Source: global traffic |
HTTP traffic detected: GET /raw/J6uRjZrv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: pastebin.comConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /vsm4ofxs/raw HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: rentry.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /raw/4B83LcVU HTTP/1.1Host: pastebin.comConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /shqm6g9p/raw HTTP/1.1Host: rentry.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /attachments/1187381098527858721/1299360122446807113/este2.txt?ex=6723826a&is=672230ea&hm=1e5ddde8edfd2b0b55a1936b9b2cf98999ca75e818b8e4dadd7bc75ebedbbd24& HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive |
Source: powershell.exe, 00000004.00000002.2309229890.00000230519AB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: HTTPS://CDN.DISCORDAPP.COM/ATTACHMENTS/1187381098527858721/1299360122446807113/ESTE2.TXT?EX=6723826A |
Source: powershell.exe, 00000004.00000002.2309229890.00000230519B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://cdn.discordapp.com |
Source: powershell.exe, 00000002.00000002.2385225983.00000283519AF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.mS%F-sE |
Source: powershell.exe, 00000004.00000002.2353954151.000002306145D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: powershell.exe, 00000004.00000002.2353954151.000002306145D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D019C0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2230796347.0000020D1007A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2230796347.0000020D101B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000004.00000002.2309229890.000002305309D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.0000023052A16000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pastebin.com |
Source: powershell.exe, 00000007.00000002.2217928363.0000020D0022D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000004.00000002.2309229890.0000023053104000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D01949000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://rentry.org |
Source: powershell.exe, 00000002.00000002.2387245646.0000028351BD5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.00000230513F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D00001000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000007.00000002.2217928363.0000020D0022D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000004.00000002.2373219888.0000023069B0E000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.microsoft. |
Source: powershell.exe, 00000002.00000002.2387245646.0000028351B8B000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6 |
Source: powershell.exe, 00000002.00000002.2387245646.0000028351BA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.00000230513F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D00001000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000004.00000002.2309229890.00000230519AB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.discordapp.com |
Source: powershell.exe, 00000004.00000002.2309229890.00000230519AB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://cdn.discordapp.com/attachments/1187381098527858721/1299360122446807113/este2.txt?ex=6723826a |
Source: powershell.exe, 00000007.00000002.2230796347.0000020D101B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000007.00000002.2230796347.0000020D101B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000007.00000002.2230796347.0000020D101B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000007.00000002.2217928363.0000020D0022D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000004.00000002.2309229890.000002305242C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D01471000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000004.00000002.2373219888.0000023069AD0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://go.microsoft.coa |
Source: powershell.exe, 00000004.00000002.2353954151.000002306145D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D019C0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2230796347.0000020D1007A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2230796347.0000020D101B0000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000004.00000002.2309229890.000002305304C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.00000230517B8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pastebin.com |
Source: powershell.exe, 00000004.00000002.2309229890.000002305304C000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pastebin.com/raw |
Source: powershell.exe, 00000004.00000002.2309229890.000002305304C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.00000230517B8000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://pastebin.com/raw/4B83LcVU |
Source: powershell.exe, 00000004.00000002.2307658874.000002304F938000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://pastebin.com/raw/J6uRjZrv |
Source: powershell.exe, 00000004.00000002.2309229890.0000023053104000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.000002305196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D016B1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://rentry.org |
Source: powershell.exe, 00000004.00000002.2309229890.0000023053104000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.000002305196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2309229890.00000230530E2000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://rentry.org/shqm6g9p/raw |
Source: powershell.exe, 00000004.00000002.2309229890.0000023053104000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://rentry.org/shqm6g9p/rawP |
Source: powershell.exe, 00000007.00000002.2217928363.0000020D01471000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D016B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2217928363.0000020D00C2D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://rentry.org/vsm4ofxs/raw |
Source: powershell.exe, 00000007.00000002.2217928363.0000020D01471000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://rentry.org/vsm4ofxs/rawp |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49744 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49712 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49744 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49712 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49756 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49756 |
Source: 4.2.powershell.exe.2305184b690.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables (downloaders) containing reversed URLs to raw contents of a paste Author: ditekSHen |
Source: 4.2.powershell.exe.2305184b690.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects known downloader agent Author: ditekSHen |
Source: 4.2.powershell.exe.23052ec24b8.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects executables (downloaders) containing reversed URLs to raw contents of a paste Author: ditekSHen |
Source: 4.2.powershell.exe.23052ec24b8.1.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects known downloader agent Author: ditekSHen |
Source: 00000004.00000002.2353954151.000002306145D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 4952, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 3460, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 3460, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |