Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 6576 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 2FBED9C7F4E671459BA52391D1D2975D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["tirepublicerj.shop", "wholersorie.shop", "cloudewahsj.shop", "framekgirus.shop", "rabidcowse.shop", "noisycuttej.shop", "abruptyopsn.shop", "nearycrepso.shop", "displayclubby.sbs"], "Build id": "hRjzG3--GAS"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:13.957384+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:15.214340+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:16.373395+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49723 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:17.512468+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49724 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:18.684917+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49725 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:20.350470+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49728 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:22.150236+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49731 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:23.191474+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:24.491158+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49748 | 185.161.251.21 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:14.714158+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:15.710485+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:23.623861+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49742 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:14.714158+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:15.710485+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:20.812695+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49728 | 104.21.64.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_0072B659 | |
Source: | Code function: | 0_3_0072B659 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_0075CBD1 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_0072B659 | |
Source: | Code function: | 0_3_0072B659 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_0074D999 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 | |
Source: | Code function: | 0_3_00793044 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Code function: | 0_3_0079EC81 | |
Source: | Code function: | 0_3_0079EC81 | |
Source: | Code function: | 0_3_0079EC81 | |
Source: | Code function: | 0_3_0079EC81 | |
Source: | Code function: | 0_3_007A4B1D | |
Source: | Code function: | 0_3_007A4B1D | |
Source: | Code function: | 0_3_007A4B1D | |
Source: | Code function: | 0_3_007A4B1D | |
Source: | Code function: | 0_3_0079EAF1 | |
Source: | Code function: | 0_3_0079EAF1 | |
Source: | Code function: | 0_3_0079EAF1 | |
Source: | Code function: | 0_3_0079EAF1 | |
Source: | Code function: | 0_3_0075CB3D | |
Source: | Code function: | 0_3_0075CB3D | |
Source: | Code function: | 0_3_0075CB3D | |
Source: | Code function: | 0_3_0075B5B5 | |
Source: | Code function: | 0_3_0073D985 | |
Source: | Code function: | 0_3_0073D985 | |
Source: | Code function: | 0_3_0073D985 | |
Source: | Code function: | 0_3_0073B638 | |
Source: | Code function: | 0_3_0073B638 | |
Source: | Code function: | 0_3_0073B638 | |
Source: | Code function: | 0_3_007397FB | |
Source: | Code function: | 0_3_007397FB | |
Source: | Code function: | 0_3_0073C2EE | |
Source: | Code function: | 0_3_0073C2EE | |
Source: | Code function: | 0_3_0073C2EE | |
Source: | Code function: | 0_3_007391DB | |
Source: | Code function: | 0_3_007391DB | |
Source: | Code function: | 0_3_007395CB | |
Source: | Code function: | 0_3_007395CB |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 22 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
21% | ReversingLabs | Win32.Trojan.Generic | ||
20% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
displayclubby.sbs | 104.21.64.1 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
104.21.64.1 | displayclubby.sbs | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584525 |
Start date and time: | 2025-01-05 18:57:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 37s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@2/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Setup.exe, PID 6576 because there are no executed function
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
12:58:14 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
104.21.64.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NTLGB | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 0.512131792943311 |
TrID: |
|
File name: | Setup.exe |
File size: | 75'077'735 bytes |
MD5: | 2fbed9c7f4e671459ba52391d1d2975d |
SHA1: | 89e3ebc3fb946566a77bb1359d0f43eded9ff3a2 |
SHA256: | 0f17388ac1220dcb7bcb2889e16bb21fae876045a55079a572057c75fa2d2067 |
SHA512: | ddbc924f47f8ae7d6c27026c293b94cd1640f32a82c8cc9561693e6f5cee490c695f29db307c2d1b68d72651e40f8bbfe6e4149009a8fe387bcfd6d4edf29bf1 |
SSDEEP: | 24576:bnbbPIm7K4brDi4IxgRqzwqNb+Yz73P2EMZbG0JEtdqxytD7TriBH0T0OgxLDQX:THBKh4nqzF3PYdStoari+gJQ |
TLSH: | 13F7D2ABF2D00BA5B75236ED4D0E9FCD99146110A31014FF6F9A050A6EFB5D84332A7E |
File Content Preview: | MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 2d2e3797b32b2b99 |
Entrypoint: | 0x5025d8 |
Entrypoint Section: | .itext |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5B226D52 [Thu Jun 14 13:27:46 2018 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | f62b90e31eca404f228fcf7068b00f31 |
Signature Valid: | false |
Signature Issuer: | CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F7219078FBE20BC1B98BF8A86BFC0396 |
Thumbprint SHA-1: | 30632EA310114105969D0BDA28FDCE267104754F |
Thumbprint SHA-256: | 1B5061CF61C93822BDE2433156EEBE1F027C8FA9C88A4AF0EBD1348AF79C61E2 |
Serial: | 14781BC862E8DC503A559346F5DCC518 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
push esi |
push edi |
mov eax, 00500930h |
call 00007FDE0D186846h |
push FFFFFFECh |
mov eax, dword ptr [00505E5Ch] |
mov eax, dword ptr [eax] |
mov ebx, dword ptr [eax+00000170h] |
push ebx |
call 00007FDE0D1876F1h |
and eax, FFFFFF7Fh |
push eax |
push FFFFFFECh |
mov eax, dword ptr [00505E5Ch] |
push ebx |
call 00007FDE0D187946h |
xor eax, eax |
push ebp |
push 00502653h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
push 00000001h |
call 00007FDE0D187091h |
call 00007FDE0D27DF2Ch |
mov eax, dword ptr [00500568h] |
push eax |
push 005005CCh |
mov eax, dword ptr [00505E5Ch] |
mov eax, dword ptr [eax] |
call 00007FDE0D1F9D1Dh |
call 00007FDE0D27DF80h |
xor eax, eax |
pop edx |
pop ecx |
pop ecx |
mov dword ptr fs:[eax], edx |
jmp 00007FDE0D27FEFBh |
jmp 00007FDE0D181F6Dh |
call 00007FDE0D27DCFCh |
mov eax, 00000001h |
call 00007FDE0D182A2Eh |
call 00007FDE0D1823B1h |
mov eax, dword ptr [00505E5Ch] |
mov eax, dword ptr [eax] |
mov edx, 005027E8h |
call 00007FDE0D1F9828h |
push 00000005h |
mov eax, dword ptr [00505E5Ch] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000170h] |
push eax |
call 00007FDE0D187907h |
mov eax, dword ptr [00505E5Ch] |
mov eax, dword ptr [eax] |
mov edx, dword ptr [004DACA0h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10e000 | 0x3840 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x114000 | 0x6fe00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x4795ea7 | 0x39c0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x113000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x10ea80 | 0x88c | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xffdc8 | 0xffe00 | 75eab3cd689bdfd0b7c52f77c4597fdf | False | 0.483021075048852 | data | 6.485099366431733 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x101000 | 0x17f4 | 0x1800 | 8e0d52126a75001416d71c23878be2c1 | False | 0.5244140625 | data | 6.003729381717893 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x103000 | 0x308c | 0x3200 | c2acc8e96fc244753abd1d87bb624bc0 | False | 0.425078125 | data | 4.3575606000501415 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x107000 | 0x6198 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x10e000 | 0x3840 | 0x3a00 | 0e1e8128f777a5ff18a144305a4fb39c | False | 0.3108836206896552 | data | 5.2048781278956655 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x112000 | 0x3c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x113000 | 0x18 | 0x200 | 9cf98ea6bb17a35d99fa770a2e9a8ff0 | False | 0.05078125 | MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "Q" | 0.2108262677871819 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x114000 | 0x6fe00 | 0x6fe00 | 09c3297f581f32b4217214693c9232b0 | False | 0.5837792423184358 | data | 7.2672713896631524 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x114c44 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x114d78 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x114eac | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x114fe0 | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x115114 | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x115248 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x11537c | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_BITMAP | 0x1154b0 | 0x4e8 | Device independent bitmap graphic, 48 x 48 x 4, image size 1152 | 0.2945859872611465 | ||
RT_BITMAP | 0x115998 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.521551724137931 | ||
RT_ICON | 0x115a80 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | United States | 0.5675675675675675 |
RT_ICON | 0x115ba8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 320 | English | United States | 0.4486994219653179 |
RT_ICON | 0x116110 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.4637096774193548 |
RT_ICON | 0x1163f8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 1152 | English | United States | 0.3935018050541516 |
RT_STRING | 0x116ca0 | 0xec | data | 0.6059322033898306 | ||
RT_STRING | 0x116d8c | 0x250 | data | 0.47466216216216217 | ||
RT_STRING | 0x116fdc | 0x28c | data | 0.4647239263803681 | ||
RT_STRING | 0x117268 | 0x3e4 | data | 0.4347389558232932 | ||
RT_STRING | 0x11764c | 0x9c | data | 0.717948717948718 | ||
RT_STRING | 0x1176e8 | 0xe8 | data | 0.6293103448275862 | ||
RT_STRING | 0x1177d0 | 0x468 | data | 0.3820921985815603 | ||
RT_STRING | 0x117c38 | 0x38c | data | 0.3898678414096916 | ||
RT_STRING | 0x117fc4 | 0x3dc | data | 0.39271255060728744 | ||
RT_STRING | 0x1183a0 | 0x360 | data | 0.37037037037037035 | ||
RT_STRING | 0x118700 | 0x40c | data | 0.3783783783783784 | ||
RT_STRING | 0x118b0c | 0x108 | data | 0.5113636363636364 | ||
RT_STRING | 0x118c14 | 0xcc | data | 0.6029411764705882 | ||
RT_STRING | 0x118ce0 | 0x234 | data | 0.5070921985815603 | ||
RT_STRING | 0x118f14 | 0x3c8 | data | 0.3181818181818182 | ||
RT_STRING | 0x1192dc | 0x32c | data | 0.43349753694581283 | ||
RT_STRING | 0x119608 | 0x2a0 | data | 0.41964285714285715 | ||
RT_RCDATA | 0x1198a8 | 0x82e8 | data | English | United States | 0.11261637622344235 |
RT_RCDATA | 0x121b90 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x121ba0 | 0x1800 | PE32+ executable (console) x86-64, for MS Windows | English | United States | 0.3924153645833333 |
RT_RCDATA | 0x1233a0 | 0x6bc | data | 0.6467517401392111 | ||
RT_RCDATA | 0x123a5c | 0x5b10 | PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows | English | United States | 0.3255404941660947 |
RT_RCDATA | 0x12956c | 0x125 | Delphi compiled form 'TMainForm' | 0.7508532423208191 | ||
RT_RCDATA | 0x129694 | 0x3a2 | Delphi compiled form 'TNewDiskForm' | 0.524731182795699 | ||
RT_RCDATA | 0x129a38 | 0x320 | Delphi compiled form 'TSelectFolderForm' | 0.53625 | ||
RT_RCDATA | 0x129d58 | 0x300 | Delphi compiled form 'TSelectLanguageForm' | 0.5703125 | ||
RT_RCDATA | 0x12a058 | 0x5d9 | Delphi compiled form 'TUninstallProgressForm' | 0.4562458249832999 | ||
RT_RCDATA | 0x12a634 | 0x461 | Delphi compiled form 'TUninstSharedFileForm' | 0.4335414808206958 | ||
RT_RCDATA | 0x12aa98 | 0x2092 | Delphi compiled form 'TWizardForm' | 0.2299112497001679 | ||
RT_GROUP_CURSOR | 0x12cb2c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x12cb40 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x12cb54 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12cb68 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12cb7c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12cb90 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x12cba4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x12cbb8 | 0x3e | data | English | United States | 0.8387096774193549 |
RT_VERSION | 0x12cbf8 | 0x15c | data | English | United States | 0.5689655172413793 |
RT_MANIFEST | 0x12cd54 | 0x62c | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4240506329113924 |
DLL | Import |
---|---|
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExW, RegOpenKeyExW, RegCloseKey |
user32.dll | GetKeyboardType, LoadStringW, MessageBoxA, CharNextW |
kernel32.dll | GetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryW, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCurrentDirectoryW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringW, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW |
user32.dll | CreateWindowExW, WindowFromPoint, WaitMessage, WaitForInputIdle, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRectEmpty, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongW, SetCapture, SetActiveWindow, SendNotifyMessageW, SendMessageTimeoutW, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, ReplyMessage, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OffsetRect, OemToCharBuffA, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, ExitWindowsEx, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BringWindowToTop, BeginPaint, AppendMenuW, CharToOemBuffA, AdjustWindowRectEx, ActivateKeyboardLayout |
msimg32.dll | AlphaBlend |
gdi32.dll | UnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, RemoveFontResourceW, Rectangle, RectVisible, RealizePalette, Polyline, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, LineDDA, IntersectClipRect, GetWindowOrgEx, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, Ellipse, DeleteObject, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, Chord, BitBlt, Arc, AddFontResourceW |
version.dll | VerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW |
mpr.dll | WNetOpenEnumW, WNetGetUniversalNameW, WNetGetConnectionW, WNetEnumResourceW, WNetCloseEnum |
kernel32.dll | lstrcpyW, lstrcmpW, WriteProfileStringW, WritePrivateProfileStringW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualFree, VirtualAlloc, TransactNamedPipe, TerminateProcess, SwitchToThread, SizeofResource, SignalObjectAndWait, SetThreadLocale, SetNamedPipeHandleState, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, RemoveDirectoryW, ReleaseMutex, ReadFile, QueryPerformanceCounter, OpenProcess, OpenMutexW, MultiByteToWideChar, MulDiv, MoveFileExW, MoveFileW, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryExW, LoadLibraryW, LeaveCriticalSection, IsDBCSLeadByte, IsBadWritePtr, InitializeCriticalSection, GlobalFindAtomW, GlobalDeleteAtom, GlobalAddAtomW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetTickCount, GetThreadLocale, GetSystemTimeAsFileTime, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetShortPathNameW, GetProfileStringW, GetProcAddress, GetPrivateProfileStringW, GetOverlappedResult, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryW, GetComputerNameW, GetCommandLineW, GetCPInfo, FreeResource, InterlockedIncrement, InterlockedExchangeAdd, InterlockedExchange, InterlockedDecrement, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FlushFileBuffers, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, EnumCalendarInfoW, EnterCriticalSection, DeviceIoControl, DeleteFileW, DeleteCriticalSection, CreateThread, CreateProcessW, CreateNamedPipeW, CreateMutexW, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringW, CompareFileTime, CloseHandle |
advapi32.dll | SetSecurityDescriptorDacl, RegSetValueExW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, InitializeSecurityDescriptor, GetUserNameW, GetTokenInformation, FreeSid, EqualSid, AllocateAndInitializeSid |
comctl32.dll | InitCommonControls |
kernel32.dll | Sleep |
oleaut32.dll | GetErrorInfo, GetActiveObject, RegisterTypeLib, LoadTypeLib, SysFreeString |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CLSIDFromProgID, CLSIDFromString, StringFromCLSID, CoCreateInstance, CoFreeUnusedLibraries, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
comctl32.dll | InitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
shell32.dll | ShellExecuteExW, ShellExecuteW, SHGetFileInfoW, ExtractIconW |
shell32.dll | SHGetPathFromIDListW, SHGetMalloc, SHChangeNotify, SHBrowseForFolderW |
comdlg32.dll | GetSaveFileNameW, GetOpenFileNameW |
ole32.dll | CoDisconnectObject |
advapi32.dll | AdjustTokenPrivileges |
oleaut32.dll | SysFreeString |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T18:58:13.957384+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:14.714158+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:14.714158+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:15.214340+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:15.710485+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:15.710485+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:16.373395+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49723 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:17.512468+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49724 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:18.684917+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49725 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:20.350470+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49728 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:20.812695+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49728 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:22.150236+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49731 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:23.191474+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:23.623861+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49742 | 104.21.64.1 | 443 | TCP |
2025-01-05T18:58:24.491158+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49748 | 185.161.251.21 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 18:58:13.490050077 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:13.490073919 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:13.490151882 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:13.491359949 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:13.491373062 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:13.957245111 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:13.957384109 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:13.963208914 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:13.963213921 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:13.963541985 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.010710001 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.010710001 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.010788918 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.714171886 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.714258909 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.714332104 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.717242002 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.717248917 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.717278004 CET | 49721 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.717283010 CET | 443 | 49721 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.732553005 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.732578039 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:14.732662916 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.732960939 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:14.732970953 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.214222908 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.214339972 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.215766907 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.215776920 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.216003895 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.217211962 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.217242002 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.217273951 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710479975 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710540056 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710647106 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710669994 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.710683107 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710695028 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710737944 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.710751057 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710792065 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710792065 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.710800886 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.710830927 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.710988998 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.711337090 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.711386919 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.711391926 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.715177059 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.715226889 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.715234995 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.715289116 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.715332031 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.715393066 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.715409040 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.715419054 CET | 49722 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.715425014 CET | 443 | 49722 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.917217016 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.917257071 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:15.917368889 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.917726994 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:15.917738914 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.373246908 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.373394966 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.374864101 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.374875069 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.375103951 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.376391888 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.376543999 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.376570940 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.928778887 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.928894997 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:16.928987980 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.929204941 CET | 49723 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:16.929217100 CET | 443 | 49723 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.035218000 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.035260916 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.035346031 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.035778046 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.035787106 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.512310982 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.512468100 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.514002085 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.514015913 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.514265060 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.515851021 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.516042948 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.516089916 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:17.516141891 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:17.516148090 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.046758890 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.046853065 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.046920061 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.047094107 CET | 49724 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.047121048 CET | 443 | 49724 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.231301069 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.231349945 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.231512070 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.231724024 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.231735945 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.684847116 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.684916973 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.686976910 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.686991930 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.687295914 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.690229893 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.690639019 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.690670013 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:18.690726042 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:18.690733910 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:19.536407948 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:19.536503077 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:19.536586046 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:19.536834002 CET | 49725 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:19.536849022 CET | 443 | 49725 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:19.897947073 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:19.897991896 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:19.898070097 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:19.898499012 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:19.898519039 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.350382090 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.350470066 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.351871967 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.351891994 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.352144957 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.353308916 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.353440046 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.353451014 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.812711000 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.812834024 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:20.813065052 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.813528061 CET | 49728 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:20.813553095 CET | 443 | 49728 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:21.658605099 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:21.658658028 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:21.658782005 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:21.659168005 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:21.659178019 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.150168896 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.150235891 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.152601004 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.152611017 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.152862072 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.155206919 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.155469894 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.155474901 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.682291031 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.682393074 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.682595968 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.682704926 CET | 49731 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.682723999 CET | 443 | 49731 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.737252951 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.737277031 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:22.737353086 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.737668037 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:22.737678051 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.191389084 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.191473961 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.202440023 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.202455997 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.202675104 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.206343889 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.206473112 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.206492901 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.623876095 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.623955011 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.624298096 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.624732971 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.624742031 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.624764919 CET | 49742 | 443 | 192.168.2.5 | 104.21.64.1 |
Jan 5, 2025 18:58:23.624769926 CET | 443 | 49742 | 104.21.64.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.761203051 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:23.761234045 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:23.761526108 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:23.762450933 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:23.762459993 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.491072893 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.491158009 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.492914915 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.492925882 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.493165016 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.494580984 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.539325953 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.753623009 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.753691912 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.753746986 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.754064083 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.754080057 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Jan 5, 2025 18:58:24.754111052 CET | 49748 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 5, 2025 18:58:24.754117012 CET | 443 | 49748 | 185.161.251.21 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 18:58:13.472675085 CET | 61144 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 5, 2025 18:58:13.485023975 CET | 53 | 61144 | 1.1.1.1 | 192.168.2.5 |
Jan 5, 2025 18:58:23.627480984 CET | 61097 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 5, 2025 18:58:23.736006975 CET | 53 | 61097 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 5, 2025 18:58:13.472675085 CET | 192.168.2.5 | 1.1.1.1 | 0xe229 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 5, 2025 18:58:23.627480984 CET | 192.168.2.5 | 1.1.1.1 | 0x932d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:13.485023975 CET | 1.1.1.1 | 192.168.2.5 | 0xe229 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 18:58:23.736006975 CET | 1.1.1.1 | 192.168.2.5 | 0x932d | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49721 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:14 UTC | 264 | OUT | |
2025-01-05 17:58:14 UTC | 8 | OUT | |
2025-01-05 17:58:14 UTC | 1133 | IN | |
2025-01-05 17:58:14 UTC | 7 | IN | |
2025-01-05 17:58:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49722 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:15 UTC | 265 | OUT | |
2025-01-05 17:58:15 UTC | 77 | OUT | |
2025-01-05 17:58:15 UTC | 1125 | IN | |
2025-01-05 17:58:15 UTC | 244 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN | |
2025-01-05 17:58:15 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49723 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:16 UTC | 277 | OUT | |
2025-01-05 17:58:16 UTC | 12797 | OUT | |
2025-01-05 17:58:16 UTC | 1128 | IN | |
2025-01-05 17:58:16 UTC | 20 | IN | |
2025-01-05 17:58:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49724 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:17 UTC | 284 | OUT | |
2025-01-05 17:58:17 UTC | 15081 | OUT | |
2025-01-05 17:58:18 UTC | 1130 | IN | |
2025-01-05 17:58:18 UTC | 20 | IN | |
2025-01-05 17:58:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49725 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:18 UTC | 274 | OUT | |
2025-01-05 17:58:18 UTC | 15331 | OUT | |
2025-01-05 17:58:18 UTC | 5180 | OUT | |
2025-01-05 17:58:19 UTC | 1133 | IN | |
2025-01-05 17:58:19 UTC | 20 | IN | |
2025-01-05 17:58:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49728 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:20 UTC | 281 | OUT | |
2025-01-05 17:58:20 UTC | 976 | OUT | |
2025-01-05 17:58:20 UTC | 1134 | IN | |
2025-01-05 17:58:20 UTC | 20 | IN | |
2025-01-05 17:58:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49731 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:22 UTC | 278 | OUT | |
2025-01-05 17:58:22 UTC | 1074 | OUT | |
2025-01-05 17:58:22 UTC | 1130 | IN | |
2025-01-05 17:58:22 UTC | 20 | IN | |
2025-01-05 17:58:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49742 | 104.21.64.1 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:23 UTC | 266 | OUT | |
2025-01-05 17:58:23 UTC | 112 | OUT | |
2025-01-05 17:58:23 UTC | 1136 | IN | |
2025-01-05 17:58:23 UTC | 218 | IN | |
2025-01-05 17:58:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49748 | 185.161.251.21 | 443 | 6576 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 17:58:24 UTC | 201 | OUT | |
2025-01-05 17:58:24 UTC | 249 | IN | |
2025-01-05 17:58:24 UTC | 329 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 12:58:01 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 75'077'735 bytes |
MD5 hash: | 2FBED9C7F4E671459BA52391D1D2975D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Function 00793044 Relevance: .4, Instructions: 399COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00793044 Relevance: .4, Instructions: 399COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00793044 Relevance: .4, Instructions: 399COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0072B659 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0072B659 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0075CBD1 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0075CBD1 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0074D999 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|