Windows
Analysis Report
WNBOZYUN.msi
Overview
General Information
Detection
RedLine, SectopRAT
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
Yara detected SectopRAT
Connects to many ports of the same IP (likely port scanning)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
Is looking for software installed on the system
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64native
msiexec.exe (PID: 8008 cmdline:
"C:\Window s\System32 \msiexec.e xe" /i "C: \Users\use r\Desktop\ WNBOZYUN.m si" MD5: E5DA170027542E25EDE42FC54C929077)
msiexec.exe (PID: 3668 cmdline:
C:\Windows \system32\ msiexec.ex e /V MD5: E5DA170027542E25EDE42FC54C929077) msiexec.exe (PID: 1228 cmdline:
C:\Windows \syswow64\ MsiExec.ex e -Embeddi ng CF32977 746E218EEE DE7CA2544B 2F355 C MD5: 9D09DC1EDA745A5F87553048E57620CF) ISBEW64.exe (PID: 284 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{AA76FF C7-070F-48 AA-A57E-E6 EA04FB65AC } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 7604 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{92500C 82-953F-40 2F-B6F9-78 9DEC6E960E } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 5912 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{1E9B17 1B-8544-42 2E-9E42-CE F439811C75 } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 1752 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{715C38 EC-9C71-43 12-AEB8-36 B923691B1B } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 824 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{18A2E0 DE-C8B0-4F 09-8999-BC 6F4666FB02 } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 5528 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{A1B3A2 47-9AAE-4F 1C-8301-F3 1840EC13D8 } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 2788 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{27C98D 69-B6ED-43 25-8361-1D 393661067B } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 832 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{740CDD F4-C0DD-4B 2A-84ED-1D FE4BAB4319 } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 1752 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{24B6B0 B2-3219-47 E3-8888-4F 1C15C69403 } MD5: 40F3A092744E46F3531A40B917CCA81E) ISBEW64.exe (PID: 824 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{F85620 70-9974-4B 8E-BAB8-30 8A662C9869 }\ISBEW64. exe {EFB75 39B-24F3-4 6B6-AF6E-3 B021B51EFE F}:{561476 74-C8B6-4B E4-9BB1-66 8D7373710C } MD5: 40F3A092744E46F3531A40B917CCA81E) RoboTaskLite.exe (PID: 8216 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\{EE8A07 17-C2AE-41 88-8BEC-63 1BE53427B8 }\RoboTask Lite.exe MD5: 6EE5F7F9F0016B5CC4F93A949A08F0DC) RoboTaskLite.exe (PID: 8248 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ServiceVal id_testv2\ RoboTaskLi te.exe MD5: 6EE5F7F9F0016B5CC4F93A949A08F0DC) cmd.exe (PID: 8284 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 8292 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) MSBuild.exe (PID: 8688 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
RoboTaskLite.exe (PID: 9028 cmdline:
"C:\Users\ user\AppDa ta\Roaming \ServiceVa lid_testv2 \RoboTaskL ite.exe" MD5: 6EE5F7F9F0016B5CC4F93A949A08F0DC) cmd.exe (PID: 9048 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) conhost.exe (PID: 9060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) MSBuild.exe (PID: 9176 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
MALWARE_Win_Arechclient2 | Detects Arechclient2 RAT | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 10 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
MALWARE_Win_Arechclient2 | Detects Arechclient2 RAT | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Click to see the 10 entries |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-28T21:49:15.639349+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49721 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:16.332150+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49723 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:17.001457+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49724 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:17.669279+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49725 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:18.338009+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49726 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:19.009232+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49727 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:19.682736+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49728 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:20.341325+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49729 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:21.008206+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49730 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:21.676092+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49731 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:22.354750+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49732 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:23.025397+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49733 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:23.697663+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49734 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:24.356086+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49735 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:25.024715+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49736 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:25.688136+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49737 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:26.360321+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49738 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:27.042496+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49739 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:27.700237+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49740 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:28.371689+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49741 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:29.045551+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49742 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:29.726819+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49743 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:30.392725+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49744 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:31.091530+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49745 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:31.774416+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49746 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:32.444646+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49747 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:33.107175+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49748 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:33.779553+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49749 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:34.458836+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49750 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:35.119069+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49751 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:35.780920+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49752 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:36.459307+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49753 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:37.134636+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49754 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:37.816587+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49755 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:38.482749+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49756 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:39.154421+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49757 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:39.827188+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49758 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:40.507387+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49759 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:41.183527+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49760 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:41.863507+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49761 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:42.536772+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49762 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:43.207901+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49763 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:43.902691+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49764 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:44.570838+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49765 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:45.242743+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49766 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:45.914241+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49767 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:46.605846+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49768 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:47.274157+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49769 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:47.960716+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49770 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:48.680352+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49771 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:49.367194+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49772 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:50.052855+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49773 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:50.708820+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49774 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:51.373614+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49775 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:52.038264+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49776 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:52.722678+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49777 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:53.382829+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49778 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:54.067477+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49779 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:54.729970+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49780 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:55.424910+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49781 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:56.355608+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49782 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:57.138462+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49783 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:57.808303+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49784 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:58.725564+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49785 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:59.400724+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49786 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:00.317077+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49787 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:01.009304+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49788 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:01.678384+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49789 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:02.492395+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49790 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:03.322718+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49791 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:04.079042+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49792 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:04.997835+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49793 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:05.665489+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49794 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:06.365705+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49795 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:07.282606+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49796 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:07.943582+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49797 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:09.642044+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49798 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:10.343524+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49799 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:11.106605+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49800 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:13.036881+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49801 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:14.753432+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49802 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:15.662289+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49803 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:16.373764+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49804 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:17.172794+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49805 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:17.844478+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49806 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:18.760545+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49807 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:19.661929+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49808 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:20.564060+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49810 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:21.580581+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49812 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:22.522758+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49813 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:23.428336+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49814 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:24.252184+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49815 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:25.163162+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49816 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:25.954313+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49817 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:26.637128+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49818 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:27.307581+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49819 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:28.077227+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49820 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:28.755337+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49822 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:29.432979+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49824 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:30.356199+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49825 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:31.012721+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49826 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:31.740695+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49827 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:32.417387+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49828 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:33.086988+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49830 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:33.747692+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49831 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:34.428126+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49834 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:35.776972+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49836 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:36.494250+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49838 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:39.198102+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49842 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:39.858441+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49843 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:40.540355+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49844 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:41.429136+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49847 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:42.527982+0100 | 2052248 | 1 | A Network Trojan was detected | 192.168.11.20 | 49850 | 92.255.85.23 | 9000 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-28T21:49:16.332150+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49723 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:18.338009+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49726 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:19.682736+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49728 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:21.676092+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49731 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:22.354750+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49732 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:23.025397+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49733 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:25.024715+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49736 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:26.360321+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49738 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:28.371689+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49741 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:29.726819+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49743 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:31.091530+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49745 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:32.444646+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49747 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:33.779553+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49749 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:35.780920+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49752 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:37.816587+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49755 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:38.482749+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49756 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:39.154421+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49757 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:39.827188+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49758 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:40.507387+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49759 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:41.183527+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49760 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:43.207901+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49763 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:44.570838+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49765 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:48.680352+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49771 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:50.052855+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49773 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:50.708820+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49774 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:56.355608+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49782 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:49:59.400724+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49786 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:01.009304+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49788 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:05.665489+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49794 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:06.365705+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49795 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:16.373764+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49804 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:17.172794+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49805 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:18.760545+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49807 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:21.580581+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49812 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:22.522758+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49813 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:23.428336+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49814 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:24.252184+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49815 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:25.163162+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49816 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:25.954313+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49817 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:28.077227+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49820 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:31.012721+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49826 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:32.417387+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49828 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:33.086988+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49830 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:39.858441+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49843 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:40.540355+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49844 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:41.429136+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49847 | 92.255.85.23 | 9000 | TCP |
2025-02-28T21:50:42.527982+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49850 | 92.255.85.23 | 9000 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: | ||
Source: | Avira: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 21_2_0715BE18 | |
Source: | Code function: | 21_2_0715C3D8 |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 21_2_0338F0F8 | |
Source: | Code function: | 21_2_0338F0F8 | |
Source: | Code function: | 21_2_077300E5 | |
Source: | Code function: | 21_2_07739701 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |