Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3EqRILOXx1.exe

Overview

General Information

Sample Name:3EqRILOXx1.exe
Analysis ID:614683
MD5:5ca02369b45067fe039314f38b286767
SHA1:b11ff0b977b16863c34dc35126f1d3d13ab5cc4f
SHA256:039c261036b80fd500607279933c43c4f1c78fdba1b54a9edbc8217df49ec154
Tags:exesansisc
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Antivirus / Scanner detection for submitted sample
Contains functionality to capture screen (.Net source)
.NET source code references suspicious native API functions
Machine Learning detection for sample
May check the online IP address of the machine
Uses 32bit PE files
Yara signature match
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
One or more processes crash
Internet Provider seen in connection with other malware
Yara detected Credential Stealer
Contains functionality to call native functions
IP address seen in connection with other malware
Enables debug privileges
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 3EqRILOXx1.exe (PID: 6192 cmdline: "C:\Users\user\Desktop\3EqRILOXx1.exe" MD5: 5CA02369B45067FE039314F38B286767)
    • dw20.exe (PID: 6484 cmdline: dw20.exe -x -s 1364 MD5: 8D10DA8A3E11747E51F23C882C22BBC3)
  • cleanup
{"Exfil Mode": "FTP", "FTP Server": "ftp://103.147.185.85/", "Password": "bvhfgas7", "Port": 21}
SourceRuleDescriptionAuthorStrings
3EqRILOXx1.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
  • 0x71d5e:$a2: \Comodo\Dragon\User Data\Default\Login Data
  • 0x70f47:$a3: \Google\Chrome\User Data\Default\Login Data
  • 0x7138e:$a4: \Orbitum\User Data\Default\Login Data
  • 0x7250f:$a5: \Kometa\User Data\Default\Login Data
3EqRILOXx1.exeJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    3EqRILOXx1.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      3EqRILOXx1.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        3EqRILOXx1.exeINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
        • 0x6c12a:$s1: UnHook
        • 0x6c131:$s2: SetHook
        • 0x6c139:$s3: CallNextHook
        • 0x6c146:$s4: _hook
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
              • 0x6c7c9:$s8: GrabbedClp
              • 0x6ca71:$s9: StartKeylogger
              • 0x6f234:$x1: $%SMTPDV$
              • 0x6dede:$x2: $#TheHashHere%&
              • 0x6decc:$x3: %FTPDV$
              • 0x6f2c2:$x4: $%TelegramDv$
              • 0x6cb00:$x5: KeyLoggerEventArgs
              • 0x6d1e8:$x5: KeyLoggerEventArgs
              • 0x6f260:$m1: | Snake Keylogger
              • 0x6f322:$m1: | Snake Keylogger
              • 0x6f476:$m1: | Snake Keylogger
              • 0x6f59c:$m1: | Snake Keylogger
              • 0x6f6f6:$m1: | Snake Keylogger
              • 0x6f200:$m2: Clipboard Logs ID
              • 0x6f42c:$m2: Screenshot Logs ID
              • 0x6f540:$m2: keystroke Logs ID
              • 0x6f72c:$m3: SnakePW
              • 0x6f404:$m4: \SnakeKeylogger\
              00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                0.0.3EqRILOXx1.exe.780000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x71d5e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x70f47:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x7138e:$a4: \Orbitum\User Data\Default\Login Data
                • 0x7250f:$a5: \Kometa\User Data\Default\Login Data
                0.0.3EqRILOXx1.exe.780000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                  0.0.3EqRILOXx1.exe.780000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                    0.0.3EqRILOXx1.exe.780000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      0.0.3EqRILOXx1.exe.780000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                      • 0x6c12a:$s1: UnHook
                      • 0x6c131:$s2: SetHook
                      • 0x6c139:$s3: CallNextHook
                      • 0x6c146:$s4: _hook
                      Click to see the 7 entries

                      There are no malicious signatures, click here to show all signatures.

