Windows
Analysis Report
M1gP5m86Gn.exe
Overview
General Information
Sample name: | M1gP5m86Gn.exerenamed because original name is a hash value |
Original sample name: | dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258.exe |
Analysis ID: | 1636343 |
MD5: | accdbd5044408c82c19c977829713e4f |
SHA1: | 070a001ac12139cc1238017d795a2b43ac52770d |
SHA256: | dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
M1gP5m86Gn.exe (PID: 7532 cmdline:
"C:\Users\ user\Deskt op\M1gP5m8 6Gn.exe" MD5: ACCDBD5044408C82C19C977829713E4F)
- cleanup
{"C2 url": ["hardswarehub.today", "gadgethgfub.icu", "hardrwarehaven.run", "techmindzs.live", "codxefusion.top", "quietswtreams.life", "techspherxe.top"], "Build id": "6JVBTX--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:21.278822+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49699 | 104.73.234.102 | 443 | TCP |
2025-03-12T17:04:21.278822+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49696 | 172.67.214.226 | 443 | TCP |
2025-03-12T17:04:32.359649+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49694 | 149.154.167.99 | 443 | TCP |
2025-03-12T17:04:34.185170+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49695 | 104.21.69.194 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:34.185170+0100 | 2060531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49695 | 104.21.69.194 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:21.278822+0100 | 2060570 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49696 | 172.67.214.226 | 443 | TCP |
2025-03-12T17:04:21.278822+0100 | 2060570 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49697 | 172.67.214.226 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:33.633705+0100 | 2060530 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 55181 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:36.328902+0100 | 2060412 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 63415 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:33.597605+0100 | 2060538 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 57995 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:33.611026+0100 | 2060542 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 51154 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:33.583307+0100 | 2060545 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 65257 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:34.189070+0100 | 2060416 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 51732 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:33.621704+0100 | 2060565 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 64277 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:34.201006+0100 | 2060568 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 50052 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:35.209819+0100 | 2060568 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 50052 | 1.1.1.1 | 53 | UDP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
83% | ReversingLabs | Win32.Spyware.Lummastealer | ||
77% | Virustotal | Browse | ||
100% | Avira | TR/AD.Nekark.sbdyl |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
techspherxe.top | 172.67.214.226 | true | false | high | |
codxefusion.top | 104.21.69.194 | true | false | high | |
steamcommunity.com | 104.73.234.102 | true | false | high | |
t.me | 149.154.167.99 | true | false | high | |
quietswtreams.life | unknown | unknown | false | high | |
earthsymphzony.today | unknown | unknown | false | high | |
hardswarehub.today | unknown | unknown | false | high | |
socialsscesforum.icu | unknown | unknown | false | unknown | |
techmindzs.live | unknown | unknown | true | unknown | |
gadgethgfub.icu | unknown | unknown | false | high | |
hardrwarehaven.run | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.214.226 | techspherxe.top | United States | 13335 | CLOUDFLARENETUS | false | |
104.21.69.194 | codxefusion.top | United States | 13335 | CLOUDFLARENETUS | false | |
104.73.234.102 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1636343 |
Start date and time: | 2025-03-12 17:03:23 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 18s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | M1gP5m86Gn.exerenamed because original name is a hash value |
Original Sample Name: | dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258.exe |
Detection: | MAL |
Classification: | mal100.troj.winEXE@1/0@12/4 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 23.199.214.10
- Excluded domains from analysis (whitelisted): fs.microsoft.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
12:04:33 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.214.226 | Get hash | malicious | LummaC Stealer | Browse | ||
104.21.69.194 | Get hash | malicious | ScreenConnect Tool, Amadey, LummaC Stealer, PureLog Stealer, Vidar, zgRAT | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
104.73.234.102 | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Amadey, DCRat, LummaC Stealer, PureLog Stealer, zgRAT | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
