Edit tour
Windows
Analysis Report
BI6oo9z4In.exe
Overview
General Information
Sample name: | BI6oo9z4In.exerenamed because original name is a hash value |
Original sample name: | 04196b8a0869c9f19b3805b4f861a0e1.exe |
Analysis ID: | 1447048 |
MD5: | 04196b8a0869c9f19b3805b4f861a0e1 |
SHA1: | 8ed2478e15af46fa12059bc2e47cc638f3238fb0 |
SHA256: | 34f4c84b4046eb6c9b1a30ebaecc226f60170d8c575319354ae120c40e589973 |
Tags: | 64exe |
Infos: | |
Detection
CryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected CryptOne packer
Yara detected Djvu Ransomware
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Stealc
Yara detected Vidar
Yara detected Vidar stealer
Yara detected zgRAT
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Modifies Group Policy settings
Opens network shares
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Connects to many different domains
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Enables debug privileges
Enables security privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Installs a Chrome extension
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Chromium Browser Instance Executed With Custom Extension
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Windows Defender Exclusions Added - Registry
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- BI6oo9z4In.exe (PID: 6852 cmdline:
"C:\Users\ user\Deskt op\BI6oo9z 4In.exe" MD5: 04196B8A0869C9F19B3805B4F861A0E1) - 8WUnp6Y_Ak5XjHYYEp1aIJYJ.exe (PID: 6832 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\8WUn p6Y_Ak5XjH YYEp1aIJYJ .exe MD5: 6BC7F3C7927F5FC13A4410F1770C2DFE) - HXqqC3YwnKDsi7zeJNheTOoZ.exe (PID: 1608 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\HXqq C3YwnKDsi7 zeJNheTOoZ .exe MD5: D79B788762C6435AE9F599743F9F482D) - RegAsm.exe (PID: 5868 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - LLNkfgDtZiUZkTn30_sZHJcE.exe (PID: 3228 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\LLNk fgDtZiUZkT n30_sZHJcE .exe MD5: D9A7D15AE1511095BC12D4FAA9BE6F70) - MSBuild.exe (PID: 7684 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MsBu ild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - conhost.exe (PID: 7740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Q7vDtN_em7fitYNxQll9ewNo.exe (PID: 2484 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\Q7vD tN_em7fitY NxQll9ewNo .exe MD5: DA2163C91450CEDDEE87651347B25C96) - uyMYdkI0kpEOwxO0H1smOiYQ.exe (PID: 3608 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\uyMY dkI0kpEOwx O0H1smOiYQ .exe MD5: 0951BF8665040A50D5FB548BE6AC7C1D) - chrome.exe (PID: 7860 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --lo ad-extensi on="C:\Use rs\user\Ap pData\Loca l\Temp\Ext ension" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - msedge.exe (PID: 8120 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --load- extension= "C:\Users\ user\AppDa ta\Local\T emp\Extens ion" MD5: 69222B8101B0601CC6663F8381E7E00F) - H61tUtaRHb9b8i2Ptr3ABL5b.exe (PID: 3004 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\H61t UtaRHb9b8i 2Ptr3ABL5b .exe MD5: A032B8D3908C0282D9ACB8647CEC1765) - schtasks.exe (PID: 7712 cmdline:
schtasks / create /f /RU "user" /tr "C:\P rogramData \MPGPH131\ MPGPH131.e xe" /tn "M PGPH131 HR " /sc HOUR LY /rl HIG HEST MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7732 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7960 cmdline:
schtasks / create /f /RU "user" /tr "C:\P rogramData \MPGPH131\ MPGPH131.e xe" /tn "M PGPH131 LG " /sc ONLO GON /rl HI GHEST MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7976 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - _vgILobA0xXbWeowDxO5iZdo.exe (PID: 4460 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\_vgI LobA0xXbWe owDxO5iZdo .exe MD5: FF620B1758C719708D6CECA3B280ABC0) - DbsmJHnmNOlKFVGvWfuU03Cy.exe (PID: 4192 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\Dbsm JHnmNOlKFV GvWfuU03Cy .exe MD5: A2A4B134591EF73161CE1E353605E858) - katC73D.tmp (PID: 7400 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\katC73D .tmp MD5: 66064DBDB70A5EB15EBF3BF65ABA254B) - 0TN7dY_Xsg2P0AdS9Hdzos_q.exe (PID: 1028 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\0TN7 dY_Xsg2P0A dS9Hdzos_q .exe MD5: 3955AF54FBAC1E43C945F447D92E4108) - FDsH_f9gemssdAs7w06vZwlL.exe (PID: 4048 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\FDsH _f9gemssdA s7w06vZwlL .exe MD5: 6012D4B3C55C25ACDB40AD82652ACDF5) - jNWxa0Pc_jGneI3LjcIqUJSt.exe (PID: 5696 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\jNWx a0Pc_jGneI 3LjcIqUJSt .exe MD5: 503AEEC17EEE650E815927B78D27AAEF) - jNWxa0Pc_jGneI3LjcIqUJSt.tmp (PID: 7484 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-CMN D8.tmp\jNW xa0Pc_jGne I3LjcIqUJS t.tmp" /SL 5="$40382, 5476278,54 272,C:\Use rs\user\Do cuments\Si mpleAdobe\ jNWxa0Pc_j GneI3LjcIq UJSt.exe" MD5: F1EE51C7EACCE1E7DE399503FCF98464) - zvaervideorecorder.exe (PID: 7656 cmdline:
"C:\Users\ user\AppDa ta\Local\Z vaer Video Recorder\ zvaervideo recorder.e xe" -i MD5: 043BBFBF3F9119E9ACD330980383D523) - mqno7fOpkNXkRXNi1WQAv6HN.exe (PID: 6064 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\mqno 7fOpkNXkRX Ni1WQAv6HN .exe MD5: D43AC79ABE604CAFFEFE6313617079A3) - nDCHNmvRZpJ9pfO5sjkcNCmB.exe (PID: 5100 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\nDCH NmvRZpJ9pf O5sjkcNCmB .exe MD5: E154829A16292C782B579D217E0EA8BF) - RegAsm.exe (PID: 7212 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - XUm5iHwFVfNXnTAqN672Jc3R.exe (PID: 7092 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\XUm5 iHwFVfNXnT AqN672Jc3R .exe MD5: 029B4A16951A6FB1F6A1FDA9B39769B7) - unbmFXV_GPtCMFoyWe7JMXak.exe (PID: 1908 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\unbm FXV_GPtCMF oyWe7JMXak .exe MD5: ADD437E239EBA1CEABCA80AF38F80B56) - unbmFXV_GPtCMFoyWe7JMXak.exe (PID: 7356 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\unbm FXV_GPtCMF oyWe7JMXak .exe MD5: ADD437E239EBA1CEABCA80AF38F80B56) - icacls.exe (PID: 8096 cmdline:
icacls "C: \Users\use r\AppData\ Local\8467 9a19-0f45- 4e6d-bca5- a027588bcd a7" /deny *S-1-1-0:( OI)(CI)(DE ,DC) MD5: 2E49585E4E08565F52090B144062F97E) - WuCWK8yqSjYPSqgAmQSoYHzV.exe (PID: 8 cmdline:
C:\Users\u ser\Docume nts\Simple Adobe\WuCW K8yqSjYPSq gAmQSoYHzV .exe MD5: AA91E10DDEC556679F0411387B52FC53) - Install.exe (PID: 7560 cmdline:
.\Install. exe MD5: 4940E4F22CE7C072AC676E4493F6277C) - Install.exe (PID: 7992 cmdline:
.\Install. exe /ifrdi dZGrX "525 403" /S MD5: FDF1795DD29A5501FC75C8FF7C24ADDA)
- svchost.exe (PID: 7104 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -s WPD BusEnum MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 7140 cmdline:
C:\Windows \System32\ svchost.ex e -k NetSv cs -p -s N caSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 7144 cmdline:
C:\Windows \system32\ svchost.ex e -k Local SystemNetw orkRestric ted -p -s fhsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 7752 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 7896 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 472 -p 32 28 -ip 322 8 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 8064 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- MPGPH131.exe (PID: 8088 cmdline:
C:\Program Data\MPGPH 131\MPGPH1 31.exe MD5: A032B8D3908C0282D9ACB8647CEC1765)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
STOP, Djvu | STOP Djvu Ransomware it is a ransomware which encrypts user data through AES-256 and adds one of the dozen available extensions as marker to the encrypted file's name. It is not used to encrypt the entire file but only the first 5 MB. In its original version it was able to run offline and, in that case, it used a hard-coded key which could be extracted to decrypt files. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
{"C2 url": "185.172.128.170/7043a0c6a68d9c65.php"}
{"C2 url": "http://185.172.128.170/7043a0c6a68d9c65.php"}
{"Download URLs": [""], "C2 url": "http://cajgtus.com/lancer/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nDo not ask assistants from youtube and recovery data sites for help in recovering your data.\r\nThey can use your free decryption quota and scam you.\r\nOur contact is emails in this text document only.\r\nYou can get and look video overview decrypt tool:\r\nhttps://wetransfer.com/downloads/33b490a613f49fa190924f199d2c079e20240512191214/caaf73\r\nPrice of private key and decrypt software is $999.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $499.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@freshingmail.top\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelpyou@airmail.cc\r\n\r\nYour personal ID:\r\n0873PsawqS", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8xYa6j6LzNJB2kuwO9Xc\\\\nSWMnTH6B2dX\\/XX8jCZc7kUlSg50HcwN2bYxLmKAwhfJZPFIYAufx4nMDKTEKIK5\\/\\\\n4RtQWlcufmpr7vcIJMnyyxwwyni9YfRUJR5VIIhfKzQE3gIQZ29b3M6dqzQeQ+oX\\\\nxHUQPadvTz\\/oYY7IbyFLZsHCxHKG2G2v4Yg4SX0nqMuvuzdAT+fLgmZd1ENiuf4U\\\\nWhF6Td3TAs0EkPT6MrxIXCKIQS5LAXEBcAlxRfv4QU03yP7NBxk4\\/gW6l4kV3RuO\\\\nbgqMAuPe3AkrIuOm1zi5FGsr7e8Y8KYE\\/RfQnJe+eOsmXlnhEpJGk1OLIrGxPETz\\\\nUQIDAQAB\\\\n-----END PUBLIC KEY-----"}
{"C2 url": ["5.42.65.115:40551"], "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RedLine_1 | Yara detected RedLine Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
JoeSecurity_Stealc_1 | Yara detected Stealc | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RiseProStealer | Yara detected RisePro Stealer | Joe Security | ||
JoeSecurity_RiseProStealer | Yara detected RisePro Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RiseProStealer | Yara detected RisePro Stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_MarsStealer | Yara detected Mars stealer | Joe Security | ||
Windows_Trojan_Smokeloader_3687686f | unknown | unknown |
| |
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Click to see the 59 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation | Detects executables containing potential Windows Defender anti-emulation checks | ditekSHen |
| |
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation | Detects executables containing potential Windows Defender anti-emulation checks | ditekSHen |
| |
Click to see the 51 entries |
System Summary |
---|
Source: | Author: Aedan Russell, frack113, X__Junior (Nextron Systems): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Christian Burkard (Nextron Systems): |
Source: | Author: vburov: |
Timestamp: | 05/24/24-09:43:13.166000 |
SID: | 2052775 |
Source Port: | 49959 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:56.167804 |
SID: | 2052775 |
Source Port: | 49897 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:42.632425 |
SID: | 2045700 |
Source Port: | 63103 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:16.987583 |
SID: | 2052775 |
Source Port: | 49982 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.791036 |
SID: | 2052775 |
Source Port: | 49914 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:50.593614 |
SID: | 2052775 |
Source Port: | 50042 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:19.588477 |
SID: | 2052775 |
Source Port: | 49989 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:40.796850 |
SID: | 2052775 |
Source Port: | 50019 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:19.614291 |
SID: | 2052775 |
Source Port: | 49990 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:22.259599 |
SID: | 2052775 |
Source Port: | 49997 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:28.818653 |
SID: | 2046269 |
Source Port: | 49815 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:57.516932 |
SID: | 2052775 |
Source Port: | 50057 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:28.818558 |
SID: | 2046269 |
Source Port: | 49814 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.227137 |
SID: | 2052775 |
Source Port: | 49960 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.894859 |
SID: | 2052775 |
Source Port: | 49975 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:59.906495 |
SID: | 2052775 |
Source Port: | 49922 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:14.457425 |
SID: | 2052775 |
Source Port: | 49967 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:51.855346 |
SID: | 2052775 |
Source Port: | 50049 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:11.447549 |
SID: | 2052775 |
Source Port: | 49949 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.489283 |
SID: | 2052761 |
Source Port: | 54292 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:05.208139 |
SID: | 2052761 |
Source Port: | 64208 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:09.720460 |
SID: | 2052775 |
Source Port: | 49942 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:51.652352 |
SID: | 2052775 |
Source Port: | 49876 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:14.394882 |
SID: | 2052775 |
Source Port: | 49966 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:56.351309 |
SID: | 2052775 |
Source Port: | 50056 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:52.969864 |
SID: | 2052775 |
Source Port: | 49882 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:34.256691 |
SID: | 2052775 |
Source Port: | 50011 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:39.684457 |
SID: | 2052761 |
Source Port: | 64944 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:39.707111 |
SID: | 2052775 |
Source Port: | 50017 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:07.345665 |
SID: | 2052775 |
Source Port: | 49935 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:12.848246 |
SID: | 2052775 |
Source Port: | 49957 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:03.220077 |
SID: | 2046269 |
Source Port: | 49813 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:54.969626 |
SID: | 2052775 |
Source Port: | 49892 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:20.138785 |
SID: | 2052775 |
Source Port: | 49992 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:11.290871 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49946 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:52.709354 |
SID: | 2052775 |
Source Port: | 49881 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:02.949433 |
SID: | 2046269 |
Source Port: | 49879 |
Destination Port: | 58709 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:34.408762 |
SID: | 2046045 |
Source Port: | 49835 |
Destination Port: | 40551 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.906634 |
SID: | 2052775 |
Source Port: | 49964 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.566429 |
SID: | 2052775 |
Source Port: | 49913 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:19.313472 |
SID: | 2046269 |
