Windows
Analysis Report
5tmmrpv3dn.exe
Overview
General Information
Sample name: | 5tmmrpv3dn.exerenamed because original name is a hash value |
Original sample name: | 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe |
Analysis ID: | 1589090 |
MD5: | 062791084ec4605d7bbacf1105f5b885 |
SHA1: | dc68b7eb995dc6462016e18c90fb5ecb2311e290 |
SHA256: | 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447 |
Tags: | exeLummaStealeruser-adrian__luca |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 5tmmrpv3dn.exe (PID: 5820 cmdline:
"C:\Users\ user\Deskt op\5tmmrpv 3dn.exe" MD5: 062791084EC4605D7BBACF1105F5B885) - cmd.exe (PID: 2804 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Gs t Gst.cmd && Gst.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6052 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5372 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 4092 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6400 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5900 cmdline:
cmd /c md 366694 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 412 cmdline:
cmd /c cop y /b ..\Ha rdcover + ..\Palesti ne + ..\Ma rked + ..\ Chargers + ..\Import ant + ..\B loomberg d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Confusion.com (PID: 348 cmdline:
Confusion. com d MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11) - choice.exe (PID: 2412 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:40.071049+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49977 | 104.102.49.254 | 443 | TCP |
2025-01-11T09:27:41.170870+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:42.133763+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:43.229525+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49980 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:44.292938+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49981 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:45.431043+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49982 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:48.594497+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49983 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:49.786808+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49984 | 104.21.16.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:41.599575+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:42.608249+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:41.599575+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:42.608249+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.364677+0100 | 2058693 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 50364 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.317300+0100 | 2058701 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 57641 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.204366+0100 | 2057939 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 59895 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.302265+0100 | 2058703 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 62817 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.388817+0100 | 2058689 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53771 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.352603+0100 | 2058695 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 58429 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.376741+0100 | 2058691 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60348 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.340785+0100 | 2058697 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49304 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.328903+0100 | 2058699 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53570 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:49.025352+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49983 | 104.21.16.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:40.572342+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49977 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Process Stats: |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 11 Input Capture | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | 31 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 13 File and Directory Discovery | Distributed Component Object Model | 1 Clipboard Data | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 25 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
46% | Virustotal | Browse | ||
29% | ReversingLabs | Win32.Adware.Nemesis |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.16.1 | true | false | high | |
copper-replace.sbs | unknown | unknown | false | high | |
wrench-creter.sbs | unknown | unknown | false | high | |
dKRpuyysuLBMIlmJvSaOU.dKRpuyysuLBMIlmJvSaOU | unknown | unknown | true | unknown | |
savvy-steereo.sbs | unknown | unknown | false | high | |
lumharmonyfields.shop | unknown | unknown | true | unknown | |
plastic-mitten.sbs | unknown | unknown | false | high | |
slam-whipp.sbs | unknown | unknown | false | high | |
record-envyp.sbs | unknown | unknown | false | high | |
looky-marked.sbs | unknown | unknown | false | high | |
preside-comforter.sbs | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.16.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589090 |
Start date and time: | 2025-01-11 09:24:47 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 5tmmrpv3dn.exerenamed because original name is a hash value |
Original Sample Name: | 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@20/11@12/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50, 52.149.20.212
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:25:45 | API Interceptor | |
03:25:50 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.16.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | StormKitty | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\366694\Confusion.com | Get hash | malicious | SmokeLoader | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Orcus, Xmrig | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 893608 |
Entropy (8bit): | 6.620254876639106 |
Encrypted: | false |
SSDEEP: | 12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L |
MD5: | 6EE7DDEBFF0A2B78C7AC30F6E00D1D11 |
SHA1: | F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2 |
SHA-256: | 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4 |
SHA-512: | 57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 507733 |
Entropy (8bit): | 7.999627690441395 |
Encrypted: | true |
SSDEEP: | 12288:x2gvbmZOAczp9Mf0Iftun40/tUtgBzXNF/H:NvaOtjMf0y0T1UtUBF/ |
MD5: | 967367E7BC3ABDD43001AC80771BBC69 |
SHA1: | 4C85BC55A4C97A836D8EC3FA938418C76A908AB5 |
SHA-256: | 06C48947250EBA20B9911955FB38D53D5983109A6BF9E03DA13C313C08EBBC1C |
SHA-512: | 108C9F54D3E1EDA3BDE8C4E9473B95202760B370EF61B8F09F1412FF2312DF9BCB6F0CBD20FF2B3687C4DBC1C7853A872C856856EB947A17D20ABBBA9A7287C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68437 |
Entropy (8bit): | 7.9970041165827075 |
Encrypted: | true |
SSDEEP: | 1536:V9CatsaftM1siP07Q/kNiQryGUlmgYM6iW7ZD+xlJSSSAO:PCaGeXiPDSiQry1kg3jW7ZOSSdO |
MD5: | 91CE1EB0208993A4CC3FB34E1546F426 |
SHA1: | FAC48E9EF003C665FD09BF6F0C2989440BC3FC71 |
SHA-256: | 4D243732B785B2E7F59B2EECACAF84A5B2208A8EDB021BA334AE8E9C6627ABC4 |
SHA-512: | 24177D1AB703994908CAA39F41CE78BD98E69529F8E855E21E9BAED5E0FDEB78D7B677B6A6A4901344BFA790800DB3488C1389E88FC9CE30CE8550AA1D041116 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 81920 |
Entropy (8bit): | 7.997911716187635 |
Encrypted: | true |
SSDEEP: | 1536:BM/yXPgrYig/nfqNJbnSFD+Ncu+kif6ALR4HjSJ7ylOfEoU4DjvTHT:jmY/fynbi+a76AKDS5yoU4HT |
MD5: | EEBBB090700C0267918BD6D3C62A3DCB |
SHA1: | 1F710F6D79FE533A2EC9AB7D9687693137D48453 |
SHA-256: | EBA892494B1C5C907A759C4117324364C8578E1055CB83771690E72363973263 |
SHA-512: | 93E5FB9E90186B5BB606E945E390D7F0F5A76478BB26427452CB810B0A2F48209E417C12216FB82D8582FB95CB3E8A13F391E1D76F407EEA89214C9480A16BFF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18912 |
Entropy (8bit): | 5.096743744635592 |
Encrypted: | false |
SSDEEP: | 384:tLffX1RCbUWxQFu7wB9KhTNbGlwBmFLpw8/3Kf2i2UCPojAqsTTSy52UCwELMFii:tD3CbUWKFzs5NV8hD/3KfUJAsKJVMFeC |
MD5: | 525A1FBFD01B226CDD9567311120ECE3 |
SHA1: | 93B3B1CDC48D809FD75B005D665E7A1847056F3B |
SHA-256: | 08866F002A9A44C8FADF47CED1A4A4EE884A349E0B41FEED9496707AD424EA31 |
SHA-512: | 131CBDF48F43FBD28521AA255E89F6E6A5156AB50D7061F0B0AFC951E21D604B954B55A3CF68B3E145A32F38118957B6549E61B58D89FF47F4C73AEA1BF2360B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18912 |
Entropy (8bit): | 5.096743744635592 |
Encrypted: | false |
SSDEEP: | 384:tLffX1RCbUWxQFu7wB9KhTNbGlwBmFLpw8/3Kf2i2UCPojAqsTTSy52UCwELMFii:tD3CbUWKFzs5NV8hD/3KfUJAsKJVMFeC |
MD5: | 525A1FBFD01B226CDD9567311120ECE3 |
SHA1: | 93B3B1CDC48D809FD75B005D665E7A1847056F3B |
SHA-256: | 08866F002A9A44C8FADF47CED1A4A4EE884A349E0B41FEED9496707AD424EA31 |
SHA-512: | 131CBDF48F43FBD28521AA255E89F6E6A5156AB50D7061F0B0AFC951E21D604B954B55A3CF68B3E145A32F38118957B6549E61B58D89FF47F4C73AEA1BF2360B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 7.997934441204886 |
Encrypted: | true |
SSDEEP: | 1536:OLdn4uMDySk7lERkeENtbOZQPsHQO5VH7LzcisncxMsqkscqQGXw06Y:Oy2o2oXvH7KnS9EdQ+UY |
MD5: | 149C1B7A5FD92F6CE76E31259B6CC694 |
SHA1: | D95FF1E129134D522F4A078E0CBE31ACA2104739 |
SHA-256: | 61129BC10A6CC409AABC5618E1BADD406EBD115A2E1605EEE246B50B57087253 |
SHA-512: | B93971F864F44C12CDF721EE37F1A94B80B1B9FAA3370EDA66325BF827A988DDE058E19751CF0F82EA2A2B8F55E9B73CC65AEA392CCD96E8379C042FB9742FAE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.99790626455546 |
Encrypted: | true |
SSDEEP: | 1536:YtYQOnM1UIgDZ8V8ZX3Vy9/UZSjtupZyeZ7xrNiWwglsQKpFp2KHbfID91UjwmOw:YiFM1Udd8AlyJUZS4TyeTrQWzuvp2KTn |
MD5: | 6D0F8D8F9A768AC700EA461AD028B82A |
SHA1: | 4445CE81851CC1D4CD5F9654D0BB97E2023A277A |
SHA-256: | 06EE6AF7E165F13D40C0C303A149BCB8AC047CF4BB719C15C6B212C9C71E4327 |
SHA-512: | 9B0B07660FD8BFA21EC211DAF704AE75F0B8EF1CED70475E9E27888E288A5293BF5A4D09E2413660C6E9A429CE943E9C8F5EECBB4224FE286B1F5C876A003205 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 93184 |
Entropy (8bit): | 7.997875829938428 |
Encrypted: | true |
SSDEEP: | 1536:plYRtlH6TkaS2zTiTBdFkZzC7xp9hZxNU9kSYy5wQ6nX+ykYCH38O7S3fTMuT:fS23iFd6ZzC7xpZx29hYd+8w8fVT |
MD5: | C4B6B683CD11871D48887170D648B730 |
SHA1: | 48F6CEA1569C5010589CFC920209BDA425391A7E |
SHA-256: | F5352A91D4BE396FA5A34F8A24C83BFBE7F7675FA56C4D9413EBD3B232CBC775 |
SHA-512: | 50F1FBB10044070520563C06FB30D92C18E3E5F8B9C6276D934B65F462357BF7D87090E43EF53447571C65219E26C9CE3A695018C5611B9860D642A0226CB219 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 7.9980340162051835 |
Encrypted: | true |
SSDEEP: | 1536:e9Ww4p238tx7Wy26IMAUDDB5KFwcKO4kzvVBAAlkjfA8MYZ4Uw6HvMSCVYHHgqEj:efH8v7Wz6IMAUZ5KycXRM+kUDhH6Hkf1 |
MD5: | 06263E5E099DB2AC80685C8E0CF24157 |
SHA1: | 044EA93D3A9CF211C2C799A3CECBC691E3490D33 |
SHA-256: | 0712DAB7F1A3AAD3CCACAF351EB05158ED6B23AC522E7B6B386BF5788D7ADFB7 |
SHA-512: | E556560AE12D2E13FB9F4CB6F613BA4389CDC938E32E76A73DB4E01237F929179B0F633F2BF1ED6973073314E63F0C04F4AB1D834953C2E7B291EE93FE6007FB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 893606 |
Entropy (8bit): | 6.620250180377024 |
Encrypted: | false |
SSDEEP: | 12288:spVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:sT3E53Myyzl0hMf1te7xaA8M0L |
MD5: | D7BF348096E384A360A291C002C905B3 |
SHA1: | B360B8869BBAE24D8FA2262AFDF4CFFCB028CD77 |
SHA-256: | CEB9D4DFBD2602D2827051C969A54F4B22910C7557D4F71C8F6529CD7720C2C7 |
SHA-512: | 351EE7216BFC3EB0CDBB9CE6760EF70A4E4FF029B8071F74B5A5208CD7EDC55CFF7F2A8B2F0ECC1CA47CEE3A77BA8FEF1727848C0C1453E00CDAB73EE2085105 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.324007823424306 |
TrID: |
|
File name: | 5tmmrpv3dn.exe |
File size: | 73'424'964 bytes |
MD5: | 062791084ec4605d7bbacf1105f5b885 |
SHA1: | dc68b7eb995dc6462016e18c90fb5ecb2311e290 |
SHA256: | 00b9d1d9fdecf5c56035cd90461a9a3a93d74b588d203253b2698c64eddcb447 |
SHA512: | a5ecbe3995ed230fc92ecb9e0566a36bd7c7ee26e160952b94c694ec6cedb4359366aee0e9fa4c404f05f4c64b70fa6bff0578f24f77f1501d5ae4af4c1a0a67 |
SSDEEP: | 24576:PcdAO+ciGEFSv5osh93ZkB0CMBR3EkuKrpXSsfN1htUIyDcOc7O7g:kMGNhBWK5BR3EkZNp1yDcx |
TLSH: | 94F723CF732D365902AF2B22853A18DE787A67F370B015D89082D074BAAD7905767F2D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...l...B...8..... |
Icon Hash: | fe38703429382080 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | EC7B36F045D3BB302D05569D0BD6531F |
Thumbprint SHA-1: | 9F99B788DFFFB11844E772AFFEC29DD91B12B8BC |
Thumbprint SHA-256: | 76526A2214EE71A25AA57B9EAF03D64B0F146BE5562E2568FA089653FE4A07B9 |
Serial: | 6E6AEF9D6F88948F39C9D04ACD49007B |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F3900BCA3EBh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F3900BCA0CDh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F3900BCA0BBh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F3900BC79BAh |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F3900BC9D91h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F3900BC7A43h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F3900BC79BAh |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x1fb2a | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x45ffff4 | 0x6050 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x1fb2a | 0x1fc00 | 7404f426b3fe77d11b0d496f080cc0c2 | False | 0.9906342273622047 | data | 7.967594346983885 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x120000 | 0xfd6 | 0x1000 | e98c003c9617d2a00331bcb73f0a9779 | False | 0.598876953125 | data | 5.595823704555002 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1001c0 | 0x1ef8b | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 1.0003626073041723 |
RT_ICON | 0x11f14c | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8209219858156028 |
RT_DIALOG | 0x11f5b4 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x11f6b4 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x11f7d0 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x11f830 | 0x22 | Targa image data - Map 32 x 61323 x 1 +1 | English | United States | 0.9705882352941176 |
RT_MANIFEST | 0x11f854 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-11T09:27:39.204366+0100 | 2057939 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (lumharmonyfields .shop) | 1 | 192.168.2.5 | 59895 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.302265+0100 | 2057909 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (plastic-mitten .sbs) | 1 | 192.168.2.5 | 62817 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.302265+0100 | 2058001 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (plastic-mitten .sbs) | 1 | 192.168.2.5 | 62817 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.302265+0100 | 2058703 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (plastic-mitten .sbs) | 1 | 192.168.2.5 | 62817 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.317300+0100 | 2057905 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (looky-marked .sbs) | 1 | 192.168.2.5 | 57641 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.317300+0100 | 2057999 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (looky-marked .sbs) | 1 | 192.168.2.5 | 57641 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.317300+0100 | 2058701 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (looky-marked .sbs) | 1 | 192.168.2.5 | 57641 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.328903+0100 | 2057919 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrench-creter .sbs) | 1 | 192.168.2.5 | 53570 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.328903+0100 | 2057997 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrench-creter .sbs) | 1 | 192.168.2.5 | 53570 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.328903+0100 | 2058699 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrench-creter .sbs) | 1 | 192.168.2.5 | 53570 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.340785+0100 | 2057917 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slam-whipp .sbs) | 1 | 192.168.2.5 | 49304 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.340785+0100 | 2057995 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slam-whipp .sbs) | 1 | 192.168.2.5 | 49304 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.340785+0100 | 2058697 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (slam-whipp .sbs) | 1 | 192.168.2.5 | 49304 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.352603+0100 | 2057913 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (record-envyp .sbs) | 1 | 192.168.2.5 | 58429 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.352603+0100 | 2057993 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (record-envyp .sbs) | 1 | 192.168.2.5 | 58429 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.352603+0100 | 2058695 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (record-envyp .sbs) | 1 | 192.168.2.5 | 58429 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.364677+0100 | 2057903 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (copper-replace .sbs) | 1 | 192.168.2.5 | 50364 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.364677+0100 | 2057991 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (copper-replace .sbs) | 1 | 192.168.2.5 | 50364 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.364677+0100 | 2058693 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (copper-replace .sbs) | 1 | 192.168.2.5 | 50364 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.376741+0100 | 2057915 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savvy-steereo .sbs) | 1 | 192.168.2.5 | 60348 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.376741+0100 | 2057989 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savvy-steereo .sbs) | 1 | 192.168.2.5 | 60348 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.376741+0100 | 2058691 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (savvy-steereo .sbs) | 1 | 192.168.2.5 | 60348 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.388817+0100 | 2057911 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (preside-comforter .sbs) | 1 | 192.168.2.5 | 53771 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.388817+0100 | 2057987 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (preside-comforter .sbs) | 1 | 192.168.2.5 | 53771 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:39.388817+0100 | 2058689 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (preside-comforter .sbs) | 1 | 192.168.2.5 | 53771 | 1.1.1.1 | 53 | UDP |
2025-01-11T09:27:40.071049+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49977 | 104.102.49.254 | 443 | TCP |
2025-01-11T09:27:40.572342+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49977 | 104.102.49.254 | 443 | TCP |
2025-01-11T09:27:41.170870+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:41.599575+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:41.599575+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:42.133763+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:42.608249+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:42.608249+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:43.229525+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49980 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:44.292938+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49981 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:45.431043+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49982 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:48.594497+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49983 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:49.025352+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49983 | 104.21.16.1 | 443 | TCP |
2025-01-11T09:27:49.786808+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49984 | 104.21.16.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 11, 2025 09:27:39.430557966 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:39.430610895 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:39.430823088 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:39.432501078 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:39.432518005 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.070966959 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.071048975 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.072788000 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.072801113 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.073088884 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.118398905 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.173073053 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.219331026 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572346926 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572365999 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572407007 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572422981 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572427988 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.572455883 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572465897 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.572483063 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.572521925 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.671171904 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.671196938 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.671277046 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.671292067 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.671318054 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.671335936 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.676156998 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.676228046 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.676233053 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.676249981 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.676275015 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.676305056 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.676999092 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.677014112 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.677041054 CET | 49977 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 11, 2025 09:27:40.677047014 CET | 443 | 49977 | 104.102.49.254 | 192.168.2.5 |
Jan 11, 2025 09:27:40.690506935 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:40.690551996 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:40.690629005 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:40.690994024 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:40.691006899 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.170789957 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.170870066 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.172537088 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.172544003 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.172771931 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.174154997 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.174170971 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.174217939 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.599531889 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.599651098 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.599812031 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.603962898 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.603979111 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.603986979 CET | 49978 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.603992939 CET | 443 | 49978 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.646877050 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.646927118 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:41.647082090 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.647285938 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:41.647303104 