Windows
Analysis Report
PRODUCT LIST.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- PRODUCT LIST.exe (PID: 5032 cmdline:
"C:\Users\ user\Deskt op\PRODUCT LIST.exe" MD5: A9B805862CCEE6848CE91EF51A31F71D) - conhost.exe (PID: 5728 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
{"C2 url": ["104.219.234.170:16383"], "Bot Id": "Ammy"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RedLine_1 | Yara detected RedLine Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:11.146262+0100 | 2045000 | 1 | Malware Command and Control Activity Detected | 104.219.234.170 | 16383 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:06.021573+0100 | 2849662 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:11.719835+0100 | 2849351 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:19.018903+0100 | 2848200 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:17.537122+0100 | 2849352 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | ASN Name: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0100E7B0 | |
Source: | Code function: | 0_2_0100DC90 | |
Source: | Code function: | 0_2_064D96D0 | |
Source: | Code function: | 0_2_064D4508 | |
Source: | Code function: | 0_2_064DD5C8 | |
Source: | Code function: | 0_2_064D33C0 | |
Source: | Code function: | 0_2_064DDAD0 | |
Source: | Code function: | 0_2_064D1210 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 221 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 741 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 561 Virtualization/Sandbox Evasion | Security Account Manager | 561 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 12 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 114 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | ReversingLabs | Win32.Trojan.Leonem | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ip.sb | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.219.234.170 | unknown | United States | 27176 | DATAWAGONUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561829 |
Start date and time: | 2024-11-24 11:48:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 39s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PRODUCT LIST.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@2/39@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 104.26.13.31, 104.26.12.31, 172.67.75.172
- Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: PRODUCT LIST.exe
Time | Type | Description |
---|---|---|
05:49:13 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DATAWAGONUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | PureCrypter, MicroClip | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | StormKitty, XWorm | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2666 |
Entropy (8bit): | 5.345804351520589 |
Encrypted: | false |
SSDEEP: | 48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHpH8HKx1qHxLU:vq5qxqdqolqztYqh3oPtI6mq7qoT5JcE |
MD5: | 7ADCF08EB89A57934E566936815936CF |
SHA1: | C164331AA17656919323F4464BC1FC1EB1B8CA90 |
SHA-256: | 848A610C0FC09EF83A3DFC86A453C9B6F81DAA2A89779529254577F818E68933 |
SHA-512: | 54EB0F3313760BC4C88C736C5CE57B1890BBCD00376445B3BFC3BB17C6ACBCE22700491D96B6E7E926892555B2AC0C62F0C31557F0E00C00EA38D225228212D3 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 0.8746135976761988 |
Encrypted: | false |
SSDEEP: | 96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4 |
MD5: | 9E68EA772705B5EC0C83C2A97BB26324 |
SHA1: | 243128040256A9112CEAC269D56AD6B21061FF80 |
SHA-256: | 17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF |
SHA-512: | 312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40960 |
Entropy (8bit): | 0.8553638852307782 |
Encrypted: | false |
SSDEEP: | 48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil |
MD5: | 28222628A3465C5F0D4B28F70F97F482 |
SHA1: | 1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14 |
SHA-256: | 93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4 |
SHA-512: | C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 0.08235737944063153 |
Encrypted: | false |
SSDEEP: | 12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO |
MD5: | 369B6DD66F1CAD49D0952C40FEB9AD41 |
SHA1: | D05B2DE29433FB113EC4C558FF33087ED7481DD4 |
SHA-256: | 14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D |
SHA-512: | 771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 0.08235737944063153 |
Encrypted: | false |
SSDEEP: | 12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO |
MD5: | 369B6DD66F1CAD49D0952C40FEB9AD41 |
SHA1: | D05B2DE29433FB113EC4C558FF33087ED7481DD4 |
SHA-256: | 14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D |
SHA-512: | 771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\PRODUCT LIST.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 106496 |
Entropy (8bit): | 1.136413900497188 |
Encrypted: | false |
SSDEEP: | 192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84 |
MD5: | 429F49156428FD53EB06FC82088FD324 |
SHA1: | 560E48154B4611838CD4E9DF4C14D0F9840F06AF |
SHA-256: | 9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF |
SHA-512: | 1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.94563762416441 |
TrID: |
|
File name: | PRODUCT LIST.exe |
File size: | 1'776'640 bytes |
MD5: | a9b805862ccee6848ce91ef51a31f71d |
SHA1: | 4ca749b30f879945324811f5924996765aa7d2e4 |
SHA256: | 9bdef064f9693bbae4a073b09a795c7b27e7486c10b3c7d920019ca3729bb434 |
SHA512: | 94b6cc887127129a3b51dd68b8d29e417a70e7538668f5bfb4d5e1769d74e2ce44dcef9f36ab6021e04fb1e78f710bcc859163e064d91793e5a3b756fe067d97 |
SSDEEP: | 24576:DRhMoSwfXo0P9Ej+zE2bb1SfyeeYF2yjfLV/JFzQXYiU4L/E/pWWG8WHHSx44s8/:DgNwfevYoaTerPtsYikWWG8GJ88Y6eb |
TLSH: | 188533812523D06DD1FB083240BA2A2FFF5FBB104BA1A699EB4E55055B3ED5D4633E38 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..t............@.. ........@.. .......................@[...........@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x80e0b0 |
Entrypoint Section: | .boot |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xF00CA9A2 [Wed Aug 14 23:34:58 2097 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 4328f7206db519cd4e82283211d98e83 |
Instruction |
---|
call 00007FE614BE0420h |
push ebx |
mov ebx, esp |
push ebx |
mov esi, dword ptr [ebx+08h] |
mov edi, dword ptr [ebx+10h] |
cld |
mov dl, 80h |
mov al, byte ptr [esi] |
inc esi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE02BCh |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE0323h |
xor eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FE614BE03B7h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
je 00007FE614BE02DAh |
push edi |
mov eax, eax |
sub edi, eax |
mov al, byte ptr [edi] |
pop edi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
jmp 00007FE614BE026Bh |
mov eax, 00000001h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FE614BE02BCh |
sub eax, ebx |
mov ebx, 00000001h |
jne 00007FE614BE02FAh |
mov ecx, 00000001h |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc ecx, ecx |
add dl, dl |
jne 00007FE614BE02D7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FE614BE02BCh |
push esi |
mov esi, edi |
sub esi, ebp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2203a | 0x50 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x24000 | 0x4e4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x2000 | 0x18000 | 0x8800 | c42c78b9832e754cb203176f75184e25 | False | 1.0006031709558822 | data | 7.994326576469916 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x1a000 | 0x4de | 0x400 | 4ca244fa9a5d437b9defb601583c39e2 | False | 0.7763671875 | data | 7.273072339326276 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x1c000 | 0xc | 0x200 | f24b480e2df71d69ab65261a0215f27d | False | 0.259765625 | data | 1.7804462848428606 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | |
.vm_sec | 0x1e000 | 0x4000 | 0x4000 | d8f3017bae73815f607d2a4b3c4cefce | False | 0.1619873046875 | data | 2.885163065318065 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x22000 | 0x2000 | 0x200 | dbd0fc163d1022be46a45b67e74740b2 | False | 0.16796875 | data | 1.1405531534676816 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x24000 | 0x2000 | 0x600 | f1fd96ed080911bb2659a9b13cb47065 | False | 0.376953125 | data | 3.7440317633000992 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x26000 | 0x3e8000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x40e000 | 0x1a4200 | 0x1a4200 | 924e3b8c5d4f06112e3c6cc99d6da471 | False | 0.9948373809878013 | data | 7.95802050682975 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x24090 | 0x254 | data | 0.4597315436241611 | ||
RT_MANIFEST | 0x242f4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | English | United States | 0.5489795918367347 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
mscoree.dll | _CorExeMain |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-24T11:49:06.021573+0100 | 2849662 | ETPRO MALWARE RedLine - CheckConnect Request | 1 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:11.146262+0100 | 2045000 | ET MALWARE RedLine Stealer - CheckConnect Response | 1 | 104.219.234.170 | 16383 | 192.168.2.5 | 49704 | TCP |
2024-11-24T11:49:11.719835+0100 | 2849351 | ETPRO MALWARE RedLine - EnvironmentSettings Request | 1 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:17.537122+0100 | 2849352 | ETPRO MALWARE RedLine - SetEnvironment Request | 1 | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | TCP |
2024-11-24T11:49:19.018903+0100 | 2848200 | ETPRO MALWARE RedLine - GetUpdates Request | 1 | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 11:49:04.399722099 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.519484997 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:04.519578934 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.539392948 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:04.659301043 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:04.899913073 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:05.019463062 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:05.966825008 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:06.021573067 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.026755095 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.026813984 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.146261930 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.146336079 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719696999 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719723940 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719736099 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719810963 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719821930 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719831944 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719835043 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.719846964 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719867945 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719878912 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719890118 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.719913960 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.719959974 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.727927923 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.771601915 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.839401007 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.880949020 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.930140972 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.930248022 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.930363894 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.934330940 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.934441090 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.934690952 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.942713022 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.942812920 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.943012953 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.951131105 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.951144934 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.951204062 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.959857941 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.959942102 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.959995031 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.967866898 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.967966080 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.968018055 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.977088928 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.977116108 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.977180958 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.984769106 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.984920979 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.984972954 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:11.993094921 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.993155956 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:11.993202925 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.001431942 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.001503944 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.001558065 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.009843111 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.009959936 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.010009050 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.050149918 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.050347090 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.050426006 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.140547991 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.140671015 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.140729904 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.143589020 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.143630028 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.143706083 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.148678064 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.148699045 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.148809910 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.154244900 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.154464006 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.154813051 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:12.159564972 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.159594059 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:12.159673929 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:15.885512114 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:15.885809898 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.006737947 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.006892920 CET | 16383 | 49704 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.006979942 CET | 49704 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.006979942 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.007179976 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.007436037 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.133919954 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133938074 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133949041 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133960962 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133972883 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133984089 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.133995056 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134006023 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134016991 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134028912 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.134035110 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.134035110 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:16.253643990 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299760103 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299781084 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299793005 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299804926 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299817085 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:16.299846888 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.482080936 CET | 16383 | 49706 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.483273983 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.537122011 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.602912903 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.603044987 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.603183031 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:17.722768068 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:17.959225893 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080063105 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080178022 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080210924 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080224991 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080238104 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080286980 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080286980 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:18.080329895 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080342054 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080651999 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.080732107 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.081258059 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.081542969 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.199924946 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200068951 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200081110 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200135946 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.200191975 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.247931004 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:18.999927998 CET | 16383 | 49707 | 104.219.234.170 | 192.168.2.5 |
Nov 24, 2024 11:49:19.018763065 CET | 49706 | 16383 | 192.168.2.5 | 104.219.234.170 |
Nov 24, 2024 11:49:19.018903017 CET | 49707 | 16383 | 192.168.2.5 | 104.219.234.170 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 11:49:12.252300024 CET | 59493 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 24, 2024 11:49:12.252300024 CET | 192.168.2.5 | 1.1.1.1 | 0xb122 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 24, 2024 11:49:12.390635967 CET | 1.1.1.1 | 192.168.2.5 | 0xb122 | No error (0) | api.ip.sb.cdn.cloudflare.net | CNAME (Canonical name) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:04.539392948 CET | 242 | OUT | |
Nov 24, 2024 11:49:05.966825008 CET | 359 | IN | |
Nov 24, 2024 11:49:11.026755095 CET | 225 | OUT | |
Nov 24, 2024 11:49:11.719696999 CET | 1236 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49706 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:16.007179976 CET | 222 | OUT | |
Nov 24, 2024 11:49:17.482080936 CET | 294 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49707 | 104.219.234.170 | 16383 | 5032 | C:\Users\user\Desktop\PRODUCT LIST.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 24, 2024 11:49:17.603183031 CET | 242 | OUT | |
Nov 24, 2024 11:49:18.999927998 CET | 408 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:49:01 |
Start date: | 24/11/2024 |
Path: | C:\Users\user\Desktop\PRODUCT LIST.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1f0000 |
File size: | 1'776'640 bytes |
MD5 hash: | A9B805862CCEE6848CE91EF51A31F71D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:49:02 |
Start date: | 24/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 14.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 32 |
Total number of Limit Nodes: | 0 |
Graph
Function 064D96D0 Relevance: 13.7, Strings: 10, Instructions: 1184COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DDAD0 Relevance: 11.9, Strings: 9, Instructions: 689COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0100E7B0 Relevance: .9, Instructions: 927COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D4508 Relevance: .8, Instructions: 814COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D33C0 Relevance: .5, Instructions: 480COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DD5C8 Relevance: .4, Instructions: 433COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DEA00 Relevance: 10.2, Strings: 8, Instructions: 193COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DBB79 Relevance: 6.5, Strings: 5, Instructions: 278COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DBB88 Relevance: 6.5, Strings: 5, Instructions: 273COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DE9D0 Relevance: 5.2, Strings: 4, Instructions: 154COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1E74 Relevance: 3.9, Strings: 3, Instructions: 182COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1E80 Relevance: 3.9, Strings: 3, Instructions: 180COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DEC75 Relevance: 3.9, Strings: 3, Instructions: 108COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DB900 Relevance: 2.5, Strings: 2, Instructions: 26COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01000CE0 Relevance: 1.6, APIs: 1, Instructions: 50COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01001870 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01000CE8 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D3E10 Relevance: 1.5, Strings: 1, Instructions: 228COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06521198 Relevance: 1.4, Instructions: 1412COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DEE8C Relevance: 1.4, Strings: 1, Instructions: 101COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D3E00 Relevance: 1.3, Strings: 1, Instructions: 91COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D879F Relevance: 1.3, Strings: 1, Instructions: 77COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D62D1 Relevance: 1.3, Strings: 1, Instructions: 74COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D87B0 Relevance: 1.3, Strings: 1, Instructions: 72COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D62E0 Relevance: 1.3, Strings: 1, Instructions: 68COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8E6F Relevance: 1.3, Strings: 1, Instructions: 68COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06522F45 Relevance: 1.3, Instructions: 1284COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DB8F1 Relevance: 1.3, Strings: 1, Instructions: 27COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06520048 Relevance: .7, Instructions: 664COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0040 Relevance: .4, Instructions: 447COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D9010 Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D2E58 Relevance: .4, Instructions: 365COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06520000 Relevance: .3, Instructions: 349COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D06A8 Relevance: .2, Instructions: 247COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DB960 Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1951 Relevance: .2, Instructions: 173COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1960 Relevance: .2, Instructions: 173COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06522D00 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DABA8 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8558 Relevance: .1, Instructions: 127COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8548 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1D38 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8988 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DF99E Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DF9A8 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D74A0 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D6070 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9D054 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D614F Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DEDAA Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D96C1 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FAD2F4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FAD4A4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0A00 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D9000 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9D04F Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D24E1 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DEDE0 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7038 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FAD2EF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FAD49F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7688 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D3009 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DDAC4 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7739 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D24F0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7044 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D61F2 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7BC4 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D5842 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8EF0 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D3018 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D5850 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D95F8 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D30F0 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DE960 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0AB9 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D966A Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D9608 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0DB0 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8978 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8889 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D3100 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DDA00 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D9678 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DC0A8 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0DC0 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DAB48 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8898 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DAD20 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0AC8 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D40C2 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DC2F2 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1210 Relevance: 3.0, Strings: 2, Instructions: 509COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0100DC90 Relevance: .4, Instructions: 372COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D59F2 Relevance: 15.1, Strings: 12, Instructions: 143COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D5A00 Relevance: 15.1, Strings: 12, Instructions: 140COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DC75A Relevance: 10.5, Strings: 8, Instructions: 468COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DC768 Relevance: 10.5, Strings: 8, Instructions: 464COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06520D50 Relevance: 10.3, Strings: 8, Instructions: 297COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|