Source Port: | 49972 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:19.313472 |
SID: | 2046269 |
Source Port: | 49973 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:23.306775 |
SID: | 2044243 |
Source Port: | 49809 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:11.888188 |
SID: | 2052775 |
Source Port: | 49953 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:02.207394 |
SID: | 2052775 |
Source Port: | 49926 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:09.489817 |
SID: | 2052775 |
Source Port: | 49940 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.189728 |
SID: | 2044246 |
Source Port: | 49809 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.487336 |
SID: | 2046266 |
Source Port: | 58709 |
Destination Port: | 49907 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.718400 |
SID: | 2046267 |
Source Port: | 58709 |
Destination Port: | 49907 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:24.732558 |
SID: | 2044244 |
Source Port: | 49809 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:43.184361 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 50022 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:18.437591 |
SID: | 2052775 |
Source Port: | 49987 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.559823 |
SID: | 2052775 |
Source Port: | 49910 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:52.883403 |
SID: | 2046266 |
Source Port: | 58709 |
Destination Port: | 49879 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:11.555269 |
SID: | 2052775 |
Source Port: | 49950 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:55.556497 |
SID: | 2046267 |
Source Port: | 58709 |
Destination Port: | 49879 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.235412 |
SID: | 2052775 |
Source Port: | 49961 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:20.067736 |
SID: | 2049837 |
Source Port: | 49805 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.514432 |
SID: | 2052775 |
Source Port: | 49974 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:16.240894 |
SID: | 2052775 |
Source Port: | 49978 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.039126 |
SID: | 2052775 |
Source Port: | 49971 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:03.533360 |
SID: | 2049837 |
Source Port: | 49730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:01.980195 |
SID: | 2052775 |
Source Port: | 49925 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:24.929053 |
SID: | 2051828 |
Source Port: | 80 |
Destination Port: | 49809 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:34.498978 |
SID: | 2046269 |
Source Port: | 49822 |
Destination Port: | 58709 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:19.212032 |
SID: | 2046266 |
Source Port: | 58709 |
Destination Port: | 49988 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:50.287612 |
SID: | 2049837 |
Source Port: | 49866 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:30.278077 |
SID: | 2046267 |
Source Port: | 50500 |
Destination Port: | 49814 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:09.948405 |
SID: | 2052775 |
Source Port: | 49945 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.340352 |
SID: | 2036335 |
Source Port: | 80 |
Destination Port: | 49963 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:17.588519 |
SID: | 2052775 |
Source Port: | 49986 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.562680 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49815 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:34.133063 |
SID: | 2046267 |
Source Port: | 50500 |
Destination Port: | 49815 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:57.068173 |
SID: | 2052775 |
Source Port: | 49903 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:12.746661 |
SID: | 2052775 |
Source Port: | 49956 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.684690 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49814 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:49.528147 |
SID: | 2052775 |
Source Port: | 50038 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:53.667975 |
SID: | 2052775 |
Source Port: | 49886 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:05.232194 |
SID: | 2052775 |
Source Port: | 49930 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:20.679319 |
SID: | 2052775 |
Source Port: | 49994 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:08.561298 |
SID: | 2052775 |
Source Port: | 49937 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:41.924516 |
SID: | 2046056 |
Source Port: | 40551 |
Destination Port: | 49835 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:22.706362 |
SID: | 2839238 |
Source Port: | 49807 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.528791 |
SID: | 2051831 |
Source Port: | 80 |
Destination Port: | 49809 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.311211 |
SID: | 2043231 |
Source Port: | 49835 |
Destination Port: | 40551 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.851222 |
SID: | 2046266 |
Source Port: | 58709 |
Destination Port: | 49908 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:58.239086 |
SID: | 2052775 |
Source Port: | 49909 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:52.805130 |
SID: | 2052775 |
Source Port: | 50052 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.791278 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49972 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:59.079841 |
SID: | 2046267 |
Source Port: | 58709 |
Destination Port: | 49908 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:17.334234 |
SID: | 2052775 |
Source Port: | 49985 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:05.813795 |
SID: | 2046269 |
Source Port: | 49908 |
Destination Port: | 58709 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:05.125851 |
SID: | 2046269 |
Source Port: | 49907 |
Destination Port: | 58709 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:33.027974 |
SID: | 2052775 |
Source Port: | 50008 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:16.332557 |
SID: | 2052775 |
Source Port: | 49979 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:11.799526 |
SID: | 2052775 |
Source Port: | 49952 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:56.513874 |
SID: | 2052775 |
Source Port: | 49902 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:24.916536 |
SID: | 2049060 |
Source Port: | 49813 |
Destination Port: | 50500 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:12.681145 |
SID: | 2052761 |
Source Port: | 57884 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.990613 |
SID: | 2052775 |
Source Port: | 49965 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:50.590851 |
SID: | 2052761 |
Source Port: | 54425 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.918080 |
SID: | 2052775 |
Source Port: | 49976 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:34.607962 |
SID: | 2043234 |
Source Port: | 40551 |
Destination Port: | 49835 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:42.294015 |
SID: | 2052775 |
Source Port: | 50021 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:12.371909 |
SID: | 2052775 |
Source Port: | 49954 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:50.637798 |
SID: | 2052775 |
Source Port: | 49873 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:56.337617 |
SID: | 2052775 |
Source Port: | 49899 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.703003 |
SID: | 2052775 |
Source Port: | 49962 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:13.845486 |
SID: | 2833438 |
Source Port: | 49963 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:21.656441 |
SID: | 2052775 |
Source Port: | 49996 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:50.453081 |
SID: | 2041922 |
Source Port: | 50041 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:38.419246 |
SID: | 2052775 |
Source Port: | 50016 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:54.875453 |
SID: | 2052775 |
Source Port: | 50054 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:14.917367 |
SID: | 2052775 |
Source Port: | 49970 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:55.886782 |
SID: | 2052775 |
Source Port: | 49896 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:19.961876 |
SID: | 2049837 |
Source Port: | 49804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:31.316511 |
SID: | 2046267 |
Source Port: | 58709 |
Destination Port: | 49822 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:31.088651 |
SID: | 2046266 |
Source Port: | 58709 |
Destination Port: | 49822 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.724410 |
SID: | 2046267 |
Source Port: | 50500 |
Destination Port: | 49813 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:15.809295 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49973 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:25.557976 |
SID: | 2046266 |
Source Port: | 50500 |
Destination Port: | 49813 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:10.780720 |
SID: | 2052775 |
Source Port: | 49947 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:57.843831 |
SID: | 2052761 |
Source Port: | 50816 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:57.606740 |
SID: | 2052775 |
Source Port: | 49904 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:14.553927 |
SID: | 2052775 |
Source Port: | 49968 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:43:35.805357 |
SID: | 2052775 |
Source Port: | 50013 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:55.425189 |
SID: | 2052775 |
Source Port: | 49893 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 05/24/24-09:42:54.068218 |
SID: | 2052775 |
Source Port: | 49890 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: |