Click to jump to signature section
Source: downloader.exe | ReversingLabs: Detection: 65% |
Source: downloader.exe | Virustotal: Detection: 68% | Perma Link |
Source: downloader.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: unknown | HTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.16:49700 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.16:49702 version: TLS 1.2 |
Source: Network traffic | Suricata IDS: 2018052 - Severity 1 - ET MALWARE Zbot Generic URI/Header Struct .bin : 192.168.2.16:49702 -> 185.199.110.133:443 |
Source: Network traffic | Suricata IDS: 2018052 - Severity 1 - ET MALWARE Zbot Generic URI/Header Struct .bin : 192.168.2.16:49700 -> 140.82.121.4:443 |
Source: Network traffic | Suricata IDS: 2010348 - Severity 1 - ET MALWARE - Possible Zeus/Perkesh (.bin) configuration download : 192.168.2.16:49702 -> 185.199.110.133:443 |
Source: Network traffic | Suricata IDS: 2010348 - Severity 1 - ET MALWARE - Possible Zeus/Perkesh (.bin) configuration download : 192.168.2.16:49700 -> 140.82.121.4:443 |
Source: global traffic | HTTP traffic detected: GET /AllsafeCyberSecurity/download_bin/raw/master/hello.bin HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /AllsafeCyberSecurity/download_bin/master/hello.bin HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: raw.githubusercontent.com |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /AllsafeCyberSecurity/download_bin/raw/master/hello.bin HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: github.comConnection: Keep-Alive |
Source: global traffic | HTTP traffic detected: GET /AllsafeCyberSecurity/download_bin/master/hello.bin HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: raw.githubusercontent.com |
Source: global traffic | DNS traffic detected: DNS query: allsafe.local |
Source: global traffic | DNS traffic detected: DNS query: github.com |
Source: global traffic | DNS traffic detected: DNS query: raw.githubusercontent.com |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49702 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49702 |
Source: unknown | HTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.16:49700 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.16:49702 version: TLS 1.2 |
Source: downloader.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal56.winEXE@2/1@3/26 |
Source: C:\Users\user\Desktop\downloader.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\hello[1].bin |
Source: downloader.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\downloader.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Source: downloader.exe | ReversingLabs: Detection: 65% |
Source: downloader.exe | Virustotal: Detection: 68% |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: apphelp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: urlmon.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: iertutil.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: srvcli.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: netutils.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: windows.storage.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: wldp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: profapi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: kernel.appcore.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: uxtheme.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: wininet.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: sspicli.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: ondemandconnroutehelper.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: winhttp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: mswsock.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: iphlpapi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: winnsi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: dnsapi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: rasadhlp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: fwpuclnt.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: schannel.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: mskeyprotect.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: ntasn1.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: msasn1.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: dpapi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: cryptsp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: rsaenh.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: cryptbase.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: gpapi.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: ncrypt.dll |
Source: C:\Users\user\Desktop\downloader.exe | Section loaded: ncryptsslp.dll |
Source: C:\Users\user\Desktop\downloader.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 |
Source: downloader.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: C:\Users\user\Desktop\downloader.exe | File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\hello[1].bin | Jump to dropped file |
Source: C:\Users\user\Desktop\downloader.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\hello[1].bin | Jump to dropped file |