149.154.167.99 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cinoshi Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
techspherxe.top | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
codxefusion.top | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | Amadey, GCleaner, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | AsyncRAT, XWorm | Browse |
| |
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
File type: | |
Entropy (8bit): | 4.852022474951185 |
TrID: |
|
File name: | M1gP5m86Gn.exe |
File size: | 7'974'400 bytes |
MD5: | accdbd5044408c82c19c977829713e4f |
SHA1: | 070a001ac12139cc1238017d795a2b43ac52770d |
SHA256: | dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258 |
SHA512: | 34fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85 |
SSDEEP: | 98304:fYRhnYdlvIib45D+ZicbrZRutIvD0wi9Q1Tjr+RTO7EC5pqQ5eoQQMgX3Q6jEd8O:5H8QK2GcJL |
TLSH: | 76866260D0179442E9D2387C9B403ADAF42A28F62E574970760E7E2CFC99918E7F9F17 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...s...s...s...b...r...8...v...s...o.......r.....k.r.......r...Richs...................PE..L......g...............+..v........ |
Icon Hash: | 0f2b397453112b0f |
Entrypoint: | 0x4014c0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67C510AF [Mon Mar 3 02:15:11 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 2b3730cda46affc8837a7df18591704a |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 00000418h |
call 00007F60A87B88E7h |
movzx eax, al |
test eax, eax |
jne 00007F60A87B889Bh |
push 00000001h |
call dword ptr [00B6F028h] |
nop |
call 00007F60A87B8542h |
push 00000104h |
lea ecx, dword ptr [ebp-0000020Ch] |
push ecx |
push 00000000h |
call dword ptr [00B6F038h] |
lea edx, dword ptr [ebp-00000418h] |
push edx |
push 00000104h |
call dword ptr [00B6F008h] |
call 00007F60A87CC6B7h |
push 00000001h |
call dword ptr [00B6F028h] |
nop |
mov esp, ebp |
pop ebp |
retn 0010h |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
sub esp, 2Ch |
lea eax, dword ptr [ebp-2Ch] |
push eax |
call dword ptr [00B6F02Ch] |
mov ecx, dword ptr [ebp-18h] |
mov dword ptr [ebp-04h], ecx |
cmp dword ptr [ebp-04h], 02h |
jnc 00007F60A87B8896h |
xor al, al |
jmp 00007F60A87B88E3h |
push 00B6F078h |
push 00B6F088h |
call dword ptr [00B6F03Ch] |
push eax |
call dword ptr [00B6F040h] |
test eax, eax |
je 00007F60A87B8896h |
xor al, al |
jmp 00007F60A87B88C4h |
push 00B6F0A4h |
call dword ptr [00B6F044h] |
mov dword ptr [ebp-08h], eax |
cmp dword ptr [ebp-08h], 00000000h |
je 00007F60A87B8896h |
xor al, al |
jmp 00007F60A87B88ACh |
push 000007D0h |
call 00007F60A87B85A4h |
add esp, 04h |
movzx edx, al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x76f214 | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x771000 | 0x2b4b0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x79d000 | 0xcbc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x76f0b8 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x76f000 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x76dd2b | 0x76de00 | f1cb89fa5c9e46045f02e8c15276e5e6 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x76f000 | 0x4d6 | 0x600 | feca90569e92c8e8352a08729f6e2a54 | False | 0.4537760416666667 | data | 4.3084225799617855 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x770000 | 0x50 | 0x200 | a6ce571490641746fab3ed64bebe94ea | False | 0.044921875 | data | 0.12227588125913882 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x771000 | 0x2b4b0 | 0x2b600 | f24ea25e3a9c418791d2c53d4feebfcd | False | 0.13140534942363113 | data | 4.41940658954128 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x79d000 | 0xcbc | 0xe00 | ea896715c57611e7b02ea0df87211b1c | False | 0.47293526785714285 | data | 3.89339994868857 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x772f20 | 0x13e0 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9901729559748428 | ||
RT_ICON | 0x774300 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | 0.04153850703892109 | ||
RT_ICON | 0x784b28 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | 0.07649253731343283 | ||
RT_ICON | 0x78dfd0 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | 0.09658040665434381 | ||
RT_ICON | 0x793458 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | 0.08904109589041095 | ||
RT_ICON | 0x797680 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | 0.15435684647302905 | ||
RT_ICON | 0x799c28 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | 0.1925422138836773 | ||
RT_ICON | 0x79acd0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | 0.3094262295081967 | ||
RT_ICON | 0x79b658 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | 0.4370567375886525 | ||
RT_MENU | 0x771630 | 0x274 | data | 0.5509554140127388 | ||
RT_MENU | 0x7718a8 | 0x368 | data | 0.551605504587156 | ||
RT_MENU | 0x771c10 | 0x416 | data | 0.5296367112810707 | ||
RT_MENU | 0x772028 | 0x288 | data | 0.5694444444444444 | ||
RT_MENU | 0x7722b0 | 0x2c6 | Matlab v4 mat-file (little endian) Y, numeric, rows 5242896, columns 7340119, imaginary | 0.5535211267605634 | ||
RT_MENU | 0x772578 | 0x300 | data | 0.5455729166666666 | ||
RT_MENU | 0x772878 | 0x2f0 | data | 0.5558510638297872 | ||
