Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: unknown | TCP traffic detected without corresponding DNS query: 109.234.38.212 |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000255A000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://109.234.38.212:6677 |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://109.234.38.212:6677/ |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000256E000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000255A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000256E000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000256E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/0 |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/ |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnect |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000255A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectT |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse |
Source: Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR |
Source: Implosions.exe, 00000000.00000002.2910742497.000000000268C000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000024C1000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.0000000002577000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910742497.00000000025A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse |
Source: Implosions.exe, 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911153997.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910554766.0000000002240000.00000004.00000020.00020000.00000000.sdmp, Implosions.exe, 00000000.00000003.1668569005.000000000071B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE% |
Source: Implosions.exe, 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911153997.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910554766.0000000002240000.00000004.00000020.00020000.00000000.sdmp, Implosions.exe, 00000000.00000003.1668569005.000000000071B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg |
Source: Implosions.exe, 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, Implosions.exe, 00000000.00000002.2911153997.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, Implosions.exe, 00000000.00000002.2910554766.0000000002240000.00000004.00000020.00020000.00000000.sdmp, Implosions.exe, 00000000.00000003.1668569005.000000000071B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/ip%appdata% |
Source: Implosions.exe, type: SAMPLE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.Implosions.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34e0190.6.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.34e0190.6.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2280f6e.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2280f6e.2.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2280086.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2280086.1.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.50a0000.8.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.50a0000.8.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2480000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2480000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2480ee8.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2480ee8.4.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2280086.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2280086.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2480000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2480000.3.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34c6458.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.34c6458.7.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.3.Implosions.exe.71b718.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.3.Implosions.exe.71b718.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34e0190.6.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.50a0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.2280f6e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.34c6458.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.2280f6e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34c6458.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.50a0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34e0190.6.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.3.Implosions.exe.71b718.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.3.Implosions.exe.71b718.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34c5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.34c5570.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 0.2.Implosions.exe.34c5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.Implosions.exe.34c5570.5.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 00000000.00000002.2911153997.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 00000000.00000002.2910554766.0000000002240000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: 00000000.00000003.1668569005.000000000071B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: Process Memory Space: Implosions.exe PID: 7544, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00408C60 | 0_2_00408C60 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_0040DC11 | 0_2_0040DC11 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00407C3F | 0_2_00407C3F |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00418CCC | 0_2_00418CCC |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00406CA0 | 0_2_00406CA0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_004028B0 | 0_2_004028B0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_0041A4BE | 0_2_0041A4BE |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00408C60 | 0_2_00408C60 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00418244 | 0_2_00418244 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00401650 | 0_2_00401650 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00402F20 | 0_2_00402F20 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_004193C4 | 0_2_004193C4 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00418788 | 0_2_00418788 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00402F89 | 0_2_00402F89 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_00402B90 | 0_2_00402B90 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_004073A0 | 0_2_004073A0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BEB70 | 0_2_021BEB70 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BE4EF | 0_2_021BE4EF |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CACD00 | 0_2_05CACD00 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA2D38 | 0_2_05CA2D38 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA1288 | 0_2_05CA1288 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA3270 | 0_2_05CA3270 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA7F88 | 0_2_05CA7F88 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA0810 | 0_2_05CA0810 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CA35A1 | 0_2_05CA35A1 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CEA448 | 0_2_05CEA448 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE5968 | 0_2_05CE5968 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE8788 | 0_2_05CE8788 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE8798 | 0_2_05CE8798 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05D67D70 | 0_2_05D67D70 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05D626D0 | 0_2_05D626D0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05D64ED0 | 0_2_05D64ED0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05DEC53F | 0_2_05DEC53F |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05DECCF0 | 0_2_05DECCF0 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05DE0040 | 0_2_05DE0040 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05DE0033 | 0_2_05DE0033 |
Source: Implosions.exe, type: SAMPLE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.Implosions.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34e0190.6.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.34e0190.6.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2280f6e.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2280f6e.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2280086.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2280086.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.50a0000.8.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.50a0000.8.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2480ee8.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2480000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2480000.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2480ee8.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2480ee8.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2280086.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2280086.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2480000.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2480000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34c6458.7.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.34c6458.7.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.3.Implosions.exe.71b718.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.3.Implosions.exe.71b718.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34e0190.6.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.50a0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.2280f6e.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.34c6458.7.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.2280f6e.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34c6458.7.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.50a0000.8.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34e0190.6.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.3.Implosions.exe.71b718.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.3.Implosions.exe.71b718.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34c5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.34c5570.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.Implosions.exe.34c5570.5.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.Implosions.exe.34c5570.5.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000002.2911359259.00000000050A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000002.2910650053.0000000002480000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000000.00000002.2911153997.00000000034C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000002.2910554766.0000000002240000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000003.1668569005.000000000071B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: Process Memory Space: Implosions.exe PID: 7544, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_0040E21D push ecx; ret | 0_2_0040E230 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_0040BB97 push dword ptr [ecx-75h]; iretd | 0_2_0040BBA3 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC3F7 pushfd ; retf | 0_2_021BC44E |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC3F7 pushad ; retf | 0_2_021BC46A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC408 pushad ; retf | 0_2_021BC412 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC420 push esp; retf | 0_2_021BC45A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC450 pushad ; retf | 0_2_021BC412 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC450 push esp; retf | 0_2_021BC45A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC444 push esp; retf | 0_2_021BC406 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC444 pushfd ; retf | 0_2_021BC44E |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC47C pushfd ; retf | 0_2_021BC4BA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC49C pushad ; retf | 0_2_021BC46A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC4AC pushfd ; retf | 0_2_021BC4BA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_021BC4F0 pushfd ; retf | 0_2_021BC4BA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE73E0 push esp; iretd | 0_2_05CE759A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE73D3 push ebx; iretd | 0_2_05CE73DA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE73D1 push esp; iretd | 0_2_05CE73D2 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE83F1 pushad ; iretd | 0_2_05CE83F2 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE6DA3 push eax; iretd | 0_2_05CE6DAA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE6DA1 push eax; iretd | 0_2_05CE6DA2 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE4CC0 pushfd ; iretd | 0_2_05CE4CC1 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE6EF3 push ecx; iretd | 0_2_05CE6EFA |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE6EF1 push edx; iretd | 0_2_05CE6EF2 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE6E36 push eax; iretd | 0_2_05CE6E3A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE7903 push ebp; iretd | 0_2_05CE790A |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05CE7900 push ebp; iretd | 0_2_05CE7902 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05D68DA2 push eax; ret | 0_2_05D68DB9 |
Source: C:\Users\user\Desktop\Implosions.exe | Code function: 0_2_05DEB8E9 push 3005D34Ch; iretd | 0_2_05DEB8F5 |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Implosions.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |