Windows
Analysis Report
Aura.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Aura.exe (PID: 7256 cmdline:
"C:\Users\ user\Deskt op\Aura.ex e" MD5: 320BF7FBC1C911B3359527BF0EA85FCA) - conhost.exe (PID: 7264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Aura.exe (PID: 7320 cmdline:
"C:\Users\ user\Deskt op\Aura.ex e" MD5: 320BF7FBC1C911B3359527BF0EA85FCA) - Aura.exe (PID: 7328 cmdline:
"C:\Users\ user\Deskt op\Aura.ex e" MD5: 320BF7FBC1C911B3359527BF0EA85FCA) - WerFault.exe (PID: 7416 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 256 -s 928 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["abruptyopsn.shop", "fancywaxxers.shop", "noisycuttej.shop", "nearycrepso.shop", "wholersorie.shop", "rabidcowse.shop", "tirepublicerj.shop", "cloudewahsj.shop", "framekgirus.shop"], "Build id": "BVnUqo--@hitok4111"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:55.784181+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.205841+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:58.417248+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:59.557409+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:00.940183+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:02.764925+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:04.140291+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:06.819127+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:56.714755+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.788731+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:07.330972+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:56.714755+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:57.788731+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:55.784181+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.205841+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:58.417248+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49738 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:59.557409+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:00.940183+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49744 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:02.764925+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:04.140291+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:06.819127+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:55.301827+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 55758 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:37:03.249051+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_004173A6 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_00441890 | |
Source: | Code function: | 3_2_004311FA | |
Source: | Code function: | 3_2_004269A0 | |
Source: | Code function: | 3_2_004451A0 | |
Source: | Code function: | 3_2_004451A0 | |
Source: | Code function: | 3_2_00445280 | |
Source: | Code function: | 3_2_00445280 | |
Source: | Code function: | 3_2_0040CB88 | |
Source: | Code function: | 3_2_004173A6 | |
Source: | Code function: | 3_2_0043E540 | |
Source: | Code function: | 3_2_0043E540 | |
Source: | Code function: | 3_2_0043061D | |
Source: | Code function: | 3_2_00421E30 | |
Source: | Code function: | 3_2_00409E98 | |
Source: | Code function: | 3_2_00418849 | |
Source: | Code function: | 3_2_0043F8D0 | |
Source: | Code function: | 3_2_0041C081 | |
Source: | Code function: | 3_2_0041F890 | |
Source: | Code function: | 3_2_0043F140 | |
Source: | Code function: | 3_2_0040A95C | |
Source: | Code function: | 3_2_0043B9C0 | |
Source: | Code function: | 3_2_004301DE | |
Source: | Code function: | 3_2_0042D1E0 | |
Source: | Code function: | 3_2_0042B9B0 | |
Source: | Code function: | 3_2_0042B9B0 | |
Source: | Code function: | 3_2_0042B9B0 | |
Source: | Code function: | 3_2_0042B9B0 | |
Source: | Code function: | 3_2_004229B0 | |
Source: | Code function: | 3_2_00421272 | |
Source: | Code function: | 3_2_004301DC | |
Source: | Code function: | 3_2_004082D0 | |
Source: | Code function: | 3_2_0041FAF0 | |
Source: | Code function: | 3_2_0041CB80 | |
Source: | Code function: | 3_2_0042D390 | |
Source: | Code function: | 3_2_004193B3 | |
Source: | Code function: | 3_2_00430416 | |
Source: | Code function: | 3_2_00431430 | |
Source: | Code function: | 3_2_00414C80 | |
Source: | Code function: | 3_2_0042EC80 | |
Source: | Code function: | 3_2_004311FA | |
Source: | Code function: | 3_2_0043F510 | |
Source: | Code function: | 3_2_00415D3C | |
Source: | Code function: | 3_2_00415D3C | |
Source: | Code function: | 3_2_00415D3C | |
Source: | Code function: | 3_2_00441E60 | |
Source: | Code function: | 3_2_0041F620 | |
Source: | Code function: | 3_2_00430622 | |
Source: | Code function: | 3_2_00441ED0 | |
Source: | Code function: | 3_2_0042FEE4 | |
Source: | Code function: | 3_2_0042FF7C |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_004387A0 |
Source: | Code function: | 3_2_03981000 |
Source: | Code function: | 3_2_004387A0 |
Source: | Code function: | 0_2_01490861 | |
Source: | Code function: | 0_2_01490870 | |
Source: | Code function: | 3_2_00408890 | |
Source: | Code function: | 3_2_004311FA | |
Source: | Code function: | 3_2_00422190 | |
Source: | Code function: | 3_2_004269A0 | |
Source: | Code function: | 3_2_00445280 | |
Source: | Code function: | 3_2_0040CB88 | |
Source: | Code function: | 3_2_004173A6 | |
Source: | Code function: | 3_2_00445C10 | |
Source: | Code function: | 3_2_0043E540 | |
Source: | Code function: | 3_2_0040E5BF | |
Source: | Code function: | 3_2_00429E40 | |
Source: | Code function: | 3_2_00412670 | |
Source: | Code function: | 3_2_00418849 | |
Source: | Code function: | 3_2_00406810 | |
Source: | Code function: | 3_2_00415831 | |
Source: | Code function: | 3_2_0041E0C0 | |
Source: | Code function: | 3_2_0043F8D0 | |
Source: | Code function: | 3_2_004308AB | |
Source: | Code function: | 3_2_004308BA | |
Source: | Code function: | 3_2_0043F140 | |
Source: | Code function: | 3_2_0040E949 | |
Source: | Code function: | 3_2_00445950 | |
Source: | Code function: | 3_2_0043495A | |
Source: | Code function: | 3_2_00409970 | |
Source: | Code function: | 3_2_00444970 | |
Source: | Code function: | 3_2_00403920 | |
Source: | Code function: | 3_2_0042B1C9 | |
Source: | Code function: | 3_2_004441B4 | |
Source: | Code function: | 3_2_0042B9B0 | |
Source: | Code function: | 3_2_004229B0 | |
Source: | Code function: | 3_2_00421272 | |
Source: | Code function: | 3_2_00444A00 | |
Source: | Code function: | 3_2_0041AA10 | |
Source: | Code function: | 3_2_00411A24 | |
Source: | Code function: | 3_2_004082D0 | |
Source: | Code function: | 3_2_004042D0 | |
Source: | Code function: | 3_2_00432AD6 | |
Source: | Code function: | 3_2_00402AE0 | |
Source: | Code function: | 3_2_004382B0 | |
Source: | Code function: | 3_2_0040D352 | |
Source: | Code function: | 3_2_00419B60 | |
Source: | Code function: | 3_2_0041E360 | |
Source: | Code function: | 3_2_0041836E | |
Source: | Code function: | 3_2_0043130D | |
Source: | Code function: | 3_2_00405B20 | |
Source: | Code function: | 3_2_00429330 | |
Source: | Code function: | 3_2_00436330 | |
Source: | Code function: | 3_2_0043DB30 | |
Source: | Code function: | 3_2_0042A33F | |
Source: | Code function: | 3_2_00406380 | |
Source: | Code function: | 3_2_0041CB80 | |
Source: | Code function: | 3_2_0040B38E | |
Source: | Code function: | 3_2_0041DB90 | |
Source: | Code function: | 3_2_004253A2 | |
Source: | Code function: | 3_2_004193B3 | |
Source: | Code function: | 3_2_00433C5A | |
Source: | Code function: | 3_2_00408C30 | |
Source: | Code function: | 3_2_0041D430 | |
Source: | Code function: | 3_2_00431430 | |
Source: | Code function: | 3_2_0041BCC6 | |
Source: | Code function: | 3_2_004094D0 | |
Source: | Code function: | 3_2_00414C80 | |
Source: | Code function: | 3_2_0040ACB0 | |
Source: | Code function: | 3_2_004311FA | |
Source: | Code function: | 3_2_00431D74 | |
Source: | Code function: | 3_2_0043CD2B | |
Source: | Code function: | 3_2_00415D3C | |
Source: | Code function: | 3_2_004385C0 | |
Source: | Code function: | 3_2_0043D5D7 | |
Source: | Code function: | 3_2_0041FDE0 | |
Source: | Code function: | 3_2_004075F0 | |
Source: | Code function: | 3_2_004425F0 | |
Source: | Code function: | 3_2_0043DD90 | |
Source: | Code function: | 3_2_0042AD9C | |
Source: | Code function: | 3_2_00444DA0 | |
Source: | Code function: | 3_2_0040B38E | |
Source: | Code function: | 3_2_00416E25 | |
Source: | Code function: | 3_2_00404E30 | |
Source: | Code function: | 3_2_0041DE30 | |
Source: | Code function: | 3_2_00402ED0 | |
Source: | Code function: | 3_2_004176D0 | |
Source: | Code function: | 3_2_00422ED0 | |
Source: | Code function: | 3_2_00428ED0 | |
Source: | Code function: | 3_2_00441ED0 | |
Source: | Code function: | 3_2_0042FEE4 | |
Source: | Code function: | 3_2_0042469C | |
Source: | Code function: | 3_2_004456A0 | |
Source: | Code function: | 3_2_004446B0 | |
Source: | Code function: | 3_2_00427F4D | |
Source: | Code function: | 3_2_0042B703 | |
Source: | Code function: | 3_2_004447C9 | |
Source: | Code function: | 3_2_004447CB | |
Source: | Code function: | 3_2_00444FD0 | |
Source: | Code function: | 3_2_004357D9 | |
Source: | Code function: | 3_2_00435FE0 | |
Source: | Code function: | 3_2_0041D780 | |
Source: | Code function: | 3_2_004447B0 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 3_2_0043E540 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 3_2_00425358 | |
Source: | Code function: | 3_2_0044A37F | |
Source: | Code function: | 3_2_0044B3A9 | |
Source: | Code function: | 3_2_0044A431 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-14908 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_004430A0 |
Source: | Code function: | 0_2_02EF8611 | |
Source: | Code function: | 0_2_02EF878E |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_02EF8611 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 11 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 3 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.80.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
147.45.47.81 | unknown | Russian Federation | 2895 | FREE-NET-ASFREEnetEU | false | |
104.21.80.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584537 |
Start date and time: | 2025-01-05 19:36:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 44s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Aura.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/5@1/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.20, 40.126.32.133, 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Aura.exe
Time | Type | Description |
---|---|---|
13:36:56 | API Interceptor | |
13:37:06 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
147.45.47.81 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Xmrig | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
104.21.80.1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWorm | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
FREE-NET-ASFREEnetEU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | DcRat, KeyLogger, StormKitty, VenomRAT | Browse |
| ||
Get hash | malicious | KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | GO Backdoor | Browse |
| ||
Get hash | malicious | AveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | AveMaria, DcRat, KeyLogger, StormKitty, VenomRAT | Browse |
| ||
Get hash | malicious | AveMaria, DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, PureLog Stealer | Browse |
| |
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Aura.exe_919c911714a3911bab40457a30dfd2c781d27e2_27bdd1c1_3ed4ccae-f4d4-4177-b00b-f340d8e200ee\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8806287645702923 |
Encrypted: | false |
SSDEEP: | 96:I1FsMnMsahLjTOAqyS3QXIDcQlc6VcEdcw3l+BHUHZ0ownOgHkEwH3dEFYAKckBH:QK2MSA0LR30auGzuiFcAZ24IO8S |
MD5: | E052945E6E7DAA61E11FAD11F58790D7 |
SHA1: | 994FD6CFC572F9063281076A3D2D758C9229DDB3 |
SHA-256: | 164AE8CFBAC748DACF73E0CDB53E311208EF0CECD1DA1C0C10B928995AD70A1D |
SHA-512: | 6FE589645FE91B3ACA9B0F877FDFC1749CA0C2EB9117FB8B6F266B90360E26B96914CEA8A66EE1EDE3011DC2E1539ECC7968BF09F94FDF690D4821657CC7C49C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 152045 |
Entropy (8bit): | 3.798016394014999 |
Encrypted: | false |
SSDEEP: | 1536:A6K7uBojRypN4uE2aORFLTgZhAHn5uCD8LetTFt6o:DKVU4uEqRFLTg8nLpt |
MD5: | AB453BDFC33A0FD5F104D8466689A1F1 |
SHA1: | C73A3CA487CA655C134174F94D43AFD7E1A7A002 |
SHA-256: | A9A3FCEBC0B33DCFFFCF614F05E086045AB09A741C432EA472DD8F02213A4FD3 |
SHA-512: | 692ABA68C7112AB04BF63AC77D726132BE9B6FE2BBA2184D03EA088132764464AAC3831E689138851D3A56602B9A8CEFB408D3ADFB4087C5D3A9FD26D328909E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8356 |
Entropy (8bit): | 3.6905805653873838 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJQG6YZ6Y9uSUcngmfLVJrprj89bnNsfitm:R6lXJZ6s6YESUcngmfLVJynGfh |
MD5: | 7B88A81CC58FAD69F6709B7FF5208C89 |
SHA1: | BFB08AC8C31F5AFACA5BFD84E512F5198A58ECCE |
SHA-256: | 2D1CDFBA87A35377B3BA69244D4A608F4D19A2AF37725989243CD856BF6C8421 |
SHA-512: | 2AE0558049BCCFCB9516EABF070D1F8543C63A9618AAD9CD0179B031C14CE71BFD2FED68D220381B8EF34CDCE7E6F99DFACEBD40CF30CCE1FF530CE398CE409C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4662 |
Entropy (8bit): | 4.429734427646169 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsbJg77aI90COWpW8VYwSvYm8M4Jz0dxPcf6FGo+q8vb0dxPcfkmMNnSx:uIjf1I7Lv7VHJzlfhoKblfkmMNn4rd |
MD5: | 5AA4676D022715C13C542E94CA416DFC |
SHA1: | BC184E83FFFEAC6854CF959941CB4A1210D9CE2D |
SHA-256: | ACC1EDEED468507EA853394E34123C9124DC4B6D5BA6A9CFAA545D0B90484DF1 |
SHA-512: | 4DEB272C61E232DBFB7335E61283AFB803728373BACFD39273D2C3D248E3BEA9B645C4B991945A16C40BAA7180A9AC11D6D5D3541F177FADEE4D9351B20A24C0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465397235364716 |
Encrypted: | false |
SSDEEP: | 6144:eIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNYdwBCswSb6:zXD94+WlLZMM6YFHG+6 |
MD5: | B5D4DC2B131872B5677374DC34D7CF8C |
SHA1: | 0293F15647CBE75D9402A020AA0F7D18F4345BF0 |
SHA-256: | 85E46B36E02E7859DE5450698FB8A8B85A7A6FDD4F2BE630B98FED3A80C9A4A4 |
SHA-512: | 3D070B2D1307877E28839484C7F799F590B987D7D19A6A67AAB1E054661E77946B233AD795758C945233E4876D9A07DC09F3B342B6E13A3BDEDA087578569381 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.932921920878322 |
TrID: |
|
File name: | Aura.exe |
File size: | 378'920 bytes |
MD5: | 320bf7fbc1c911b3359527bf0ea85fca |
SHA1: | cb1b1244c5e5f902e21252dee0f017d3d4a03046 |
SHA256: | 3b2c100e17a3a58006bfa5ab9fc0bd4a3951f6ca5449d0d8ff7f8f1b3a2c9884 |
SHA512: | aa9d425c67417ce3a812b0284a1599ac7f09bd898270d9f94c19db016d122fb579728ca3f273d927cc7f6f58bc60404c541a339f91bebc7c20d04fdb456f02b6 |
SSDEEP: | 6144:u9Y1yj7QbH9cmXVllnABXgebDPBG414r3drK+4rTp3kzVIBhVpwqskhmuy9Ax5af:G9j7QbH9zllABzDpZ14Bj4rTxMVIVpPw |
TLSH: | 6F8412288783D562DA8F5D3119D3894627F4F3413183739F2AC5F1B8C3227D86B96A9E |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....C,...............0.................. ........@.. ....................... ............`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a4be |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB22C430A [Sun Sep 21 17:53:14 2064 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F1B6B6C408DB2B4D60BAA489E9A0E5A |
Thumbprint SHA-1: | 15F760D82C79D22446CC7D4806540BF632B1E104 |
Thumbprint SHA-256: | 28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D |
Serial: | 0997C56CAA59055394D9A9CDB8BEEB56 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa470 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x242 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x5a200 | 0x2628 | .bss |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa422 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x84c4 | 0x8600 | e05f1acca24b974a8126be170dff517b | False | 0.5043726679104478 | data | 5.950953039580874 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x242 | 0x400 | 14d8e51a66bfa2cb04d0bad62fb2e968 | False | 0.3037109375 | data | 3.5160679793070893 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xe000 | 0xc | 0x200 | 15941323991b3ba9288d6bda059fba10 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x10000 | 0x51200 | 0x51200 | f84b80b1342d95637cf405913c3a686c | False | 1.0003340475731894 | data | 7.999446172451969 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xc058 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-05T19:36:55.301827+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.4 | 55758 | 1.1.1.1 | 53 | UDP |
2025-01-05T19:36:55.784181+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:55.784181+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:56.714755+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:56.714755+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.205841+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.205841+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.788731+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:57.788731+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:58.417248+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49738 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:58.417248+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:59.557409+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:36:59.557409+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:00.940183+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49744 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:00.940183+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:02.764925+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:02.764925+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:03.249051+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:04.140291+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:04.140291+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:06.819127+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:06.819127+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
2025-01-05T19:37:07.330972+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:36:55.319591045 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:55.319633961 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:55.319701910 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:55.322586060 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:55.322602987 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:55.784112930 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:55.784181118 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:55.788728952 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:55.788738012 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:55.788976908 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:55.840907097 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.007905006 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.007930040 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.008013010 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.714761972 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.714843988 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.714905024 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.716557026 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.716578007 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.716589928 CET | 49733 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.716594934 CET | 443 | 49733 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.727955103 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.727976084 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:56.728045940 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.728395939 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:56.728409052 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.205780983 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.205841064 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.351792097 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.351824999 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.352072001 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.353591919 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.353738070 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.353764057 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788729906 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788772106 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788800955 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788825989 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788830042 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.788856030 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788872957 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.788892984 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.788981915 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.788990974 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.789315939 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.789463997 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.789472103 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.793554068 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.793589115 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.793607950 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.793617010 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.793665886 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.793673038 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.840899944 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.879131079 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.879183054 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.879249096 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.879285097 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.879318953 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.879395008 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.879406929 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.879416943 CET | 49735 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.879421949 CET | 443 | 49735 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.935811996 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.935836077 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:57.935928106 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.936225891 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:57.936242104 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:58.417148113 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:58.417248011 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:58.418432951 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:58.418442965 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:58.418661118 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:58.425730944 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:58.425863981 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:58.425892115 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:58.425973892 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:58.425981998 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.075392008 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.075460911 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.075519085 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.075858116 CET | 49738 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.075874090 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.093355894 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.093393087 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.093470097 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.093740940 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.093755960 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.557329893 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.557409048 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.558605909 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.558614969 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.558819056 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:36:59.560059071 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.560234070 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:36:59.560262918 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.351130009 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.351216078 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.351286888 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.360001087 CET | 49741 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.360019922 CET | 443 | 49741 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.483911991 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.483939886 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.484004974 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.485096931 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.485110998 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.940112114 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.940182924 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.941539049 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.941550016 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.941775084 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.950637102 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.950776100 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.950802088 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:00.950870037 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:00.950877905 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:01.568984032 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:01.569066048 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:01.569137096 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:01.569358110 CET | 49744 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:01.569374084 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:01.657552004 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:01.657582045 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:01.657646894 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:01.657897949 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:01.657912970 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:02.764856100 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:02.764925003 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:02.771708012 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:02.771716118 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:02.771939993 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:02.787198067 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:02.787492990 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:02.787498951 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:03.249066114 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:03.249174118 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:03.249263048 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:03.263158083 CET | 49745 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:03.263170958 CET | 443 | 49745 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:03.683208942 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:03.683231115 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:03.683330059 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:03.683598995 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:03.683612108 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.140213966 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.140290976 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.141432047 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.141443014 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.141665936 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.142867088 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.143672943 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.143706083 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.143834114 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.143876076 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.143981934 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144002914 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.144124985 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144146919 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.144292116 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144318104 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.144470930 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144503117 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.144510984 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144664049 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.144697905 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.153927088 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.154108047 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.154134989 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.154155970 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.154170990 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.154300928 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.154331923 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.158847094 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.159003973 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.159034014 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:04.159053087 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:04.159653902 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.359931946 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.360014915 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.360167980 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.360239983 CET | 49747 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.360255957 CET | 443 | 49747 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.364172935 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.364207029 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.364285946 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.364557028 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.364569902 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.819060087 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.819127083 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.820539951 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.820548058 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.820751905 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:06.821924925 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.821974039 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:06.821986914 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.330985069 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331023932 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331053019 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331074953 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.331084967 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331098080 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331131935 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.331145048 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331182003 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331190109 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.331197023 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331247091 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.331254005 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331516981 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331562042 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.331568956 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.331958055 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.332005024 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.332010984 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.332020044 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.332062006 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.332139969 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.332149982 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.332159042 CET | 49750 | 443 | 192.168.2.4 | 104.21.80.1 |
Jan 5, 2025 19:37:07.332164049 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.4 |
Jan 5, 2025 19:37:07.334629059 CET | 49752 | 80 | 192.168.2.4 | 147.45.47.81 |
Jan 5, 2025 19:37:07.339406013 CET | 80 | 49752 | 147.45.47.81 | 192.168.2.4 |
Jan 5, 2025 19:37:07.339482069 CET | 49752 | 80 | 192.168.2.4 | 147.45.47.81 |
Jan 5, 2025 19:37:07.339572906 CET | 49752 | 80 | 192.168.2.4 | 147.45.47.81 |
Jan 5, 2025 19:37:07.344351053 CET | 80 | 49752 | 147.45.47.81 | 192.168.2.4 |
Jan 5, 2025 19:37:11.231695890 CET | 49752 | 80 | 192.168.2.4 | 147.45.47.81 |
Jan 5, 2025 19:37:38.520673990 CET | 63032 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:37:38.525527000 CET | 53 | 63032 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:37:38.525603056 CET | 63032 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:37:38.530416965 CET | 53 | 63032 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:37:39.003901958 CET | 63032 | 53 | 192.168.2.4 | 162.159.36.2 |
Jan 5, 2025 19:37:39.008913994 CET | 53 | 63032 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:37:39.009011984 CET | 63032 | 53 | 192.168.2.4 | 162.159.36.2 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 5, 2025 19:36:55.301826954 CET | 55758 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 5, 2025 19:36:55.314891100 CET | 53 | 55758 | 1.1.1.1 | 192.168.2.4 |
Jan 5, 2025 19:37:38.520108938 CET | 53 | 61352 | 162.159.36.2 | 192.168.2.4 |
Jan 5, 2025 19:37:39.021164894 CET | 53 | 50176 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:36:55.301826954 CET | 192.168.2.4 | 1.1.1.1 | 0xd631 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 5, 2025 19:36:55.314891100 CET | 1.1.1.1 | 192.168.2.4 | 0xd631 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49752 | 147.45.47.81 | 80 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 5, 2025 19:37:07.339572906 CET | 198 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49733 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:36:56 UTC | 264 | OUT | |
2025-01-05 18:36:56 UTC | 8 | OUT | |
2025-01-05 18:36:56 UTC | 1133 | IN | |
2025-01-05 18:36:56 UTC | 7 | IN | |
2025-01-05 18:36:56 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49735 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:36:57 UTC | 265 | OUT | |
2025-01-05 18:36:57 UTC | 52 | OUT | |
2025-01-05 18:36:57 UTC | 1131 | IN | |
2025-01-05 18:36:57 UTC | 238 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN | |
2025-01-05 18:36:57 UTC | 1031 | IN | |
2025-01-05 18:36:57 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49738 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:36:58 UTC | 282 | OUT | |
2025-01-05 18:36:58 UTC | 15331 | OUT | |
2025-01-05 18:36:58 UTC | 2831 | OUT | |
2025-01-05 18:36:59 UTC | 1135 | IN | |
2025-01-05 18:36:59 UTC | 20 | IN | |
2025-01-05 18:36:59 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:36:59 UTC | 272 | OUT | |
2025-01-05 18:36:59 UTC | 8729 | OUT | |
2025-01-05 18:37:00 UTC | 1131 | IN | |
2025-01-05 18:37:00 UTC | 20 | IN | |
2025-01-05 18:37:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49744 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:37:00 UTC | 278 | OUT | |
2025-01-05 18:37:00 UTC | 15331 | OUT | |
2025-01-05 18:37:00 UTC | 5081 | OUT | |
2025-01-05 18:37:01 UTC | 1139 | IN | |
2025-01-05 18:37:01 UTC | 20 | IN | |
2025-01-05 18:37:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49745 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:37:02 UTC | 274 | OUT | |
2025-01-05 18:37:02 UTC | 948 | OUT | |
2025-01-05 18:37:03 UTC | 1127 | IN | |
2025-01-05 18:37:03 UTC | 20 | IN | |
2025-01-05 18:37:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49747 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:37:04 UTC | 283 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:04 UTC | 15331 | OUT | |
2025-01-05 18:37:06 UTC | 1135 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49750 | 104.21.80.1 | 443 | 7328 | C:\Users\user\Desktop\Aura.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-05 18:37:06 UTC | 265 | OUT | |
2025-01-05 18:37:06 UTC | 87 | OUT | |
2025-01-05 18:37:07 UTC | 1127 | IN | |
2025-01-05 18:37:07 UTC | 242 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN | |
2025-01-05 18:37:07 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:36:54 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Aura.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xba0000 |
File size: | 378'920 bytes |
MD5 hash: | 320BF7FBC1C911B3359527BF0EA85FCA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:36:54 |
Start date: | 05/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 13:36:54 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Aura.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x320000 |
File size: | 378'920 bytes |
MD5 hash: | 320BF7FBC1C911B3359527BF0EA85FCA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:36:54 |
Start date: | 05/01/2025 |
Path: | C:\Users\user\Desktop\Aura.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe90000 |
File size: | 378'920 bytes |
MD5 hash: | 320BF7FBC1C911B3359527BF0EA85FCA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 6 |
Start time: | 13:36:54 |
Start date: | 05/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x810000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 7.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 60% |
Total number of Nodes: | 15 |
Total number of Limit Nodes: | 2 |
Graph
Function 02EF8611 Relevance: 42.3, APIs: 11, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02EF878E Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01492C3A Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 219memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014906E8 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01490861 Relevance: 2.7, Strings: 2, Instructions: 157COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01490870 Relevance: 2.6, Strings: 2, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.8% |
Dynamic/Decrypted Code Coverage: | 5.2% |
Signature Coverage: | 36.1% |
Total number of Nodes: | 305 |
Total number of Limit Nodes: | 21 |
Graph
Function 00412670 Relevance: 163.0, APIs: 4, Strings: 88, Instructions: 2028COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E540 Relevance: 32.2, APIs: 11, Strings: 7, Instructions: 718memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03981000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408890 Relevance: 7.8, APIs: 5, Instructions: 297threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409E98 Relevance: 3.8, Strings: 3, Instructions: 98COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430416 Relevance: 3.2, APIs: 2, Instructions: 158COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00445280 Relevance: 1.6, Strings: 1, Instructions: 365COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004430A0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441890 Relevance: 1.5, Strings: 1, Instructions: 212COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004451A0 Relevance: 1.3, Strings: 1, Instructions: 74COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB88 Relevance: .2, Instructions: 177COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421E30 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430414 Relevance: 3.1, APIs: 2, Instructions: 142COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438990 Relevance: 3.1, APIs: 2, Instructions: 133COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D186 Relevance: 3.1, APIs: 2, Instructions: 115COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004303D0 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443198 Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443040 Relevance: 1.5, APIs: 1, Instructions: 30memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441850 Relevance: 1.5, APIs: 1, Instructions: 26memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D480 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437687 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D313 Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434CC1 Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00443200 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441830 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004229B0 Relevance: 6.7, Strings: 5, Instructions: 449COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421272 Relevance: 4.8, Strings: 3, Instructions: 1004COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441ED0 Relevance: 4.3, Strings: 3, Instructions: 556COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418849 Relevance: 4.1, APIs: 2, Instructions: 1064COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C80 Relevance: 3.5, Strings: 2, Instructions: 987COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FF7C Relevance: 2.7, Strings: 2, Instructions: 153COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004301DE Relevance: 2.6, Strings: 2, Instructions: 131COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004301DC Relevance: 2.6, Strings: 2, Instructions: 106COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A95C Relevance: 2.5, Strings: 2, Instructions: 46COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415D3C Relevance: 2.4, Strings: 1, Instructions: 1101COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F8D0 Relevance: 2.1, Strings: 1, Instructions: 873COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CB80 Relevance: 1.7, Strings: 1, Instructions: 434COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042EC80 Relevance: 1.7, Strings: 1, Instructions: 418COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F140 Relevance: 1.6, Strings: 1, Instructions: 351COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042FEE4 Relevance: 1.4, Strings: 1, Instructions: 165COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082D0 Relevance: .3, Instructions: 346COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F620 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D1E0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F510 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C081 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FAF0 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B9C0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D390 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441E60 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F890 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|