Edit tour
Windows
Analysis Report
CX17SY6xF6.exe
Overview
General Information
Sample Name: | CX17SY6xF6.exe |
Original Sample Name: | db47df7cf51747e533c968da7452f1ce6d20f465d7fcd6e2eac559266ac3e9ed.exe |
Analysis ID: | 1281452 |
MD5: | ca67c9c17a701b0664b90de372acdfb1 |
SHA1: | 8d7e388b5d276816279ef37e7cab9cd554251737 |
SHA256: | db47df7cf51747e533c968da7452f1ce6d20f465d7fcd6e2eac559266ac3e9ed |
Tags: | exe |
Infos: | |
Detection
Pushdo
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Backdoor Pushdo
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Snort IDS alert for network traffic
Writes to foreign memory regions
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Injects a PE file into a foreign processes
Send many emails (e-Mail Spam)
Contains functionality to inject code into remote processes
Machine Learning detection for dropped file
Drops PE files to the user root directory
Contains functionality to inject threads in other processes
Tries to resolve many domain names, but no domain seems valid
Contains functionality to compare user and computer (likely to detect sandboxes)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Connects to many different domains
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Connects to several IPs in different countries
Uses SMTP (mail sending)
Found evasive API chain (may stop execution after accessing registry keys)
Drops PE files to the user directory
Creates or modifies windows services
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
- CX17SY6xF6.exe (PID: 6512 cmdline:
C:\Users\u ser\Deskto p\CX17SY6x F6.exe MD5: CA67C9C17A701B0664B90DE372ACDFB1) - svchost.exe (PID: 5172 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 3864 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 4112 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 4092 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 5768 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 21840 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433)
- pigalicapi.exe (PID: 2408 cmdline:
"C:\Users\ user\pigal icapi.exe" MD5: CA67C9C17A701B0664B90DE372ACDFB1) - svchost.exe (PID: 632 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 21288 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 22764 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 22800 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433) - svchost.exe (PID: 22940 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433)
- pigalicapi.exe (PID: 6996 cmdline:
"C:\Users\ user\pigal icapi.exe" MD5: CA67C9C17A701B0664B90DE372ACDFB1) - svchost.exe (PID: 23432 cmdline:
C:\Windows \system32\ svchost.ex e MD5: FA6C268A5B5BDA067A901764D203D433)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Pushdo | Pushdo is usually classified as a "downloader" trojan - meaning its true purpose is to download and install additional malicious software. There are dozens of downloader trojan families out there, but Pushdo is actually more sophisticated than most, but that sophistication lies in the Pushdo control server rather than the trojan. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
JoeSecurity_Pushdo | Yara detected Backdoor Pushdo | Joe Security | ||
Click to see the 5 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.4188.114.96.749694802016867 07/27/23-21:52:20.127901 |
SID: | 2016867 |
Source Port: | 49694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 4_2_00EC8A70 | |
Source: | Code function: | 4_2_00EC8800 | |
Source: | Code function: | 4_2_00EC47F0 | |
Source: | Code function: | 4_2_00EC4BA0 | |
Source: | Code function: | 4_2_00EC8BB0 | |
Source: | Code function: | 4_2_00EC8970 | |
Source: | Code function: | 4_2_00EC8CF0 | |
Source: | Code function: | 4_2_00EC4880 |
Compliance |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_010E1989 | |
Source: | Code function: | 0_2_010E5EA0 | |
Source: | Code function: | 3_2_00F01989 | |
Source: | Code function: | 3_2_00F05EA0 |
Networking |
---|
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | Jump to behavior | ||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Network Connect: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: | |||
Source: | Domain query: |
Source: | Snort IDS: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |