Windows
Analysis Report
PRODUCT LIST.exe
Overview
General Information
Detection
RedLine
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
PRODUCT LIST.exe (PID: 5032 cmdline:
"C:\Users\ user\Deskt op\PRODUCT LIST.exe" MD5: A9B805862CCEE6848CE91EF51A31F71D) conhost.exe (PID: 5728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
{"C2 url": ["104.219.234.170:16383"], "Bot Id": "Ammy"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RedLine_1 | Yara detected RedLine Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen |
|
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:11.146262+0100 | 2045000 | 1 | Malware Command and Control Activity Detected | 104.219.234.170 | 16383 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:06.021573+0100 | 2849662 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:11.719835+0100 | 2849351 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:19.018903+0100 | 2848200 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:17.537122+0100 | 2849352 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0100E7B0 | |
Source: | Code function: | 0_2_0100DC90 | |
Source: | Code function: | 0_2_064D96D0 | |
Source: | Code function: | 0_2_064D4508 | |
Source: | Code function: | 0_2_064DD5C8 | |
Source: | Code function: | 0_2_064D33C0 | |
Source: | Code function: | 0_2_064DDAD0 | |
Source: | Code function: | 0_2_064D1210 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 221 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 741 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 561 Virtualization/Sandbox Evasion | Security Account Manager | 561 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 12 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 114 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | ReversingLabs | Win32.Trojan.Leonem | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ip.sb | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.219.234.170 | unknown | United States | 27176 | DATAWAGONUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561829 |
Start date and time: | 2024-11-24 11:48:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 39s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PRODUCT LIST.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@2/39@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 104.26.13.31, 104.26.12.31, 172.67.75.172
- Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: PRODUCT LIST.exe
Time | Type | Description |
---|---|---|
05:49:13 | API Interceptor |
⊘No context
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DATAWAGONUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | PureCrypter, MicroClip | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | StormKitty, XWorm | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2666 |
Entropy (8bit): | 5.345804351520589 |
Encrypted: | false |
SSDEEP: | 48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHpH8HKx1qHxLU:vq5qxqdqolqztYqh3oPtI6mq7qoT5JcE |
MD5: | 7ADCF08EB89A57934E566936815936CF |
SHA1: | C164331AA17656919323F4464BC1FC1EB1B8CA90 |
SHA-256: | 848A610C0FC09EF83A3DFC86A453C9B6F81DAA2A89779529254577F818E68933 |
SHA-512: | 54EB0F3313760BC4C88C736C5CE57B1890BBCD00376445B3BFC3BB17C6ACBCE22700491D96B6E7E926892555B2AC0C62F0C31557F0E00C00EA38D225228212D3 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 0.08235737944063153 |
Encrypted: | false |
SSDEEP: | 12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO |
MD5: | 369B6DD66F1CAD49D0952C40FEB9AD41 |
SHA1: | D05B2DE29433FB113EC4C558FF33087ED7481DD4 |
SHA-256: | 14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D |
SHA-512: | 771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 0.08235737944063153 |
Encrypted: | false |
SSDEEP: | 12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO |
MD5: | 369B6DD66F1CAD49D0952C40FEB9AD41 |
SHA1: | D05B2DE29433FB113EC4C558FF33087ED7481DD4 |
SHA-256: | 14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D |
SHA-512: | 771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.94563762416441 |
TrID: |
|
File name: | PRODUCT LIST.exe |
File size: | 1'776'640 bytes |
MD5: | a9b805862ccee6848ce91ef51a31f71d |
SHA1: | 4ca749b30f879945324811f5924996765aa7d2e4 |
SHA256: | 9bdef064f9693bbae4a073b09a795c7b27e7486c10b3c7d920019ca3729bb434 |
SHA512: | 94b6cc887127129a3b51dd68b8d29e417a70e7538668f5bfb4d5e1769d74e2ce44dcef9f36ab6021e04fb1e78f710bcc859163e064d91793e5a3b756fe067d97 |
SSDEEP: | 24576:DRhMoSwfXo0P9Ej+zE2bb1SfyeeYF2yjfLV/JFzQXYiU4L/E/pWWG8WHHSx44s8/:DgNwfevYoaTerPtsYikWWG8GJ88Y6eb |
TLSH: | 188533812523D06DD1FB083240BA2A2FFF5FBB104BA1A699EB4E55055B3ED5D4633E38 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..t............@.. ........@.. .......................@[...........@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x80e0b0 |
Entrypoint Section: | .boot |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xF00CA9A2 [Wed Aug 14 23:34:58 2097 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 4328f7206db519cd4e82283211d98e83 |
Instruction |
---|
call 00007FE614BE0420h |
push ebx |
mov ebx, esp |
push ebx |
mov esi, dword ptr [ebx+08h] |
mov edi, dword ptr [ebx+10h] |
cld |
mov dl, 80h |
mov al, byte ptr [esi] |
inc esi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE02BCh |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE0323h |
xor eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE03B7h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
je 00007FE614BE02DAh |
push edi |
mov eax, eax |
sub edi, eax |
mov al, byte ptr [edi] |
pop edi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
jmp 00007FE614BE026Bh |
mov eax, 00000001h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FE614BE02BCh |
sub eax, ebx |
mov ebx, 00000001h |
jne 00007FE614BE02FAh |
mov ecx, 00000001h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc ecx, ecx |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FE614BE02BCh |
push esi |
mov esi, edi |
sub esi, ebp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2203a | 0x50 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x24000 | 0x4e4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x2000 | 0x18000 | 0x8800 | c42c78b9832e754cb203176f75184e25 | False | 1.0006031709558822 | data | 7.994326576469916 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x1a000 | 0x4de | 0x400 | 4ca244fa9a5d437b9defb601583c39e2 | False | 0.7763671875 | data | 7.273072339326276 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x1c000 | 0xc | 0x200 | f24b480e2df71d69ab65261a0215f27d | False | 0.259765625 | data | 1.7804462848428606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | |
.vm_sec | 0x1e000 | 0x4000 | 0x4000 | d8f3017bae73815f607d2a4b3c4cefce | False | 0.1619873046875 | data | 2.885163065318065 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x22000 | 0x2000 | 0x200 | dbd0fc163d1022be46a45b67e74740b2 | False | 0.16796875 | data | 1.1405531534676816 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x24000 | 0x2000 | 0x600 | f1fd96ed080911bb2659a9b13cb47065 | False | 0.376953125 | data | 3.7440317633000992 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x26000 | 0x3e8000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x40e000 | 0x1a4200 | 0x1a4200 | 924e3b8c5d4f06112e3c6cc99d6da471 | False | 0.9948373809878013 | data | 7.95802050682975 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x24090 | 0x254 | data | 0.4597315436241611 | ||
RT_MANIFEST | 0x242f4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | English | United States | 0.5489795918367347 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
mscoree.dll | _CorExeMain |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:06.021573+0100 | 2849662 | ETPRO MALWARE RedLine - CheckConnect Request | 1 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:11.146262+0100 | 2045000 | ET MALWARE RedLine Stealer - CheckConnect Response | 1 | 104.219.234.170 | 16383 | 192.168.2.5 | 49704 | TCP |
2024-11-24T11:49:11.719835+0100 | 2849351 | ETPRO MALWARE RedLine - EnvironmentSettings Request | 1 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:17.537122+0100 | 2849352 | ETPRO MALWARE RedLine - SetEnvironment Request | 1 | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:19.018903+0100 | 2848200 | ETPRO MALWARE RedLine - GetUpdates Request | 1 | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 11:49:04.399722099 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.519484997 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:04.519578934 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.539392948 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.659301043 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:04.899913073 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:05.019463062 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:05.966825008 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:06.021573067 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.026755095 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.026813984 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.146261930 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.146336079 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719696999 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719723940 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719736099 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719810963 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719821930 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719831944 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719835043 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.719846964 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719867945 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719878912 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719890118 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719913960 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.719959974 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.727927923 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.771601915 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.839401007 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.880949020 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.930140972 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.930248022 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.930363894 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.934330940 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.934441090 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.934690952 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.942713022 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.942812920 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.943012953 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.951131105 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.951144934 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.951204062 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.959857941 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.959942102 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.959995031 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.967866898 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.967966080 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.968018055 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.977088928 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.977116108 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.977180958 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.984769106 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.984920979 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.984972954 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.993094921 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.993155956 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.993202925 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.001431942 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.001503944 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.001558065 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.009843111 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.009959936 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.010009050 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.050149918 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.050347090 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.050426006 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.140547991 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.140671015 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.140729904 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.143589020 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.143630028 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.143706083 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.148678064 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.148699045 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.148809910 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.154244900 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.154464006 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.154813051 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.159564972 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.159594059 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.159673929 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:15.885512114 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:15.885809898 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.006737947 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.006892920 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.006979942 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.006979942 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.007179976 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.007436037 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.133919954 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133938074 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133949041 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133960962 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133972883 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133984089 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133995056 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134006023 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134016991 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134028912 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134035110 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.134035110 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.253643990 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299760103 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299781084 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299793005 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299804926 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299817085 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299846888 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.482080936 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.483273983 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.537122011 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.602912903 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.603044987 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.603183031 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.722768068 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.959225893 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080063105 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080178022 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080210924 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080224991 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080238104 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080286980 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080286980 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080329895 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080342054 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080651999 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080732107 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.081258059 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.081542969 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.199924946 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200068951 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200081110 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200135946 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200191975 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.247931004 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.999927998 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:19.018763065 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:19.018903017 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 11:49:12.252300024 CET | 59493 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 24, 2024 11:49:12.252300024 CET | 192.168.2.5 | 1.1.1.1 | 0xb122 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 24, 2024 11:49:12.390635967 CET | 1.1.1.1 | 192.168.2.5 | 0xb122 | No error (0) | api.ip.sb.cdn.cloudflare.net | CNAME (Canonical name) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:04.539392948 CET | 242 | OUT | |
Nov 24, 2024 11:49:05.966825008 CET | 359 | IN | |
Nov 24, 2024 11:49:11.026755095 CET | 225 | OUT | |
Nov 24, 2024 11:49:11.719696999 CET | 1236 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:16.007179976 CET | 222 | OUT | |
Nov 24, 2024 11:49:17.482080936 CET | 294 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:17.603183031 CET | 242 | OUT | |
Nov 24, 2024 11:49:18.999927998 CET | 408 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:49:01 |
Start date: | 24/11/2024 |
Path: | C:\Users\user\Desktop\PRODUCT LIST.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1f0000 |
File size: | 1'776'640 bytes |
MD5 hash: | A9B805862CCEE6848CE91EF51A31F71D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:49:02 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |