeapReAlloc, HeapSize, RtlUnwind, GetLocaleInfoA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, CreateFileA, CloseHandle |
USER32.dll | GetMenu |
GDI32.dll | GetCharABCWidthsFloatW |
WINHTTP.dll | WinHttpSetOption |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Romanian | Romania |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-07T17:35:05.807851+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53308 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:19.807581+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 49709 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:27.732600+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.175.87.197 | 443 | 192.168.2.6 | 49758 | TCP |
2024-11-07T17:35:33.312240+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 49752 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:46.820698+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 49813 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:35:55.246016+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.175.87.197 | 443 | 192.168.2.6 | 53298 | TCP |
2024-11-07T17:36:00.443027+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 49828 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:13.937631+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53300 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:27.445639+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53301 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:40.958410+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53304 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:36:54.449681+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53305 | 185.172.128.90 | 80 | TCP |
2024-11-07T17:37:07.954255+0100 | 2856233 | ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) | 1 | 192.168.2.6 | 53307 | 185.172.128.90 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 7, 2024 17:35:11.319230080 CET | 49709 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:11.324541092 CET | 80 | 49709 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:11.324861050 CET | 49709 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:11.325412989 CET | 49709 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:11.330576897 CET | 80 | 49709 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:19.807385921 CET | 80 | 49709 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:19.807580948 CET | 49709 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:19.808077097 CET | 49709 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:19.813244104 CET | 80 | 49709 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:24.823981047 CET | 49752 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:24.828850031 CET | 80 | 49752 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:24.828950882 CET | 49752 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:24.829231024 CET | 49752 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:24.834613085 CET | 80 | 49752 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:33.312139034 CET | 80 | 49752 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:33.312239885 CET | 49752 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:33.318391085 CET | 49752 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:33.323286057 CET | 80 | 49752 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:38.324135065 CET | 49813 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:38.329207897 CET | 80 | 49813 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:38.329376936 CET | 49813 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:38.329468966 CET | 49813 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:38.334393978 CET | 80 | 49813 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:46.820544958 CET | 80 | 49813 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:46.820698023 CET | 49813 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:46.820970058 CET | 49813 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:46.825894117 CET | 80 | 49813 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:51.926984072 CET | 49828 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:51.931906939 CET | 80 | 49828 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:35:51.931972027 CET | 49828 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:51.938896894 CET | 49828 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:35:51.943846941 CET | 80 | 49828 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:00.442939043 CET | 80 | 49828 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:00.443027020 CET | 49828 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:00.443121910 CET | 49828 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:00.448411942 CET | 80 | 49828 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:05.449366093 CET | 53300 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:05.454289913 CET | 80 | 53300 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:05.454400063 CET | 53300 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:05.454579115 CET | 53300 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:05.459671021 CET | 80 | 53300 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:13.937483072 CET | 80 | 53300 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:13.937630892 CET | 53300 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:13.944804907 CET | 53300 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:13.949754953 CET | 80 | 53300 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:18.949109077 CET | 53301 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:18.954336882 CET | 80 | 53301 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:18.954425097 CET | 53301 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:18.954583883 CET | 53301 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:18.959824085 CET | 80 | 53301 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:27.445565939 CET | 80 | 53301 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:27.445638895 CET | 53301 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:27.445775986 CET | 53301 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:27.450790882 CET | 80 | 53301 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:32.450565100 CET | 53304 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:32.455548048 CET | 80 | 53304 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:32.455765009 CET | 53304 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:32.455765009 CET | 53304 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:32.460696936 CET | 80 | 53304 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:40.958333015 CET | 80 | 53304 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:40.958410025 CET | 53304 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:40.958492041 CET | 53304 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:40.963320017 CET | 80 | 53304 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:45.964895964 CET | 53305 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:45.969995975 CET | 80 | 53305 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:45.970105886 CET | 53305 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:45.971509933 CET | 53305 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:45.976314068 CET | 80 | 53305 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:54.449565887 CET | 80 | 53305 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:54.449681044 CET | 53305 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:54.449759960 CET | 53305 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:54.457983971 CET | 80 | 53305 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:59.464951992 CET | 53307 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:59.469940901 CET | 80 | 53307 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:36:59.470036030 CET | 53307 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:59.470169067 CET | 53307 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:36:59.475034952 CET | 80 | 53307 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:37:07.954180002 CET | 80 | 53307 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:37:07.954255104 CET | 53307 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:37:07.954330921 CET | 53307 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:37:07.959142923 CET | 80 | 53307 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:37:12.966455936 CET | 53308 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:37:12.971438885 CET | 80 | 53308 | 185.172.128.90 | 192.168.2.6 |
Nov 7, 2024 17:37:12.973639011 CET | 53308 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:37:12.973800898 CET | 53308 | 80 | 192.168.2.6 | 185.172.128.90 |
Nov 7, 2024 17:37:12.978746891 CET | 80 | 53308 | 185.172.128.90 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 7, 2024 17:35:53.066246033 CET | 53 | 52667 | 162.159.36.2 | 192.168.2.6 |
Nov 7, 2024 17:35:53.728171110 CET | 53 | 49777 | 1.1.1.1 | 192.168.2.6 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49709 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:35:11.325412989 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49752 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:35:24.829231024 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49813 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:35:38.329468966 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49828 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:35:51.938896894 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 53300 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:36:05.454579115 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 53301 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:36:18.954583883 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 53304 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:36:32.455765009 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 53305 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:36:45.971509933 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.6 | 53307 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:36:59.470169067 CET | 411 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.6 | 53308 | 185.172.128.90 | 80 | 1484 | C:\Users\user\Desktop\stage-0.bin.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 7, 2024 17:37:12.973800898 CET | 411 | OUT |
Target ID: | 0 |
Start time: | 11:35:08 |
Start date: | 07/11/2024 |
Path: | C:\Users\user\Desktop\stage-0.bin.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 343'552 bytes |
MD5 hash: | 8B7D2590F1FB0DFD81B796F4B4723542 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |