Source: file.exe, 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:%u/ |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384248122.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1405022219.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426453259.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1303556511.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192/ |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384248122.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1405022219.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426453259.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1303556511.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192/; |
Source: file.exe, 00000000.00000003.1384248122.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1303556511.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1344211554.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384424235.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1343804099.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1324145477.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192/o |
Source: file.exe, 00000000.00000003.2355807803.000000000014E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1324145477.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/ |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919964890.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2124856393.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960279813.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2001232594.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2104552769.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041645667.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/)d |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444// |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426453259.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426854312.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/1e |
Source: file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757443023.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1715028291.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1714700662.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797376850.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/20 |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/ |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/5/ |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/9d |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253880468.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2124856393.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2104552769.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2294278387.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041645667.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210661642.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2212088351.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/pdates.rss |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253880468.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919964890.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/updates.rss |
Source: file.exe, 00000000.00000003.2355807803.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/209.192:444/updates.rssad |
Source: file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253880468.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2294278387.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210661642.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2212088351.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/5/ |
Source: file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253880468.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2294278387.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210661642.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2212088351.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/9d |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634599084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569716854.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/Ad |
Source: file.exe, 00000000.00000003.1405022219.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/Qd |
Source: file.exe, 00000000.00000003.1467199619.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1467558003.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507891892.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000149000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000149000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/Qg |
Source: file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/S |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/Yd$ |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/Yg$ |
Source: file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/_ |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/a |
Source: file.exe, 00000000.00000003.1507891892.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000149000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/ae |
Source: file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919916767.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797376850.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/o |
Source: file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/pdates.rss |
Source: file.exe, 00000000.00000002.3709866097.000000000014E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/pdates.rssyd |
Source: file.exe, 00000000.00000003.2355807803.000000000014E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1324145477.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss |
Source: file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2699191944.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507891892.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2619393287.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797376850.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000149000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss%~ |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919916767.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2104552769.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss( |
Source: file.exe, 00000000.00000003.2415595495.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1324145477.000000000014A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1343804099.000000000014A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634599084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1344263330.000000000014A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569716854.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384248122.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2779948550.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384424235.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2375442389.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1614451350.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1589240884.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1589425126.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss.~ |
Source: file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1549193452.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041645667.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss1~ |
Source: file.exe, 00000000.00000003.3064924684.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.3024672136.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss4~ |
Source: file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878250381.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2983362217.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1940682857.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919964890.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960279813.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1549193452.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss7~ |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2124856393.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2104552769.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss=~ |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3709624199.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1589240884.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssF |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssId |
Source: file.exe, 00000000.00000002.3709624199.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssL |
Source: file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634599084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569716854.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674772703.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757443023.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1715028291.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1549193452.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1614451350.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1714700662.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssQg |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210661642.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2104552769.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssR |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1589240884.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1714700662.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919916767.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssX |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384248122.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1405022219.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426453259.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssb |
Source: file.exe, 00000000.00000003.1384248122.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1364777586.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1344211554.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1384424235.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1343804099.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1324145477.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssmui |
Source: file.exe, 00000000.00000003.1488138869.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1405022219.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1426453259.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1447653763.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1507671346.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1467199619.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssmui( |
Source: file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2355807803.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3709624199.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssmuih |
Source: file.exe, 00000000.00000003.2124856393.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2274385808.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1528474940.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1695341643.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1981125983.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2000941231.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335061965.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2041409022.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1757230911.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1548051388.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1589240884.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1714700662.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1899474923.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919916767.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssn |
Source: file.exe, 00000000.00000002.3709358127.00000000000FC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssr |
Source: file.exe, 00000000.00000003.2125826358.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081782043.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2062212310.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2166903788.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2293920913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1858506141.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2314872826.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2082132459.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1960016913.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1919731532.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1735670165.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2021921590.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634599084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1878001612.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2315065289.000000000014D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rssyd |
Source: file.exe, 00000000.00000003.1797616084.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1838015921.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.3105085222.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2189422108.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2860667309.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1837792556.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1777823088.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817986661.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2210661642.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2212088351.0000000000148000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1797376850.0000000000148000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/updates.rss~ |
Source: file.exe, 00000000.00000003.2166903788.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1634376076.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2234089313.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1614451350.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2253620833.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2147046630.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1655029615.0000000000124000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1674553440.0000000000124000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.74.209.192:444/w |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Rule for beacon reflective loader Author: unknown |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 0.2.file.exe.a30000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a30000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 0.2.file.exe.a90000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710494904.0000000000A90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13 |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 00000000.00000002.3710436556.0000000000A30000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: Process Memory Space: file.exe PID: 7360, type: MEMORYSTR | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |