Analysis Report XQehPgTn35.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
Threatname: Njrat |
---|
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "714bcaf02dc680243f761ccdcdc54f71", "Install Dir": "system 32", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "[i]", "Port": "MTU0MDkg", "Network Seprator": "714bcaf02dc680243f761ccdcdc54f71", "Mutex Name": "False", "BSOD Active": "MTU0MDkg", "Pastebin Link": "Software\\Microsoft\\Windows\\CurrentVersion\\Run"}
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
|
Dropped Files |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
Click to see the 11 entries |
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Njrat | detect njRAT in memory | JPCERT/CC Incident Response Group |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Njrat | detect njRAT in memory | JPCERT/CC Incident Response Group |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Click to see the 4 entries |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Click to see the 5 entries |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Netsh Port or Application Allowed | Show sources |
Source: | Author: Markus Neis, Sander Wiebing: |
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Antivirus detection for dropped file | Show sources |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for domain / URL | Show sources |
Source: | Virustotal: | Perma Link |
Multi AV Scanner detection for dropped file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Yara detected Njrat | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Machine Learning detection for dropped file | Show sources |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Compliance: |
---|
Detected unpacking (overwrites its own PE header) | Show sources |
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | File opened: |
Spreading: |
---|
Contains functionality to spread to USB devices (.Net source) | Show sources |
Source: | .Net Code: | ||
Source: | .Net Code: |
Creates autorun.inf (USB autostart) | Show sources |
Source: | File created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
C2 URLs / IPs found in malware configuration | Show sources |
Source: | URLs: |
Connects to many ports of the same IP (likely port scanning) | Show sources |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: |
Source: | Window created: | ||
Source: | Window created: | ||
Source: | Window created: | ||
Source: | Window created: |
E-Banking Fraud: |
---|
Yara detected Njrat | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Malicious sample detected (through community Yara rule) | Show sources |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
PE file has nameless sections | Show sources |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process Stats: |
Source: | File created: | Jump to behavior |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: | ||
Source: | Key opened: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Static file information: |
Source: | File opened: |
Data Obfuscation: |
---|
Detected unpacking (changes PE section rights) | Show sources |
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
Detected unpacking (overwrites its own PE header) | Show sources |
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: | ||
Source: | Unpacked PE file: |
.NET source code contains potential unpacker | Show sources |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Persistence and Installation Behavior: |
---|
Drops PE files to the document folder of the user | Show sources |
Source: | File created: | Jump to dropped file |
Drops executables to the windows directory (C:\Windows) and starts them | Show sources |
Source: | Executable created and started: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival: |
---|
Drops PE files to the startup folder | Show sources |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File opened / queried: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Anti Debugging: |
---|
Hides threads from debuggers | Show sources |
Source: | Thread information set: | ||
Source: | Thread information set: | ||
Source: | Thread information set: | ||
Source: | Thread information set: | ||
Source: | Thread information set: |
Source: | Process token adjusted: |
Source: | Memory allocated: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Lowering of HIPS / PFW / Operating System Security Settings: |
---|
Disables the Windows task manager (taskmgr) | Show sources |
Source: | Registry key created or modified: | Jump to behavior |
Modifies the windows firewall | Show sources |
Source: | Process created: |
Uses netsh to modify the Windows network and firewall settings | Show sources |
Source: | Process created: |
Stealing of Sensitive Information: |
---|
Yara detected Njrat | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected Njrat | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Replication Through Removable Media21 | Windows Management Instrumentation | Startup Items1 | Startup Items1 | Masquerading132 | Input Capture1 | Security Software Discovery211 | Replication Through Removable Media21 | Input Capture1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Registry Run Keys / Startup Folder12 | Process Injection12 | Disable or Modify Tools31 | LSASS Memory | Process Discovery2 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Non-Standard Port1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Registry Run Keys / Startup Folder12 | Virtualization/Sandbox Evasion131 | Security Account Manager | Virtualization/Sandbox Evasion131 | SMB/Windows Admin Shares | Clipboard Data1 | Automated Exfiltration | Non-Application Layer Protocol1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Process Injection12 | NTDS | Application Window Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol11 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Deobfuscate/Decode Files or Information1 | LSA Secrets | Peripheral Device Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Obfuscated Files or Information3 | Cached Domain Credentials | Remote System Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Software Packing33 | DCSync | File and Directory Discovery3 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | System Information Discovery22 | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Joe Sandbox ML |
Dropped Files |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Avira | HEUR/AGEN.1128047 | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
44% | Virustotal | Browse | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi | ||
43% | Metadefender | Browse | ||
62% | ReversingLabs | Win32.Backdoor.Bladabhindi |
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Dropper.Gen | Download File | ||
100% | Avira | HEUR/AGEN.1128047 | Download File | ||
100% | Avira | TR/Patched.Ren.Gen2 | Download File | ||
100% | Avira | TR/Patched.Ren.Gen2 | Download File | ||
100% | Avira | TR/Dropper.Gen | Download File | ||
100% | Avira | TR/Patched.Ren.Gen2 | Download File | ||
100% | Avira | HEUR/AGEN.1128047 | Download File | ||
100% | Avira | HEUR/AGEN.1128047 | Download File | ||
100% | Avira | HEUR/AGEN.1128047 | Download File | ||
100% | Avira | TR/Dropper.Gen | Download File |
Domains |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
12% | Virustotal | Browse |
URLs |
---|
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
4.tcp.ngrok.io | 3.138.180.119 | true | true |
| unknown |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| low |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.129.187.220 | unknown | United States | 16509 | AMAZON-02US | true | |
3.138.180.119 | 4.tcp.ngrok.io | United States | 16509 | AMAZON-02US | true | |
3.136.65.236 | unknown | United States | 16509 | AMAZON-02US | true |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 433012 |
Start date: | 11.06.2021 |
Start time: | 05:37:10 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 11m 8s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | XQehPgTn35.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 24 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.spre.troj.adwa.evad.winEXE@14/27@35/3 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
05:38:01 | Autostart | |
05:38:12 | Autostart | |
05:38:25 | Autostart |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
3.129.187.220 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
3.138.180.119 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
3.136.65.236 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
4.tcp.ngrok.io | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
AMAZON-02US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
AMAZON-02US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.2874233355119316 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0 |
MD5: | 80EFBEC081D7836D240503C4C9465FEC |
SHA1: | 6AF398E08A359457083727BAF296445030A55AC3 |
SHA-256: | C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523 |
SHA-512: | DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.2874233355119316 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0 |
MD5: | 80EFBEC081D7836D240503C4C9465FEC |
SHA1: | 6AF398E08A359457083727BAF296445030A55AC3 |
SHA-256: | C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523 |
SHA-512: | DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\XQehPgTn35.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.2874233355119316 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0 |
MD5: | 80EFBEC081D7836D240503C4C9465FEC |
SHA1: | 6AF398E08A359457083727BAF296445030A55AC3 |
SHA-256: | C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523 |
SHA-512: | DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3 |
Malicious: | true |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
|
Process: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5 |
Entropy (8bit): | 1.9219280948873623 |
Encrypted: | false |
SSDEEP: | 3:yn:yn |
MD5: | 24E9E7D7EEA4DE90C8FC67AE1145ABF2 |
SHA1: | DD9BB46CCC6340CA892CF17EBE32B9BDBADEE2D1 |
SHA-256: | BD6C1D15579254E8879ADA07376F93CB2E959F45670374892FDE2EFAF4194F6C |
SHA-512: | 5572AFD61C7BA666515A987F23AD0A05AB753BDC28CFA492ADB30200207427A4A38699D3B7981E0750414775A4CE72A209511951D38A8673C709B08774FCA01F |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | false |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\XQehPgTn35.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.474554204780528 |
Encrypted: | false |
SSDEEP: | 3:It1KV2PHQCyK0x:e1KAwCyD |
MD5: | 40B1630BE21F39CB17BD1963CAE5A207 |
SHA1: | 63C14BD151D42820DD45C033363FA5B9E1D34124 |
SHA-256: | F87E55F1A423B65FD639146F71F6027DBD4D6E69B65D9A17F1744774AA6589E1 |
SHA-512: | 833112ED4A9A3C621D2FFFC78F83502B2937B82A2CF9BC692D75D907CE2AA46C2D97CFE23C402DB3292B2DD2655FF8692C3CD00D5BA4D792C3D8AF24958E1926 |
Malicious: | true |
Preview: |
|
Process: | C:\Windows\server.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1143296 |
Entropy (8bit): | 7.98927615016363 |
Encrypted: | false |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
MD5: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
SHA1: | D1441CC336655F36EFC3DB070F84701A1F68E51A |
SHA-256: | 6884AC9F82A44A7702C4807DEEC1640B66EB71F6C750DD0CA1D5D78632E626B5 |
SHA-512: | AAA673ADB4511D7E4BA5836F6874B047E8C2B31F86E005D46094A47626D23F97D72874307538C451541DBB44905503DF2227902E9F4CCFFA4D9836981ABCD2E6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
|
Process: | C:\Windows\SysWOW64\netsh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 313 |
Entropy (8bit): | 4.971939296804078 |
Encrypted: | false |
SSDEEP: | 6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha |
MD5: | 689E2126A85BF55121488295EE068FA1 |
SHA1: | 09BAAA253A49D80C18326DFBCA106551EBF22DD6 |
SHA-256: | D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25 |
SHA-512: | C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C |
Malicious: | false |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.98927615016363 |
TrID: |
|
File name: | XQehPgTn35.exe |
File size: | 1143296 |
MD5: | 595c00bf9ca4baa42b4490f2782cf2d3 |
SHA1: | d1441cc336655f36efc3db070f84701a1f68e51a |
SHA256: | 6884ac9f82a44a7702c4807deec1640b66eb71f6c750dd0ca1d5d78632e626b5 |
SHA512: | aaa673adb4511d7e4ba5836f6874b047e8c2b31f86e005d46094a47626d23f97d72874307538c451541dbb44905503df2227902e9f4ccffa4d9836981abcd2e6 |
SSDEEP: | 24576:DPnLbQ9A/PFjHhefsVJ1ff9IS/+AhMrRekPHnu6DNO:DPImPFUQJVIg+WMrwOu6DN |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.................p............... ........@.. ........................8...........@................................ |
File Icon |
---|
Icon Hash: | 00828e8e8686b000 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x4087b0 |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | TERMINAL_SERVER_AWARE, DYNAMIC_BASE |
Time Stamp: | 0x60B61FAE [Tue Jun 1 11:53:18 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 2e5467cba76f44a088d39f78c5e807b6 |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
mov eax, 00401000h |
call 00007F42888039D6h |
call far 5DE5h : 8B10C483h |
jmp 00007F4288B78961h |
xchg eax, ebx |
das |
pop ecx |
fimul word ptr [ecx] |
scasd |
jbe 00007F4288803992h |
stc |
outsb |
mov dl, 89h |
cmpsd |
pop es |
dec ebp |
les ecx, fword ptr [edi] |
stosd |
salc |
cmp ebx, dword ptr [ecx+23h] |
salc |
je 00007F42888039BAh |
add al, 46h |
jbe 00007F42888039CEh |
in eax, 48h |
imul eax, dword ptr [edx], 58FF3743h |
dec ecx |
jnbe 00007F4288803A01h |
or eax, 5A7F49C4h |
xchg eax, esi |
mov ebx, dword ptr [edx] |
call 00007F429F5EECBFh |
sub ebx, dword ptr [eax+247EDDBBh] |
in eax, dx |
xchg dword ptr [ecx+esi*4+4Fh], ecx |
lodsd |
mov bh, 01h |
xchg dword ptr [edx], ebx |
push 0D715D85h |
outsb |
mov ch, 85h |
loop 00007F4288803A38h |
cwde |
aad F9h |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x29c020 | 0x210 | .data |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x29c000 | 0xc | .data |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
0x2000 | 0x18000 | 0x8600 | False | 0.989884561567 | data | 7.97927562362 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
0x1a000 | 0x2000 | 0x200 | False | 0.0546875 | data | 0.305313057312 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
0x1c000 | 0x280000 | 0x2ba00 | unknown | unknown | unknown | unknown | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ | |
.data | 0x29c000 | 0xe4000 | 0xe2c00 | False | 0.997420238423 | data | 7.9850157277 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
Imports |
---|
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA |
user32.dll | MessageBoxA |
advapi32.dll | RegCloseKey |
oleaut32.dll | SysFreeString |
gdi32.dll | CreateFontA |
shell32.dll | ShellExecuteA |
version.dll | GetFileVersionInfoA |
mscoree.dll | _CorExeMain |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
06/11/21-05:38:32.480901 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:38:35.122490 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:38:37.883521 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:40.816135 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:43.655370 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:46.534439 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:49.820340 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:52.550734 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:38:55.325429 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49736 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:38:58.026524 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49737 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:01.781328 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49738 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:04.485435 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49739 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:08.299471 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49740 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:10.989140 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49741 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:13.686687 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49742 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:16.472819 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49743 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:19.192478 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49744 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:21.879780 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49745 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:26.277451 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49746 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:28.697781 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49747 | 15409 | 192.168.2.3 | 3.129.187.220 |
06/11/21-05:39:31.432722 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49748 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:34.209617 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49749 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:36.900868 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49750 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:39.620373 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49751 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:43.395380 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49752 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:46.772436 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49753 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:49.556360 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49754 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:52.263322 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49755 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:39:54.965375 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49756 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:39:57.721057 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49757 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:40:00.642878 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49758 | 15409 | 192.168.2.3 | 3.136.65.236 |
06/11/21-05:40:03.342398 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49759 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:40:06.076276 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49760 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:40:08.799968 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49761 | 15409 | 192.168.2.3 | 3.138.180.119 |
06/11/21-05:40:11.612120 | TCP | 2021176 | ET TROJAN Bladabindi/njRAT CnC Command (ll) | 49762 | 15409 | 192.168.2.3 | 3.138.180.119 |
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2021 05:38:28.263359070 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:28.404962063 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:28.405138016 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:28.994911909 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:29.109426975 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:32.480901003 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:32.623845100 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:32.624118090 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:32.764477015 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:33.060138941 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:33.071002007 CEST | 15409 | 49727 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:33.071343899 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:34.743252993 CEST | 49727 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:34.982126951 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:35.121546984 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.121665955 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:35.122489929 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:35.262887955 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.263066053 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:35.403242111 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.584269047 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.656944036 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:35.665175915 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.668739080 CEST | 15409 | 49729 | 3.138.180.119 | 192.168.2.3 |
Jun 11, 2021 05:38:35.668905973 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:37.594604015 CEST | 49729 | 15409 | 192.168.2.3 | 3.138.180.119 |
Jun 11, 2021 05:38:37.742187023 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:37.882061005 CEST | 15409 | 49730 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:37.882210016 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:37.883521080 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:38.025667906 CEST | 15409 | 49730 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:38.025789976 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:38.165572882 CEST | 15409 | 49730 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:38.476670027 CEST | 15409 | 49730 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:38.476713896 CEST | 15409 | 49730 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:38.476943016 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:40.534037113 CEST | 49730 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:40.671755075 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:40.813503981 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:40.813718081 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:40.816134930 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:40.956271887 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:40.956549883 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:41.096815109 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:41.281196117 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:41.344819069 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:41.352886915 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:41.353302956 CEST | 15409 | 49731 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:41.353425980 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.291449070 CEST | 49731 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.505050898 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.645172119 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:43.645334005 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.655369997 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.798135042 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:43.798265934 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:43.938019991 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:44.116847038 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:44.196537018 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:44.196671963 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:44.201392889 CEST | 15409 | 49732 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:44.201508999 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.206796885 CEST | 49732 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.322411060 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.466084003 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:46.466279030 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.534439087 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.674432039 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:46.674643993 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:46.814506054 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:46.977404118 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:47.048439026 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:47.071618080 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:47.078805923 CEST | 15409 | 49733 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:47.078957081 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:49.130012989 CEST | 49733 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:49.664273977 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:49.809375048 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:49.809490919 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:49.820339918 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:49.963341951 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:49.963480949 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:50.103955984 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:50.235722065 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:50.297827005 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:50.345540047 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:50.362777948 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:50.366107941 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:50.366185904 CEST | 49734 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:50.507401943 CEST | 15409 | 49734 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:52.409234047 CEST | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:52.549846888 CEST | 15409 | 49735 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:52.549998045 CEST | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:52.550734043 CEST | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:52.696180105 CEST | 15409 | 49735 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:52.696350098 CEST | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:52.839436054 CEST | 15409 | 49735 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:53.028906107 CEST | 15409 | 49735 | 3.129.187.220 | 192.168.2.3 |
Jun 11, 2021 05:38:53.142692089 CEST | 49735 | 15409 | 192.168.2.3 | 3.129.187.220 |
Jun 11, 2021 05:38:53.197839975 CEST | 15409 | 49735 | 3.129.187.220 | 192.168.2.3 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2021 05:37:48.970566988 CEST | 60152 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:49.033849001 CEST | 53 | 60152 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:49.378783941 CEST | 57544 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:49.442737103 CEST | 53 | 57544 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:50.145737886 CEST | 55984 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:50.204411983 CEST | 53 | 55984 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:51.442954063 CEST | 64185 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:51.495007992 CEST | 53 | 64185 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:52.702096939 CEST | 65110 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:52.764108896 CEST | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:53.692610025 CEST | 58361 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:53.744622946 CEST | 53 | 58361 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:54.623907089 CEST | 63492 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:54.686862946 CEST | 53 | 63492 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:55.696166039 CEST | 60831 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:55.749423981 CEST | 53 | 60831 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:57.883934021 CEST | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:57.939203024 CEST | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:58.812541962 CEST | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:37:58.863327980 CEST | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:37:59.996539116 CEST | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:00.055717945 CEST | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:01.384387016 CEST | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:01.443344116 CEST | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:02.852978945 CEST | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:02.913965940 CEST | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:03.809122086 CEST | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:03.860022068 CEST | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:04.636384010 CEST | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:04.686847925 CEST | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:05.487831116 CEST | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:05.538418055 CEST | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:06.414119005 CEST | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:06.464705944 CEST | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:07.609879017 CEST | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:07.670522928 CEST | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:08.449652910 CEST | 50540 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:08.513906956 CEST | 53 | 50540 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:28.096605062 CEST | 54366 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:28.160732031 CEST | 53 | 54366 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:28.208518982 CEST | 53034 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:28.271539927 CEST | 53 | 53034 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:34.836051941 CEST | 57762 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:34.896231890 CEST | 53 | 57762 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:37.599096060 CEST | 55435 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:37.659429073 CEST | 53 | 55435 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:40.598186016 CEST | 50713 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:40.660141945 CEST | 53 | 50713 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:43.438324928 CEST | 56132 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:43.497728109 CEST | 53 | 56132 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:46.221971035 CEST | 58987 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:46.285773993 CEST | 53 | 58987 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:49.135191917 CEST | 56579 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:49.196597099 CEST | 53 | 56579 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:52.318876028 CEST | 60633 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:52.380361080 CEST | 53 | 60633 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:55.058105946 CEST | 61292 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:55.119384050 CEST | 53 | 61292 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:38:57.808234930 CEST | 63619 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:38:57.862252951 CEST | 53 | 63619 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:01.317874908 CEST | 64938 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:01.382457972 CEST | 53 | 64938 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:04.265638113 CEST | 61946 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:04.324976921 CEST | 53 | 61946 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:07.983109951 CEST | 64910 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:08.038408041 CEST | 53 | 64910 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:10.783400059 CEST | 52123 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:10.845694065 CEST | 53 | 52123 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:13.477179050 CEST | 56130 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:13.538152933 CEST | 53 | 56130 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:16.255187035 CEST | 56338 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:16.316384077 CEST | 53 | 56338 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:18.974092960 CEST | 59420 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:19.033886909 CEST | 53 | 59420 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:21.679620981 CEST | 58784 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:21.730010986 CEST | 53 | 58784 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:24.601767063 CEST | 63978 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:24.661842108 CEST | 53 | 63978 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:28.487149000 CEST | 62938 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:28.546643972 CEST | 53 | 62938 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:31.214534998 CEST | 55708 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:31.275702953 CEST | 53 | 55708 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:33.976038933 CEST | 56803 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:34.036474943 CEST | 53 | 56803 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:36.682391882 CEST | 57145 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:36.741065979 CEST | 53 | 57145 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:39.395881891 CEST | 55359 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:39.457341909 CEST | 53 | 55359 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:42.354665995 CEST | 58306 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:42.414808989 CEST | 53 | 58306 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:46.567203999 CEST | 64124 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:46.626611948 CEST | 53 | 64124 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:49.323838949 CEST | 49361 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:49.382500887 CEST | 53 | 49361 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:52.042948008 CEST | 63150 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:52.093952894 CEST | 53 | 63150 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:54.735972881 CEST | 53279 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:54.798815012 CEST | 53 | 53279 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:39:57.523766994 CEST | 56881 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:39:57.577550888 CEST | 53 | 56881 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:40:00.395754099 CEST | 53642 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:40:00.449871063 CEST | 53 | 53642 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:40:03.119240046 CEST | 55667 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:40:03.181199074 CEST | 53 | 55667 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:40:05.865139008 CEST | 54833 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:40:05.927911043 CEST | 53 | 54833 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:40:08.588099957 CEST | 62476 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:40:08.651952982 CEST | 53 | 62476 | 8.8.8.8 | 192.168.2.3 |
Jun 11, 2021 05:40:11.383903980 CEST | 49705 | 53 | 192.168.2.3 | 8.8.8.8 |
Jun 11, 2021 05:40:11.447014093 CEST | 53 | 49705 | 8.8.8.8 | 192.168.2.3 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Jun 11, 2021 05:38:28.096605062 CEST | 192.168.2.3 | 8.8.8.8 | 0xf277 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:34.836051941 CEST | 192.168.2.3 | 8.8.8.8 | 0xb8e8 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:37.599096060 CEST | 192.168.2.3 | 8.8.8.8 | 0xee6 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:40.598186016 CEST | 192.168.2.3 | 8.8.8.8 | 0x32c4 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:43.438324928 CEST | 192.168.2.3 | 8.8.8.8 | 0x38f4 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:46.221971035 CEST | 192.168.2.3 | 8.8.8.8 | 0xe038 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:49.135191917 CEST | 192.168.2.3 | 8.8.8.8 | 0xd1a8 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:52.318876028 CEST | 192.168.2.3 | 8.8.8.8 | 0xf5b5 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:55.058105946 CEST | 192.168.2.3 | 8.8.8.8 | 0x8c7d | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:38:57.808234930 CEST | 192.168.2.3 | 8.8.8.8 | 0x921b | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:01.317874908 CEST | 192.168.2.3 | 8.8.8.8 | 0xb963 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:04.265638113 CEST | 192.168.2.3 | 8.8.8.8 | 0x118b | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:07.983109951 CEST | 192.168.2.3 | 8.8.8.8 | 0xfb61 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:10.783400059 CEST | 192.168.2.3 | 8.8.8.8 | 0xf912 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:13.477179050 CEST | 192.168.2.3 | 8.8.8.8 | 0xfec0 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:16.255187035 CEST | 192.168.2.3 | 8.8.8.8 | 0x4d5a | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:18.974092960 CEST | 192.168.2.3 | 8.8.8.8 | 0xbd57 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:21.679620981 CEST | 192.168.2.3 | 8.8.8.8 | 0x8ed1 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:24.601767063 CEST | 192.168.2.3 | 8.8.8.8 | 0x8f77 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:28.487149000 CEST | 192.168.2.3 | 8.8.8.8 | 0x847c | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:31.214534998 CEST | 192.168.2.3 | 8.8.8.8 | 0xbb5f | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:33.976038933 CEST | 192.168.2.3 | 8.8.8.8 | 0x53ca | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:36.682391882 CEST | 192.168.2.3 | 8.8.8.8 | 0x91f6 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:39.395881891 CEST | 192.168.2.3 | 8.8.8.8 | 0x87b1 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:42.354665995 CEST | 192.168.2.3 | 8.8.8.8 | 0x6eba | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:46.567203999 CEST | 192.168.2.3 | 8.8.8.8 | 0x9a26 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:49.323838949 CEST | 192.168.2.3 | 8.8.8.8 | 0x5276 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:52.042948008 CEST | 192.168.2.3 | 8.8.8.8 | 0xd7a2 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:54.735972881 CEST | 192.168.2.3 | 8.8.8.8 | 0x6e44 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:39:57.523766994 CEST | 192.168.2.3 | 8.8.8.8 | 0xafac | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:40:00.395754099 CEST | 192.168.2.3 | 8.8.8.8 | 0x659c | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:40:03.119240046 CEST | 192.168.2.3 | 8.8.8.8 | 0x7d9e | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:40:05.865139008 CEST | 192.168.2.3 | 8.8.8.8 | 0xacb3 | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:40:08.588099957 CEST | 192.168.2.3 | 8.8.8.8 | 0x593e | Standard query (0) | A (IP address) | IN (0x0001) | |
Jun 11, 2021 05:40:11.383903980 CEST | 192.168.2.3 | 8.8.8.8 | 0xc299 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Jun 11, 2021 05:38:28.160732031 CEST | 8.8.8.8 | 192.168.2.3 | 0xf277 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:34.896231890 CEST | 8.8.8.8 | 192.168.2.3 | 0xb8e8 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:37.659429073 CEST | 8.8.8.8 | 192.168.2.3 | 0xee6 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:40.660141945 CEST | 8.8.8.8 | 192.168.2.3 | 0x32c4 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:43.497728109 CEST | 8.8.8.8 | 192.168.2.3 | 0x38f4 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:46.285773993 CEST | 8.8.8.8 | 192.168.2.3 | 0xe038 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:49.196597099 CEST | 8.8.8.8 | 192.168.2.3 | 0xd1a8 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:52.380361080 CEST | 8.8.8.8 | 192.168.2.3 | 0xf5b5 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:55.119384050 CEST | 8.8.8.8 | 192.168.2.3 | 0x8c7d | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:38:57.862252951 CEST | 8.8.8.8 | 192.168.2.3 | 0x921b | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:01.382457972 CEST | 8.8.8.8 | 192.168.2.3 | 0xb963 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:04.324976921 CEST | 8.8.8.8 | 192.168.2.3 | 0x118b | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:08.038408041 CEST | 8.8.8.8 | 192.168.2.3 | 0xfb61 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:10.845694065 CEST | 8.8.8.8 | 192.168.2.3 | 0xf912 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:13.538152933 CEST | 8.8.8.8 | 192.168.2.3 | 0xfec0 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:16.316384077 CEST | 8.8.8.8 | 192.168.2.3 | 0x4d5a | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:19.033886909 CEST | 8.8.8.8 | 192.168.2.3 | 0xbd57 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:21.730010986 CEST | 8.8.8.8 | 192.168.2.3 | 0x8ed1 | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:24.661842108 CEST | 8.8.8.8 | 192.168.2.3 | 0x8f77 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:28.546643972 CEST | 8.8.8.8 | 192.168.2.3 | 0x847c | No error (0) | 3.129.187.220 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:31.275702953 CEST | 8.8.8.8 | 192.168.2.3 | 0xbb5f | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:34.036474943 CEST | 8.8.8.8 | 192.168.2.3 | 0x53ca | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:36.741065979 CEST | 8.8.8.8 | 192.168.2.3 | 0x91f6 | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:39.457341909 CEST | 8.8.8.8 | 192.168.2.3 | 0x87b1 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:42.414808989 CEST | 8.8.8.8 | 192.168.2.3 | 0x6eba | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:46.626611948 CEST | 8.8.8.8 | 192.168.2.3 | 0x9a26 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:49.382500887 CEST | 8.8.8.8 | 192.168.2.3 | 0x5276 | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:52.093952894 CEST | 8.8.8.8 | 192.168.2.3 | 0xd7a2 | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:54.798815012 CEST | 8.8.8.8 | 192.168.2.3 | 0x6e44 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:39:57.577550888 CEST | 8.8.8.8 | 192.168.2.3 | 0xafac | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:40:00.449871063 CEST | 8.8.8.8 | 192.168.2.3 | 0x659c | No error (0) | 3.136.65.236 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:40:03.181199074 CEST | 8.8.8.8 | 192.168.2.3 | 0x7d9e | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:40:05.927911043 CEST | 8.8.8.8 | 192.168.2.3 | 0xacb3 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:40:08.651952982 CEST | 8.8.8.8 | 192.168.2.3 | 0x593e | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) | ||
Jun 11, 2021 05:40:11.447014093 CEST | 8.8.8.8 | 192.168.2.3 | 0xc299 | No error (0) | 3.138.180.119 | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 05:37:55 |
Start date: | 11/06/2021 |
Path: | C:\Users\user\Desktop\XQehPgTn35.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 1143296 bytes |
MD5 hash: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
General |
---|
Start time: | 05:37:57 |
Start date: | 11/06/2021 |
Path: | C:\Windows\server.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9c0000 |
File size: | 1143296 bytes |
MD5 hash: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
General |
---|
Start time: | 05:38:00 |
Start date: | 11/06/2021 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 82944 bytes |
MD5 hash: | A0AA3322BB46BBFC36AB9DC1DBBBB807 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:00 |
Start date: | 11/06/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b2800000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:17 |
Start date: | 11/06/2021 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 82944 bytes |
MD5 hash: | A0AA3322BB46BBFC36AB9DC1DBBBB807 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:18 |
Start date: | 11/06/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b2800000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:18 |
Start date: | 11/06/2021 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd90000 |
File size: | 82944 bytes |
MD5 hash: | A0AA3322BB46BBFC36AB9DC1DBBBB807 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:19 |
Start date: | 11/06/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b2800000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 05:38:21 |
Start date: | 11/06/2021 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xda0000 |
File size: | 1143296 bytes |
MD5 hash: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
General |
---|
Start time: | 05:38:34 |
Start date: | 11/06/2021 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Google.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1310000 |
File size: | 1143296 bytes |
MD5 hash: | 595C00BF9CA4BAA42B4490F2782CF2D3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|