Click to jump to signature section
Source: C:\Users\user\AppData\Local\Temp\.net\pkt1\904\PacketCryptApp.dll | ReversingLabs: Detection: 18% |
Source: dr0p.exe | ReversingLabs: Detection: 42% |
Source: C:\Users\user\AppData\Local\Temp\.net\pkt1\904\PacketCryptApp.dll | Joe Sandbox ML: detected |
Source: | Binary string: System.Diagnostics.TraceSource.ni.pdb source: System.Diagnostics.TraceSource.dll.4.dr |
Source: | Binary string: System.Runtime.InteropServices.ni.pdb source: pkt1.exe, 00000004.00000002.4146708699.00007FFE11511000.00000020.00000001.01000000.0000000D.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Threading\Release\net8.0\System.Threading.pdb source: pkt1.exe, 00000004.00000002.4153789130.00007FFE11BB1000.00000020.00000001.01000000.0000000C.sdmp |
Source: | Binary string: System.Diagnostics.Process.ni.pdb source: pkt1.exe, 00000004.00000002.4154368557.00007FFE1A501000.00000020.00000001.01000000.00000008.sdmp |
Source: | Binary string: System.ComponentModel.Primitives.ni.pdb source: pkt1.exe, 00000004.00000002.4154239730.00007FFE11ED1000.00000020.00000001.01000000.00000009.sdmp |
Source: | Binary string: System.Net.Ping.ni.pdb source: System.Net.Ping.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\Corehost.Static\singlefilehost.pdb source: pkt1.exe, 00000004.00000000.2021865265.00007FF68EC8D000.00000002.00000001.01000000.00000005.sdmp, pkt1.exe, 00000004.00000002.4115297870.00007FF68EC8D000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\System.Private.CoreLib\x64\Release\System.Private.CoreLib.pdb source: pkt1.exe, 00000004.00000002.4115743156.00007FFDFACF1000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Ping\Release\net8.0-windows\System.Net.Ping.pdb source: System.Net.Ping.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdbSHA256 source: pkt1.exe, 00000004.00000002.4110591486.000001DA4AE92000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.TraceSource\Release\net8.0\System.Diagnostics.TraceSource.pdb source: System.Diagnostics.TraceSource.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Net.Ping\Release\net8.0-windows\System.Net.Ping.pdbSHA256S source: System.Net.Ping.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Memory\Release\net8.0\System.Memory.pdb source: pkt1.exe, 00000004.00000002.4153918296.00007FFE11BD1000.00000020.00000001.01000000.0000000B.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Data.DataSetExtensions/Release/net8.0-windows/System.Data.DataSetExtensions.pdbSHA256X source: System.Data.DataSetExtensions.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Console\Release\net8.0-windows\System.Console.pdb source: pkt1.exe, 00000004.00000002.4154082225.00007FFE11EA1000.00000020.00000001.01000000.0000000A.sdmp |
Source: | Binary string: /_/artifacts/obj/netstandard/Release/net8.0-windows/netstandard.pdb source: pkt1.exe, 00000004.00000002.4112102175.000001DA4D5A0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.ComponentModel.Primitives\Release\net8.0\System.ComponentModel.Primitives.pdb source: pkt1.exe, 00000004.00000002.4154239730.00007FFE11ED1000.00000020.00000001.01000000.00000009.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\coreclr\windows.x64.Release\dlls\mscordac\mscordaccore.pdb source: pkt1.exe, 00000004.00000002.4115612916.00007FF68EE68000.00000002.00000001.01000000.00000005.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Loader\Release\net8.0\System.Runtime.Loader.pdbSHA256i source: System.Runtime.Loader.dll.4.dr |
Source: | Binary string: /_/artifacts/obj/System.ServiceModel.Web/Release/net8.0-windows/System.ServiceModel.Web.pdb source: System.ServiceModel.Web.dll.4.dr |
Source: | Binary string: C:\Users\Admin.DESKTOP-9H4MNNT\Desktop\1111\PacketCryptApp\obj\Release\net8.0\win-x64\PacketCryptApp.pdbSHA256_u source: pkt1.exe, 00000004.00000002.4110904218.000001DA4C8D2000.00000002.00000001.01000000.00000007.sdmp |
Source: | Binary string: /_/artifacts/obj/netstandard/Release/net8.0-windows/netstandard.pdbSHA256%# source: pkt1.exe, 00000004.00000002.4112102175.000001DA4D5A0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.Console.ni.pdb source: pkt1.exe, 00000004.00000002.4154082225.00007FFE11EA1000.00000020.00000001.01000000.0000000A.sdmp |
Source: | Binary string: /_/artifacts/obj/System.Data.DataSetExtensions/Release/net8.0-windows/System.Data.DataSetExtensions.pdb source: System.Data.DataSetExtensions.dll.4.dr |
Source: | Binary string: System.Linq.Expressions.ni.pdb source: System.Linq.Expressions.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Diagnostics.Process\Release\net8.0-windows\System.Diagnostics.Process.pdb source: pkt1.exe, 00000004.00000002.4154368557.00007FFE1A501000.00000020.00000001.01000000.00000008.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Primitives\Release\net8.0\Microsoft.Win32.Primitives.pdb source: pkt1.exe, 00000004.00000002.4110638077.000001DA4AEA2000.00000002.00000001.01000000.00000010.sdmp |
Source: | Binary string: System.Memory.ni.pdb source: pkt1.exe, 00000004.00000002.4153918296.00007FFE11BD1000.00000020.00000001.01000000.0000000B.sdmp |
Source: | Binary string: System.Threading.ni.pdb source: pkt1.exe, 00000004.00000002.4153789130.00007FFE11BB1000.00000020.00000001.01000000.0000000C.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime\Release\net8.0\System.Runtime.pdb source: pkt1.exe, 00000004.00000002.4110591486.000001DA4AE92000.00000002.00000001.01000000.0000000F.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq.Expressions\Release\net8.0\System.Linq.Expressions.pdb source: System.Linq.Expressions.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.InteropServices\Release\net8.0\System.Runtime.InteropServices.pdb source: pkt1.exe, 00000004.00000002.4146708699.00007FFE11511000.00000020.00000001.01000000.0000000D.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdbSHA2560 source: pkt1.exe, 00000004.00000002.4110702890.000001DA4AEB2000.00000002.00000001.01000000.00000011.sdmp |
Source: | Binary string: System.Private.CoreLib.ni.pdb source: pkt1.exe, 00000004.00000002.4115743156.00007FFDFACF1000.00000020.00000001.01000000.00000006.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Text.Encoding.Extensions\Release\net8.0\System.Text.Encoding.Extensions.pdb source: pkt1.exe, 00000004.00000002.4110702890.000001DA4AEB2000.00000002.00000001.01000000.00000011.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Linq.Expressions\Release\net8.0\System.Linq.Expressions.pdbSHA256 source: System.Linq.Expressions.dll.4.dr |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\Microsoft.Win32.Primitives\Release\net8.0\Microsoft.Win32.Primitives.pdbSHA256%B source: pkt1.exe, 00000004.00000002.4110638077.000001DA4AEA2000.00000002.00000001.01000000.00000010.sdmp |
Source: | Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.Loader\Release\net8.0\System.Runtime.Loader.pdb source: System.Runtime.Loader.dll.4.dr |
Source: | Binary string: C:\Users\Admin.DESKTOP-9H4MNNT\Desktop\1111\PacketCryptApp\obj\Release\net8.0\win-x64\PacketCryptApp.pdb source: pkt1.exe, 00000004.00000002.4110904218.000001DA4C8D2000.00000002.00000001.01000000.00000007.sdmp |
Source: | Binary string: /_/artifacts/obj/System.ServiceModel.Web/Release/net8.0-windows/System.ServiceModel.Web.pdbSHA256 source: System.ServiceModel.Web.dll.4.dr |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ | Jump to behavior |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\ | Jump to behavior |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ | Jump to behavior |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\AppData\ | Jump to behavior |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\ | Jump to behavior |
Source: C:\Users\user\Desktop\dr0p.exe | File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\ | Jump to behavior |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\.net\pkt1\904\System.Net.dll, type: DROPPED |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\.net\pkt1\904\System.dll, type: DROPPED |
Source: Yara match | File source: C:\Users\user\AppData\Local\Temp\.net\pkt1\904\netstandard.dll, type: DROPPED |
Source: global traffic | HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 07 Jan 2025 12:57:59 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Mon, 06 Jan 2025 05:15:33 GMTETag: "287a9be-62b02b7c80797"Accept-Ranges: bytesContent-Length: 42445246Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 0a 59 8b 17 4e 38 e5 44 4e 38 e5 44 4e 38 e5 44 47 40 76 44 58 38 e5 44 8d bb e6 45 5a 38 e5 44 8d bb e1 45 5c 38 e5 44 8d bb e0 45 11 38 e5 44 3e b9 e1 45 46 38 e5 44 3e b9 e4 45 43 38 e5 44 4e 38 e4 44 46 3a e5 44 5d bc e6 45 5b 38 e5 44 5d bc ec 45 c3 3a e5 44 5d bc e5 45 4f 38 e5 44 5d bc 1a 44 4f 38 e5 44 5d bc e7 45 4f 38 e5 44 52 69 63 68 4e 38 e5 44 00 00 00 00 00 00 00 00 50 45 00 00 64 86 0a 00 21 5f 11 67 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 0e 28 00 aa 61 00 00 ec 31 00 00 00 00 00 90 fe 5c 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 70 95 00 00 04 00 00 00 00 00 00 03 00 60 c1 00 00 18 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 f0 66 79 00 c4 00 00 00 b4 67 79 00 68 01 00 00 00 70 80 00 20 73 14 00 00 a0 7b 00 fc 60 03 00 00 00 00 00 00 00 00 00 00 f0 94 00 2c 7e 00 00 b0 a6 70 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 a8 70 00 28 00 00 00 40 45 62 00 40 01 00 00 00 00 00 00 00 00 00 00 00 d0 61 00 c8 0e 00 00 a4 64 79 00 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1c a7 61 00 00 10 00 00 00 a8 61 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 43 4c 52 5f 55 45 46 dd 00 00 00 00 c0 61 00 00 02 00 00 00 ac 61 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 e2 c5 17 00 00 d0 61 00 00 c6 17 00 00 ae 61 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 c4 ff 01 00 00 a0 79 00 00 98 00 00 00 74 79 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 fc 60 03 00 00 a0 7b 00 00 62 03 00 00 0c 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 69 64 61 74 00 00 38 00 00 00 00 10 7f 00 00 02 00 00 00 |