RT_MENU | 0x772b68 | 0x1d6 | data | 0.6063829787234043 | ||
RT_DIALOG | 0x772d40 | 0x114 | data | 0.7282608695652174 | ||
RT_STRING | 0x79bff0 | 0x92 | data | 0.7465753424657534 | ||
RT_STRING | 0x79c088 | 0x17e | data | 0.6596858638743456 | ||
RT_STRING | 0x79c208 | 0x1a2 | data | 0.6435406698564593 | ||
RT_STRING | 0x79c3b0 | 0xfa | data | 0.676 | ||
RT_ACCELERATOR | 0x772e58 | 0x30 | data | 0.8958333333333334 | ||
RT_ACCELERATOR | 0x772e88 | 0x20 | data | 1.0625 | ||
RT_ACCELERATOR | 0x772ea8 | 0x20 | data | 1.0625 | ||
RT_ACCELERATOR | 0x772ec8 | 0x28 | data | 0.925 | ||
RT_ACCELERATOR | 0x772ef0 | 0x30 | data | 0.8958333333333334 | ||
RT_GROUP_ICON | 0x79bac0 | 0x84 | data | 0.7272727272727273 | ||
RT_VERSION | 0x79bb48 | 0x4a4 | data | 0.4057239057239057 |
DLL | Import |
---|---|
KERNEL32.dll | GetCommandLineA, GetEnvironmentStringsW, GetTempPathW, GetLastError, HeapAlloc, HeapFree, GetProcessHeap, SetCriticalSectionSpinCount, Sleep, GetCurrentProcess, ExitProcess, GetSystemInfo, GetVersion, GetTickCount, GetModuleFileNameW, GetModuleHandleW, GetProcAddress, LoadLibraryW, GlobalAlloc, GlobalFree, MultiByteToWideChar, ConvertDefaultLocale |
USER32.dll | IsWindowVisible, GetWindowContextHelpId, MessageBoxA, GetWindowLongW, IsDialogMessageW, RegisterClassW |
Description | Data |
---|---|
Comments | This program's analytics tools provide valuable insights into my performance |
CompanyName | TechSphere Enterprises Technologies. |
FileDescription | This program's analytics tools provide valuable insights into my performance |
FileVersion | 9.1.22.897 |
InternalName | TaskForgeApp |
LegalCopyright | Copyright (C) 2022-2025 by TechSphere Enterprises Technologies. |
OriginalFilename | CodeBridge.exe |
ProductName | Task Manager DeLuxe |
ProductVersion | 9.1.22.897 |
Translation | 0x0409 0x04b0 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-12T17:04:21.278822+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49699 | 104.73.234.102 | 443 | TCP |
2025-03-12T17:04:21.278822+0100 | 2060570 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (techspherxe .top in TLS SNI) | 1 | 192.168.2.6 | 49696 | 172.67.214.226 | 443 | TCP |
2025-03-12T17:04:21.278822+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49696 | 172.67.214.226 | 443 | TCP |
2025-03-12T17:04:21.278822+0100 | 2060570 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (techspherxe .top in TLS SNI) | 1 | 192.168.2.6 | 49697 | 172.67.214.226 | 443 | TCP |
2025-03-12T17:04:32.359649+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49694 | 149.154.167.99 | 443 | TCP |
2025-03-12T17:04:33.583307+0100 | 2060545 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (hardswarehub .today) | 1 | 192.168.2.6 | 65257 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:33.597605+0100 | 2060538 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gadgethgfub .icu) | 1 | 192.168.2.6 | 57995 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:33.611026+0100 | 2060542 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (hardrwarehaven .run) | 1 | 192.168.2.6 | 51154 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:33.621704+0100 | 2060565 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (techmindzs .live) | 1 | 192.168.2.6 | 64277 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:33.633705+0100 | 2060530 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (codxefusion .top) | 1 | 192.168.2.6 | 55181 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:34.185170+0100 | 2060531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (codxefusion .top in TLS SNI) | 1 | 192.168.2.6 | 49695 | 104.21.69.194 | 443 | TCP |
2025-03-12T17:04:34.185170+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49695 | 104.21.69.194 | 443 | TCP |
2025-03-12T17:04:34.189070+0100 | 2060416 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (quietswtreams .life) | 1 | 192.168.2.6 | 51732 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:34.201006+0100 | 2060568 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (techspherxe .top) | 1 | 192.168.2.6 | 50052 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:35.209819+0100 | 2060568 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (techspherxe .top) | 1 | 192.168.2.6 | 50052 | 1.1.1.1 | 53 | UDP |
2025-03-12T17:04:36.328902+0100 | 2060412 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (earthsymphzony .today) | 1 | 192.168.2.6 | 63415 | 1.1.1.1 | 53 | UDP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 12, 2025 17:04:30.253824949 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:30.253876925 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:30.253947973 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:30.257812023 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:30.257837057 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:32.359585047 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:32.359648943 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:32.381828070 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:32.381838083 