                      Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke (rule): Data: Image: C:\Users\user\Desktop\3EqRILOXx1.exe, QueryName: checkip.dyndns.org
                      Timestamp:04/25/22-07:30:14.530852 04/25/22-07:30:14.530852
                      SID:2842536
                      Source Port:49738
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "FTP", "FTP Server": "ftp://103.147.185.85/", "Password": "bvhfgas7", "Port": 21}
                      Source: 3EqRILOXx1.exeReversingLabs: Detection: 69%
                      Source: 3EqRILOXx1.exeAvira: detected
                      Source: 3EqRILOXx1.exeJoe Sandbox ML: detected
                      Source: 3EqRILOXx1.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: 3EqRILOXx1.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: browserpassEcostura.browserpass.dll.compressedEcostura.browserpass.pdb.compressed+newtonsoft.json.net20Ycostura.newtonsoft.json.net20.dll.compressedYcostura.newtonsoft.json.net20.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: costura.browserpass.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: symbols\dll\mscorlib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.318849682.0000000000B86000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: lib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: q#"costura.browserpass.pdb.compressed source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.newtonsoft.json.net20.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: q-,costura.newtonsoft.json.net20.pdb.compressed( source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbd source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.4:49738 -> 132.226.247.73:80
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeDNS query: name: checkip.dyndns.org
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeDNS query: name: checkip.dyndns.org
                      Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
                      Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                      Source: 3EqRILOXx1.exe, 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: 3EqRILOXx1.exeString found in binary or memory: http://checkip.dyndns.org/q
                      Source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgx&Qq
                      Source: 3EqRILOXx1.exeString found in binary or memory: https://api.telegram.org/bot
                      Source: 3EqRILOXx1.exeString found in binary or memory: https://freegeoip.app/xml/
                      Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeCode function: 0_2_00EBA09A recv,
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 3EqRILOXx1.exe, wvwsOyZpBTrBOUxpiQDJT/COVID19.cs.Net Code: TakeScreenshot
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.cs.Net Code: TakeScreenshot
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.cs.Net Code: TakeScreenshot

                      System Summary

                      barindex
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                      Source: 3EqRILOXx1.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 3EqRILOXx1.exe, type: SAMPLEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1364
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeCode function: 0_2_00EBA67E NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeCode function: 0_2_00EBA64D NtQuerySystemInformation,
                      Source: 3EqRILOXx1.exe, 00000000.00000002.318794855.00000000007F8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewvwsOyZpBTrBOUxpiQDJT.exeL vs 3EqRILOXx1.exe
                      Source: 3EqRILOXx1.exeBinary or memory string: OriginalFilenamewvwsOyZpBTrBOUxpiQDJT.exeL vs 3EqRILOXx1.exe
                      Source: 3EqRILOXx1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 3EqRILOXx1.exeReversingLabs: Detection: 69%
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile read: C:\Users\user\Desktop\3EqRILOXx1.exeJump to behavior
                      Source: 3EqRILOXx1.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\3EqRILOXx1.exe "C:\Users\user\Desktop\3EqRILOXx1.exe"
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1364
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1364
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeCode function: 0_2_00EBA502 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeCode function: 0_2_00EBA4CB AdjustTokenPrivileges,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5266.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@1/1
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: 3EqRILOXx1.exeString found in binary or memory: F-Stopw
                      Source: 3EqRILOXx1.exeString found in binary or memory: F-Stopw
                      Source: 3EqRILOXx1.exe, wvwsOyZpBTrBOUxpiQDJT/COVIDPickers.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                      Source: 3EqRILOXx1.exe, wvwsOyZpBTrBOUxpiQDJT/COVID19.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVIDPickers.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVIDPickers.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.csCryptographic APIs: 'TransformFinalBlock'
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: 3EqRILOXx1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: 3EqRILOXx1.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: browserpassEcostura.browserpass.dll.compressedEcostura.browserpass.pdb.compressed+newtonsoft.json.net20Ycostura.newtonsoft.json.net20.dll.compressedYcostura.newtonsoft.json.net20.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: costura.browserpass.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: symbols\dll\mscorlib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.318849682.0000000000B86000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: lib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\dll\mscorlib.pdb source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: q#"costura.browserpass.pdb.compressed source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: costura.newtonsoft.json.net20.pdb.compressed source: 3EqRILOXx1.exe
                      Source: Binary string: q-,costura.newtonsoft.json.net20.pdb.compressed( source: 3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbd source: 3EqRILOXx1.exe, 00000000.00000002.319295855.0000000000F06000.00000004.00000020.00020000.00000000.sdmp
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.74079601316
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 3EqRILOXx1.exe, wvwsOyZpBTrBOUxpiQDJT/COVID19.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll')
                      Source: 3EqRILOXx1.exe, wvwsOyZpBTrBOUxpiQDJT/FFDecryptor.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll')
                      Source: 0.0.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/FFDecryptor.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/COVID19.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll')
                      Source: 0.2.3EqRILOXx1.exe.780000.0.unpack, wvwsOyZpBTrBOUxpiQDJT/FFDecryptor.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1364
                      Source: C:\Users\user\Desktop\3EqRILOXx1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3EqRILOXx1.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTR
                      Source: Yara matchFile source: 3EqRILOXx1.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTR
                      Source: Yara matchFile source: 3EqRILOXx1.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3EqRILOXx1.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTR
                      Source: Yara matchFile source: 3EqRILOXx1.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3EqRILOXx1.exe.780000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3EqRILOXx1.exe PID: 6192, type: MEMORYSTR
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Command and Scripting Interpreter
                      Path Interception1
                      Access Token Manipulation
                      1
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network Medium2
                      Ingress Tool Transfer
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts1
                      Native API
                      Boot or Logon Initialization Scripts11
                      Process Injection
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over Bluetooth2
                      Non-Application Layer Protocol
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                      Access Token Manipulation
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration12
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                      Process Injection
                      NTDS1
                      Remote System Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      System Network Configuration Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      System Information Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Software Packing
                      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      3EqRILOXx1.exe69%ReversingLabsByteCode-MSIL.Infostealer.Mintluks
                      3EqRILOXx1.exe100%AviraTR/ATRAPS.Gen
                      3EqRILOXx1.exe100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      0.0.3EqRILOXx1.exe.780000.0.unpack100%AviraHEUR/AGEN.1203010Download File
                      0.2.3EqRILOXx1.exe.780000.0.unpack100%AviraHEUR/AGEN.1203010Download File
                      SourceDetectionScannerLabelLink
                      checkip.dyndns.com0%VirustotalBrowse
                      checkip.dyndns.org0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://freegeoip.app/xml/0%URL Reputationsafe
                      http://checkip.dyndns.org0%URL Reputationsafe
                      http://checkip.dyndns.org/0%URL Reputationsafe
                      http://checkip.dyndns.org/q0%URL Reputationsafe
                      http://checkip.dyndns.orgx&Qq0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      checkip.dyndns.com
                      132.226.247.73
                      truetrueunknown
                      checkip.dyndns.org
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://freegeoip.app/xml/3EqRILOXx1.exefalse
                      • URL Reputation: safe
                      unknown
                      http://checkip.dyndns.org3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/bot3EqRILOXx1.exefalse
                        high
                        http://checkip.dyndns.org/q3EqRILOXx1.exefalse
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.orgx&Qq3EqRILOXx1.exe, 00000000.00000002.319518854.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        132.226.247.73
                        checkip.dyndns.comUnited States
                        16989UTMEMUStrue
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:614683
                        Start date and time: 25/04/202207:29:112022-04-25 07:29:11 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 50s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:3EqRILOXx1.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:26
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/3@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 8.6% (good quality ratio 7.7%)
                        • Quality average: 55.4%
                        • Quality standard deviation: 28.5%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Adjust boot time
                        • Enable AMSI
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 52.182.143.212
                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdcus15.centralus.cloudapp.azure.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        07:30:55API Interceptor1x Sleep call for process: dw20.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.0655206820205292
                        Encrypted:false
                        SSDEEP:192:LwEji510DHHaKsn9fC59Fm1sNOAkRm5/u7sCS274It1:sE+510jaKCg5/u7sCX4It1
                        MD5:F2243B207211AE71852BE57DF7C86BC4
                        SHA1:3ABA79F29AE07D7448C93B2006647AB3230F78A8
                        SHA-256:FBA21EFC03A5C054899A0815031322815DD79759370EB3A3546A650787A7FF17
                        SHA-512:ECD985387E105E2067335DD2205933678FA4D1A500068565F56F201745B407FDDACD6A948D4E5F2C74E96570384FD6DD82FE318093B1DB995BE419F404425150
                        Malicious:true
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.5.3.3.8.2.2.2.0.3.7.7.2.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.5.3.3.8.2.2.2.7.4.0.8.4.8.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.6.f.d.a.3.c.-.3.6.0.5.-.4.6.4.2.-.a.7.4.8.-.d.4.e.c.d.1.6.7.9.b.b.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.w.v.w.s.O.y.Z.p.B.T.r.B.O.U.x.p.i.Q.D.J.T...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.3.0.-.0.0.0.1.-.0.0.1.c.-.9.1.1.8.-.c.9.8.8.6.5.5.8.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.4.b.c.c.3.a.0.3.8.f.b.d.8.8.a.8.2.5.6.f.d.6.b.7.c.4.1.8.f.1.1.0.0.0.0.0.0.0.0.!.0.0.0.0.b.1.1.f.f.0.b.9.7.7.b.1.6.8.6.3.c.3.4.d.c.3.5.1.2.6.f.1.d.3.d.1.3.a.b.5.c.c.4.f.!.3.E.q.R.I.L.O.X.x.1...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.9././.0.3.:.1.8.:.5.7.:.5.4.!.0.!.3.E.q.R.I.L.O.X.x.1...e.x.e.....B.o.o.
                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):7610
                        Entropy (8bit):3.709037103507393
                        Encrypted:false
                        SSDEEP:192:Rrl7r3GLNizj26B6Y4eSURgWgmf4T8Sv+p1V9b1fKHm:RrlsNi/26B6YhSURgWgmf4YSqV9pfz
                        MD5:6FC24DEB25D133A71BDE3B90F4605205
                        SHA1:D388155933CAE5A0A993EC13583628FA1D0F69F5
                        SHA-256:B7499C986FF8920C3A82932AE9D03CFAC50D79E707CADF5BD69A64B7E398C08A
                        SHA-512:669563F8FD5F0F1027E712D213220646D51A5E3F0F33EFD8BB83F419BE9FA62F5B357A27CCA0E7B4531DD62D51C684020266AFB7E65F5A409911E8E684D4AE47
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.9.2.<./.P.i.d.>.......
                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4600
                        Entropy (8bit):4.515711899276359
                        Encrypted:false
                        SSDEEP:48:cvIwSD8zsFJgtWI9JVWgc8sqYjt8fm8M4JFKfeuJoF8D+q88xsJ1XE52tftud:uITff2kgrsqYWJFKLtDfuXk2tfId
                        MD5:CF658A65942D584916E491A1A51BE94A
                        SHA1:A4286EEB6E00E88349D4E2BC759DBAA4878DA2AD
                        SHA-256:927152BBE0CE4E7A2C6B7BB9639EE32441FC908CC11864FC9F80C72C71091FC1
                        SHA-512:C8B49B2A1E9712DC31A24B5EBBDA6EEE6A9F480042CABDB2044AD36BFCFA0422AD22B6543D67CF4654F041235636D355E3920F9263725ED8A8E88BF234D47CFB
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1486961" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.7243202513703695
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                        • Win32 Executable (generic) a (10002005/4) 49.75%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Windows Screen Saver (13104/52) 0.07%
                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                        File name:3EqRILOXx1.exe
                        File size:481280
                        MD5:5ca02369b45067fe039314f38b286767
                        SHA1:b11ff0b977b16863c34dc35126f1d3d13ab5cc4f
                        SHA256:039c261036b80fd500607279933c43c4f1c78fdba1b54a9edbc8217df49ec154
                        SHA512:302c954d724d00309a650661689316fd0898135463882af5ca787cdef4cf9c60e2144dc2f55f80ed6df5e7141730433e1c92ae68eb0f379f1473d050abf0d1a4
                        SSDEEP:12288:eR3E3HDei3oXA2jCXgXLz/HQOqzjW/NP:eRU3Hq6oXA2jBXHnqzjG
                        TLSH:7CA4E02D37E88900E2BED9B225B14011C7B9A802195FEE0D57D2F42D3E3D6948E5AFD7
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2p2a.................L...........j... ........@.. ....................................@................................
                        Icon Hash:00828e8e8686b000
                        Entrypoint:0x476aae
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x61327032 [Fri Sep 3 18:57:54 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v2.0.50727
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x76a600x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x780000x606.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x74ab40x74c00False0.836378730594data7.74079601316IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x780000x6060x800False0.32568359375data3.50532555502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x7a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_VERSION0x780a00x37cdata
                        RT_MANIFEST0x7841c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        DLLImport
                        mscoree.dll_CorExeMain
                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright 2021
                        Assembly Version1.0.0.0
                        InternalNamewvwsOyZpBTrBOUxpiQDJT.exe
                        FileVersion1.0.0.0
                        CompanyName
                        LegalTrademarks
                        Comments
                        ProductNamewvwsOyZpBTrBOUxpiQDJT
                        ProductVersion1.0.0.0
                        FileDescriptionwvwsOyZpBTrBOUxpiQDJT
                        OriginalFilenamewvwsOyZpBTrBOUxpiQDJT.exe
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        04/25/22-07:30:14.530852 04/25/22-07:30:14.530852TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4973880192.168.2.4132.226.247.73
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 25, 2022 07:30:14.300725937 CEST4973880192.168.2.4132.226.247.73
                        Apr 25, 2022 07:30:14.530256033 CEST8049738132.226.247.73192.168.2.4
                        Apr 25, 2022 07:30:14.530395985 CEST4973880192.168.2.4132.226.247.73
                        Apr 25, 2022 07:30:14.530852079 CEST4973880192.168.2.4132.226.247.73
                        Apr 25, 2022 07:30:14.760173082 CEST8049738132.226.247.73192.168.2.4
                        Apr 25, 2022 07:30:21.409869909 CEST8049738132.226.247.73192.168.2.4
                        Apr 25, 2022 07:30:21.587019920 CEST4973880192.168.2.4132.226.247.73
                        Apr 25, 2022 07:30:56.630317926 CEST4973880192.168.2.4132.226.247.73
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 25, 2022 07:30:14.181183100 CEST6445453192.168.2.48.8.8.8
                        Apr 25, 2022 07:30:14.199006081 CEST53644548.8.8.8192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Apr 25, 2022 07:30:14.181183100 CEST192.168.2.48.8.8.80xcf55Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                        Apr 25, 2022 07:30:14.199006081 CEST8.8.8.8192.168.2.40xcf55No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                        • checkip.dyndns.org
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.449738132.226.247.7380C:\Users\user\Desktop\3EqRILOXx1.exe
                        TimestampkBytes transferredDirectionData
                        Apr 25, 2022 07:30:14.530852079 CEST468OUTGET / HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                        Host: checkip.dyndns.org
                        Connection: Keep-Alive
                        Apr 25, 2022 07:30:21.409869909 CEST1153INHTTP/1.1 504 Gateway Time-out
                        Date: Mon, 25 Apr 2022 05:30:21 GMT
                        Content-Type: text/html
                        Content-Length: 557
                        Connection: keep-alive
                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                        Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                        Click to jump to process

                        Target ID:0
                        Start time:07:30:11
                        Start date:25/04/2022
                        Path:C:\Users\user\Desktop\3EqRILOXx1.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\3EqRILOXx1.exe"
                        Imagebase:0x780000
                        File size:481280 bytes
                        MD5 hash:5CA02369B45067FE039314F38B286767
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.318642073.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000000.225338757.0000000000782000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                        Reputation:low

                        Target ID:4
                        Start time:07:30:21
                        Start date:25/04/2022
                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                        Wow64 process (32bit):true
                        Commandline:dw20.exe -x -s 1364
                        Imagebase:0x10000000
                        File size:33936 bytes
                        MD5 hash:8D10DA8A3E11747E51F23C882C22BBC3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        No disassembly