Click to jump to signature section
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Avira: detection malicious, Label: BDS/Backdoor.Gen7 |
Source: golfinfo.ini.0.dr | Malware Configuration Extractor: Urelas {"C2 url": ["218.54.28.139", "121.88.5.183"], "Drop filename": ["histe", "shoste"]} |
Source: A0cYOljhtv.exe | ReversingLabs: Detection: 89% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Joe Sandbox ML: detected |
Source: A0cYOljhtv.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: A0cYOljhtv.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2804923 - Severity 1 - ETPRO MALWARE Rootkit.Win32.Bootkor.ha CnC Traffic : 192.168.2.7:49717 -> 121.88.5.184:11170 |
Source: Network traffic | Suricata IDS: 2804923 - Severity 1 - ETPRO MALWARE Rootkit.Win32.Bootkor.ha CnC Traffic : 192.168.2.7:49700 -> 121.88.5.183:11120 |
Source: Malware configuration extractor | IPs: 218.54.28.139 |
Source: Malware configuration extractor | IPs: 121.88.5.183 |
Source: global traffic | TCP traffic: 192.168.2.7:49700 -> 121.88.5.183:11120 |
Source: global traffic | TCP traffic: 192.168.2.7:49717 -> 121.88.5.184:11170 |
Source: Joe Sandbox View | ASN Name: CNM-AS-KRDLIVEKR CNM-AS-KRDLIVEKR |
Source: Joe Sandbox View | ASN Name: CNM-AS-KRDLIVEKR CNM-AS-KRDLIVEKR |
Source: Joe Sandbox View | ASN Name: SKB-ASSKBroadbandCoLtdKR SKB-ASSKBroadbandCoLtdKR |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.183 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.183 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.183 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.183 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.183 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: unknown | TCP traffic detected without corresponding DNS query: 121.88.5.184 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Code function: 0_2_008443C9 recv,_memmove, | 0_2_008443C9 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Code function: 0_2_00842E60: CreateFileW,DeviceIoControl,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,CloseHandle, | 0_2_00842E60 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Code function: String function: 008B7650 appears 31 times | |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Code function: String function: 00847650 appears 31 times | |
Source: A0cYOljhtv.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@7/3@0/3 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2020:120:WilError_03 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | File created: C:\Users\user~1\AppData\Local\Temp\golfinfo.ini | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\sanfdr.bat" " |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Command line argument: Foilde | 0_2_00841000 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Command line argument: Foilde | 0_2_00841000 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Command line argument: 218.54.31.226 | 0_2_00841000 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Command line argument: tmp5RST.exe | 0_2_00841000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: Foilde | 8_2_008B1000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: Foilde | 8_2_008B1000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: 121.88.5.183 | 8_2_008B1000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: tmp5RST.exe | 8_2_008B1000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: tmp5RST.exe | 8_2_008B1000 |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Command line argument: tmp5RST.exe | 8_2_008B1000 |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | File read: C:\Users\user\Desktop\desktop.ini | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: A0cYOljhtv.exe | ReversingLabs: Detection: 89% |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | File read: C:\Users\user\Desktop\A0cYOljhtv.exe | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\A0cYOljhtv.exe "C:\Users\user\Desktop\A0cYOljhtv.exe" | |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Process created: C:\Users\user\AppData\Local\Temp\shoste.exe "C:\Users\user~1\AppData\Local\Temp\shoste.exe" | |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\sanfdr.bat" " | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Process created: C:\Users\user\AppData\Local\Temp\shoste.exe "C:\Users\user~1\AppData\Local\Temp\shoste.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user~1\AppData\Local\Temp\sanfdr.bat" " | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\shoste.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\A0cYOljhtv.exe | File written: C:\Users\user\AppData\Local\Temp\golfinfo.ini | Jump to behavior |