Windows Analysis Report
SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe

Overview

General Information

Sample name: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Analysis ID: 1537051
MD5: f0ecb0b7a365f88b26f3cb7d5101881a
SHA1: 09e0740dad05507a1d652995f6eebb3eadddf7b7
SHA256: 4d97c5998d3d572ebdfbcad5ff324bf33a355fa49f0fbfb2ee8f50af7ccaec49
Tags: exe
Infos:

Detection

Go Injector, RedLine
Score: 92
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Go Injector
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Installs new ROOT certificates
IP address seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer

AV Detection

barindex
Source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c0008a6000.1.raw.unpack Malware Configuration Extractor: RedLine {"C2 url": ["185.215.113.9:12617"], "Bot Id": "Hanaa", "Authorization Header": "0e2b43b28f6c980406364d73b3b371a7"}
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe ReversingLabs: Detection: 55%
Source: Submited Sample Integrated Neural Analysis Model: Matched 96.4% probability
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release_x64\Eula.pdb888 source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release_x64\Eula.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C000858000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: SystemSettings.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3004317044.000000C0007E0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C000858000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: SystemSettings.pdbGCTL source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3004317044.000000C0007E0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb@@ source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp

Networking

barindex
Source: Malware configuration extractor URLs: 185.215.113.9:12617
Source: Joe Sandbox View IP Address: 185.199.110.133 185.199.110.133
Source: Joe Sandbox View IP Address: 185.199.110.133 185.199.110.133
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /EDDYCJY/fake-useragent/v0.2.0/static/fake_useragent_0.2.0.json HTTP/1.1Host: raw.githubusercontent.comUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
Source: global traffic DNS traffic detected: DNS query: raw.githubusercontent.com
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://go.mail.ru/help/robots)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://notifyninja.com/monitoring
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0H
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0I
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com0O
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C000580000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C00043C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3007893098.000000C000580000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.apple.com/go/applebot)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C0001FF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.brandwatch.net)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C000168000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/mobile/adsbot.html)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C000168000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/mobile/adsbot.html)C:
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C000168000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.google.com/mobile/adsbot.html)Mozilla/5.0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtdcannot
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.icjobs.de)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C0001FF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.jobboerse.com/bot.htm)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C000168000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.similartech.com/smtbot)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C000168000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.similartech.com/smtbot)Mozilla/5.0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3307217031.000000C0001FF000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.xn--jobbrse-d1a.com)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000558000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://yandex.com/bots)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C0008A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C000588000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3007789626.000000C0005AC000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C00049D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3005997659.000000C000640000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2629519795.000000C000931000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://api.ip.sb/ip
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://github.com/golang/protobuf/issues/1609):
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://golang.org/doc/faq#nil_errorcollected
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://locationInfinityencodingprotobuftype_urlhttp/1.1mac-os-xcomputerNO_PROXYdisabledrequiredopti
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://management.azure.com%q
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://onsi.github.io/gomega/#adjusting-output
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: https://onsi.github.io/gomega/#eventually
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C000470000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://www.jobboerse.com/bot.htm)
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704

System Summary

barindex
Source: 00000000.00000003.3005308576.000000C0006B8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: 00000000.00000003.3005069060.000000C000750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: 00000000.00000003.3075843578.000000C003266000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: 00000000.00000003.3074488765.000000C0032A6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: 00000000.00000003.2631370302.000000C000900000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: 00000000.00000002.3312288498.000000C001D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Number of sections : 12 > 10
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameEula.exe* vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2629519795.000000C000A59000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C000858000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3006634269.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3005416512.000000C000673000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3005852551.000000C000663000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2629519795.000000C0008F0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000000.2053965778.00007FF722AD4000.00000008.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameCapCut.exeD" vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameClampers.exe8 vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilename32BitMAPIBroker.exeD vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3004317044.000000C0007E0000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameSystemSettings.exej% vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Binary or memory string: OriginalFilenameCapCut.exeD" vs SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe
Source: 00000000.00000003.3005308576.000000C0006B8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 00000000.00000003.3005069060.000000C000750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 00000000.00000003.3075843578.000000C003266000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 00000000.00000003.3074488765.000000C0032A6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 00000000.00000003.2631370302.000000C000900000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 00000000.00000002.3312288498.000000C001D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: classification engine Classification label: mal92.troj.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe File created: C:\Users\user\AppData\Local\Temp\fake_useragent_0.2.0.json Jump to behavior
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000000.2051979895.00007FF722022000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: SelectExprDprotobuf:"bytes,5,opt,name=select_expr,json=selectExpr,proto3,oneof"O*func([]resolver.Address, balancer.NewSubConnOptions) (balancer.SubConn, error)O*struct { F uintptr; X0 *transport.http2Client; X1 *transport.Stream; X2 bool }O*struct { F uintptr; X0 *transport.http2Server; X1 *transport.Stream; X2 bool }P*struct { *promhttp.responseWriterDelegator; http.Hijacker; http.CloseNotifier }P*struct { *promhttp.responseWriterDelegator; io.ReaderFrom; http.CloseNotifier }P*func(context.Context, string, *net.TCPAddr, *net.TCPAddr) (*net.TCPConn, error)P*struct { F uintptr; X0 chan struct {}; X1 http.RoundTripper; X2 *http.Request }P*map.bucket[uint16]struct { curve ecdh.Curve; hash crypto.Hash; nSecret uint16 }P*func(context.Context, string, net.Conn) (net.Conn, credentials.AuthInfo, error)
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe ReversingLabs: Detection: 55%
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: depgithub.com/docker/docker-credential-helpersv0.8.2h1:bX3YxiGzFP5sOXWc3bTPEXdEaZSeVMrFgOr3T+zrFAo=
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine .localhostwsarecvmsgwsasendmsgIP addressunixpacket netGo = RIPEMD-160ChorasmianDevanagariGlagoliticKharoshthiManichaeanOld_ItalicOld_PermicOld_TurkicOld_UyghurPhoenicianSaurashtraSHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1POSTALCODEexecerrdotSYSTEMROOTConnectionKeep-Alivelocal-addrRST_STREAMEND_STREAMSet-Cookie stream=%dset-cookieuser-agentkeep-alive:authorityconnectionequivalentHost: %s
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=RegSetValueExWinternal error.in-addr.arpa.unknown mode: unreachable: /log/filter.go/log/helper.godata truncated
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: Estimated total available CPU time not spent executing any Go or Go runtime code. In other words, the part of /cpu/classes/total:cpu-seconds that was unused. This metric is an overestimate, and not directly comparable to system CPU time measurements. Compare only with other /cpu/classes metrics.Memory allocated from the heap that is reserved for stack space, whether or not it is currently in-use. Currently, this represents all stack memory for goroutines. It also includes all OS thread stacks in non-cgo programs. Note that stacks may be allocated differently in the future, and this may change.ASTEmptyASTComparatorASTCurrentNodeASTExpRefASTFunctionExpressionASTFieldASTFilterProjectionASTFlattenASTIdentityASTIndexASTIndexExpressionASTKeyValPairASTLiteralASTMultiSelectHashASTMultiSelectListASTOrExpressionASTAndExpressionASTNotExpressionASTPipeASTProjectionASTSubexpressionASTSliceASTValueProjectionDistribution of individual non-GC-related stop-the-world pause latencies. This is the time from deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (measured directly in /sched/pauses/stopping/other:seconds). Bucket counts increase monotonically.Distribution of individual GC-related stop-the-world stopping latencies. This is the time it takes from deciding to stop the world until all Ps are stopped. This is a subset of the total GC-related stop-the-world time (/sched/pauses/total/gc:seconds). During this time, some threads may be executing. Bucket counts increase monotonically.Distribution of individual non-GC-related stop-the-world stopping latencies. This is the time it takes from deciding to stop the world until all Ps are stopped. This is a subset of the total non-GC-related stop-the-world time (/sched/pauses/total/other:seconds). During this time, some threads may be executing. Bucket counts increase monotonically.stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSTmplLitstateJSRegexpstateJSBlockCmtstateJSLineCmtstateJSHTMLOpenCmtstateJSHTMLCloseCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateErrorstateDeadGC cycle the last time the GC CPU limiter was enabled. This metric is useful for diagnosing the root cause of an out-of-memory error, because the limiter trades memory for CPU time when the GC's CPU time gets too high. This is most likely to occur with use of SetMemoryLimit. The first GC cycle is cycle 1, so a value of 0 indicates that it was never enabled.Distribution of individual GC-related stop-the-world pause latencies. This is the time from deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (this is measured directly in /sched/pauses/stopping/gc:seconds), during which some threads may still be running. Bucket counts increase monotonically.Estimated total CPU ti
