Windows
Analysis Report
ehxF3rusxJ.exe
Overview
General Information
Sample name: | ehxF3rusxJ.exerenamed because original name is a hash value |
Original sample name: | 75096dda61a68ec57361d1d25972a28b7fce9c676490ec2aa4aa3e018536977e.exe |
Analysis ID: | 1579064 |
MD5: | 1dea073d9439cce9534ac2b33f6dd285 |
SHA1: | df2115247664958d2b2a1842eb6ffcf2cd8430a4 |
SHA256: | 75096dda61a68ec57361d1d25972a28b7fce9c676490ec2aa4aa3e018536977e |
Tags: | exeuser-Chainskilabs |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- ehxF3rusxJ.exe (PID: 3812 cmdline:
"C:\Users\ user\Deskt op\ehxF3ru sxJ.exe" MD5: 1DEA073D9439CCE9534AC2B33F6DD285)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["please-commissions.gl.at.ply.gg"], "Port": 35075, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
System Summary |
---|
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:15.514563+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:18.634549+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:19.205272+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49705 | TCP |
2024-12-20T18:59:22.431352+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:13.365452+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.485432+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.605133+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.725175+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.844898+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.965198+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.085166+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.204846+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.324744+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.571415+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.692061+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.817385+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.157331+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.283463+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.403173+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.522795+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.642573+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.807234+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.926875+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.046592+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.286221+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.407409+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.640003+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.760308+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.880083+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.999689+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.119292+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.238968+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.322122+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.441776+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.561516+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.681121+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.920553+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.040274+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.139343+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.258911+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.378828+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.498763+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.619253+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.636404+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.739188+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.861372+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.956622+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.076318+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.196059+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:15.514563+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:13.365452+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.485432+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.605133+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.725175+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.844898+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.965198+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.085166+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.204846+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.324744+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.571415+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.692061+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.817385+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.157331+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.283463+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.403173+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.522795+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.642573+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.807234+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.926875+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.046592+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.286221+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.407409+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.640003+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.760308+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.880083+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.999689+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.119292+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.238968+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.322122+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.441776+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.561516+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.681121+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.920553+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.040274+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.139343+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.258911+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.378828+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.498763+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.619253+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.739188+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.861372+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.956622+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.076318+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.196059+0100 | 2852873 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:18.083919+0100 | 2855924 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:12.160699+0100 | 2853191 | 1 | Malware Command and Control Activity Detected | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:11.226246+0100 | 2853192 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF848E6C67D | |
Source: | Code function: | 0_2_00007FF848E6D3CF | |
Source: | Code function: | 0_2_00007FF848E6D3CF | |
Source: | Code function: | 0_2_00007FF848E6BFE0 | |
Source: | Code function: | 0_2_00007FF848E6BFE0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF848E671C2 | |
Source: | Code function: | 0_2_00007FF848E605A0 | |
Source: | Code function: | 0_2_00007FF848E66416 | |
Source: | Code function: | 0_2_00007FF848E6BFE0 | |
Source: | Code function: | 0_2_00007FF848E62328 | |
Source: | Code function: | 0_2_00007FF848E6B4BB |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_00007FF848E600C1 |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 2 Registry Run Keys / Startup Folder | 2 Registry Run Keys / Startup Folder | 1 Masquerading | OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Screen Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 131 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 11 Archive Collected Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 131 Virtualization/Sandbox Evasion | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 13 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
87% | ReversingLabs | Win32.Exploit.Xworm | ||
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML | |||
87% | ReversingLabs | Win32.Exploit.Xworm |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
please-commissions.gl.at.ply.gg | 147.185.221.24 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
147.185.221.24 | please-commissions.gl.at.ply.gg | United States | 12087 | SALSGIVERUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579064 |
Start date and time: | 2024-12-20 18:58:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ehxF3rusxJ.exerenamed because original name is a hash value |
Original Sample Name: | 75096dda61a68ec57361d1d25972a28b7fce9c676490ec2aa4aa3e018536977e.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/3@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target ehxF3rusxJ.exe, PID 3812 because it is empty
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: ehxF3rusxJ.exe
Time | Type | Description |
---|---|---|
12:59:03 | API Interceptor | |
18:59:03 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
147.185.221.24 | Get hash | malicious | Quasar | Browse | ||
Get hash | malicious | ScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, Xmrig | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Njrat, RevengeRAT | Browse | |||
Get hash | malicious | XWorm | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
SALSGIVERUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, Xmrig | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
|
Process: | C:\Users\user\Desktop\ehxF3rusxJ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1727 |
Entropy (8bit): | 5.3718223239563105 |
Encrypted: | false |
SSDEEP: | 48:MxHKQwYHKGSI6o6+vxp3/elStHTHhAHKKkhHNp51qHGIs0HKD:iqbYqGSI6o9Zp/elStzHeqKkhtp5wmjB |
MD5: | 31EF241F1F20FCB19A5F31BA847A045B |
SHA1: | EF969D35B4517591F0761196C80EC3596497D890 |
SHA-256: | 06C7CEBB25F733FC6E607865E9268C51ED87F001379A5C35A8FB1BEF13756D31 |
SHA-512: | 8643C52CA4C18D62EF54591EB342E60C11B40BFA0680B3ECD63BF4B9A67486CCEA4B5FA3EE0ACEAAB835D2501894B1AE8A0077FC19B8C51D1192D671A83E30F4 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\ehxF3rusxJ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 748 |
Entropy (8bit): | 5.000371362441162 |
Encrypted: | false |
SSDEEP: | 12:82jcO4flt88CMTlsY//DLMpGpjAitHHEKswayJmV:82Kfl+8fTZv9NA2vswayJm |
MD5: | 384E693309FA7DD2F687292B66D75CC6 |
SHA1: | D2035F1F80ECEBE78091AB5113246A4B500115FE |
SHA-256: | BF18DA1EB75A0D2A572746B88FEA9B50FB9CA5A6836D9B8DFD62D43735F65CE7 |
SHA-512: | E1156188AF4D251C78A534A4A674E92BF931D416195779DB0A079FDBD55EA4B422219732C544D303D015DA0670A0F8C11B4BAFA034B4F0D6882772635B32EA2B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\ehxF3rusxJ.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34816 |
Entropy (8bit): | 5.576940534170495 |
Encrypted: | false |
SSDEEP: | 384:1xaXVqG28uymzhzUuHnOmYxLm9cCwvHixdTEgVR8pkFTBLTIZwYGDcvw9Ikuise4:DaXUzPi9wcC4C7V9FZ9jPaOjhv/cD |
MD5: | 1DEA073D9439CCE9534AC2B33F6DD285 |
SHA1: | DF2115247664958D2B2A1842EB6FFCF2CD8430A4 |
SHA-256: | 75096DDA61A68EC57361D1D25972A28B7FCE9C676490EC2AA4AA3E018536977E |
SHA-512: | 4D5D268675A6916B4C42DBAC6AC35CDE66799F442178BB2FBF037C3D02506FF723E0D7234746559D89FA787E43C935F4AE8B03DF4041669BE01169038E402DC6 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.576940534170495 |
TrID: |
|
File name: | ehxF3rusxJ.exe |
File size: | 34'816 bytes |
MD5: | 1dea073d9439cce9534ac2b33f6dd285 |
SHA1: | df2115247664958d2b2a1842eb6ffcf2cd8430a4 |
SHA256: | 75096dda61a68ec57361d1d25972a28b7fce9c676490ec2aa4aa3e018536977e |
SHA512: | 4d5d268675a6916b4c42dbac6ac35cde66799f442178bb2fbf037c3d02506ff723e0d7234746559d89fa787e43c935f4ae8b03df4041669be01169038e402dc6 |
SSDEEP: | 384:1xaXVqG28uymzhzUuHnOmYxLm9cCwvHixdTEgVR8pkFTBLTIZwYGDcvw9Ikuise4:DaXUzPi9wcC4C7V9FZ9jPaOjhv/cD |
TLSH: | 22F23B4877904321CAFE6FF16DF3B1090274F5078923E79E4CD48A9A6F279C28A107E6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.bg.................~............... ........@.. ....................................@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x409cee |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6762A055 [Wed Dec 18 10:13:41 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9c98 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xa000 | 0x4d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xc000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x7cf4 | 0x7e00 | 50c19c312fffd4f301292dec854f2ba5 | False | 0.4983568948412698 | data | 5.720814910919369 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xa000 | 0x4d8 | 0x600 | afbb984503128042cc38bf70e5e337f4 | False | 0.375 | data | 3.7203482473352403 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xc000 | 0xc | 0x200 | 4d60749099df21a093a8bd5ee10fc20e | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xa0a0 | 0x244 | data | 0.4724137931034483 | ||
RT_MANIFEST | 0xa2e8 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-20T18:59:11.226246+0100 | 2853192 | ETPRO MALWARE Win32/XWorm V3 CnC Command - sendPlugin Outbound | 1 | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:12.160699+0100 | 2853191 | ETPRO MALWARE Win32/XWorm V3 CnC Command - savePlugin Inbound | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:13.365452+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.365452+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.485432+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.485432+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.605133+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.605133+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.725175+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.725175+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.844898+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.844898+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.965198+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:13.965198+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.085166+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.085166+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.204846+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.204846+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.324744+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.324744+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.571415+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.571415+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.692061+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.692061+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.817385+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:14.817385+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.157331+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.157331+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.283463+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.283463+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.403173+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.403173+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.514563+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:15.514563+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:15.522795+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.522795+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.642573+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.642573+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.807234+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.807234+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.926875+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:15.926875+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.046592+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.046592+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.286221+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.286221+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.407409+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.407409+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.640003+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.640003+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.760308+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.760308+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.880083+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.880083+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.999689+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:16.999689+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.119292+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.119292+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.238968+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.238968+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.322122+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.322122+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.441776+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.441776+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.561516+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.561516+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.681121+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.681121+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.920553+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:17.920553+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.040274+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.040274+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.083919+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.139343+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.139343+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.258911+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.258911+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.378828+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.378828+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.498763+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.498763+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.619253+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.619253+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.634549+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