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:32.382039070 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:32.435075045 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:32.707916021 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:32.748367071 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557496071 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557518959 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557526112 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557544947 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557554007 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557578087 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:33.557581902 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557599068 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557611942 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.557641983 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:33.557667017 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:33.560419083 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:33.560425043 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.560444117 CET | 49694 | 443 | 192.168.2.6 | 149.154.167.99 |
Mar 12, 2025 17:04:33.560448885 CET | 443 | 49694 | 149.154.167.99 | 192.168.2.6 |
Mar 12, 2025 17:04:33.646728992 CET | 49695 | 443 | 192.168.2.6 | 104.21.69.194 |
Mar 12, 2025 17:04:33.646760941 CET | 443 | 49695 | 104.21.69.194 | 192.168.2.6 |
Mar 12, 2025 17:04:33.646837950 CET | 49695 | 443 | 192.168.2.6 | 104.21.69.194 |
Mar 12, 2025 17:04:33.647176027 CET | 49695 | 443 | 192.168.2.6 | 104.21.69.194 |
Mar 12, 2025 17:04:33.647192955 CET | 443 | 49695 | 104.21.69.194 | 192.168.2.6 |
Mar 12, 2025 17:04:34.185169935 CET | 49695 | 443 | 192.168.2.6 | 104.21.69.194 |
Mar 12, 2025 17:04:35.415209055 CET | 49696 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:35.415246010 CET | 443 | 49696 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:35.415317059 CET | 49696 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:35.415662050 CET | 49696 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:35.415678024 CET | 443 | 49696 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.324410915 CET | 443 | 49696 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.324955940 CET | 49697 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.324987888 CET | 443 | 49697 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.325062990 CET | 49697 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.325930119 CET | 49697 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.325942993 CET | 443 | 49697 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.326447964 CET | 443 | 49697 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.326782942 CET | 49698 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.326798916 CET | 443 | 49698 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.326859951 CET | 49698 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.327536106 CET | 49698 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.327568054 CET | 443 | 49698 | 172.67.214.226 | 192.168.2.6 |
Mar 12, 2025 17:04:36.327625036 CET | 49698 | 443 | 192.168.2.6 | 172.67.214.226 |
Mar 12, 2025 17:04:36.349157095 CET | 49699 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.349183083 CET | 443 | 49699 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.349256992 CET | 49699 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.349512100 CET | 49699 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.349531889 CET | 443 | 49699 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.349937916 CET | 443 | 49699 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.350300074 CET | 49700 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.350331068 CET | 443 | 49700 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.350392103 CET | 49700 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.350653887 CET | 49700 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.350668907 CET | 443 | 49700 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.351015091 CET | 443 | 49700 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.351310015 CET | 49701 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.351324081 CET | 443 | 49701 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.351450920 CET | 49701 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.351512909 CET | 49701 | 443 | 192.168.2.6 | 104.73.234.102 |
Mar 12, 2025 17:04:36.351527929 CET | 443 | 49701 | 104.73.234.102 | 192.168.2.6 |
Mar 12, 2025 17:04:36.351568937 CET | 49701 | 443 | 192.168.2.6 | 104.73.234.102 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 12, 2025 17:04:30.226650953 CET | 49725 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:30.233383894 CET | 53 | 49725 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.566355944 CET | 52045 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.577639103 CET | 53 | 52045 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.583307028 CET | 65257 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.595252037 CET | 53 | 65257 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.597604990 CET | 57995 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.608712912 CET | 53 | 57995 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.611026049 CET | 51154 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.619754076 CET | 53 | 51154 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.621704102 CET | 64277 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.631753922 CET | 53 | 64277 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:33.633704901 CET | 55181 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:33.646111012 CET | 53 | 55181 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:34.189069986 CET | 51732 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:34.198514938 CET | 53 | 51732 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:34.201005936 CET | 50052 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:35.209819078 CET | 50052 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:35.413199902 CET | 53 | 50052 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:35.423259974 CET | 53 | 50052 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:36.328902006 CET | 63415 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:36.337958097 CET | 53 | 63415 | 1.1.1.1 | 192.168.2.6 |
Mar 12, 2025 17:04:36.339066982 CET | 61382 | 53 | 192.168.2.6 | 1.1.1.1 |
Mar 12, 2025 17:04:36.348562956 CET | 53 | 61382 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 12, 2025 17:04:30.226650953 CET | 192.168.2.6 | 1.1.1.1 | 0xab38 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.566355944 CET | 192.168.2.6 | 1.1.1.1 | 0xff07 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.583307028 CET | 192.168.2.6 | 1.1.1.1 | 0xf6ea | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.597604990 CET | 192.168.2.6 | 1.1.1.1 | 0x8782 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.611026049 CET | 192.168.2.6 | 1.1.1.1 | 0x211e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.621704102 CET | 192.168.2.6 | 1.1.1.1 | 0xdadc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.633704901 CET | 192.168.2.6 | 1.1.1.1 | 0x744a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:34.189069986 CET | 192.168.2.6 | 1.1.1.1 | 0x7a5c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:34.201005936 CET | 192.168.2.6 | 1.1.1.1 | 0xc36 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:35.209819078 CET | 192.168.2.6 | 1.1.1.1 | 0xc36 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:36.328902006 CET | 192.168.2.6 | 1.1.1.1 | 0xc040 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:36.339066982 CET | 192.168.2.6 | 1.1.1.1 | 0x9a3b | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 12, 2025 17:04:30.233383894 CET | 1.1.1.1 | 192.168.2.6 | 0xab38 | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:33.577639103 CET | 1.1.1.1 | 192.168.2.6 | 0xff07 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.595252037 CET | 1.1.1.1 | 192.168.2.6 | 0xf6ea | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.608712912 CET | 1.1.1.1 | 192.168.2.6 | 0x8782 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.619754076 CET | 1.1.1.1 | 192.168.2.6 | 0x211e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.631753922 CET | 1.1.1.1 | 192.168.2.6 | 0xdadc | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:33.646111012 CET | 1.1.1.1 | 192.168.2.6 | 0x744a | No error (0) | 104.21.69.194 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:33.646111012 CET | 1.1.1.1 | 192.168.2.6 | 0x744a | No error (0) | 172.67.212.102 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:34.198514938 CET | 1.1.1.1 | 192.168.2.6 | 0x7a5c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:35.413199902 CET | 1.1.1.1 | 192.168.2.6 | 0xc36 | No error (0) | 172.67.214.226 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:35.413199902 CET | 1.1.1.1 | 192.168.2.6 | 0xc36 | No error (0) | 104.21.16.172 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:35.423259974 CET | 1.1.1.1 | 192.168.2.6 | 0xc36 | No error (0) | 172.67.214.226 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:35.423259974 CET | 1.1.1.1 | 192.168.2.6 | 0xc36 | No error (0) | 104.21.16.172 | A (IP address) | IN (0x0001) | false | ||
Mar 12, 2025 17:04:36.337958097 CET | 1.1.1.1 | 192.168.2.6 | 0xc040 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Mar 12, 2025 17:04:36.348562956 CET | 1.1.1.1 | 192.168.2.6 | 0x9a3b | No error (0) | 104.73.234.102 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49694 | 149.154.167.99 | 443 | 7532 | C:\Users\user\Desktop\M1gP5m86Gn.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-12 16:04:32 UTC | 195 | OUT | |
2025-03-12 16:04:33 UTC | 511 | IN | |
2025-03-12 16:04:33 UTC | 12447 | IN |
Target ID: | 0 |
Start time: | 12:04:26 |
Start date: | 12/03/2025 |
Path: | C:\Users\user\Desktop\M1gP5m86Gn.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc60000 |
File size: | 7'974'400 bytes |
MD5 hash: | ACCDBD5044408C82C19C977829713E4F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |