Source: http://185.215.113.115/68b591d6548ec281/vcruntime140.dlln |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpAAFBGDBKJJJKFIIIJ |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/vcruntime140.dllc |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/msvcp140.dllBN |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/nss3.dllw |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/freebl3.dllbN |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/vcruntime140.dlls |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpp |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpl |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phprowser |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/vcruntime140.dll; |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpC |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phper |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpve |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpO |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpW |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/mozglue.dlle |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/softokn3.dllA |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/freebl3.dllO |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/vcruntime140.dll. |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.phpR0 |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/c4becf79229cb002.php%0 |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/Y |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/msvcp140.dllzN |
Avira URL Cloud: Label: malware |
Source: http://185.215.113.115/68b591d6548ec281/sqlite3.dll= |
Avira URL Cloud: Label: malware |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5EA9A0 PK11SDR_Decrypt,PORT_NewArena_Util,SEC_QuickDERDecodeItem_Util,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,PK11_GetInternalKeySlot,PK11_Authenticate,PORT_FreeArena_Util,PK11_ListFixedKeysInSlot,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_FreeSymKey,PORT_FreeArena_Util,PK11_FreeSymKey,SECITEM_ZfreeItem_Util, |
0_2_6C5EA9A0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E4440 PK11_PrivDecrypt, |
0_2_6C5E4440 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5B4420 SECKEY_DestroyEncryptedPrivateKeyInfo,memset,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,SECITEM_ZfreeItem_Util,SECITEM_ZfreeItem_Util,free, |
0_2_6C5B4420 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E44C0 PK11_PubEncrypt, |
0_2_6C5E44C0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C6325B0 PK11_Encrypt,memcpy,PR_SetError,PK11_Encrypt, |
0_2_6C6325B0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5EA650 PK11SDR_Encrypt,PORT_NewArena_Util,PK11_GetInternalKeySlot,PK11_Authenticate,SECITEM_ZfreeItem_Util,TlsGetValue,EnterCriticalSection,PR_Unlock,PK11_CreateContextBySymKey,PK11_GetBlockSize,PORT_Alloc_Util,memcpy,SECITEM_ZfreeItem_Util,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PORT_ArenaAlloc_Util,PK11_CipherOp,SEC_ASN1EncodeItem_Util,SECITEM_ZfreeItem_Util,PORT_FreeArena_Util,PK11_DestroyContext, |
0_2_6C5EA650 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5C8670 PK11_ExportEncryptedPrivKeyInfo, |
0_2_6C5C8670 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5CE6E0 PK11_AEADOp,TlsGetValue,EnterCriticalSection,PORT_Alloc_Util,PK11_Encrypt,PORT_Alloc_Util,memcpy,memcpy,PR_SetError,PR_SetError,PR_Unlock,PR_SetError,PR_Unlock,PK11_Decrypt,PR_GetCurrentThread,PK11_Decrypt,PK11_Encrypt,memcpy,memcpy,PR_SetError,free, |
0_2_6C5CE6E0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C60A730 SEC_PKCS12AddCertAndKey,PORT_ArenaMark_Util,PORT_ArenaMark_Util,PK11_FindKeyByAnyCert,SECKEY_DestroyPrivateKey,PORT_ArenaAlloc_Util,PR_SetError,PR_SetError,PK11_GetInternalKeySlot,PK11_FindKeyByAnyCert,SECKEY_DestroyPrivateKey,PORT_ArenaAlloc_Util,SECKEY_DestroyEncryptedPrivateKeyInfo,strlen,PR_SetError,PORT_FreeArena_Util,PORT_FreeArena_Util,PORT_ArenaAlloc_Util,PR_SetError, |
0_2_6C60A730 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C610180 SECMIME_DecryptionAllowed,SECOID_GetAlgorithmTag_Util, |
0_2_6C610180 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E43B0 PK11_PubEncryptPKCS1,PR_SetError, |
0_2_6C5E43B0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C607C00 SEC_PKCS12DecoderImportBags,PR_SetError,NSS_OptionGet,CERT_DestroyCertificate,SECITEM_ZfreeItem_Util,PR_SetError,SECKEY_DestroyPublicKey,SECITEM_ZfreeItem_Util,PR_SetError,SECKEY_DestroyPublicKey,SECITEM_ZfreeItem_Util,PR_SetError,SECOID_FindOID_Util,SECITEM_ZfreeItem_Util,SECKEY_DestroyPublicKey,SECOID_GetAlgorithmTag_Util,SECITEM_CopyItem_Util,PK11_ImportEncryptedPrivateKeyInfoAndReturnKey,SECITEM_ZfreeItem_Util,SECKEY_DestroyPublicKey,PK11_ImportPublicKey,SECOID_FindOID_Util, |
0_2_6C607C00 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5C7D60 PK11_ImportEncryptedPrivateKeyInfoAndReturnKey,SECOID_FindOID_Util,SECOID_FindOIDByTag_Util,PK11_PBEKeyGen,PK11_GetPadMechanism,PK11_UnwrapPrivKey,PK11_FreeSymKey,SECITEM_ZfreeItem_Util,PK11_PBEKeyGen,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_ImportPublicKey,SECKEY_DestroyPublicKey, |
0_2_6C5C7D60 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C60BD30 SEC_PKCS12IsEncryptionAllowed,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy,NSS_GetAlgorithmPolicy, |
0_2_6C60BD30 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C609EC0 SEC_PKCS12CreateUnencryptedSafe,PORT_ArenaMark_Util,PORT_ArenaAlloc_Util,PR_SetError,PR_SetError,SEC_PKCS7DestroyContentInfo, |
0_2_6C609EC0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E3FF0 PK11_PrivDecryptPKCS1, |
0_2_6C5E3FF0 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E3850 PK11_Encrypt,TlsGetValue,EnterCriticalSection,SEC_PKCS12SetPreferredCipher,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,PR_Unlock,TlsGetValue,EnterCriticalSection,PR_Unlock,PR_SetError, |
0_2_6C5E3850 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C5E9840 NSS_Get_SECKEY_EncryptedPrivateKeyInfoTemplate, |
0_2_6C5E9840 |
Source: C:\Users\user\Desktop\random(1).exe |
Code function: 0_2_6C60DA40 SEC_PKCS7ContentIsEncrypted, |
0_2_6C60DA40 |
Source: |
Binary string: mozglue.pdbP source: random(1).exe, 00000000.00000002.2028941439.000000006F8ED000.00000002.00000001.01000000.0000000A.sdmp, mozglue[1].dll.0.dr, mozglue.dll.0.dr |
Source: |
Binary string: freebl3.pdb source: freebl3[1].dll.0.dr, freebl3.dll.0.dr |
Source: |
Binary string: freebl3.pdbp source: freebl3[1].dll.0.dr, freebl3.dll.0.dr |
Source: |
Binary string: nss3.pdb@ source: random(1).exe, 00000000.00000002.2028728035.000000006C6BF000.00000002.00000001.01000000.00000009.sdmp, nss3.dll.0.dr, nss3[1].dll.0.dr |
Source: |
Binary string: softokn3.pdb@ source: softokn3[1].dll.0.dr, softokn3.dll.0.dr |
Source: |
Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.0.dr, vcruntime140[1].dll.0.dr |
Source: |
Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140[1].dll.0.dr, msvcp140.dll.0.dr |
Source: |
Binary string: nss3.pdb source: random(1).exe, 00000000.00000002.2028728035.000000006C6BF000.00000002.00000001.01000000.00000009.sdmp, nss3.dll.0.dr, nss3[1].dll.0.dr |
Source: |
Binary string: mozglue.pdb source: random(1).exe, 00000000.00000002.2028941439.000000006F8ED000.00000002.00000001.01000000.0000000A.sdmp, mozglue[1].dll.0.dr, mozglue.dll.0.dr |
Source: |
Binary string: softokn3.pdb source: softokn3[1].dll.0.dr, softokn3.dll.0.dr |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\random(1).exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49733 -> 185.215.113.115:80 |
Source: Network traffic |
Suricata IDS: 2044244 - Severity 1 - ET MALWARE Win32/Stealc Requesting browsers Config from C2 : 192.168.2.4:49733 -> 185.215.113.115:80 |
Source: Network traffic |
Suricata IDS: 2044245 - Severity 1 - ET MALWARE Win32/Stealc Active C2 Responding with browsers Config : 185.215.113.115:80 -> 192.168.2.4:49733 |
Source: Network traffic |
Suricata IDS: 2044246 - Severity 1 - ET MALWARE Win32/Stealc Requesting plugins Config from C2 : 192.168.2.4:49733 -> 185.215.113.115:80 |
Source: Network traffic |
Suricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 185.215.113.115:80 -> 192.168.2.4:49733 |
Source: Network traffic |
Suricata IDS: 2044248 - Severity 1 - ET MALWARE Win32/Stealc Submitting System Information to C2 : 192.168.2.4:49733 -> 185.215.113.115:80 |