Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49806 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49814 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49822 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49823 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49831 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49832 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49837 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49843 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49844 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49852 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49858 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49863 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 216.58.208.238:443 -> 192.168.2.4:49867 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 172.67.209.202:443 -> 192.168.2.4:49875 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49876 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 216.58.208.238:443 -> 192.168.2.4:49874 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 142.250.181.65:443 -> 192.168.2.4:49882 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 142.250.181.65:443 -> 192.168.2.4:49884 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49885 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.67.146:443 -> 192.168.2.4:49897 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49899 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49904 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.4:49908 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49916 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50060 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50068 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50120 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50125 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50128 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50134 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50140 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50141 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50157 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50158 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50162 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50168 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50169 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50174 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50177 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50180 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.89.115:443 -> 192.168.2.4:50185 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50186 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 104.21.21.99:443 -> 192.168.2.4:50189 version: TLS 1.2 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} |
Source: C:\Users\user\AppData\Local\Temp\1019804001\cc6f25572f.exe |
Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs |
Source: Network traffic |
Suricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.4:49753 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:49759 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49785 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49802 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2058397 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click) : 192.168.2.4:57173 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49806 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49814 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49822 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49824 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49832 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49842 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49837 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49858 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49866 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49875 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49865 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:49843 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49890 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49907 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49906 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49925 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49945 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49942 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49960 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49974 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49978 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:49991 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:49997 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:50005 -> 185.121.15.192:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50011 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:50016 -> 185.121.15.192:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50024 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50025 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058378 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sweepyribs .lat) : 192.168.2.4:61253 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.4:65072 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50060 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.4:53998 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50061 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50051 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50068 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50078 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50089 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50097 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058378 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sweepyribs .lat) : 192.168.2.4:60789 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.4:49839 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50120 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50125 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50134 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50129 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50121 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2044244 - Severity 1 - ET MALWARE Win32/Stealc Requesting browsers Config from C2 : 192.168.2.4:50121 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2044245 - Severity 1 - ET MALWARE Win32/Stealc Active C2 Responding with browsers Config : 185.215.113.206:80 -> 192.168.2.4:50121 |
Source: Network traffic |
Suricata IDS: 2044246 - Severity 1 - ET MALWARE Win32/Stealc Requesting plugins Config from C2 : 192.168.2.4:50121 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50128 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 185.215.113.206:80 -> 192.168.2.4:50121 |
Source: Network traffic |
Suricata IDS: 2044248 - Severity 1 - ET MALWARE Win32/Stealc Submitting System Information to C2 : 192.168.2.4:50121 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50139 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50140 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50141 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50153 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50157 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50162 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50158 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50168 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50169 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50171 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50177 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058378 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sweepyribs .lat) : 192.168.2.4:64282 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.4:52072 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50180 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50174 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50181 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50189 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50186 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50222 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50223 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:50191 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50124 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.4:50144 -> 185.121.15.192:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50238 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50165 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50246 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50252 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50253 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50233 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50269 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50276 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2058361 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) : 192.168.2.4:50287 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50288 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50302 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50295 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50306 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50339 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50358 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50325 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50366 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50386 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50372 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:50357 -> 185.215.113.206:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50412 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50402 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50406 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50416 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50447 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50451 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50428 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50460 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50455 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50476 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50435 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50472 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50489 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.4:50498 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50504 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50501 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50508 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058397 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (pancakedipyps .click) : 192.168.2.4:56639 -> 1.1.1.1:53 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50500 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50509 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:50505 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50517 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50527 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50526 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50528 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:50497 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50533 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50496 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50521 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50547 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50541 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50520 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50523 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50542 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50572 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50567 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:50568 |
Source: Network traffic |
Suricata IDS: 2058398 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (pancakedipyps .click in TLS SNI) : 192.168.2.4:50544 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50608 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50610 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.4:50605 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50595 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50580 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50604 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50562 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50623 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50558 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50637 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50642 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50617 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50665 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50584 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50669 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50673 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.4:50571 -> 185.215.113.43:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50681 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50650 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50598 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50677 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50685 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50646 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2856148 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M4 : 192.168.2.4:50654 -> 212.193.31.8:80 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49814 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49814 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49823 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49823 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49831 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49831 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49822 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49806 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49806 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49875 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49852 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49897 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50060 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50060 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50068 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50068 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50120 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50120 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50141 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50185 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50185 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50186 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50128 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50128 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50180 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50180 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50222 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50189 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50189 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50240 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50240 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50250 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50205 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50205 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50264 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50287 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50276 -> 104.21.21.99:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50304 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50298 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50247 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50247 -> 104.21.67.146:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50517 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50517 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50520 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50520 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50544 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50614 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50526 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50614 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50633 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50541 -> 172.67.209.202:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50639 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50616 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50616 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50636 -> 104.21.89.115:443 |
Source: Network traffic |
Suricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50174 -> 104.21.21.99:443 |