Windows
Analysis Report
Set-up.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Set-up.exe (PID: 7104 cmdline:
"C:\Users\ user\Deskt op\Set-up. exe" MD5: 7A7570C5AFC5BF3D53854F4AE9E61457)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["spookycappy.biz", "fraggielek.biz", "grandiouseziu.biz", "marketlumpe.biz", "nuttyshopr.biz", "littlenotii.biz", "rampnatleadk.click", "punishzement.biz", "truculengisau.biz"], "Build id": "error--end"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 1 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:13.124090+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:14.615838+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:15.818900+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:17.106777+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:18.280695+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:21.757785+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:23.442162+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:26.618370+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.139.144 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:14.149231+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:15.116755+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:27.974091+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 172.67.139.144 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:14.149231+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:15.116755+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:17.580047+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49735 | 172.67.139.144 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 41 Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
7% | Virustotal | Browse | ||
13% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
rampnatleadk.click | 172.67.139.144 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.139.144 | rampnatleadk.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589443 |
Start date and time: | 2025-01-12 15:19:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 40s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Set-up.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
09:20:13 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.139.144 | Get hash | malicious | HTMLPhisher | Browse | ||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse | |||
Get hash | malicious | Metasploit | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
rampnatleadk.click | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | AteraAgent | Browse |
| |
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Python Stealer, Exela Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Blank Grabber, Umbral Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 4.912957308594877 |
TrID: |
|
File name: | Set-up.exe |
File size: | 73'935'792 bytes |
MD5: | 7a7570c5afc5bf3d53854f4ae9e61457 |
SHA1: | f58e3ef793b096e088438eb4df373294bf95c09b |
SHA256: | 3ab888d4b341b936543bb6d48504a4530c27466c4a40b0705ef3dba5a5326b6d |
SHA512: | 37c5605fca62df263ac8dd90628b4cf3ecd35a4c9b72556df98f3a92997ce90f317c00ad8606d7d7240064e92449263decef84257acc3312b07d1bbf539c5506 |
SSDEEP: | 786432:r5jdQMlIFsGI9Op1nkhf9FXCcb5DWk30lpu+6ecJ5OozAJCChf6:r5jerBp1khf9FVpZSBFmzECe6 |
TLSH: | 34F7011DA42240B5CAC705F20442EBEFDFAC91C7B30C69FB8558B829E65EEE13875275 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................,...7...............,...@...........................=.....O.h....... ............................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x401490 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x0 [Thu Jan 1 00:00:00 1970 UTC] |
TLS Callbacks: | 0x577900, 0x5778b0, 0x586160 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 66f460940005bddd8c100e502fe04a61 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 182448CAE21BA54F268E2431834C010A |
Thumbprint SHA-1: | 95049E3871E56AD012E4A9FAF47E3ED3B24560ED |
Thumbprint SHA-256: | CB40734E877816F319B7003E8742ABF2E674853AE9E1E3F3DE48AAAF41CD9B6C |
Serial: | 093ED8E100C38F343753BB55EFF93AA9 |
Instruction |
---|
mov dword ptr [0077FB80h], 00000000h |
jmp 00007F1BF4C5D6A6h |
nop |
sub esp, 1Ch |
mov eax, dword ptr [esp+20h] |
mov dword ptr [esp], eax |
call 00007F1BF4DE0286h |
test eax, eax |
sete al |
add esp, 1Ch |
movzx eax, al |
neg eax |
ret |
nop |
nop |
nop |
push ebp |
mov ebp, esp |
sub esp, 18h |
mov eax, dword ptr [006CDF40h] |
test eax, eax |
je 00007F1BF4C5DA1Eh |
mov dword ptr [esp], 006CE000h |
call dword ptr [00781324h] |
sub esp, 04h |
test eax, eax |
mov edx, 00000000h |
je 00007F1BF4C5D9F8h |
mov dword ptr [esp+04h], 006CE00Eh |
mov dword ptr [esp], eax |
call dword ptr [00781330h] |
sub esp, 08h |
mov edx, eax |
test edx, edx |
je 00007F1BF4C5D9EBh |
mov dword ptr [esp], 006CDF40h |
call edx |
mov dword ptr [esp], 00401520h |
call 00007F1BF4C5D96Eh |
leave |
ret |
lea esi, dword ptr [esi+00000000h] |
push ebp |
mov ebp, esp |
pop ebp |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
mov edx, dword ptr [eax+04h] |
test edx, edx |
jne 00007F1BF4C5D9EDh |
jmp 00007F1BF4C5D9F9h |
lea esi, dword ptr [esi+00000000h] |
mov edx, eax |
mov eax, dword ptr [edx] |
test eax, eax |
jne 00007F1BF4C5D9DAh |
mov eax, edx |
ret |
nop |
lea esi, dword ptr [esi+00h] |
mov edx, dword ptr [eax+08h] |
test edx, edx |
je 00007F1BF4C5D9FBh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x381000 | 0x1130 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x3d8000 | 0xa90 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x467fbd0 | 0x2fe0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x377c60 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3812d4 | 0x298 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2c946c | 0x2c9600 | 9cf47fc347cdbbf130eddec516aa1240 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x2cb000 | 0x2f44 | 0x3000 | 130b4e00ce634bad52c053e1574fe9a9 | False | 0.280517578125 | data | 3.243424224347642 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x2ce000 | 0xb08f0 | 0xb0a00 | bea2499c0e1df9cd97a030da848314ac | False | 0.2471014132165605 | data | 6.065462763185077 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ |
.bss | 0x37f000 | 0x1720 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x381000 | 0x1130 | 0x1200 | 942388f17ddd7b3b9e942aa3e25ef1f0 | False | 0.3721788194444444 | data | 5.188836074181512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x383000 | 0x38 | 0x200 | d5aa9775f71d308d7c3bf602d41f42e9 | False | 0.080078125 | Matlab v4 mat-file (little endian) \220xW, numeric, rows 4198688, columns 0 | 0.32492027068200274 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x384000 | 0x53e00 | 0x53e00 | f595e5ebf5bb869b2eb4cc0b46d0d7ff | False | 0.6724862611773472 | data | 7.476446820068237 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x3d8000 | 0xa90 | 0xc00 | ff44ed8a59e9a32256eeb1abc91aa665 | False | 0.3479817708333333 | data | 4.84698912941843 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x3d80b8 | 0x230 | data | Ukrainian | Ukrain | 0.5035714285714286 |
RT_MANIFEST | 0x3d82e8 | 0x528 | XML 1.0 document, ASCII text, with CRLF line terminators | 0.4643939393939394 | ||
RT_MANIFEST | 0x3d8810 | 0x280 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.553125 |
DLL | Import |
---|---|
KERNEL32.dll | AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateFileMappingA, CreateFileW, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFileSize, GetFileSizeEx, GetHandleInformation, GetLastError, GetModuleHandleA, GetModuleHandleW, GetNamedPipeClientProcessId, GetProcAddress, GetProcessAffinityMask, GetStartupInfoA, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, QueryFullProcessImageNameA, RaiseException, ReadFile, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte |
msvcrt.dll | __getmainargs, __initenv, __lconv_init, __mb_cur_max, __p__acmdln, __p__commode, __p__fmode, __set_app_type, __setusermatherr, _amsg_exit, _assert, _beginthreadex, _cexit, _endthreadex, _errno, _fileno, _get_osfhandle, _initterm, _iob, _isatty, _lock, _onexit, _setjmp3, _strdup, _strnicmp, _ultoa, _unlock, abort, atof, atoi, calloc, clearerr, exit, fclose, feof, ferror, fflush, fgetc, fopen, fprintf, fputc, fputs, fread, free, frexp, fwrite, getc, getenv, isalpha, isprint, isspace, iswctype, localeconv, malloc, mbstowcs, memchr, memcmp, memcpy, memmove, memset, gmtime, printf, putc, qsort, realloc, remove, setlocale, setvbuf, signal, strcat, strchr, strcmp, strcoll, strcpy, strerror, strftime, strlen, strncmp, strncpy, strrchr, strstr, strtol, strtoul, strxfrm, tolower, toupper, towlower, towupper, ungetc, vfprintf, time, wcscoll, wcsftime, wcslen, wcsxfrm, longjmp, _write, _strdup, _setmode, _fileno, _fdopen |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Ukrainian | Ukrain | |
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-12T15:20:13.124090+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:14.149231+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:14.149231+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:14.615838+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:15.116755+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:15.116755+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:15.818900+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:17.106777+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:17.580047+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49735 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:18.280695+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:21.757785+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:23.442162+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:26.618370+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.139.144 | 443 | TCP |
2025-01-12T15:20:27.974091+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 172.67.139.144 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 12, 2025 15:20:12.646370888 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:12.646393061 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:12.646457911 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:12.648998976 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:12.649012089 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:13.123961926 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:13.124089956 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:13.160512924 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:13.160533905 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:13.160914898 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:13.207465887 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:13.384536982 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:13.384556055 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:13.384658098 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.149202108 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.149274111 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.149327040 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.150636911 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.150649071 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.150659084 CET | 49732 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.150662899 CET | 443 | 49732 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.158315897 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.158409119 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.158504009 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.158849001 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.158888102 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.615753889 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.615838051 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.616894960 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.616919994 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.617142916 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:14.618093014 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.618134022 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:14.618180037 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116544962 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116594076 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116625071 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116652012 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.116708994 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116748095 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.116770029 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.116925001 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116970062 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.116971016 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.116985083 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.117026091 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.117450953 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.160599947 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203063965 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203140020 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203164101 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203202009 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203226089 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203254938 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203284979 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203326941 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203466892 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203500032 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.203524113 CET | 49733 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.203536987 CET | 443 | 49733 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.362643003 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.362678051 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.362734079 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.362977028 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.362987995 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.818819046 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.818900108 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.842443943 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.842457056 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.842705965 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.865037918 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.865148067 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.865175962 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:15.865225077 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:15.865231037 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:16.496027946 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:16.496107101 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:16.496201992 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:16.496265888 CET | 49734 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:16.496277094 CET | 443 | 49734 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:16.623943090 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:16.624032021 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:16.624114037 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:16.624571085 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:16.624624014 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.106558084 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.106776953 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.108421087 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.108450890 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.109297037 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.110527039 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.110642910 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.110676050 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.580065966 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.580406904 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.580593109 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.581332922 CET | 49735 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.581372023 CET | 443 | 49735 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.792392015 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.792484045 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:17.792603016 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.792871952 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:17.792912006 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:18.280369997 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:18.280694962 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:18.292406082 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:18.292455912 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:18.293528080 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:18.337877989 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:18.338059902 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:18.338161945 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:18.338233948 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:18.338249922 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:20.436995983 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:20.437235117 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:20.437433958 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:20.437515974 CET | 49736 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:20.437555075 CET | 443 | 49736 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.261101007 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.261133909 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.261192083 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.261594057 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.261606932 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.757654905 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.757785082 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.758768082 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.758785009 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.759728909 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:21.761069059 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.761145115 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:21.761149883 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:22.233613968 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:22.233850956 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:22.234071016 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:22.234559059 CET | 49737 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:22.234571934 CET | 443 | 49737 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:22.851324081 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:22.851367950 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:22.851866961 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:22.851867914 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:22.851907969 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.442008018 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.442162037 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.443069935 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.443084002 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.443434954 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.455646038 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.456299067 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.456345081 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.456624985 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.456669092 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.456796885 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.456897974 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.457047939 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.457088947 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.457264900 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.457313061 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.457500935 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.457550049 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.457576036 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.457755089 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.457815886 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.465557098 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.465815067 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.465858936 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.465904951 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.466001987 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.466057062 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.467006922 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:23.467138052 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:23.467179060 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.137933969 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.138001919 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.138113976 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.138202906 CET | 49741 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.138241053 CET | 443 | 49741 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.164457083 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.164542913 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.164628029 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.165004015 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.165039062 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.618268967 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.618370056 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.619371891 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.619401932 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.619631052 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:26.626986980 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.627029896 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:26.627074003 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:27.973925114 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:27.973984003 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:27.974066973 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:27.974219084 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:27.974219084 CET | 49745 | 443 | 192.168.2.4 | 172.67.139.144 |
Jan 12, 2025 15:20:27.974261999 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Jan 12, 2025 15:20:27.974289894 CET | 443 | 49745 | 172.67.139.144 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 12, 2025 15:20:12.619774103 CET | 53308 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 12, 2025 15:20:12.641587973 CET | 53 | 53308 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 12, 2025 15:20:12.619774103 CET | 192.168.2.4 | 1.1.1.1 | 0x3b42 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 12, 2025 15:20:12.641587973 CET | 1.1.1.1 | 192.168.2.4 | 0x3b42 | No error (0) | 172.67.139.144 | A (IP address) | IN (0x0001) | false | ||
Jan 12, 2025 15:20:12.641587973 CET | 1.1.1.1 | 192.168.2.4 | 0x3b42 | No error (0) | 104.21.79.9 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49732 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:13 UTC | 265 | OUT | |
2025-01-12 14:20:13 UTC | 8 | OUT | |
2025-01-12 14:20:14 UTC | 1134 | IN | |
2025-01-12 14:20:14 UTC | 7 | IN | |
2025-01-12 14:20:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:14 UTC | 266 | OUT | |
2025-01-12 14:20:14 UTC | 49 | OUT | |
2025-01-12 14:20:15 UTC | 1131 | IN | |
2025-01-12 14:20:15 UTC | 238 | IN | |
2025-01-12 14:20:15 UTC | 901 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN | |
2025-01-12 14:20:15 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:15 UTC | 279 | OUT | |
2025-01-12 14:20:15 UTC | 15331 | OUT | |
2025-01-12 14:20:15 UTC | 2804 | OUT | |
2025-01-12 14:20:16 UTC | 1131 | IN | |
2025-01-12 14:20:16 UTC | 20 | IN | |
2025-01-12 14:20:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49735 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:17 UTC | 274 | OUT | |
2025-01-12 14:20:17 UTC | 8732 | OUT | |
2025-01-12 14:20:17 UTC | 1135 | IN | |
2025-01-12 14:20:17 UTC | 20 | IN | |
2025-01-12 14:20:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49736 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:18 UTC | 279 | OUT | |
2025-01-12 14:20:18 UTC | 15331 | OUT | |
2025-01-12 14:20:18 UTC | 5078 | OUT | |
2025-01-12 14:20:20 UTC | 1136 | IN | |
2025-01-12 14:20:20 UTC | 20 | IN | |
2025-01-12 14:20:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49737 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:21 UTC | 284 | OUT | |
2025-01-12 14:20:21 UTC | 1409 | OUT | |
2025-01-12 14:20:22 UTC | 1124 | IN | |
2025-01-12 14:20:22 UTC | 20 | IN | |
2025-01-12 14:20:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49741 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:23 UTC | 278 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:23 UTC | 15331 | OUT | |
2025-01-12 14:20:26 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49745 | 172.67.139.144 | 443 | 7104 | C:\Users\user\Desktop\Set-up.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-12 14:20:26 UTC | 266 | OUT | |
2025-01-12 14:20:26 UTC | 84 | OUT | |
2025-01-12 14:20:27 UTC | 1124 | IN | |
2025-01-12 14:20:27 UTC | 54 | IN | |
2025-01-12 14:20:27 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 09:20:05 |
Start date: | 12/01/2025 |
Path: | C:\Users\user\Desktop\Set-up.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'935'792 bytes |
MD5 hash: | 7A7570C5AFC5BF3D53854F4AE9E61457 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |