Edit tour
Windows
Analysis Report
30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe
Overview
General Information
Detection
Quasar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Quasar RAT
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match
Classification
- System is w10x64
- 30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe (PID: 5628 cmdline:
C:\Users\u ser\Deskto p\30EAFDB7 C2C580890C 4FB2A7101D B1D22C88BD 723603F.ex e MD5: 6DDDA01B781E92010749CAE1248B6D51) - syscall.exe (PID: 1596 cmdline:
C:\Windows \SysWOW64\ SubDir\sys call.exe MD5: 6DDDA01B781E92010749CAE1248B6D51)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Quasar RAT, QuasarRAT | Quasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Quasarrat_e52df647 | unknown | unknown |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar_RAT_2 | Detects Quasar RAT | Florian Roth |
| |
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Quasarrat_e52df647 | unknown | unknown |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar_RAT_2 | Detects Quasar RAT | Florian Roth |
| |
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
Windows_Trojan_Quasarrat_e52df647 | unknown | unknown |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar | detect Remcos in memory | JPCERT/CC Incident Response Group |
| |
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Quasarrat_e52df647 | unknown | unknown |
| |
Quasar_RAT_1 | Detects Quasar RAT | Florian Roth |
| |
Quasar_RAT_2 | Detects Quasar RAT | Florian Roth |
| |
Click to see the 6 entries |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.488.198.193.21349734802814031 12/21/23-21:31:53.772646 |
SID: | 2814031 |
Source Port: | 49734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.4104.26.15.7349737802814030 12/21/23-21:31:56.157554 |
SID: | 2814030 |
Source Port: | 49737 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.488.198.193.21349729802814031 12/21/23-21:31:49.636142 |
SID: | 2814031 |
Source Port: | 49729 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.4104.26.15.7349732802814030 12/21/23-21:31:52.464064 |
SID: | 2814030 |
Source Port: | 49732 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0152A288 | |
Source: | Code function: | 0_2_015299B8 | |
Source: | Code function: | 0_2_01529670 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_01527069 |
Persistence and Installation Behavior |
---|
Source: | Executable created and started: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 21 Windows Management Instrumentation | Path Interception | 11 Process Injection | 121 Masquerading | OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 11 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 31 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Standard Port | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 31 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Ingress Tool Transfer | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 2 Non-Application Layer Protocol | Data Destruction | Virtual Private Server | Employee Names | ||
Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Hidden Files and Directories | LSA Secrets | 23 System Information Discovery | SSH | Keylogging | Scheduled Transfer | 13 Application Layer Protocol | Data Encrypted for Impact | Server | Gather Victim Network Information | ||
Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Data Transfer Size Limits | Multiband Communication | Service Stop | Botnet | Domain Properties |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | ByteCode-MSIL.Trojan.Tinclex | ||
100% | Avira | HEUR/AGEN.1305744 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1305744 | ||
100% | Joe Sandbox ML | |||
84% | ReversingLabs | ByteCode-MSIL.Trojan.Tinclex |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
telize.com | 88.198.193.213 | true | true | unknown | |
www.telize.com | 88.198.193.213 | true | true | unknown | |
api4.ipify.org | 64.185.227.156 | true | false | high | |
freegeoip.net | 104.26.15.73 | true | false | high | |
api.ipify.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
91.92.248.33 | unknown | Bulgaria | 34368 | THEZONEBG | false | |
88.198.193.213 | telize.com | Germany | 24940 | HETZNER-ASDE | true | |
104.26.15.73 | freegeoip.net | United States | 13335 | CLOUDFLARENETUS | false | |
64.185.227.156 | api4.ipify.org | United States | 18450 | WEBNXUS | false |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1365837 |
Start date and time: | 2023-12-21 21:31:03 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/2@4/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: 30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe
Time | Type | Description |
---|---|---|
21:31:52 | API Interceptor | |
21:32:32 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
88.198.193.213 | Get hash | malicious | Quasar | Browse |
| |
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
104.26.15.73 | Get hash | malicious | Quasar | Browse |
| |
Get hash | malicious | AgentTesla Blackshades MailPassView | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
| |||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
telize.com | Get hash | malicious | Quasar | Browse |
| |
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
api4.ipify.org | Get hash | malicious | Amadey, Glupteba, LummaC Stealer, RedLine, SmokeLoader, Stealc, Vidar | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, NSISDropper | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | AgentTesla, Amadey, Creal Stealer, Djvu, FormBook, Glupteba, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
www.telize.com | Get hash | malicious | Quasar | Browse |
| |
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
THEZONEBG | Get hash | malicious | Amadey, Glupteba, LummaC Stealer, RedLine, SmokeLoader, Stealc, Vidar | Browse |
| |
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, Vidar | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | PayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | PayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | PayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | AveMaria, UACMe | Browse |
| ||
Get hash | malicious | PayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | PayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | RisePro Stealer, SmokeLoader, Vidar, zgRAT | Browse |
| ||
HETZNER-ASDE | Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| |
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Petite Virus, Socks5Systemz | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine, SectopRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | AveMaria, PrivateLoader | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Agent Tesla, AgentTesla | Browse |
| ||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| ||
Get hash | malicious | Agent Tesla, AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Agniane Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | RisePro Stealer, Vidar | Browse |
|
⊘No context
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe.log
Download File
Process: | C:\Users\user\Desktop\30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1578 |
Entropy (8bit): | 5.3557361963257835 |