2024-12-20T18:59:18.636404+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49704 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.739188+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.739188+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.861372+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.861372+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.956622+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:18.956622+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.076318+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.076318+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.196059+0100 | 2852873 | ETPRO MALWARE Win32/XWorm CnC PING Command Outbound M2 | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.196059+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.5 | 49705 | 147.185.221.24 | 35075 | TCP |
2024-12-20T18:59:19.205272+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49705 | TCP |
2024-12-20T18:59:22.431352+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 147.185.221.24 | 35075 | 192.168.2.5 | 49704 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 20, 2024 18:59:05.004609108 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:05.124700069 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:05.124803066 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:05.351682901 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:05.471514940 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:10.538830042 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:10.579051971 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:11.226246119 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:11.346010923 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.160698891 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.160718918 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.160799026 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.160917044 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.161011934 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.161026955 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.161060095 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.203922033 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.394717932 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.394736052 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.394850969 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.395018101 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.395129919 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.395184040 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.403000116 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.403352976 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.403414011 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.411452055 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.411470890 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:12.411536932 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:12.928379059 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.047986031 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.048285007 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.125469923 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.245150089 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.245217085 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.365381002 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.365452051 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.485337019 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.485431910 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.604975939 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.605133057 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.725085020 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.725174904 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.844832897 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.844897985 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:13.965137005 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:13.965198040 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.085095882 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.085165977 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.204730988 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.204845905 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.324604988 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.324743986 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.444752932 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.447602987 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.567734003 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.571414948 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.692002058 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.692060947 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.812304974 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.817384958 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.851581097 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:14.907110929 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.913590908 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:14.937084913 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.033983946 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.034152985 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.034296989 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.153975010 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.157330990 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.280388117 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.283463001 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.403052092 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.403172970 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.514563084 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.522741079 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.522794962 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.563291073 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.642508030 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.642573118 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.664422035 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.707918882 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.807162046 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.807234049 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:15.827954054 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.828135014 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.926798105 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:15.926875114 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.046533108 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.046591997 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.166434050 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.166491985 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.286125898 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.286221027 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.406033993 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.407408953 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.482547045 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.520109892 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.527172089 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.639841080 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.639950991 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.640002966 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.640049934 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.640124083 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.640171051 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.760241032 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.760308027 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.880013943 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.880083084 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:16.999614954 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:16.999689102 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.119227886 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.119292021 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.238894939 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.238967896 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.322061062 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.322122097 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.349478960 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.358551979 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.441703081 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.441776037 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.469086885 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.469141960 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.469386101 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.469443083 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.469553947 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.469568968 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.561433077 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.561516047 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.681057930 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.681121111 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.800681114 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.800760031 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:17.920449018 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:17.920552969 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.040149927 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.040273905 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.083919048 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.139240980 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.139343023 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.159841061 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.203752995 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.212619066 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.258850098 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.258910894 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.332484961 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.332742929 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.332767010 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.332916975 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.378756046 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.378828049 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.498619080 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.498763084 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.619199991 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.619252920 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.634548903 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.636404037 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.739108086 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.739187956 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.756308079 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.859375954 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.861371994 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.956547976 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.956621885 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:18.980998993 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:18.995059967 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:19.076239109 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.076318026 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:19.114841938 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.114865065 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.114905119 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.114936113 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115076065 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115107059 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115201950 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115255117 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115364075 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115376949 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.115417957 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.195982933 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.196058989 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:19.205271959 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.207434893 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:19.327795029 CET | 35075 | 49705 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:19.327876091 CET | 49705 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:22.431351900 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:22.436784983 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Dec 20, 2024 18:59:22.556737900 CET | 35075 | 49704 | 147.185.221.24 | 192.168.2.5 |
Dec 20, 2024 18:59:22.557413101 CET | 49704 | 35075 | 192.168.2.5 | 147.185.221.24 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 20, 2024 18:59:04.626247883 CET | 52678 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 20, 2024 18:59:04.987365007 CET | 53 | 52678 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 20, 2024 18:59:04.626247883 CET | 192.168.2.5 | 1.1.1.1 | 0x5ea4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 20, 2024 18:59:04.987365007 CET | 1.1.1.1 | 192.168.2.5 | 0x5ea4 | No error (0) | 147.185.221.24 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 12:58:58 |
Start date: | 20/12/2024 |
Path: | C:\Users\user\Desktop\ehxF3rusxJ.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x40000 |
File size: | 34'816 bytes |
MD5 hash: | 1DEA073D9439CCE9534AC2B33F6DD285 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6BFE0 Relevance: .6, Instructions: 619COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6D3CF Relevance: .6, Instructions: 568COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E66416 Relevance: .5, Instructions: 471COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E671C2 Relevance: .5, Instructions: 457COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6C67D Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6ED6D Relevance: .4, Instructions: 370COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E66DD6 Relevance: .3, Instructions: 330COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6C8E2 Relevance: .3, Instructions: 311COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E626B5 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E62CC0 Relevance: .3, Instructions: 284COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6900D Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E62AC5 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E69060 Relevance: .2, Instructions: 215COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6CE74 Relevance: .2, Instructions: 214COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6845D Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68D81 Relevance: .2, Instructions: 207COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E62008 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E63D0C Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6CEA0 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E67DBA Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6D81D Relevance: .2, Instructions: 184COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6140D Relevance: .2, Instructions: 182COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6045B Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60478 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FA29 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E61D65 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60BFE Relevance: .2, Instructions: 154COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6CD36 Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E687C1 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E604C8 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6B3BA Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60A91 Relevance: .1, Instructions: 129COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6DDC1 Relevance: .1, Instructions: 121COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E7060A Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60AB0 Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E60949 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E69B39 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68689 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68985 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70245 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E62953 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6ECA2 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6C469 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70169 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70051 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6AD85 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6AEA1 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68123 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E682B1 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6DCF5 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E69A7D Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E615A1 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E68B5D Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E61CED Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6CC99 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6FB7C Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6890C Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E69AD5 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E6131D Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E61A1D Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF848E70040 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|