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.133594036 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.133763075 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.137453079 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.137466908 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.137738943 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.139297009 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.139297962 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.139380932 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608258963 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608316898 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608350992 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608392954 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608423948 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608515978 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608521938 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.608540058 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608568907 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.608568907 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.608576059 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.608689070 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.608696938 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.609343052 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.609411001 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.609419107 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.649705887 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.649727106 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.696571112 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700351954 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700426102 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700459003 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700491905 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700519085 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700562954 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700608969 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700608969 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700757980 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700788021 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.700896025 CET | 49979 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.700906038 CET | 443 | 49979 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.774470091 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.774535894 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:42.774638891 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.775018930 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:42.775033951 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.229414940 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.229525089 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.233485937 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.233499050 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.233803988 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.237862110 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.237984896 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.238010883 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.794426918 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.794529915 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.794615984 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.794755936 CET | 49980 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.794764996 CET | 443 | 49980 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.818710089 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.818811893 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:43.818927050 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.819258928 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:43.819298029 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.292848110 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.292937994 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.294439077 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.294470072 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.294786930 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.296153069 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.296485901 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.296531916 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.296614885 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.296632051 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.809700012 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.809793949 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.809883118 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.810111046 CET | 49981 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.810147047 CET | 443 | 49981 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.947243929 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.947310925 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:44.947634935 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.947674990 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:44.947684050 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:45.430960894 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:45.431042910 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:45.432282925 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:45.432307959 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:45.432559013 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:45.433957100 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:45.434119940 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:45.434160948 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:45.434235096 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:45.434246063 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.060477018 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.060731888 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.060807943 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.060877085 CET | 49982 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.060894966 CET | 443 | 49982 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.131797075 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.131841898 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.131922960 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.132200003 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.132215023 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.594270945 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.594496965 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.595618010 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.595648050 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.596638918 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:48.597769022 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.597851992 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:48.597867012 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.025368929 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.025604963 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.025676966 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.025744915 CET | 49983 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.025760889 CET | 443 | 49983 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.320873976 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.320918083 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.321058989 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.321329117 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.321343899 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.786684036 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.786808014 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.788053989 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.788069010 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.788367987 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.789609909 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.790280104 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.790323973 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.790445089 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.790503025 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.790672064 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.790729046 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.790883064 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.790935993 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.791114092 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791163921 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.791389942 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791431904 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.791451931 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791482925 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.791672945 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791714907 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.791768074 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791858912 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.791919947 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.800810099 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.801054955 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.801099062 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:49.801151037 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.801243067 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Jan 11, 2025 09:27:49.805541039 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:51.372824907 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:51.373075962 CET | 443 | 49984 | 104.21.16.1 | 192.168.2.5 |
Jan 11, 2025 09:27:51.373155117 CET | 49984 | 443 | 192.168.2.5 | 104.21.16.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 11, 2025 09:25:50.646866083 CET | 49546 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:25:50.654707909 CET | 53 | 49546 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.204365969 CET | 59895 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.295777082 CET | 53 | 59895 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.302264929 CET | 62817 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.313132048 CET | 53 | 62817 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.317300081 CET | 57641 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.326222897 CET | 53 | 57641 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.328902960 CET | 53570 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.337758064 CET | 53 | 53570 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.340785027 CET | 49304 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.349874973 CET | 53 | 49304 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.352602959 CET | 58429 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.361675024 CET | 53 | 58429 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.364676952 CET | 50364 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.373656988 CET | 53 | 50364 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.376740932 CET | 60348 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.385572910 CET | 53 | 60348 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.388817072 CET | 53771 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.398222923 CET | 53 | 53771 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:39.403753996 CET | 64449 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:39.410621881 CET | 53 | 64449 | 1.1.1.1 | 192.168.2.5 |
Jan 11, 2025 09:27:40.679198027 CET | 55122 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 11, 2025 09:27:40.689522028 CET | 53 | 55122 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 11, 2025 09:25:50.646866083 CET | 192.168.2.5 | 1.1.1.1 | 0x24dd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.204365969 CET | 192.168.2.5 | 1.1.1.1 | 0xbeac | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.302264929 CET | 192.168.2.5 | 1.1.1.1 | 0xb315 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.317300081 CET | 192.168.2.5 | 1.1.1.1 | 0x581a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.328902960 CET | 192.168.2.5 | 1.1.1.1 | 0xb308 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.340785027 CET | 192.168.2.5 | 1.1.1.1 | 0xe9d4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.352602959 CET | 192.168.2.5 | 1.1.1.1 | 0xc510 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.364676952 CET | 192.168.2.5 | 1.1.1.1 | 0xd0cd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.376740932 CET | 192.168.2.5 | 1.1.1.1 | 0x2b6f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.388817072 CET | 192.168.2.5 | 1.1.1.1 | 0x1b18 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.403753996 CET | 192.168.2.5 | 1.1.1.1 | 0x1d71 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:40.679198027 CET | 192.168.2.5 | 1.1.1.1 | 0x9724 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 11, 2025 09:25:50.654707909 CET | 1.1.1.1 | 192.168.2.5 | 0x24dd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.295777082 CET | 1.1.1.1 | 192.168.2.5 | 0xbeac | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.313132048 CET | 1.1.1.1 | 192.168.2.5 | 0xb315 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.326222897 CET | 1.1.1.1 | 192.168.2.5 | 0x581a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.337758064 CET | 1.1.1.1 | 192.168.2.5 | 0xb308 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.349874973 CET | 1.1.1.1 | 192.168.2.5 | 0xe9d4 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.361675024 CET | 1.1.1.1 | 192.168.2.5 | 0xc510 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.373656988 CET | 1.1.1.1 | 192.168.2.5 | 0xd0cd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.385572910 CET | 1.1.1.1 | 192.168.2.5 | 0x2b6f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.398222923 CET | 1.1.1.1 | 192.168.2.5 | 0x1b18 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 11, 2025 09:27:39.410621881 CET | 1.1.1.1 | 192.168.2.5 | 0x1d71 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 11, 2025 09:27:40.689522028 CET | 1.1.1.1 | 192.168.2.5 | 0x9724 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49977 | 104.102.49.254 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:40 UTC | 219 | OUT | |
2025-01-11 08:27:40 UTC | 1905 | IN | |
2025-01-11 08:27:40 UTC | 14479 | IN | |
2025-01-11 08:27:40 UTC | 16384 | IN | |
2025-01-11 08:27:40 UTC | 3768 | IN | |
2025-01-11 08:27:40 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49978 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:41 UTC | 263 | OUT | |
2025-01-11 08:27:41 UTC | 8 | OUT | |
2025-01-11 08:27:41 UTC | 1123 | IN | |
2025-01-11 08:27:41 UTC | 7 | IN | |
2025-01-11 08:27:41 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49979 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:42 UTC | 264 | OUT | |
2025-01-11 08:27:42 UTC | 79 | OUT | |
2025-01-11 08:27:42 UTC | 1125 | IN | |
2025-01-11 08:27:42 UTC | 244 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN | |
2025-01-11 08:27:42 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49980 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:43 UTC | 279 | OUT | |
2025-01-11 08:27:43 UTC | 12817 | OUT | |
2025-01-11 08:27:43 UTC | 1130 | IN | |
2025-01-11 08:27:43 UTC | 20 | IN | |
2025-01-11 08:27:43 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49981 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:44 UTC | 283 | OUT | |
2025-01-11 08:27:44 UTC | 15083 | OUT | |
2025-01-11 08:27:44 UTC | 1126 | IN | |
2025-01-11 08:27:44 UTC | 20 | IN | |
2025-01-11 08:27:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49982 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:45 UTC | 276 | OUT | |
2025-01-11 08:27:45 UTC | 15331 | OUT | |
2025-01-11 08:27:45 UTC | 5200 | OUT | |
2025-01-11 08:27:48 UTC | 1120 | IN | |
2025-01-11 08:27:48 UTC | 20 | IN | |
2025-01-11 08:27:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49983 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:48 UTC | 281 | OUT | |
2025-01-11 08:27:48 UTC | 1238 | OUT | |
2025-01-11 08:27:49 UTC | 1136 | IN | |
2025-01-11 08:27:49 UTC | 20 | IN | |
2025-01-11 08:27:49 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49984 | 104.21.16.1 | 443 | 348 | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-11 08:27:49 UTC | 278 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:49 UTC | 15331 | OUT | |
2025-01-11 08:27:51 UTC | 1129 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:25:45 |
Start date: | 11/01/2025 |
Path: | C:\Users\user\Desktop\5tmmrpv3dn.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'424'964 bytes |
MD5 hash: | 062791084EC4605D7BBACF1105F5B885 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:25:45 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:25:45 |
Start date: | 11/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:25:47 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:25:47 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:25:48 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 03:25:48 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 03:25:48 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 03:25:48 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:25:48 |
Start date: | 11/01/2025 |
Path: | C:\Users\user\AppData\Local\Temp\366694\Confusion.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6d0000 |
File size: | 893'608 bytes |
MD5 hash: | 6EE7DDEBFF0A2B78C7AC30F6E00D1D11 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 11 |
Start time: | 03:25:49 |
Start date: | 11/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|