Encrypted: | false |
SSDEEP: | 48:MIHK5HKH1qHiYHKh3okHZHKJHKntHo6hAHKzeR:Pq5qHwCYqh3ok5qJqntI6eqzm |
MD5: | 396FD2F3BDCFA72D0EB7DBDC83FCFF74 |
SHA1: | 13BB9A42DAF2DD87D53E861AD0D7304328E565CA |
SHA-256: | 7FAEAC19A652D39C2537D2C414E258681ED3D66F15C7B28B6D22E52C1A3F510F |
SHA-512: | 6CBBEC1ED42BEE61B550FD69FB0A893573612F4C301130BD7C64340AAF738F5CB55735F7C5DFA5E09F408034CF965AC25B28DFE1A413ABE5837E74E07545934D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 273920 |
Entropy (8bit): | 6.389557780583135 |
Encrypted: | false |
SSDEEP: | 6144:RaaXMzUmOZoqSYjO8KHGwgImxbEWMgdD:4achqSYFKHGw1m3Mw |
MD5: | 6DDDA01B781E92010749CAE1248B6D51 |
SHA1: | F33280D5DEE0BCD5B5F07C8D38E50B3833288192 |
SHA-256: | 30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603FF37AC4F13928DD84B73 |
SHA-512: | C4D901E6A3846DD4995943AD38DBF8EA38669ED6936CA1D31354D9F330EB4F9B502E1C49B9B424184BDF8899A2EE4EFE257DBC4BF0FF489C2BE228F8A45301E2 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.389557780583135 |
TrID: |
|
File name: | 30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
File size: | 273'920 bytes |
MD5: | 6ddda01b781e92010749cae1248b6d51 |
SHA1: | f33280d5dee0bcd5b5f07c8d38e50b3833288192 |
SHA256: | 30eafdb7c2c580890c4fb2a7101db1d22c88bd723603ff37ac4f13928dd84b73 |
SHA512: | c4d901e6a3846dd4995943ad38dbf8ea38669ed6936ca1d31354d9f330eb4f9b502e1c49b9b424184bdf8899a2ee4efe257dbc4bf0ff489c2be228f8a45301e2 |
SSDEEP: | 6144:RaaXMzUmOZoqSYjO8KHGwgImxbEWMgdD:4achqSYFKHGw1m3Mw |
TLSH: | 78448D6667DC871BE3AE07BEF06041015BB9DD27F50AE7874D8885B82C533A1CE426E7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!.Ue................. ...........?... ........@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x443f9e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6555F521 [Thu Nov 16 10:55:29 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add al, byte ptr [eax] |
adc byte ptr [eax], al |
add byte ptr [eax], al |
and byte ptr [eax], al |
add byte ptr [eax+00000018h], al |
cmp byte ptr [eax], al |
add byte ptr [eax+00000000h], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add dword ptr [eax], eax |
add byte ptr [eax], al |
push eax |
add byte ptr [eax], al |
add byte ptr [eax], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add dword ptr [eax], eax |
add dword ptr [eax], eax |
add byte ptr [eax], al |
push 00800000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax+00000000h], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x43f48 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x44000 | 0xa00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x46000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x41fa4 | 0x42000 | False | 0.5190873579545454 | data | 6.408203067377705 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x44000 | 0xa00 | 0xa00 | False | 0.358984375 | data | 4.494437383231915 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x46000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x440a0 | 0x244 | data | 0.47413793103448276 | ||
RT_MANIFEST | 0x442e8 | 0x562 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.43178519593613934 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.488.198.193.21349734802814031 12/21/23-21:31:53.772646 | TCP | 2814031 | ETPRO TROJAN W32/Quasar RAT Connectivity Check | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
192.168.2.4104.26.15.7349737802814030 12/21/23-21:31:56.157554 | TCP | 2814030 | ETPRO TROJAN W32/Quasar RAT Connectivity Check 2 | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
192.168.2.488.198.193.21349729802814031 12/21/23-21:31:49.636142 | TCP | 2814031 | ETPRO TROJAN W32/Quasar RAT Connectivity Check | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
192.168.2.4104.26.15.7349732802814030 12/21/23-21:31:52.464064 | TCP | 2814030 | ETPRO TROJAN W32/Quasar RAT Connectivity Check 2 | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2023 21:31:49.389581919 CET | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:49.635679007 CET | 80 | 49729 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:49.635783911 CET | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:49.636142015 CET | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:49.882888079 CET | 80 | 49729 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:49.882961035 CET | 80 | 49729 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:49.935340881 CET | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.143281937 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.143321037 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:50.143385887 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.162745953 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.162761927 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:50.674129963 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:50.674247980 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.678483963 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.678493023 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:50.678787947 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:50.732243061 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.762335062 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:50.804738998 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.161001921 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.161144972 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.161205053 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.172629118 CET | 49730 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.172641039 CET | 443 | 49730 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.173157930 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.173192978 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.173278093 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.173649073 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.173664093 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.714670897 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:51.716598988 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:51.716634989 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:52.207650900 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:52.207791090 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:52.207844019 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:52.208096981 CET | 49731 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:52.208110094 CET | 443 | 49731 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:52.338395119 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:52.463819027 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.463900089 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:52.464063883 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:52.588548899 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.598694086 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.599468946 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:52.733278036 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.733320951 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.733330965 CET | 80 | 49732 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:52.733489990 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:52.869411945 CET | 49733 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:53.029047966 CET | 80 | 49733 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:53.029252052 CET | 49733 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:53.029310942 CET | 49733 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:53.189026117 CET | 80 | 49733 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:53.189039946 CET | 80 | 49733 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:53.232101917 CET | 49733 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:53.252178907 CET | 49732 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:53.252239943 CET | 49729 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:53.252320051 CET | 49733 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:53.521946907 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:53.772243977 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:53.772484064 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:53.772645950 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.019153118 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.019176006 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.020627975 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.020663023 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.020742893 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.026921988 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.026936054 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.060427904 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.532258987 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.532360077 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.538007975 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.538018942 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.538825035 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:54.591481924 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.602343082 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:54.648742914 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.023587942 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.023633003 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.023796082 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.028139114 CET | 49735 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.028152943 CET | 443 | 49735 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.028671026 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.028698921 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.028765917 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.029120922 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.029135942 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.536015034 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:55.537759066 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:55.537776947 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:56.030122042 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:56.030173063 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:56.030222893 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:56.030543089 CET | 49736 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:56.030559063 CET | 443 | 49736 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:56.033368111 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:56.157313108 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.157511950 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:56.157553911 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:56.281390905 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.294445038 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.295181990 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:56.427026033 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.427071095 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.427087069 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:56.427140951 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:56.431358099 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:56.590445995 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:56.590539932 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:56.590687990 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:56.751074076 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:56.751127005 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:31:56.794620037 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:31:56.943674088 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:31:57.183509111 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:31:57.183676004 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:31:57.429667950 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:31:57.439465046 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:57.482191086 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:31:57.692784071 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:57.693553925 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:57.693594933 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:57.693681002 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:57.694207907 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:57.694221973 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:57.747756958 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.195483923 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.197062016 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.197088957 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.689052105 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.689088106 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.689244032 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.689483881 CET | 49740 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.689497948 CET | 443 | 49740 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.689963102 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.689997911 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:58.690067053 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.690385103 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:58.690397978 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.196038961 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.197594881 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:59.197628975 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.688431978 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.688570023 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.688627005 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:59.688905954 CET | 49741 | 443 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:31:59.688920975 CET | 443 | 49741 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:31:59.689173937 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:59.817796946 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:59.818027020 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:59.949728966 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:59.949742079 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:59.949749947 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:31:59.949984074 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:31:59.950306892 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:32:00.109397888 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:32:00.134412050 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:32:00.153983116 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:32:00.382481098 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:32:00.435308933 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:32:25.388389111 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:32:25.628012896 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:32:25.689619064 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:32:25.689671040 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:32:50.638423920 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:32:50.877578020 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:32:50.923404932 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:32:50.923477888 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:33:05.109268904 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:33:05.109328032 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:33:12.686845064 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:33:12.686954975 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:33:15.935312986 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:33:16.173784971 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:33:16.173877001 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:33:16.174565077 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:33:37.701267004 CET | 49734 | 80 | 192.168.2.4 | 88.198.193.213 |
Dec 21, 2023 21:33:37.701411963 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:33:37.701478958 CET | 49738 | 80 | 192.168.2.4 | 64.185.227.156 |
Dec 21, 2023 21:33:37.825902939 CET | 80 | 49737 | 104.26.15.73 | 192.168.2.4 |
Dec 21, 2023 21:33:37.826045036 CET | 49737 | 80 | 192.168.2.4 | 104.26.15.73 |
Dec 21, 2023 21:33:37.860697031 CET | 80 | 49738 | 64.185.227.156 | 192.168.2.4 |
Dec 21, 2023 21:33:37.947777033 CET | 80 | 49734 | 88.198.193.213 | 192.168.2.4 |
Dec 21, 2023 21:33:41.185441971 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:33:41.423954964 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:33:41.424150944 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:33:41.426906109 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:06.435513973 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:06.673636913 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:06.673716068 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:06.674841881 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:31.685411930 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:31.923911095 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:31.924212933 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:31.924609900 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:56.950999975 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:57.175846100 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:34:57.175915003 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:34:57.191621065 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:35:22.201117992 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:35:22.423890114 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:35:22.423979998 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:35:22.444375992 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:35:47.451086998 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:35:47.673949957 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:35:47.674032927 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:35:47.692913055 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:36:12.701149940 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:36:12.924037933 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Dec 21, 2023 21:36:12.924124002 CET | 49739 | 4782 | 192.168.2.4 | 91.92.248.33 |
Dec 21, 2023 21:36:12.940912962 CET | 4782 | 49739 | 91.92.248.33 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2023 21:31:49.127305031 CET | 64288 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 21, 2023 21:31:49.383277893 CET | 53 | 64288 | 1.1.1.1 | 192.168.2.4 |
Dec 21, 2023 21:31:49.884321928 CET | 53299 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 21, 2023 21:31:50.137042046 CET | 53 | 53299 | 1.1.1.1 | 192.168.2.4 |
Dec 21, 2023 21:31:52.211429119 CET | 53017 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 21, 2023 21:31:52.337388992 CET | 53 | 53017 | 1.1.1.1 | 192.168.2.4 |
Dec 21, 2023 21:31:52.742269039 CET | 54551 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 21, 2023 21:31:52.867408037 CET | 53 | 54551 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 21, 2023 21:31:49.127305031 CET | 192.168.2.4 | 1.1.1.1 | 0xfe14 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2023 21:31:49.884321928 CET | 192.168.2.4 | 1.1.1.1 | 0x987f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2023 21:31:52.211429119 CET | 192.168.2.4 | 1.1.1.1 | 0xc5d9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2023 21:31:52.742269039 CET | 192.168.2.4 | 1.1.1.1 | 0x1acc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 21, 2023 21:31:49.383277893 CET | 1.1.1.1 | 192.168.2.4 | 0xfe14 | No error (0) | 88.198.193.213 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:50.137042046 CET | 1.1.1.1 | 192.168.2.4 | 0x987f | No error (0) | 88.198.193.213 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.337388992 CET | 1.1.1.1 | 192.168.2.4 | 0xc5d9 | No error (0) | 104.26.15.73 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.337388992 CET | 1.1.1.1 | 192.168.2.4 | 0xc5d9 | No error (0) | 172.67.75.176 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.337388992 CET | 1.1.1.1 | 192.168.2.4 | 0xc5d9 | No error (0) | 104.26.14.73 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.867408037 CET | 1.1.1.1 | 192.168.2.4 | 0x1acc | No error (0) | api4.ipify.org | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.867408037 CET | 1.1.1.1 | 192.168.2.4 | 0x1acc | No error (0) | 64.185.227.156 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.867408037 CET | 1.1.1.1 | 192.168.2.4 | 0x1acc | No error (0) | 104.237.62.212 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2023 21:31:52.867408037 CET | 1.1.1.1 | 192.168.2.4 | 0x1acc | No error (0) | 173.231.16.77 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49729 | 88.198.193.213 | 80 | 5628 | C:\Users\user\Desktop\30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 21, 2023 21:31:49.636142015 CET | 144 | OUT | |
Dec 21, 2023 21:31:49.882961035 CET | 403 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.26.15.73 | 80 | 5628 | C:\Users\user\Desktop\30EAFDB7C2C580890C4FB2A7101DB1D22C88BD723603F.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 21, 2023 21:31:52.464063883 CET | 146 | OUT | |
Dec 21, 2023 21:31:52.598694086 CET | 613 | IN | |
Dec 21, 2023 21:31:52.599468946 CET | 126 | OUT | |
Dec 21, 2023 21:31:52.733278036 CET | 1286 | IN |