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: Estimated total available CPU time not spent executing any Go or Go runtime code. In other words, the part of /cpu/classes/total:cpu-seconds that was unused. This metric is an overestimate, and not directly comparable to system CPU time measurements. Compare only with other /cpu/classes metrics.Memory allocated from the heap that is reserved for stack space, whether or not it is currently in-use. Currently, this represents all stack memory for goroutines. It also includes all OS thread stacks in non-cgo programs. Note that stacks may be allocated differently in the future, and this may change.ASTEmptyASTComparatorASTCurrentNodeASTExpRefASTFunctionExpressionASTFieldASTFilterProjectionASTFlattenASTIdentityASTIndexASTIndexExpressionASTKeyValPairASTLiteralASTMultiSelectHashASTMultiSelectListASTOrExpressionASTAndExpressionASTNotExpressionASTPipeASTProjectionASTSubexpressionASTSliceASTValueProjectionDistribution of individual non-GC-related stop-the-world pause latencies. This is the time from deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (measured directly in /sched/pauses/stopping/other:seconds). Bucket counts increase monotonically.Distribution of individual GC-related stop-the-world stopping latencies. This is the time it takes from deciding to stop the world until all Ps are stopped. This is a subset of the total GC-related stop-the-world time (/sched/pauses/total/gc:seconds). During this time, some threads may be executing. Bucket counts increase monotonically.Distribution of individual non-GC-related stop-the-world stopping latencies. This is the time it takes from deciding to stop the world until all Ps are stopped. This is a subset of the total non-GC-related stop-the-world time (/sched/pauses/total/other:seconds). During this time, some threads may be executing. Bucket counts increase monotonically.stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSTmplLitstateJSRegexpstateJSBlockCmtstateJSLineCmtstateJSHTMLOpenCmtstateJSHTMLCloseCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateErrorstateDeadGC cycle the last time the GC CPU limiter was enabled. This metric is useful for diagnosing the root cause of an out-of-memory error, because the limiter trades memory for CPU time when the GC's CPU time gets too high. This is most likely to occur with use of SetMemoryLimit. The first GC cycle is cycle 1, so a value of 0 indicates that it was never enabled.Distribution of individual GC-related stop-the-world pause latencies. This is the time from deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (this is measured directly in /sched/pauses/stopping/gc:seconds), during which some threads may still be running. Bucket counts increase monotonically.Estimated total CPU ti
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: net/addrselect.go
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: github.com/go-openapi/swag@v0.23.0/loading.go
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: google.golang.org/grpc@v1.63.2/internal/balancerload/load.go
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe String found in binary or memory: dOaNajEYPL/load.go
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe File read: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Section loaded: winhttp.dll Jump to behavior
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static file information: File size 20831232 > 1048576
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x812000
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Raw size of .data is bigger than: 0x100000 < 0x12ee00
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0xa25e00
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release_x64\Eula.pdb888 source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release_x64\Eula.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310009226.000000C0004E1000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C000858000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: SystemSettings.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3004317044.000000C0007E0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.2631370302.000000C000858000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: SystemSettings.pdbGCTL source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000003.3004317044.000000C0007E0000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Release\Plug_ins\pi_brokers\32BitMAPIBroker.pdb@@ source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, 00000000.00000002.3310532037.000000C0005CF000.00000004.00001000.00020000.00000000.sdmp
Source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Static PE information: section name: .xdata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\AppReadiness VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\DVD VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\DVD\EFI VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\DVD\EFI\en-US VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\DVD\PCAT VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\bg-BG VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\da-DK VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\de-DE VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\el-GR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\en-GB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\en-US VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\es-MX VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\fi-FI VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\fr-CA VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\fr-FR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\hr-HR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\nb-NO VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\nl-NL VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\pl-PL VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\pt-PT VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\ru-RU VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\sl-SI VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\sr-Latn-RS VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\sv-SE VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\EFI\zh-CN VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\Misc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\de-DE VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\en-GB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\hr-HR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\memtest.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\memtest.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\nb-NO VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\nl-NL VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\pl-PL VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\pt-BR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\qps-ploc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\ru-RU VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\sr-Latn-RS VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\PCAT\tr-TR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Boot\Resources VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Branding\Basebrd\en-GB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\CSC\v2.0.6\temp VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\DiagTrack\Scenarios VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Fonts VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\GameBarPresenceWriter VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\HelpPane.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\HelpPane.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME\IMEJP VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME\IMEJP\Assets VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME\IMEJP\DICTS VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME\IMEKR VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\IME\IMETC\HELP VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\.NET CLR Networking\0000 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\.NET Memory Cache 4.0 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\LSM VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\MSDTC\0000 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\ServiceModelOperation 3.0.0.0\0000 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\INF\ServiceModelOperation 3.0.0.0\0409 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\ImmersiveControlPanel\SystemSettings.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\ImmersiveControlPanel\SystemSettings.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\ImmersiveControlPanel\en-GB VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\ImmersiveControlPanel\pris VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\InputMethod\SHARED VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00 VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\AdobeCollabSync.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\AdobeCollabSync.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\CRLogTransport.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\CRWindowsClientService.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Eula.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Eula.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Exch_Acrobat.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Exch_Acrobat.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Exch_AcrobatInfo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\Exch_AcrobatInfo.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\SingleClientServicesUpdater.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\SingleClientServicesUpdater.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\_32bitmapibroker.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\_32bitmapibroker.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\_4bitmapibroker.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Queries volume information: C:\Windows\Installer\$PatchCache$\Managed\68AB67CA330133017706CB5110E47A00\21.1.20135\_4bitmapibroker.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, type: SAMPLE
Source: Yara match File source: 00000000.00000000.2051979895.00007FF722506000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe PID: 5000, type: MEMORYSTR
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00049e000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00058c000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000a16000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000858000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c0008a6000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000620000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c0008a6000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00058c000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000858000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00049e000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000003.3007789626.000000C0005AC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2631370302.000000C0008A6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310532037.000000C000588000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310893840.000000C000858000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310009226.000000C00049D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.3005997659.000000C000640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2629519795.000000C000931000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe PID: 5000, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe, type: SAMPLE
Source: Yara match File source: 00000000.00000000.2051979895.00007FF722506000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe PID: 5000, type: MEMORYSTR
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00049e000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00058c000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000a16000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000858000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c0008a6000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000620000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c0008a6000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00058c000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c000858000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe.c00049e000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000003.3007789626.000000C0005AC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2631370302.000000C0008A6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310532037.000000C000588000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310893840.000000C000858000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3310009226.000000C00049D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.3005997659.000000C000640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2629519795.000000C000931000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SecuriteInfo.com.Win64.Malware-gen.1057.9543.exe PID: 5000, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs