Windows
Analysis Report
17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
Overview
General Information
Sample name: | 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe |
Analysis ID: | 1553106 |
MD5: | 01ef0ba434c74e68df6e94737826d22f |
SHA1: | 86c934eb90ae6ecc38fd7dd38001552f618d5e5f |
SHA256: | 48ee878fefc7d5d9df66fc978dfaafcfb61129acf92b1143e1b865ab292be9f0 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe (PID: 1992 cmdline:
"C:\Users\ user\Deskt op\1731235 8643e2349e 1394349def 751b6d9e1f 5f7d806ef3 32905ce99f 25fe32ff48 0e138d6557 .dat-decod ed.exe" MD5: 01EF0BA434C74E68DF6E94737826D22F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
{"Server": "dckast.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "IcjempBO8d2MCouzOGusB0svKBQJXA6a", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "MIICMDCCAZmgAwIBAgIVAIhNlmebb6nSe6ECHjMpYKJ1i7gvMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIxMDEyODA1MzU1N1oXDTMxMTEwNzA1MzU1N1owEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALz18kcXxyYRNtzNciIOitqVEEKYOOJZOGjSaWOLKz3M/Df8QpKzt86Y+GK3639BYF/OzJ6i8PyJcI4jCe+L56ytnlJDfAYTzg7df+pvpE6bSgYYgBSEMcKBPrpx6bV5z/V8FOCVqlt9xfM47rHzIs6kOkc0Xu0TqFGxVfi3Koj/AgMBAAGjMjAwMB0GA1UdDgQWBBQOZShjgdZ92lUVGT5AalbF4rcBrDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBABuRWEmIgb/BjPElBrcq4LuUTHLBWgnJN3yXXtFA+Nl/+mYto5FZMUmzz3mbjKRHuzo79jdei4h1vSO9+2gTFWw1mY8HoeEoyL0YExBQMCoUPjpLJEuAydiWBMXXBmv0zPzE3W7zhG6DRe8pXQkZ2yu8c9G4KxXS1ITmSrlJqBQ6", "ServerSignature": "ZIALyYaEK2Gf9gnEAWavWOlpzAiUytpYF0CfNaOtJ8GspQ6HPAr4iuTjM7Rva8TOykfQUmKjNP6Kbjdj6exK3H8TCZIcKZdURtF0TCwSQvECT0GIeTVFARCSyw9L7oDKWUmPRrmclA8bpdKzhVCHHWUMlnSSUQbraA0yIMRWCzQ=", "BDOS": "null", "External_config_on_Pastebin": "false"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_DCRat_1aeea1ac | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_B64_Artifacts | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice | Detects executables attemping to enumerate video devices using WMI | ditekSHen |
| |
INDICATOR_SUSPICIOUS_EXE_DcRatBy | Detects executables containing the string DcRatBy | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T11:53:27.865161+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.5 | 49707 | TCP |
2024-11-10T11:54:06.445320+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.5 | 49862 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848DA308D |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848DA00C1 |
Boot Survival |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 111 Obfuscated Files or Information | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 21 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
82% | ReversingLabs | ByteCode-MSIL.Backdoor.AsyncRAT | ||
76% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1307404 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dckast.duckdns.org | 45.135.232.38 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.135.232.38 | dckast.duckdns.org | Russian Federation | 49392 | ASBAXETNRU | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1553106 |
Start date and time: | 2024-11-10 11:52:14 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtReadVirtualMemory calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.135.232.38 | Get hash | malicious | AsyncRAT, DcRat | Browse | ||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | Remcos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASBAXETNRU | Get hash | malicious | AsyncRAT, DcRat | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Clipboard Hijacker, Cryptbot | Browse |
|
File type: | |
Entropy (8bit): | 5.620781820179294 |
TrID: |
|
File name: | 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe |
File size: | 48'640 bytes |
MD5: | 01ef0ba434c74e68df6e94737826d22f |
SHA1: | 86c934eb90ae6ecc38fd7dd38001552f618d5e5f |
SHA256: | 48ee878fefc7d5d9df66fc978dfaafcfb61129acf92b1143e1b865ab292be9f0 |
SHA512: | d489c98df8ae90621922cba7d4ff0e3d937382ef60900cd2af7b319e2902048576f8a41c32210ea6b555c0ae753d5f930d234f28827227e2fe1343cc2a46057f |
SSDEEP: | 768:xGq+s3pUtDILNCCa+Di+0j1rgLqRp8AofiV8YbOgekOHg3LTvEgK/JLZVc6KN:8q+AGtQO+OOPAbzbxgHcTnkJLZVclN |
TLSH: | 5B236D0037D8C136E2FD4BB4A9F2A2458279D6675903CA996CC815EA2B13FC597036FE |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40cbbe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x60930A0B [Wed May 5 21:11:39 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xcb68 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0xdf7 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xabc4 | 0xac00 | ccfb5bc34bf8e2c2f1fb1b8335f8ff03 | False | 0.5024073401162791 | data | 5.6464763236392 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xe000 | 0xdf7 | 0xe00 | 2083376922615c09cdda9acfd9305376 | False | 0.4017857142857143 | data | 5.110607648061562 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0xc | 0x200 | 82148d01c3935cf90ef81a3dd1fad607 | False | 0.044921875 | data | 0.07763316234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe0a0 | 0x2d4 | data | 0.4350828729281768 | ||
RT_MANIFEST | 0xe374 | 0xa83 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.40245261984392416 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-10T11:53:27.865161+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.5 | 49707 | TCP |
2024-11-10T11:54:06.445320+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.5 | 49862 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 10, 2024 11:53:12.031997919 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:12.036824942 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:12.036917925 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:12.057600021 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:12.062524080 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:12.656487942 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:12.656637907 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:17.752285957 CET | 49704 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:17.753823996 CET | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:17.911768913 CET | 35650 | 49704 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:17.911792040 CET | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:17.911922932 CET | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:17.912415028 CET | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:17.918600082 CET | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:18.526166916 CET | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:18.526287079 CET | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:23.530694008 CET | 49705 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:23.531831980 CET | 49706 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:23.535490036 CET | 35650 | 49705 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:23.536561012 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:23.536638021 CET | 49706 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:23.536927938 CET | 49706 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:23.541680098 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:24.163470984 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:24.163547993 CET | 49706 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:29.171411037 CET | 49706 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:29.172456026 CET | 49714 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:29.176176071 CET | 35650 | 49706 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:29.177290916 CET | 35650 | 49714 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:29.177367926 CET | 49714 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:29.177675009 CET | 49714 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:29.182389021 CET | 35650 | 49714 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:29.795591116 CET | 35650 | 49714 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:29.795665979 CET | 49714 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:34.796605110 CET | 49714 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:34.797620058 CET | 49745 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:34.801445007 CET | 35650 | 49714 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:34.802402973 CET | 35650 | 49745 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:34.802491903 CET | 49745 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:34.802819967 CET | 49745 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:34.807816982 CET | 35650 | 49745 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:35.423825979 CET | 35650 | 49745 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:35.423886061 CET | 49745 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:40.436989069 CET | 49745 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:40.437971115 CET | 49777 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:40.442044020 CET | 35650 | 49745 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:40.443003893 CET | 35650 | 49777 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:40.443072081 CET | 49777 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:40.443293095 CET | 49777 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:40.448093891 CET | 35650 | 49777 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:41.053394079 CET | 35650 | 49777 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:41.053492069 CET | 49777 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:46.062001944 CET | 49777 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:46.062768936 CET | 49854 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:46.066926003 CET | 35650 | 49777 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:46.067584991 CET | 35650 | 49854 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:46.067646027 CET | 49854 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:46.067832947 CET | 49854 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:46.072566032 CET | 35650 | 49854 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:46.072979927 CET | 35650 | 49854 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:51.078989029 CET | 49859 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:51.083878040 CET | 35650 | 49859 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:51.083991051 CET | 49859 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:51.084250927 CET | 49859 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:51.089051008 CET | 35650 | 49859 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:51.702980042 CET | 35650 | 49859 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:51.703077078 CET | 49859 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.719588041 CET | 49859 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.720385075 CET | 49860 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.724389076 CET | 35650 | 49859 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:56.725222111 CET | 35650 | 49860 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:56.725282907 CET | 49860 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.725562096 CET | 49860 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.730108023 CET | 35650 | 49860 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:56.730173111 CET | 49860 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:53:56.730331898 CET | 35650 | 49860 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:53:56.734927893 CET | 35650 | 49860 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:01.734946012 CET | 49861 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:01.739713907 CET | 35650 | 49861 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:01.739805937 CET | 49861 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:01.740067959 CET | 49861 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:01.744833946 CET | 35650 | 49861 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:02.352153063 CET | 35650 | 49861 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:02.352227926 CET | 49861 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:07.358957052 CET | 49861 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:07.359776020 CET | 49863 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:07.363940954 CET | 35650 | 49861 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:07.364785910 CET | 35650 | 49863 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:07.364871025 CET | 49863 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:07.365176916 CET | 49863 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:07.370059967 CET | 35650 | 49863 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:07.978771925 CET | 35650 | 49863 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:07.978846073 CET | 49863 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:12.983974934 CET | 49863 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:12.988816023 CET | 35650 | 49863 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:13.102504015 CET | 49864 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:13.107431889 CET | 35650 | 49864 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:13.107501030 CET | 49864 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:13.107774973 CET | 49864 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:13.112519026 CET | 35650 | 49864 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:13.721029043 CET | 35650 | 49864 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:13.721120119 CET | 49864 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.734035969 CET | 49864 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.735045910 CET | 49865 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.739237070 CET | 35650 | 49864 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:18.739875078 CET | 35650 | 49865 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:18.739959002 CET | 49865 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.740231991 CET | 49865 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.745012045 CET | 35650 | 49865 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:18.745064974 CET | 49865 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:18.745119095 CET | 35650 | 49865 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:18.750684977 CET | 35650 | 49865 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:23.752490997 CET | 49866 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:23.757515907 CET | 35650 | 49866 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:23.757582903 CET | 49866 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:23.757913113 CET | 49866 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:23.762682915 CET | 35650 | 49866 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:24.393441916 CET | 35650 | 49866 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:24.393517971 CET | 49866 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.405945063 CET | 49866 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.406838894 CET | 49867 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.410797119 CET | 35650 | 49866 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:29.411616087 CET | 35650 | 49867 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:29.411696911 CET | 49867 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.412101984 CET | 49867 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.416815996 CET | 35650 | 49867 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:29.416825056 CET | 35650 | 49867 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:29.416877031 CET | 49867 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:29.421632051 CET | 35650 | 49867 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:34.427782059 CET | 49868 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:34.433037043 CET | 35650 | 49868 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:34.433115959 CET | 49868 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:34.433451891 CET | 49868 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:34.438762903 CET | 35650 | 49868 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:34.438796997 CET | 35650 | 49868 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:34.438833952 CET | 49868 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:34.443775892 CET | 35650 | 49868 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:39.454268932 CET | 49869 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:39.459081888 CET | 35650 | 49869 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:39.459172010 CET | 49869 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:39.459512949 CET | 49869 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:39.464246035 CET | 35650 | 49869 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:40.099806070 CET | 35650 | 49869 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:40.099898100 CET | 49869 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.109091043 CET | 49869 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.109878063 CET | 49870 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.113954067 CET | 35650 | 49869 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:45.114650011 CET | 35650 | 49870 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:45.114717007 CET | 49870 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.115113974 CET | 49870 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.119771004 CET | 35650 | 49870 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:45.119843960 CET | 49870 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:45.119857073 CET | 35650 | 49870 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:45.124594927 CET | 35650 | 49870 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:50.125715017 CET | 49871 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:50.130546093 CET | 35650 | 49871 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:50.130629063 CET | 49871 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:50.130893946 CET | 49871 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:50.135632992 CET | 35650 | 49871 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:50.746371984 CET | 35650 | 49871 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:50.746444941 CET | 49871 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:55.749741077 CET | 49871 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:55.750850916 CET | 49872 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:55.754547119 CET | 35650 | 49871 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:55.755662918 CET | 35650 | 49872 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:55.755747080 CET | 49872 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:55.756056070 CET | 49872 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:54:55.760971069 CET | 35650 | 49872 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:56.367728949 CET | 35650 | 49872 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:54:56.367834091 CET | 49872 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.381477118 CET | 49872 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.385504007 CET | 49873 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.386384964 CET | 35650 | 49872 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:01.390316010 CET | 35650 | 49873 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:01.390391111 CET | 49873 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.390707016 CET | 49873 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.395308971 CET | 35650 | 49873 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:01.395364046 CET | 49873 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:01.395446062 CET | 35650 | 49873 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:01.400125027 CET | 35650 | 49873 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:06.463587999 CET | 49874 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:06.468508959 CET | 35650 | 49874 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:06.468621969 CET | 49874 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:06.473761082 CET | 35650 | 49874 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:06.473834991 CET | 49874 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:06.488254070 CET | 49874 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:06.493046045 CET | 35650 | 49874 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:11.500880957 CET | 49875 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:11.505697012 CET | 35650 | 49875 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:11.505783081 CET | 49875 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:11.506089926 CET | 49875 | 35650 | 192.168.2.5 | 45.135.232.38 |
Nov 10, 2024 11:55:11.510858059 CET | 35650 | 49875 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:12.125915051 CET | 35650 | 49875 | 45.135.232.38 | 192.168.2.5 |
Nov 10, 2024 11:55:12.125976086 CET | 49875 | 35650 | 192.168.2.5 | 45.135.232.38 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 10, 2024 11:53:11.050909042 CET | 55953 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2024 11:53:12.024605989 CET | 53 | 55953 | 1.1.1.1 | 192.168.2.5 |
Nov 10, 2024 11:54:12.984689951 CET | 50120 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 10, 2024 11:54:13.101888895 CET | 53 | 50120 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 10, 2024 11:53:11.050909042 CET | 192.168.2.5 | 1.1.1.1 | 0x231c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 10, 2024 11:54:12.984689951 CET | 192.168.2.5 | 1.1.1.1 | 0x5dca | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 10, 2024 11:53:12.024605989 CET | 1.1.1.1 | 192.168.2.5 | 0x231c | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false | ||
Nov 10, 2024 11:54:13.101888895 CET | 1.1.1.1 | 192.168.2.5 | 0x5dca | No error (0) | 45.135.232.38 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 05:53:07 |
Start date: | 10/11/2024 |
Path: | C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa80000 |
File size: | 48'640 bytes |
MD5 hash: | 01EF0BA434C74E68DF6E94737826D22F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 27.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 6 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|